نتایج جستجو برای: artificial immune algorithm

تعداد نتایج: 1257646  

Journal: :Inf. Sci. 2009
Guan-Chun Luh Chung-Huei Chueh

This paper describes the application of an artificial immune system to a scheduling application. A novel approach multi-modal immune algorithm is proposed for finding optimal solutions to job-shop scheduling problems emulating the features of a biological immune system. Inter-relationships within the proposed algorithm resemble antibody molecule structure, antibody–antigen relationships in term...

Journal: :Inf. Sci. 2015
Yong Peng Bao-Liang Lu

Artificial immune system is a class of computational intelligence methods drawing inspiration from human immune system. As one type of popular artificial immune computing model, clonal selection algorithm (CSA) has been widely used for many optimization problems. CSA mainly generates new schemes by hyper-mutation operators which simulate the immune response process. However, these hyper-mutatio...

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2020

Journal: :CoRR 2006
Julie Greensmith Uwe Aickelin

Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time problem of port scan detection. Our results show a significant difference in artificial DC behaviour for an outgoing portscan when compared to beh...

2004
Roberto T. Alves Myriam R. Delgado Heitor S. Lopes Alex A. Freitas

Fuzzy systems were designed to compute with uncertainties and linguistic information and allow us to develop mathematical tools for information processing. Artificial immune systems (AIS) consist of methods inspired by the biological immune system and designed for solving real-world problems. This work integrates these two kinds of systems, proposing a novel AIS for discovering fuzzy classifica...

Journal: :IJDSN 2013
Nabil Ali Alrajeh Jaime Lloret Mauri

Intrusion detection system (IDS) is regarded as the second line of defense against network anomalies and threats. IDS plays an important role in network security.There are many techniques which are used to design IDSs for specific scenario and applications. Artificial intelligence techniques are widely used for threats detection. This paper presents a critical study on genetic algorithm, artifi...

Journal: :iranian journal of environmental sciences 0
amir soltani mohammadi irrigation and drainage department, faculty of water sciences engineering, shahid chamran university, ahvaz, iran atefeh sayadi shahraki irrigation and drainage department, faculty of water sciences engineering, shahid chamran university, ahvaz, iran abd ali naseri irrigation and drainage department, faculty of water sciences engineering, shahid chamran university, ahvaz, iran

one of the main aims of water resource planners and managers is to estimate and predict the parameters of groundwater quality so that they can make managerial decisions. in this regard, there have many models developed, proposing better management in order to maintain water quality. most of these models require input parameters that are either hardly available or time-consuming and expensive to...

2015
Georgi Ivanov Nikolay Nikolov Svetla Nikova

S-boxes play an important role in ensuring the resistance of block ciphers against cryptanalysis as often they are their only nonlinear components. The cryptographic properties of S-boxes and a variety of constructions have been studied extensively over the past years. Techniques for S-box generation include algebraic constructions, pseudo-random generation and heuristic approaches. The family ...

Journal: :Neurocomputing 2014
Fengqiang Zhao Guangqiang Li Chao Yang Ajith Abraham Hongbo Liu

Packing and layout problems have wide applications in engineering practice. However, they belong to NP (non-deterministic polynomial)-Complete problems. In this paper, we introduce human intelligence into the computational intelligent algorithms, namely particle swarm optimisation (PSO) and immune algorithms (IA). A novel human-computer cooperative PSO-based immune algorithm (HCPSO-IA) is propo...

2013
Srinivasa Rao

Many heuristic optimization techniques derived from evolutionary algorithms are stochastic search methods that mimic the natural biological evolution and/or social behavior of spices. Such algorithms have been developed to obtain near optimal solutions to large scale optimization problems, where in traditional methods may fail. With the development of computational intelligence in recent years,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید