نتایج جستجو برای: artificial immune algorithm
تعداد نتایج: 1257646 فیلتر نتایج به سال:
This paper describes the application of an artificial immune system to a scheduling application. A novel approach multi-modal immune algorithm is proposed for finding optimal solutions to job-shop scheduling problems emulating the features of a biological immune system. Inter-relationships within the proposed algorithm resemble antibody molecule structure, antibody–antigen relationships in term...
Artificial immune system is a class of computational intelligence methods drawing inspiration from human immune system. As one type of popular artificial immune computing model, clonal selection algorithm (CSA) has been widely used for many optimization problems. CSA mainly generates new schemes by hyper-mutation operators which simulate the immune response process. However, these hyper-mutatio...
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time problem of port scan detection. Our results show a significant difference in artificial DC behaviour for an outgoing portscan when compared to beh...
Fuzzy systems were designed to compute with uncertainties and linguistic information and allow us to develop mathematical tools for information processing. Artificial immune systems (AIS) consist of methods inspired by the biological immune system and designed for solving real-world problems. This work integrates these two kinds of systems, proposing a novel AIS for discovering fuzzy classifica...
Intrusion detection system (IDS) is regarded as the second line of defense against network anomalies and threats. IDS plays an important role in network security.There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are widely used for threats detection. This paper presents a critical study on genetic algorithm, artifi...
one of the main aims of water resource planners and managers is to estimate and predict the parameters of groundwater quality so that they can make managerial decisions. in this regard, there have many models developed, proposing better management in order to maintain water quality. most of these models require input parameters that are either hardly available or time-consuming and expensive to...
S-boxes play an important role in ensuring the resistance of block ciphers against cryptanalysis as often they are their only nonlinear components. The cryptographic properties of S-boxes and a variety of constructions have been studied extensively over the past years. Techniques for S-box generation include algebraic constructions, pseudo-random generation and heuristic approaches. The family ...
Packing and layout problems have wide applications in engineering practice. However, they belong to NP (non-deterministic polynomial)-Complete problems. In this paper, we introduce human intelligence into the computational intelligent algorithms, namely particle swarm optimisation (PSO) and immune algorithms (IA). A novel human-computer cooperative PSO-based immune algorithm (HCPSO-IA) is propo...
Many heuristic optimization techniques derived from evolutionary algorithms are stochastic search methods that mimic the natural biological evolution and/or social behavior of spices. Such algorithms have been developed to obtain near optimal solutions to large scale optimization problems, where in traditional methods may fail. With the development of computational intelligence in recent years,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید