咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection Algorithm"
174 条 记 录,以下是151-160 订阅
排序:
Self-adaptive mobile web service discovery framework for Dynamic Mobile Environment
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2022年 184卷 111120-111120页
作者: Garba, Salisu Mohamad, Radziah Saadon, Nor Azizah Univ Teknol Malaysia Fac Engn Sch Comp Skudai 81310 Johor Malaysia
This paper proposes a self-adaptive mobile web service (MWS) discovery framework for a dynamic mobile environment (DME) to deal with MWS proliferation, dynamic context, and irrelevant MWS discovery challenges. The mai... 详细信息
来源: 评论
Improving damage detection by combining multiple classifiers in different feature spaces
收藏 引用
ENGINEERING STRUCTURES 2024年 299卷
作者: Barontini, Alberto Masciotta, Maria Giovanna Amado-Mendes, Paulo Ramos, Luis F. Lourenco, Paulo B. Univ Minho ISISE ARISE Dept Civil Engn Guimaraes Portugal Univ G Annunzio Chieti Pescara Dept Engn & Geol Viale Pindaro 42 I-65127 Pescara Italy Univ G Annunzio Chieti Pescara Res Ctr UdA TechLab I-66100 Chieti Italy Univ Coimbra ISISE ARISE Dept Civil Engn Coimbra Portugal
Vibration-based damage identification methods have been explored in several engineering fields. However, the effective damage-sensitivity of vibration-based features and the balance between false alarms and readiness ... 详细信息
来源: 评论
DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2017年 第11期11卷 5574-5591页
作者: Guo, Weipeng Chen, Yonghong Cai, Yiqiao Wang, Tian Tian, Hui Huaqiao Univ Coll Comp Sci & Technol Xiamen Peoples R China Univ Cincinnati Dept Elect Engn & Comp Syst Cincinnati OH 45221 USA
Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detector... 详细信息
来源: 评论
Towards a Hybrid Immune algorithm Based on Danger Theory for Database Security
收藏 引用
IEEE ACCESS 2020年 8卷 145332-145362页
作者: Said, Wael Mostafa, Ayman Mohamed Zagazig Univ Fac Comp & Informat Zagazig 44519 Egypt Taibah Univ Coll Comp Sci & Engn Medina 42353 Saudi Arabia Jouf Univ Coll Comp & Informat Sci Sakaka 72314 Saudi Arabia
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database securi... 详细信息
来源: 评论
Combine labeled and unlabeled data for immune detector training with label propagation
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2022年 第0期236卷 107661-107661页
作者: Chen Wen Wang Changzhi Sichuan Univ Sch Cyber Sci & Engn Chengdu Peoples R China Zhihuiyuntian Inc Artificial Intelligence Ctr Chengdu Peoples R China
Artificial immune detectors are the basic recognition components of immune systems. Traditionally, the candidate non-self detectors are compared with the whole self training set to eliminate self reactive ones in nega... 详细信息
来源: 评论
A novel sophisticated hybrid method for intrusion detection using the artificial immune system
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021年 58卷
作者: Farzadnia, Ehsan Shirazi, Hossein Nowroozi, Alireza Malek Ashtar Univ Technol Fac Elect & Comp Engn Tehran Iran IRIB Univ Media Engn Dept Tehran Iran
Artificial immune system (AIS) as a good prototype for developing Machine Learning (ML) is a promising candidate to design Intrusion Detection System (IDS). Two of its prevalent paradigms, the negative selection, and ... 详细信息
来源: 评论
Reducing the Training Samples for Damage Detection of Existing Buildings through Self-Space Approximation Techniques
收藏 引用
SENSORS 2021年 第21期21卷 7155-7155页
作者: Barontini, Alberto Masciotta, Maria Giovanna Amado-Mendes, Paulo Ramos, Luis F. Lourenco, Paulo B. Univ Minho Dept Civil Engn ISISE P-4800058 Guimaraes Portugal Univ G dAnnunzio Dept Engn & Geol I-65127 Pescara Italy Univ Coimbra Dept Civil Engn ISISE P-3030788 Coimbra Portugal
Data-driven methodologies are among the most effective tools for damage detection of complex existing buildings, such as heritage structures. Indeed, the historical evolution and actual behaviour of these assets are o... 详细信息
来源: 评论
Research on prediction of coal and gas outburst risk based on TIWTD-CNSA
收藏 引用
RESULTS IN ENGINEERING 2023年 18卷
作者: Peng, Ji Shiliang, Shi Xingyu, Shi Hunan Univ Sci & Technol Coll Resource Environm & Safety Engn Xiangtan 411201 Peoples R China Hunan Univ Sci & Technol Prov Key Lab Safe Min Tech Coal Mines Taoyuan Rd Xiangtan 411201 Hunan Peoples R China Changsha Univ Sci & Technol Wanjiali Rd Changsha 410114 Hunan Peoples R China
When processing the current coal and gas outburst risk index data, it is observed that the data sequence does not have intuitive regularity, and the acquired data signals are generally mixed with different degrees of ... 详细信息
来源: 评论
Artificial Immune-based algorithm for Academic Leadership Assessment
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第8期10卷 364-370页
作者: Jantan, Hamidah Azemi, Nur Hamizah Syafiqah Che Othman, Zulaiha Ali Univ Teknol MARA UiTM Terengganu Fac Comp & Math Sci Kuala Terengganu Terengganu Malaysia Univ Kebangsaan Malaysia Fac Informat Sci & Technol Ctr Artificial Intelligence Technol Bangi Malaysia
Artificial Immune-based algorithm is inspired by the biological immune system as computational intelligence approach in data analysis. negative selection algorithm is derived from immune-based algorithm's family t... 详细信息
来源: 评论
Fast Mutation Operator Applied in Detector Generating Strategy
Fast Mutation Operator Applied in Detector Generating Strate...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Xingbao Liu Zixing Cai Chixin Xiao School of Information Science and Engineering Central South University Changsha 410083 China Cent School of Information Science and Engineering Central South University Changsha 410083 China
Inspired by the stimulated-responding mutation process of gene segment, a new mutation operator is proposed. The main characteristic is its mutation method, when one bit is mutated then the following contiguous bits a... 详细信息
来源: 评论