咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative Selection Algorithm"
174 条 记 录,以下是161-170 订阅
排序:
AN IMPROVED V-DETECTOR algorithm OF IDENTIFYING BOUNDARY SELF
AN IMPROVED V-DETECTOR ALGORITHM OF IDENTIFYING BOUNDARY SEL...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: GUI-YANG LI TAO LI JIE ZENG HAI-BO LI School of Computer Science Sichuan University Chengdu 610065 China School of Computer Science Si School of Computer Science Sichuan University Chengdu 610065 China
The V-dctector algorithm is a real-valued negative selection algorithm with variable-sized detectors. In this paper, several flaws existed in the algorithm are investigated and analyzed. An improved V-detector algorit... 详细信息
来源: 评论
Research on Immune Pathology in Artificial Immune System
Research on Immune Pathology in Artificial Immune System
收藏 引用
2009中国控制与决策会议
作者: Xuanwu Zhou Key Laboratory of Network & Information Security of the APF,Engineering College of the APF,Xi'an 710086,P.R.China
Artificial immune system(AIS) mimicks the superior properties of biological immune system and provides an effective method in intelligent computing and intelligent system *** the disease-causing mechanisms of immune p... 详细信息
来源: 评论
Multi-class iteratively refined negative selection classifier
收藏 引用
APPLIED SOFT COMPUTING 2008年 第2期8卷 972-984页
作者: Markowska-Kaczmar, Urszula Kordas, Bartosz Wroclaw Univ Technol Inst Appl Informat PL-50370 Wroclaw Poland
In the paper a new classification method is proposed. It is based on negative selection, which was originally designed for anomaly detection and dichotomic classification. In our earlier work we described M-NSA algori... 详细信息
来源: 评论
Feature Interval Matching Based negative selection algorithm for Anomaly Detection
Feature Interval Matching Based Negative Selection Algorithm...
收藏 引用
智能计算及其应用国际会议
作者: YU Qiong1, WU Zejun1, 2, LIANG Yiwen 1 (1.School of Computer Science, Wuhan University, Wuhan 430079, China) (2.School of Information Science, Zhongnan University of Economics and Law, Wuhan 430060, China)
Inspired by human immune system, artificial immune system is widely applied to computational fields, especially to the field of anomaly detection. Antibody-antigen matching is the basis for recognitio
来源: 评论
A Constructional algorithm of Principal and Subordinate Structure Self-set Based on Decision Tree
A Constructional Algorithm of Principal and Subordinate Stru...
收藏 引用
4th International Conference on Wireless Communications, Networking and Mobile Computing
作者: Fu, Haidong Xie, Qi Wuhan Univ Sci & Technol Dept Comp Sci Wuhan 430081 Hubei Peoples R China
Aiming at solving the problem of "self-set incomplete" that exists in intrusion detection system based on computer immune, this paper designs a construction algorithm of principal and subordinate structure s... 详细信息
来源: 评论
Fast Mutation Operator Applied in Detector Generating Strategy
Fast Mutation Operator Applied in Detector Generating Strate...
收藏 引用
9th International Conference for Young Computer Scientists
作者: Liu, Xingbao Cai, Zixing Xiao, Chixin Cent S Univ Sch Informat Sci & Engn Changsha 410083 Peoples R China
Inspired by the stimulated-responding mutation process of gene segment, a new mutation operator is proposed. The main characteristic is its mutation method, when one bit is mutated then the following contiguous bits a... 详细信息
来源: 评论
Fast Mutation Operator Applied in Detector Generating Strategy
Fast Mutation Operator Applied in Detector Generating Strate...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Xingbao Liu Zixing Cai Chixin Xiao School of Information Science and Engineering Central South University Changsha 410083 China Cent School of Information Science and Engineering Central South University Changsha 410083 China
Inspired by the stimulated-responding mutation process of gene segment, a new mutation operator is proposed. The main characteristic is its mutation method, when one bit is mutated then the following contiguous bits a... 详细信息
来源: 评论
A Constructional algorithm of Principal and Subordinate Structure Self-set Based on Decision Tree
A Constructional Algorithm of Principal and Subordinate Stru...
收藏 引用
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)
作者: Haidong Fu Qi Xie Department of Computer Science Wuhan University of Science & Technology Wuhan Hubei China 430081
Aiming at solving the problem of "self-set incomplete" that exists in intrusion detection system based on computer immune, this paper designs a construction algorithm of principal and subordinate structure s... 详细信息
来源: 评论
Neural networks-based negative selection algorithm with applications in fault diagnosis
Neural networks-based negative selection algorithm with appl...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Gao, XZ Ovaska, SJ Wang, X Chow, MY Aalto Univ Inst Intelligent Power Elect FIN-02150 Espoo Finland
In this paper we first propose a novel neural networks-based negative selection algorithm (NSA). The principle and structure of our NSA are presented, and its training algorithm is derived Taking advantage of neural n... 详细信息
来源: 评论
An artificial immune method for stock market avoiding control of hedge fund
An artificial immune method for stock market avoiding contro...
收藏 引用
3rd International Conference on Natural Computation (ICNC 2007)
作者: Wu, Ze-Jun Wang, Xu Liang, Yi-Wen Wuhan Univ Sch Comp Luojia Mt Wuhan 430072 Peoples R China Zhongnan Univ Econ & Law Coll Informat Wuhan 430072 Peoples R China
With the increasing opening of Chinese Financial Market to the world, the international venture capital, especially the hedge fund, will make big profits through various operational means in this faulty environment. T... 详细信息
来源: 评论