A negative selection algorithm based on the hierarchical clustering of self set HC-RNSA is introduced in this paper. Several strategies are applied to improve the algorithm performance. First, the self data set is replaced by the self cluster centers to compare with the detector candidates in each cluster level. As the number of self clusters is much less than the self set size, the detector generation efficiency is improved. Second, during the detector generation process, the detector candidates are restricted to the lower coverage space to reduce detector redundancy. In the article, the problem that the distances between antigens coverage to a constant value in the high dimensional space is analyzed, accordingly the Principle Component An...
AbstractConcerned with the problem of lacking fault samples of complex equipments, it studies the pr...
This paper describes an enhanced negative selection algorithm (NSA) called V-detector. Several key c...
Anomaly detection methods are of common use in many fields, including databases and large computer s...
Negative selection algorithm is one of the main algorithms of artificial immune systems. However, ca...
Excessive detectors, high time complexity, and loopholes are main problems which current negative se...
Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immun...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
While dealing with sensitive personnel data, the data have to be maintained to preserve integrity an...
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are id...
This paper describes a real-valued representation for the negative selection algorithm and its appli...
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired...
Inspired by the biological immune system, many researchers apply artificial immune principles to int...
In the last decade, classifiers have been presented using Artificial Immune (AI) technique. However,...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
Negative selection algorithm (NSA) classifies a given data either as normal (self) or anomalous (non...
AbstractConcerned with the problem of lacking fault samples of complex equipments, it studies the pr...
This paper describes an enhanced negative selection algorithm (NSA) called V-detector. Several key c...
Anomaly detection methods are of common use in many fields, including databases and large computer s...
Negative selection algorithm is one of the main algorithms of artificial immune systems. However, ca...
Excessive detectors, high time complexity, and loopholes are main problems which current negative se...
Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immun...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
While dealing with sensitive personnel data, the data have to be maintained to preserve integrity an...
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are id...
This paper describes a real-valued representation for the negative selection algorithm and its appli...
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired...
Inspired by the biological immune system, many researchers apply artificial immune principles to int...
In the last decade, classifiers have been presented using Artificial Immune (AI) technique. However,...
This paper proposes an extended negative selection algorithm for anomaly detection. Unlike previousl...
Negative selection algorithm (NSA) classifies a given data either as normal (self) or anomalous (non...
AbstractConcerned with the problem of lacking fault samples of complex equipments, it studies the pr...
This paper describes an enhanced negative selection algorithm (NSA) called V-detector. Several key c...
Anomaly detection methods are of common use in many fields, including databases and large computer s...