Search alternatives:
selective algorithm » selection algorithm (Expand Search), detection algorithm (Expand Search), detection algorithms (Expand Search)
task selective » based selective (Expand Search), a selective (Expand Search), mutant selective (Expand Search)
selective algorithm » selection algorithm (Expand Search), detection algorithm (Expand Search), detection algorithms (Expand Search)
task selective » based selective (Expand Search), a selective (Expand Search), mutant selective (Expand Search)
-
341
Schematic diagram of 3D velocity collision cone.
Published 2025“…This paper proposes a dynamic path planning method based on the reciprocal velocity obstacles algorithm, enabling micro-UAVs to safely and efficiently accomplish flight tasks in complex environments. …”
-
342
Initial environment for multi-dynamic obstacles.
Published 2025“…This paper proposes a dynamic path planning method based on the reciprocal velocity obstacles algorithm, enabling micro-UAVs to safely and efficiently accomplish flight tasks in complex environments. …”
-
343
Confusion matrix of CIC-IDS2017 dataset.
Published 2025“…<div><p>Imbalanced intrusion classification is a complex and challenging task as there are few number of instances/intrusions generally considered as minority instances/intrusions in the imbalanced intrusion datasets. …”
-
344
Confusion matrix of NSL-KDD dataset.
Published 2025“…<div><p>Imbalanced intrusion classification is a complex and challenging task as there are few number of instances/intrusions generally considered as minority instances/intrusions in the imbalanced intrusion datasets. …”
-
345
Confusion matrix of CSE-CIC-IDS2018 dataset.
Published 2025“…<div><p>Imbalanced intrusion classification is a complex and challenging task as there are few number of instances/intrusions generally considered as minority instances/intrusions in the imbalanced intrusion datasets. …”
-
346
Confusion matrix of UNSW-NB15 dataset.
Published 2025“…<div><p>Imbalanced intrusion classification is a complex and challenging task as there are few number of instances/intrusions generally considered as minority instances/intrusions in the imbalanced intrusion datasets. …”
-
347
Confusion matrix of CIC-DDoS2019 dataset.
Published 2025“…<div><p>Imbalanced intrusion classification is a complex and challenging task as there are few number of instances/intrusions generally considered as minority instances/intrusions in the imbalanced intrusion datasets. …”
-
348
Proposed model training parameters.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
349
Input image and extracted features maps.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
350
Layer wise structure complexity reduction.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
351
Accuracy change vs. ELM layers pruning rate.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
352
Characteristic and limitations of existing work.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
353
Working procedure of ELM classifier network.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
354
Proposed CNN (EHO+HOBS-ELM) architecture.
Published 2024“…Firstly, an Elephant Herding Optimization (EHO) algorithm selects pertinent features for classification tasks. …”
-
355
-
356
An overview of DDGWizard.
Published 2025“…B: Collect data from the VariBench [<a href="http://www.ploscompbiol.org/article/info:doi/10.1371/journal.pcbi.1013783#pcbi.1013783.ref043" target="_blank">43</a>] database, conduct feature enrichment to the collected data using the feature calculation pipeline to obtain the DDGWizard dataset, and then split it into training and test sets for subsequent ML tasks. C: Perform feature selection based on the RFE (recursive feature elimination) algorithm, followed by a further analysis of feature importance. …”
-
357
gcPCA v4 correctly identifies hippocampal replay in neurophysiological data without prior knowledge of replay content.
Published 2025“…The automatic <i>α</i> selection algorithm from cPCA returns various <i>α</i> values depending on the number of cPCs requested (parameter <i>k</i>). …”
-
358
BOPIM: Bayesian Optimization for Influence Maximization on Temporal Networks
Published 2025“…In this work, we propose <math><mrow>BOPIM</mrow></math>, a Bayesian Optimization (BO) algorithm for IM on temporal networks. The IM task is well-suited for a BO solution due to its expensive and complicated objective function. …”
-
359
Example of CPE URI version 2.3.
Published 2024“…Lastly, we propose a high-confidence text selection method and an improved self-training algorithm that incorporates a teacher-student model and weight update constraints, for exploring the true labels of low-confidence text using a model trained on high-confidence text, thereby reducing the noise in the distant annotation data. …”
-
360
Ablation experiment results (in %).
Published 2024“…Lastly, we propose a high-confidence text selection method and an improved self-training algorithm that incorporates a teacher-student model and weight update constraints, for exploring the true labels of low-confidence text using a model trained on high-confidence text, thereby reducing the noise in the distant annotation data. …”