Hyperparameter optimization method based on harmony search algorithm to improve performance of 1D CNN human respiration pattern recognition system
SH Kim, ZW Geem, GT Han - Sensors, 2020 - mdpi.com
In this study, we propose a method to find an optimal combination of hyperparameters to
improve the accuracy of respiration pattern recognition in a 1D (Dimensional) convolutional …
improve the accuracy of respiration pattern recognition in a 1D (Dimensional) convolutional …
Automated Hyperparameter Optimization of Gradient Boosting Decision Tree Approach for Gold Mineral Prospectivity Mapping in the Xiong'ershan Area
M Fan, K Xiao, L Sun, S Zhang, Y Xu - Minerals, 2022 - mdpi.com
The weak classifier ensemble algorithms based on the decision tree model, mainly include
bagging (eg, fandom forest-RF) and boosting (eg, gradient boosting decision tree, eXtreme …
bagging (eg, fandom forest-RF) and boosting (eg, gradient boosting decision tree, eXtreme …
PPO: a new nature-inspired metaheuristic algorithm based on predation for optimization
B Mohammad Hasani Zade, N Mansouri - Soft Computing, 2021 - Springer
Researchers from different domains have developed several metaheuristic algorithms that
are inspired by the biological phenomenon. In this work, we propose a novel algorithm that …
are inspired by the biological phenomenon. In this work, we propose a novel algorithm that …
An adaptive multi-population optimization algorithm for global continuous optimization
Z Li, V Tam, LK Yeung - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, there are various optimization problems that exact mathematical methods are
not applicable. Metaheuristics are considered as efficient approaches for finding the …
not applicable. Metaheuristics are considered as efficient approaches for finding the …
Deep learning hyper-parameter tuning for sentiment analysis in twitter based on evolutionary algorithms
N Rodríguez-Barroso, AR Moya… - 2019 Federated …, 2019 - ieeexplore.ieee.org
The state of the art in Sentiment Analysis is defined by deep learning methods, and currently
the research efforts are focused on improving the encoding of underlying contextual …
the research efforts are focused on improving the encoding of underlying contextual …
A novel meta-heuristic optimization algorithm inspired by the spread of viruses
Z Li, V Tam - arXiv preprint arXiv:2006.06282, 2020 - arxiv.org
According to the no-free-lunch theorem, there is no single meta-heuristic algorithm that can
optimally solve all optimization problems. This motivates many researchers to continuously …
optimally solve all optimization problems. This motivates many researchers to continuously …
Convolution neural network application for first‐break picking for land seismic data
GN Loginov, AA Duchkov, DA Litvichenko… - Geophysical …, 2022 - earthdoc.org
An automatic and robust algorithm for the first‐break picking is necessary to build the near‐
surface velocity model. We propose the algorithm based on a convolution neural network …
surface velocity model. We propose the algorithm based on a convolution neural network …
Utilization of genetic algorithm in tuning the hyper-parameters of hybrid NN-based side-slip angle estimators
MG Essa, CM Elias, OM Shehata - Neural Computing and Applications, 2024 - Springer
This paper proposes a solution to enhance and compare different neural network (NN)-
based side-slip angle estimators. The feed-forward neural networks (FFNNs), recurrent …
based side-slip angle estimators. The feed-forward neural networks (FFNNs), recurrent …
[PDF][PDF] Anomaly detection in cloud computing environments
FJ Schmidt - 2020 - d-nb.info
Cloud computing is widely applied by modern software development companies. Providing
digital services in a cloud environment offers both the possibility of cost-efficient usage of …
digital services in a cloud environment offers both the possibility of cost-efficient usage of …
Efficient Multi-Objective NeuroEvolution in Computer Vision and Applications for Threat Identification
D Dimanov - 2023 - eprints.bournemouth.ac.uk
Concealed threat detection is at the heart of critical security systems designed to en-sure
public safety. Currently, methods for threat identification and detection are primarily manual …
public safety. Currently, methods for threat identification and detection are primarily manual …