Search Results - (( intelligence system cell algorithm ) OR ( intelligence work computer algorithm ))
Search alternatives:
- intelligence system »
- intelligence work »
- cell algorithm »
- work computer »
- system cell »
-
1
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
2
Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri
Published 2017“…The principle of ICLONALG is to select the best cells to be cloned and mutated by calculating similarity measurements of the most competent cells. …”
Get full text
Get full text
Thesis -
3
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024Subjects:journal::journal article -
4
Designing a new model for worm response using security metrics
Published 2024Subjects:Conference Paper -
5
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024Proceedings Paper -
6
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
7
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…This worm response model is called as eZSiber, inspired by apoptosis or also known as cell-programmed death. It is a concept borrowed from human immunology system (HIS), where it has been mapped into network security environment. …”
Proceedings Paper -
9
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…This study investigates the use of a novel Proposed Self-Calibration Algorithm (PSCA) of multi pressure sensors in real time on robotic hand glove system. …”
Get full text
Get full text
Thesis -
11
Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review
Published 2025“…Therefore, this study presents the prospect of artificial intelligence-based algorithms, control systems, and energy management strategies advances on HFCEVs performance optimization. …”
Review -
12
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Article -
13
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
14
Swarm intelligence optimization algorithms: a review
Published 2018Get full text
Get full text
Get full text
Article -
15
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
16
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023Subjects: “…Algorithms…”
Conference paper -
17
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
18
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…This work is aimed to decrease the total real and reactive power losses while enhancing the voltage profile of the distribution network with less computation time by proposing two new artificial intelligence algorithms, i.e. grouping particle swarm optimization algorithm and grouping genetic algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article
