咨询与建议

限定检索结果

文献类型

  • 87 篇 期刊文献
  • 84 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 112 篇 计算机科学与技术...
    • 41 篇 电气工程
    • 27 篇 控制科学与工程
    • 16 篇 软件工程
    • 15 篇 信息与通信工程
    • 12 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 8 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 3 篇 石油与天然气工程
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
    • 1 篇 地质资源与地质工...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 17 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 5 篇 化学
    • 4 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 17 篇 管理科学与工程(可...
  • 4 篇 医学
    • 2 篇 临床医学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 174 篇 negative selecti...
  • 69 篇 artificial immun...
  • 29 篇 anomaly detectio...
  • 23 篇 artificial immun...
  • 13 篇 intrusion detect...
  • 11 篇 fault diagnosis
  • 11 篇 fault detection
  • 9 篇 structural healt...
  • 8 篇 detector generat...
  • 7 篇 detector
  • 7 篇 v-detector
  • 6 篇 intrusion detect...
  • 6 篇 hypothesis testi...
  • 5 篇 computer securit...
  • 5 篇 detector generat...
  • 5 篇 clonal selection...
  • 4 篇 optimization
  • 4 篇 differential evo...
  • 4 篇 boundary self
  • 4 篇 i/o request pack...

机构

  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ col...
  • 5 篇 sichuan univ sch...
  • 5 篇 changzhou univ s...
  • 4 篇 shanghai univ sc...
  • 4 篇 sichuan univ sch...
  • 3 篇 univ elect sci &...
  • 2 篇 univ sci & techn...
  • 2 篇 sichuan univ col...
  • 2 篇 bahmanyar univ k...
  • 2 篇 xiamen univ tech...
  • 2 篇 univ teknol mala...
  • 2 篇 aalto univ inst ...
  • 2 篇 univ teknol mala...
  • 2 篇 shahid bahonar u...
  • 2 篇 koszalin univ te...
  • 2 篇 school of comput...
  • 2 篇 shanghai univ sc...
  • 2 篇 school of comput...
  • 2 篇 dongguan univ te...

作者

  • 15 篇 li tao
  • 6 篇 liu shulin
  • 6 篇 li dong
  • 4 篇 masciotta maria ...
  • 4 篇 barontini albert...
  • 4 篇 amado-mendes pau...
  • 4 篇 he junjiang
  • 4 篇 chavarette fabio...
  • 4 篇 zeng jie
  • 4 篇 chen wen
  • 3 篇 wawryn krzysztof
  • 3 篇 yang chunying
  • 3 篇 ramos luis f.
  • 3 篇 zeng jinquan
  • 3 篇 xu aiqiang
  • 3 篇 wang yunpeng
  • 3 篇 li tingjun
  • 3 篇 li beibei
  • 3 篇 li haibo
  • 3 篇 idris ismaila

语言

  • 166 篇 英文
  • 5 篇 其他
  • 2 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Negative selection algorithm"
174 条 记 录,以下是81-90 订阅
排序:
Optimization and Application of Real-valued negative selection algorithm
Optimization and Application of Real-valued Negative Selecti...
收藏 引用
2011 International Conference on Power Electronics and Engineering Application
作者: Xu Aiqiang Liu Yong Zhao Xiuli Yang Chunying Li Tingjun Naval Aeronautical and Astronautical University
Concerned with the problem of lacking fault samples of complex equipments, it studies the principle and application of negative selection algorithm of artificial immune system. The detectors generation mechanism of re... 详细信息
来源: 评论
An Improved Detector Set Generation Mechanism in negative selection algorithm
An Improved Detector Set Generation Mechanism in Negative Se...
收藏 引用
2016 3rd International Conference on Information and Communication Technology for Education(ICTE 2016)
作者: Bo Hu Science and Technology College Jiangxi Normal University
in view of the shortcomings of the detector generation mechanism in the existing negative selection algorithm,a new method of boundary detection is proposed to deal with the problem of the boundary *** the algorithm,i... 详细信息
来源: 评论
Integrated negative selection algorithm and Positive selection algorithm for Malware Detection
Integrated Negative Selection Algorithm and Positive Selecti...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Fuyong Zhang Ying Ma School of Computer Science and Network Security Dongguan University of Technology School of Computer and Information Engineering Xiamen University of Technology
Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package(IRP) sequences for malware detection. N-gram will be used to analyze IRP s... 详细信息
来源: 评论
A New negative selection algorithm and its Application in the Fault Diagnosis of the Pump-jack
A New Negative Selection Algorithm and its Application in th...
收藏 引用
7th World Congress on Intelligent Control and Automation (WCICA 2008), vol.5
作者: Weijian Ren Qiong Wang Daqing Petroleum Institute Daqing Heilongjiang China
The fault diagnosis of the pump-jack is as the background in the paper. A new negative selection algorithm is proposed combining the advantage of genetic algorithm and simulating annealing algorithm. The initial value... 详细信息
来源: 评论
Damage detection in composite beams using negative selection algorithm method
收藏 引用
Materials Today: Proceedings 2023年
作者: Kosanam Ashwini Sasmita Sahu Hemalata Jena Rita Kumari Sahu KIIT University Bhubaneswar 751024 India
Most of the structural members act under periodic loading conditions which lead to cracks or damages. The initiation of cracks may change the physical properties of a structure mostly the flexibility and stiffness cha... 详细信息
来源: 评论
EvoSeedRNSAII: An improved evolutionary algorithm for generating detectors in the real-valued negative selection algorithms
收藏 引用
APPLIED SOFT COMPUTING 2014年 19卷 18-30页
作者: Zhang, Jie Luo, Wenjian Univ Sci & Technol China Sch Comp Sci & Technol Hefei 230027 Anhui Peoples R China Univ Sci & Technol China Anhui Key Lab Software Engn Comp & Commun Hefei 230027 Anhui Peoples R China
In the previous work, a detector generation algorithm, named as the EvoSeedRNSA, is proposed. A genetic algorithm is adopted in the EvoSeedRNSA to evolve the random seeds to generate an approximately optimal detector ... 详细信息
来源: 评论
An integrated approach to detect online financial transaction fraud using negative and clonal selection algorithms with AIS  3
An integrated approach to detect online financial transactio...
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Gupta, Rohan Ghanghas, Peshal Uie Chandigarh University Dept. of Ece Mohali India
The relevancy of fraud detection in account takeover fraud in online financial transactions is at it's peak. The traditional fraud detection approaches have seen a downwards trend. This paper adds more onto the ut... 详细信息
来源: 评论
Artificial immunity-based energy theft detection for advanced metering infrastructures
收藏 引用
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION 2025年 48卷
作者: Fu, Jie Yang, Chengxi Liu, Yuxuan Zhang, Kunsan Li, Jiaqi Li, Beibei State Grid Fujian Elect Power Co Ltd Fuzhou 350003 Fujian Peoples R China Sichuan Univ Sch Cyber Sci & Engn Chengdu 610207 Sichuan Peoples R China
Advanced Metering Infrastructure (AMI) is envisioned to enable smart energy management and consumption while ensuring the integrity of real energy consumption data. However, existing smart meters, gateways, and commun... 详细信息
来源: 评论
An intelligent manufacturing system based on a recursive control structure
收藏 引用
FRONTIERS IN MECHANICAL ENGINEERING-SWITZERLAND 2025年 10卷
作者: Teng, Bingyan Nanjing Vocat Univ Ind Technol Sch Business & Trade Nanjing Peoples R China
Introduction The excessive uncertainty of in modern manufacturing systems is caused by machine failures, changes in material information, and other factors. In addition, the organizational production mode conflicts br... 详细信息
来源: 评论
Using a Novel negative selection Inspired Anomaly Detection algorithm to Identify Corrupted Ribo-seq and RNA-seq Samples  19
Using a Novel Negative Selection Inspired Anomaly Detection ...
收藏 引用
10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics (ACM-BCB)
作者: Perkins, Patrick Heber, Steffen North Carolina State Univ Bioinformat Res Ctr Raleigh NC 27695 USA North Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA
RNA-seq and Ribo-seq are popular techniques for quantifying cellular transcription and translation. These experiments use next-generation sequencing to produce genome-wide high-resolution snapshots of the total popula... 详细信息
来源: 评论