咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative selection algorithm"
174 条 记 录,以下是71-80 订阅
排序:
Multisource Neighborhood Immune Detector Adaptive Model for Anomaly Detection
收藏 引用
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 2021年 第3期25卷 582-594页
作者: Xi, Liang Wang, Rui-Dong Yao, Zhi-Yu Zhang, Feng-Bin Harbin Univ Sci & Technol Sch Comp Sci & Technol Harbin 150080 Peoples R China MediaTek Inc TV Business Unit Shenzhen 518051 Peoples R China
The artificial immune system (AIS) is one of the important branches of artificial intelligence technology, and it is widely used in many fields. The detector set is the core knowledge set, and the AIS application effe... 详细信息
来源: 评论
Abnormal Detection of Pumping Unit Bearing Based on Extension Theory
收藏 引用
IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING 2021年 第12期16卷 1647-1652页
作者: Zhang, Zhiming Sch Northeast Petr Univ High Tech Ind Dev Zone 99 Xuefu St Daqing City Heilongjiang Peoples R China
In order to solve the problem that is difficult to extract the fault data of bearing of pumping unit in operation, a negative selection algorithm based on extension theory is proposed to detect the abnormal of bearing... 详细信息
来源: 评论
Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2021年 第1期17卷 47-59页
作者: Wawryn, Krzysztof Widulinski, Patryk Koszalin Univ Technol Dept Elect & Comp Sci Ul Sniadeckich 2 PL-75453 Koszalin Poland
An intrusion detection system inspired by the human immune system is described: a custom artificial immune system that monitors a local area containing critical files in the operating system. The proposed mechanism sc... 详细信息
来源: 评论
A Smart System of Malware Detection Based on Artificial Immune Network and Deep Belief Network
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2021年 第1期15卷 1-25页
作者: Dung Hoang Le Nguyen Thanh Vu Tuan Dinh Le Vietnam Natl Univ Univ Informat Technol Hanoi Vietnam Ho Chi Minh City Univ Food Ind Ho Chi Minh City Vietnam Long An Univ Econ & Ind Tan An City Long An Vietnam
This paper proposes a smart system of virus detection that can classify a file as benign or malware with high accuracy detection rate. The approach is based on the aspects of the artificial immune system, in which an ... 详细信息
来源: 评论
Research on prediction of coal and gas outburst risk based on TIWTD-CNSA
收藏 引用
RESULTS IN ENGINEERING 2023年 18卷
作者: Peng, Ji Shiliang, Shi Xingyu, Shi Hunan Univ Sci & Technol Coll Resource Environm & Safety Engn Xiangtan 411201 Peoples R China Hunan Univ Sci & Technol Prov Key Lab Safe Min Tech Coal Mines Taoyuan Rd Xiangtan 411201 Hunan Peoples R China Changsha Univ Sci & Technol Wanjiali Rd Changsha 410114 Hunan Peoples R China
When processing the current coal and gas outburst risk index data, it is observed that the data sequence does not have intuitive regularity, and the acquired data signals are generally mixed with different degrees of ... 详细信息
来源: 评论
A Study of Detection Probabilities and Real-World Testing of a Human Immunity Inspired Intrusion Detection System  28
A Study of Detection Probabilities and Real-World Testing of...
收藏 引用
28th International Conference on Mixed Design of Integrated Circuits and System (MIXDES)
作者: Widulinski, Patryk Wawryn, Krzysztof Koszalin Univ Technol Fac Elect & Comp Sci Koszalin Poland
In the paper, a study of detection probabilities and experimental tests of an intrusion detection system (IDS) utilizing the artificial immune system (MS) based on the negative selection approach are presented. The al... 详细信息
来源: 评论
Self-adaptive mobile web service discovery framework for Dynamic Mobile Environment
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2022年 184卷 111120-111120页
作者: Garba, Salisu Mohamad, Radziah Saadon, Nor Azizah Univ Teknol Malaysia Fac Engn Sch Comp Skudai 81310 Johor Malaysia
This paper proposes a self-adaptive mobile web service (MWS) discovery framework for a dynamic mobile environment (DME) to deal with MWS proliferation, dynamic context, and irrelevant MWS discovery challenges. The mai... 详细信息
来源: 评论
Combine labeled and unlabeled data for immune detector training with label propagation
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2022年 第0期236卷 107661-107661页
作者: Chen Wen Wang Changzhi Sichuan Univ Sch Cyber Sci & Engn Chengdu Peoples R China Zhihuiyuntian Inc Artificial Intelligence Ctr Chengdu Peoples R China
Artificial immune detectors are the basic recognition components of immune systems. Traditionally, the candidate non-self detectors are compared with the whole self training set to eliminate self reactive ones in nega... 详细信息
来源: 评论
Prognosis and fail detection in a dynamic rotor using artificial immunological system
收藏 引用
ENGINEERING COMPUTATIONS 2020年 第9期37卷 3127-3145页
作者: Outa, Roberto Chavarette, Fabio Roberto Mishra, Vishnu Narayan Goncalves, Aparecido C. Roefero, Luiz G. P. Moro, Thiago C. FATEC Aracatuba Fac Technol Aracatuba Dept Biofuels Aracatuba Brazil Univ Estadual Paulista Fac Engn Ilha Solteira Dept Math Ilha Solteira Brazil Indira Gandhi Natl Tribal Univ Dept Math Amarkantak India Univ Estadual Paulista Fac Engn Ilha Solteira Dept Mech Engn Ilha Solteira Brazil
Purpose In recent years, the mechanical industries began to apply many investments in research and technological development to obtain efficient methods to analyze the integrity of structures and prevent disasters and... 详细信息
来源: 评论
An immune -based risk assessment method for digital virtual assets
收藏 引用
COMPUTERS & SECURITY 2021年 102卷 102134-102134页
作者: He, Junjiang Li, Tao Li, Beibei Lan, Xiaolong Li, Zhiyong Wang, Yunpeng Sichuan Univ Coll Cybersecur 24 South Sect 1Yihuan Rd Chengdu Peoples R China
Digital virtual assets are playing an increasingly important role and have become an indispensable part of people's lives. However, due to the characteristics of network, virtuality, and openness, digital virtual ... 详细信息
来源: 评论