The fault diagnosis of the pump-jack is as the background in the paper. A new negative selection algorithm is proposed combining the advantage of genetic algorithm and simulating annealing algorithm. The initial value...
详细信息
ISBN:
(纸本)9781424421138
The fault diagnosis of the pump-jack is as the background in the paper. A new negative selection algorithm is proposed combining the advantage of genetic algorithm and simulating annealing algorithm. The initial values of the detectors are initialized by genetic algorithm, thus the diversity of the detectors is retained, the scope of detecting is enlarged. The variable radius of detectors is introduced to cover non-self space efficiently. The redundancy of detectors is reduced and the efficiency is improved by using simulating annealing. The method is used to diagnosis the faults of the pump-jack. The results are better. Especially the method can diagnosis unknown faults. It has great potentiality.
The fault diagnosis of the pump-jack is as the background in the paper. A new negative selection algorithm is proposed combining the advantage of genetic algorithm and simulating annealing algorithm. The initial value...
详细信息
The fault diagnosis of the pump-jack is as the background in the paper. A new negative selection algorithm is proposed combining the advantage of genetic algorithm and simulating annealing algorithm. The initial values of the detectors are initialized by genetic algorithm, thus the diversity of the detectors is retained, the scope of detecting is enlarged. The variable radius of detectors is introduced to cover non-self space efficiently. The redundancy of detectors is reduced and the efficiency is improved by using simulating annealing. The method is used to diagnosis the faults of the pump-jack. The results are better. Especially the method can diagnosis unknown faults. It has great potentiality.
In this paper, we address the recommendation process as a one-class classification problem based on content features and a negativeselection (NS) algorithm that captures user preferences. Specifically, we develop an ...
详细信息
ISBN:
(纸本)9781614990949;9781614990932
In this paper, we address the recommendation process as a one-class classification problem based on content features and a negativeselection (NS) algorithm that captures user preferences. Specifically, we develop an Artificial Immune System (AIS) based on a negative selection algorithm that forms the core of a music recommendation system. A NS-based learning algorithm allows our system to build a classifier of all music pieces in a database and make personalized recommendations to users. This is achieved quite efficiently through the intrinsic property of the NS algorithm to discriminate "self-objects" (i.e. music pieces of user's like) from "non self-objects", especially when the class of non self-object is vast when compared to the class of self-objects and the examples (samples) of music pieces come only from the class of self-objects (music pieces of user's like). Our recommender system has been fully implemented and evaluated and found to outperform state of the art recommender systems based on support vector machines-based methodologies.
In this paper a new method to find global optimal path is obtained. Utilization of standard graph searching methods leads to eliminate uncertainness of heuristic algorithms. By using graph searching method a suboptima...
详细信息
ISBN:
(纸本)9781457708398
In this paper a new method to find global optimal path is obtained. Utilization of standard graph searching methods leads to eliminate uncertainness of heuristic algorithms. By using graph searching method a suboptimal solution is obtained, it causes to increase speed, precision and performance of heuristic algorithms. Firstly, the environment is defined with using a useful graph theory. Then by adaptive Dijkstra algorithm a suboptimal path is obtained. Finally, Continuous Clonal selectionalgorithm (CCSA) that is combined with negative selection algorithm, improves this suboptimal path and derives global optimal path. The simulation results show that this suggested method in compression with ant colony and elistic genetic algorithms, has more accuracy and precision, with competitive speed. Also, our suggested algorithm can be used for solving more complicated dynamic problems. Moreover, this proposed approach can be used as standard method in optimization problems especially in path planning and trajectory.
For the realistic demand of data security communications, the paper proposes a new algorithm for encryption/decryption based on the theory of artificial immunization. It is a new method based on the negativeselection...
详细信息
ISBN:
(纸本)9781457703218
For the realistic demand of data security communications, the paper proposes a new algorithm for encryption/decryption based on the theory of artificial immunization. It is a new method based on the negative selection algorithm and extracts the encryption factor from the plaintext. Encryption factor as a key group is expanded by the way of the m-sequence and generates pseudo-random key sequence that can be used to encrypt data. Pseudo-random key sequence generated in this way has good characteristics of self-correlation and the encrypted data has a better anti-attack performance. Therefore, there will be a good prospect of application.
Detector plays an important role in self and non-self discrimination for intrusion detection system,which makes detector generation a kernel algorithm for artificial immune *** this paper,firstly current used binary m...
详细信息
ISBN:
(纸本)9781612848372
Detector plays an important role in self and non-self discrimination for intrusion detection system,which makes detector generation a kernel algorithm for artificial immune *** this paper,firstly current used binary matching rules are listed,characteristics of which are *** detector generation algorithm is divided into three main processes,including gene library,negativeselection and clone *** for gene library is explained based on the gene library *** new methods are adopted to improve the performance of NSA,and finally cooperative co-evolution detector generation model is constructed which is a novel structure for intrusion detection *** paper is aimed for researchers to focus problems on three main ideas concluded in last chapter.
Modern manufacturing techniques depend upon systems that produce high volumes with consistent quality in order to ensure maximum *** source of reduced productivity is equipment *** minimize these production losses,we ...
详细信息
Modern manufacturing techniques depend upon systems that produce high volumes with consistent quality in order to ensure maximum *** source of reduced productivity is equipment *** minimize these production losses,we propose an intelligent system that is incorporated into the architecture of a machine for detecting the onset of equipment malfunctioning,and to generate corrective *** intelligent diagnostic system is based upon the artificial immune algorithm and the technique of negative *** proposed immune based system monitors a machine's transition states during an operating cycle and immediately detects the occurrence of an anomaly.
Computer Security System and Biological Immune System have much comparability, so the Artificial Immune algorithm is applied in Intrusion Detection System to solve various problems in the field of computer security. T...
详细信息
ISBN:
(纸本)9781612848334
Computer Security System and Biological Immune System have much comparability, so the Artificial Immune algorithm is applied in Intrusion Detection System to solve various problems in the field of computer security. This paper presents the fundamental and method of Intrusion Detection System based on Artificial Immune algorithm, analyzes and compares the parameters of the Artificial Immune algorithm. After studying the classical algorithm which is called negative selection algorithm, we discovered the match algorithm had caused the examination black hole. This paper proposes an improved algorithm based on the traditional algorithm, and compares the performance and efficiency to the traditional algorithm, then testifies the effectivity and feasibility of the improved algorithm.
In the recent past, there have been a number of engineering studies motivated by analogies with the human immune system. The immune system has provided a rich source of inspiration for pattern recognition, machine lea...
详细信息
In the recent past, there have been a number of engineering studies motivated by analogies with the human immune system. The immune system has provided a rich source of inspiration for pattern recognition, machine learning and data mining analyses. One of the properties of the immune system which proves particularly useful for novelty detection is that of self/non-self discrimination and this forms the basis of the negative selection algorithm which has previously been applied by other researchers to the problem of time-series novelty detection. The object of the current paper is to apply the negative selection algorithm to more general feature sets and also to consider the case of novelty detection where the normal condition set is significantly non-Gaussian or varies with operational or environmental conditions. (C) 2009 Elsevier Ltd. All rights reserved.
The success of a negative selection algorithm depends on its detectors. A shape space, conceptually, is where selves, detectors, and antigens reside. These detectors are expected to fully cover the whole shape space. ...
详细信息
ISBN:
(纸本)9781424481262
The success of a negative selection algorithm depends on its detectors. A shape space, conceptually, is where selves, detectors, and antigens reside. These detectors are expected to fully cover the whole shape space. The better the coverage;the better the detection rate. However, this assumption brings a major challenge to negativeselection experiments - the scalability problem, where the experiments cannot process real life datasets in a timely manner. On the other hand, with any real life dataset, due to arbitrary antibody/antigen representing formats, the shape space actually cannot be fully occupied. The unoccupied locations sometimes constitute a significant, or even overwhelm, portion in a shape space. In this paper, we first briefly review the theoretic model of the shape space and then study the impact of the unoccupied locations, under the term shape space occupancy. Based on the study outcomes, we suggest the heuristics for generating detectors. We demonstrate shape space occupancy, detector generation by antigen feedback mechanism, and negativeselection experiments on 4 different datasets, which cover the data presentation formats in both strings and real number valued vectors.
暂无评论