يعرض 1 - 20 نتائج من 53 نتيجة بحث عن 'binary e learning ((detection algorithm) OR (optimization algorithm))', وقت الاستعلام: 0.36s تنقيح النتائج
  1. 1

    MSE for ILSTM algorithm in binary classification. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  2. 2
  3. 3
  4. 4

    A* Path-Finding Algorithm to Determine Cell Connections حسب Max Weng (22327159)

    منشور في 2025
    "…To address this, the research integrates a modified A* pathfinding algorithm with a U-Net convolutional neural network, a custom statistical binary classification method, and a personalized Min-Max connectivity threshold to automate the detection of astrocyte connectivity.…"
  5. 5
  6. 6
  7. 7

    Comparison of intrusion detection systems. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  8. 8
  9. 9

    Effects of Class Imbalance and Data Scarcity on the Performance of Binary Classification Machine Learning Models Developed Based on ToxCast/Tox21 Assay Data حسب Changhun Kim (682542)

    منشور في 2022
    "…Therefore, the resampling algorithm employed should vary depending on the data distribution to achieve optimal classification performance. …"
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Summary of LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  16. 16

    SHAP analysis for LITNET-2020 dataset. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  17. 17

    Parameter setting for CBOA and PSO. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  18. 18

    NSL-KDD dataset description. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  19. 19

    The architecture of LSTM cell. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"
  20. 20

    The architecture of ILSTM. حسب Asmaa Ahmed Awad (16726315)

    منشور في 2023
    "…Deep learning models (e.g., Long Short-Term Memory, LSTM) have been employed in designing intrusion detection systems to address this issue. …"