咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative selection algorithm"
174 条 记 录,以下是161-170 订阅
排序:
Performance Evaluation of a Fraud Detection System based Artificial Immune System on the Cloud
Performance Evaluation of a Fraud Detection System based Art...
收藏 引用
International Conference on Computer Science & Education
作者: Elham Hormozi Morteza Sargolzaei Javan Mohammad Kazem Akbari Hadi Hormozi Computer Engineering and Information Technology Mazandaran University of Science and Technology Babol Computer Engineering and Information Technology Amirkabir University of Technology (Tehran Polytechnic) Tehran Computer Engineering and Information Technology Islamic Azad University of Arak
Fraud is defined as the unlawful and intentional misrepresentation which can lead to actual or potential disadvantage to another individual or group. Fraud detection is a topic applicable to many industries including ... 详细信息
来源: 评论
Using IRP with a Novel Artificial Immune algorithm for Windows Malicious Executables Detection
Using IRP with a Novel Artificial Immune Algorithm for Windo...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Fuyong Zhang Ying Ma School of Computer Science and Network Security Dongguan University of Technology School of Computer and Information Engineering Xiamen University of Technology
Run-time malware detection strategies have already attracted extensive attention due to its effectiveness and robustness. With regards to Windows operating system, the API(Application Program Interface) is chosen to... 详细信息
来源: 评论
A Constructional algorithm of Principal and Subordinate Structure Self-set Based on Decision Tree
A Constructional Algorithm of Principal and Subordinate Stru...
收藏 引用
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)
作者: Haidong Fu Qi Xie Department of Computer Science Wuhan University of Science & Technology Wuhan Hubei China 430081
Aiming at solving the problem of "self-set incomplete" that exists in intrusion detection system based on computer immune, this paper designs a construction algorithm of principal and subordinate structure s... 详细信息
来源: 评论
Application of an Information Fusion Method to Compound Fault Diagnosis of Rotating Machinery
Application of an Information Fusion Method to Compound Faul...
收藏 引用
第27届中国控制与决策会议
作者: Qin Hu Aisong Qin Qinghua Zhang Guoxi Sun Longqiu Shao Guangdong provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis Guangdong University of Petrochemical Technology
Aiming at how to use the multiple fault features information synthetically to improve accuracy of compound fault diagnosis,an information fusion method based on the weighted evidence theory was proposed to effectively... 详细信息
来源: 评论
The dynamic immune forecasting method of the airdrome flight delay under considering the stochastic factors
The dynamic immune forecasting method of the airdrome flight...
收藏 引用
2009 Ninth International Conference on Hybrid Intelligent Systems(第九届混合智能系统国际会议 HIS 2009)
作者: Jianli Ding Xuesen Li Guansheng Tong College of Computer Science and Technology Civil Aviation University of China Tianjin 300300 China Information Technology Research Base Civil Aviation Administration of China Tianjin 300300 China
There are many uncertain stochastic factors in the process of the airdrome flight delay forecast, especially the cumulate diversification and propagation effect of the flight delays. The paper is on the base of the im... 详细信息
来源: 评论
Novel design concepts for network intrusion systems based on dendritic cells processes
Novel design concepts for network intrusion systems based on...
收藏 引用
第八届全国青年岩土力学与工程会议暨青年华人岩土工程论坛
作者: RICHARD M R TAN Guan-zheng ONGALO P N F CHERUIYOT W School of Information Science and Engineering Central South University Changsha 410083 China
An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are ***, this ability is shown to provide a feature reduction mechanism that could be used to ... 详细信息
来源: 评论
Significant Level in V-detector Generation algorithm
Significant Level in V-detector Generation Algorithm
收藏 引用
2009 Asia-Pacific Conference on Information Processing
作者: Guiyang Li, Tao Li, Jie Zeng, Haibo Li School of Computer Science Sichuan University Chengdu, China
The V-detector generation algorithm is a kind of negative selection algorithm (NSA) inspired by biological immune system (BIS). In this paper, V-detector generation algorithm is simply introduced. The problem that V-d... 详细信息
来源: 评论
A Detector Generating algorithm Based on Interval Partition
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2009年 第1期5卷 27-27页
作者: Xia, Huifen Ju, Shiguang Cai, Tao Jiangsu Univ Dept Comp Sci Zhenjiang 212031 Peoples R China
Based on the functions and some relevant theories of the biological immune system, an artificial immune system is established to solve the practical problems for computing systems. At present, the artificial immune sy... 详细信息
来源: 评论
Experimental Platform for Faults Detection in Fuzzy Controllers based on Artificial Immune Systems
Experimental Platform for Faults Detection in Fuzzy Controll...
收藏 引用
IEEE International Instrumentation and Measurement Technology Conference
作者: Robson Pacifico Guimaraes Lima Bruno Willian de Souza Arruda Cleonilson Protasio de Souza Department of Electroeletronic Federal Institute of Pernambuco IFPE Afogados da Ingazeira Pernambuco Brazil Department of Electrical Engineering Federal University of Paraiba UFPB Joao Pessoa Paraiba Brazil
An Artificial-Immune-System (AIS) based anomaly detection system applied to Water Supply System (WSS) is presented. At normal working, the pressure level into the WSS is controlled by a Fuzzy Control System. As the WS... 详细信息
来源: 评论
Research on Intrusion Detection System Using Improved Artificial Immune algorithm
Research on Intrusion Detection System Using Improved Artifi...
收藏 引用
2011 4th IEEE International Conference on Computer Science and Information Technology(ICCSIT 2011)
作者: Xiang Feng Tianling Zhao Department of Computer Science East China University of Science and Technology
Computer Security System and Biological Immune System have much comparability, so the Artificial Immune algorithm is applied in Intrusion Detection System to solve various problems in the field of computer security. T... 详细信息
来源: 评论