What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based net...
详细信息
ISBN:
(纸本)9781628410563
What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based network intrusion detection system with an autonomous structuring algorithm. There is evidence that neuromorphic computation for network intrusion detection is fractal in nature under certain conditions. Specifically, the neural structure can take fractal form when simple neural structuring is autonomous. A neural structure is fractal by definition when its fractal dimension exceeds the synaptic matrix dimension. The authors introduce the use of fractal dimension of the neuromorphic structure as a factor in the autonomous restructuring feedback loop.
Initially, different areas of research in compute,science based on models inspired by Nature will be approached. The area entitled evolutionarycomputation is discussed in a general view. After, the emphasis is put on...
详细信息
ISBN:
(纸本)0769508626
Initially, different areas of research in compute,science based on models inspired by Nature will be approached. The area entitled evolutionarycomputation is discussed in a general view. After, the emphasis is put on the human tendency to copy and to find answers to new problems by adopting similar solutions of other equivalent issues already resolved by Nature. Finally, there is an attempt to demonstrate that in the case of evolutionarycomputation, even if success is achieved in many cases, most of what Nature has attained was either severely simplified or truncated in the simulation process. Also, in several cases a mol-e detailed and mor-e faithful copy could have yielded better results to already existing systems or to new ones.
Classical understandings of biological evolution inspired creation of the entire order of evolutionarycomputation (EC) heuristic optimization techniques. In turn, the development of EC has shown how living organisms ...
详细信息
ISBN:
(纸本)9789898425836
Classical understandings of biological evolution inspired creation of the entire order of evolutionarycomputation (EC) heuristic optimization techniques. In turn, the development of EC has shown how living organisms use biomolecular implementations of these techniques to solve particular problems in survival and adaptation. An example of such a natural Genetic Algorithm (GA) is the way in which a higher organism's adaptive immune system selects antibodies and competes against its complement, the development of antigen variability by pathogenic organisms. In our approach, we use operators that implement the reproduction and diversification of genetic material in a manner inspired by retroviral reproduction and a genetic-engineering technique known as DNA shuffling. We call this approach Retroviral Genetic Algorithms, or retroGA (Spirov and Holloway, 2010). Here, we extend retroGA to include: (1) the utilization of tags in strings;(2) the capability of the Reproduction-Crossover operator to read these tags and interpret them as instructions;and (3), as a consequence, to use more than one reproductive strategy. We validated the efficacy of the extended retroGA technique with benchmark tests on concatenated trap functions and compared these with Royal Road and Royal Staircase functions.
A modified version of the intelligent water drop algorithm for performing planning for air and ground robots based on telemetry provided by satellites has been created. The IWD algorithm works by simulating the flow o...
详细信息
ISBN:
(纸本)9781628410563
A modified version of the intelligent water drop algorithm for performing planning for air and ground robots based on telemetry provided by satellites has been created. The IWD algorithm works by simulating the flow of water drops in a stream-network, dynamically adapting drop and network characteristics. This paper presents the base IWD algorithm, a simplified version of the algorithm (SIWD) and a derivative of this simplified version that has been adapted and applied to planning air and ground robot paths based upon orbital (for aerial) and aerial (for ground) imagery. An analysis of the performance of the algorithm is presented.
Soft robotic devices are designed for applications such as exploration, manipulation, search and rescue, medical surgery, rehabilitation, and assistance. Due to their complex kinematics, various and often hard-to-defi...
详细信息
Soft robotic devices are designed for applications such as exploration, manipulation, search and rescue, medical surgery, rehabilitation, and assistance. Due to their complex kinematics, various and often hard-to-define degrees of freedom, and nonlinear properties of their material, designing and operating these devices can be quite challenging. Using tools such as optimization methods can improve the efficiency of these devices and help roboticists manufacture the robots they need. In this work, we present an extensive and systematic literature search on the optimization methods used for the mechanical design of soft robots, particularly focusing on literature exploiting evolutionarycomputation (EC). We completed the search in the IEEE, ACM, Springer, SAGE, Elsevier, MDPI, Scholar, and Scopus databases between 2009 and 2024 using the keywords "soft robot," "design," and "optimization." We categorized our findings in terms of the type of soft robot (i.e., bio-inspired, cable-driven, continuum, fluid-driven, gripper, manipulator, modular), its application (exploration, manipulation, surgery), the optimization metrics (topology, force, locomotion, kinematics, sensors, and energy), and the optimization method (categorized as EC or non-EC methods). After providing a road map of our findings in the state of the art, we offer our observations concerning the implementation of the optimization methods and their advantages. We then conclude our paper with suggestions for future research.
This two-volume set (CCIS 1565 and CCIS 1566) constitutes selected and revised papers from the 16th International Conference on bio-inspired Computing: Theories and applications, BIC-TA 2021, held in Taiyuan, Chi...
详细信息
ISBN:
(数字)9789811912566
ISBN:
(纸本)9789811912559
This two-volume set (CCIS 1565 and CCIS 1566) constitutes selected and revised papers from the 16th International Conference on bio-inspired Computing: Theories and applications, BIC-TA 2021, held in Taiyuan, China, in December 2021.;The 67 papers presented were thoroughly reviewed and selected from 211 submissions. The papers are organized in the following topical sections: evolutionarycomputation and swarm intelligence; DNA and molecular computing; machine learning and computer vision.
This paper presents a new approach to optimization of an energy-constrained modulation scheme for wireless sensor networks by taking advantage of a novel bio-inspired optimization algorithm. The algorithm is inspired ...
详细信息
ISBN:
(纸本)9781424418220
This paper presents a new approach to optimization of an energy-constrained modulation scheme for wireless sensor networks by taking advantage of a novel bio-inspired optimization algorithm. The algorithm is inspired by Wright's shifting balance theory (SBT) of evolution in population genetics. The total energy consumption of an energy-constrained modulation scheme is minimized by using the new SBT-based optimization algorithm. The results obtained by this new algorithm are compared with other popular optimization algorithms. Numerical experiments are performed to demonstrate that the SBT-based algorithm could be used as an efficient optimizer for solving the optimization problems arising from currently emerging energy-efficient wireless sensor networks.
Clustering is perhaps one of the most popular approaches used in unsupervised machine learning. There's a huge number of different methods and algorithms that have been designed in the last decades related to this...
详细信息
ISBN:
(纸本)9781479983223
Clustering is perhaps one of the most popular approaches used in unsupervised machine learning. There's a huge number of different methods and algorithms that have been designed in the last decades related to this "blind pattern search", some of these approaches are based on bio-inspired methods such as evolutionarycomputation, Swarm Intelligence or Neural Networks among others. In the last years, and due to the fast growing of Big Data problems, some interesting advances and new approaches are currently being developed in this area, new algorithms like online clustering and streaming clustering are appearing. These new algorithms try to solve classical problems in Clustering and deal with the new features of these new kind of problems. This keynote lecture will provide some basics on both, Clustering methods and bio-inspiredcomputation, and how they have been combined to improve the quality of these algorithms, to later show the main features that Big Data needs to obtain reliable clustering approaches. Finally, some practical examples and applications will be described to show how these new algorithms are evolving to be used in the near future in complex and dynamic environments.
This book constitutes the refereed proceedings of the 17th International Conference on bio-inspired Computing: Theories and applications, BIC-TA 2022, held in Wuhan, China, during December 16–18, 2022.;The 56 fu...
详细信息
ISBN:
(数字)9789819915491
ISBN:
(纸本)9789819915484
This book constitutes the refereed proceedings of the 17th International Conference on bio-inspired Computing: Theories and applications, BIC-TA 2022, held in Wuhan, China, during December 16–18, 2022.;The 56 full papers included in this book were carefully reviewed and selected from 148 submissions. They were organized in topical sections as follows: evolutionarycomputation and swarm intelligence; machine learning and deep learning; intelligent control and simulation and molecular computing and nanotechnology.
In this paper we introduce a method to monitor interpersonal relations through a game with a social dilemma. In the game players can interact with each other through negotiations and by exchanges of resources. To enab...
详细信息
ISBN:
(纸本)9789898425836
In this paper we introduce a method to monitor interpersonal relations through a game with a social dilemma. In the game players can interact with each other through negotiations and by exchanges of resources. To enable the monitoring of interpersonal relations this environment confronts players with specially selected instances of the game, where strategies based on different social factors (like helpfulness or fairness) will enforce different choices in the game. An evolutionaryinspired optimization was used to find the games with the special social setting. The special selection of the games helps us to relate the observed actions directly to parameters that model strategies that the players are likely to adopt. Through an estimation of these parameters we are able to observe quantitative differences in the social preferences by different players. Moreover, we demonstrate that players play differently depending on whom they are interacting with. This strongly indicates that the observed playing styles can reveal certain aspects of the relations between players.
暂无评论