نتایج جستجو برای: negative selection algorithm

تعداد نتایج: 1531326  

Journal: :journal of computer and robotics 0
mojgan elikaei ahari faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran babak nasersharif electrical and computer engineering department, k.n. toosi university of technology, iran

different approaches have been proposed for feature selection to obtain suitable features subset among all features. these methods search feature space for feature subsets which satisfies some criteria or optimizes several objective functions. the objective functions are divided into two main groups: filter and wrapper methods.  in filter methods, features subsets are selected due to some measu...

Journal: :international journal of advanced design and manufacturing technology 0
xiping li ningning gong tingwei ji

the integration of an approximate model and a clonal selection algorithm (csa) is considered to one of the most effective ways to solve complex optimization design problems in engineering. in this study, first, a process for developing an approximate model and the principles of clonal selection algorithms were presented. then, a variotherm temperature injection mold used to produce a large liqu...

1995
Dipankar Dasgupta Stephanie Forrest

Detection of tool breakage is very important for automated machining operations. This paper presents a negative-selection algorithm for tool breakage detection. The method is inspired by the defense mechanism of the immune system, which discriminates between self and non-self. Here self is deened to be normal cutting operations and non-self is any deviation beyond allowable variation of the cut...

Esfandyar Malekian, Hossein Fakhari, Jamal Ghasemi Serveh Farzad

One of the most important methods of opacity accounting information by management is to accelerate the identification of good news versus delaying the identification of bad news on profits, but there is always a final level of accumulation of bad news in the company, and by reaching that its final level, these bad news will be released, which will lead to a Stock Price Crash Risk. In fact, stoc...

1995
Dipankar Dasgupta Stephanie Forrest

Detection of tool breakage is very important for automated machining operations. This paper presents a negative-selection algorithm for tool breakage detection. The method is inspired by the defense mechanism of the immune system, which discriminates between self and non-self. Here self is deened to be normal cutting operations and non-self is any deviation beyond allowable variation of the cut...

An efficient cluster head selection algorithm in wireless sensor networks is proposed in this paper. The implementation of the proposed algorithm can improve energy which allows the structured representation of a network topology. According to the residual energy, number of the neighbors, and the centrality of each node, the algorithm uses Fuzzy Inference Systems to select cluster head. The alg...

2003
Fabio A. González Dipankar Dasgupta Jonatan Gómez

Negative selection algorithm is one of the most widely used techniques in the field of artificial immune systems. It is primarily used to detect changes in data/behavior patterns by generating detectors in the complementary space (from given normal samples). The negative selection algorithm generally uses binary matching rules to generate detectors. The purpose of the paper is to show that the ...

Projects scheduling by the project portfolio selection, something that has its own complexity and its flexibility, can create different composition of the project portfolio. An integer programming model is formulated for the project portfolio selection and scheduling.Two heuristic algorithms, genetic algorithm (GA) and simulated annealing (SA), are presented to solve the problem. Results of cal...

2012
Ismaila Idris

A spam detection model based on negative selection algorithm is proposed in this paper. The artificial immune system creates techniques to solve complex computations, aiming to developing immune based models. This is done by distinguishing self from non-self. Preliminary mathematical analysis will expose the computation and experimental description of the method and how it is applied to spam de...

2007
JASON BROWNLEE

Strings of bits (bitstrings) are a common first-order representation in the design and preliminary investigation of computational intelligence algorithms given (1) the ease in mapping the strings to arbitrary domains (such as real numbers), and (2) in terms of mathematical analysis. This work considers the use of bitstrings in the context of the clonal expansion and antigenic selection in a gen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید