Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    An Immune-Based Model for Service Survivability

    In order to enhance service survivability, an immune-based model for service survivability, referred to as ISSM, is presented. In the model, the concepts and formal definitions of self, nonself, immunocyte, di...

    **quan Zeng, **aojie Liu, Tao Li, Feixian Sun in Cryptology and Network Security (2006)

  2. Chapter and Conference Paper

    Artificial Immunity-Based Discovery for Popular Information in WEB Pages

    An artificial immunity-based discovery method for popular information is proposed. Principles of evolution and concentration of antibodies in artificial immune system are simulated. Key words in web pages are ...

    Caiming Liu, **aojie Liu, Tao Li, Lingxi Peng in Computational Science – ICCS 2007 (2007)

  3. Chapter and Conference Paper

    A Supervised Classifier Based on Artificial Immune System

    Artificial immune recognition system (AIRS) has been convincingly proved a highly effective classifier, which has been successfully applied to pattern recognition and etc. However, there are two shortcomings t...

    Lingxi Peng, Yinqiao Peng, **aojie Liu, Caiming Liu in Computational Science – ICCS 2007 (2007)

  4. No Access

    Article

    Anomaly detection with artificial immune network

    Inspired by the immune network theory, an adaptive anomaly detection paradigm based on artificial immune network, referred as APAI, is proposed. The implementation of the paradigm includes: initially, the firs...

    Lingxi Peng, Tao Li, **aojie Liu in Wuhan University Journal of Natural Scienc… (2007)

  5. Chapter and Conference Paper

    Modeling Enterprise Intelligence Component Based on Multi-Agents

    The large-granularity software component is the basis for structuring complex enterprise software system. However, current components are small, and their coupling is close. Furthermore, a software entity is b...

    Rui Fan, Lingxi Peng in Research and Practical Issues of Enterprise Information Systems II (2008)

  6. No Access

    Chapter and Conference Paper

    An English Letter Recognition Algorithm Based Artificial Immune

    In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...

    Chunlin Liang, Lingxi Peng, Yindie Hong in Advances in Neural Networks – ISNN 2009 (2009)

  7. No Access

    Chapter and Conference Paper

    Document Classification with Multi-layered Immune Principle

    Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...

    Chunlin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng in Advances in Swarm Intelligence (2010)

  8. No Access

    Chapter and Conference Paper

    Quantum Immune Algorithm and Its Application in Collision Detection

    Collision detection is very important to improve the truth and immersion in the virtual environment. Firstly the paper analyzes the problems that exist in traditional algorithms. There is no algorithm suitable...

    Jue Wu, Ling** Peng, LiXue Chen, Lei Yang in Life System Modeling and Intelligent Computing (2010)

  9. No Access

    Chapter and Conference Paper

    Research of Modified Quantum Genetic Algorithm and It’s Application in Collision Detection

    Collision detection is very important for improving the truth and immersion in the virtual environment. The paper analyzes the problems that exist in the normal algorithm. And there is no algorithm which is su...

    Jue Wu, LiXue Chen, Lei Yang, Ling** Peng in Advanced Intelligent Computing Theories an… (2010)

  10. No Access

    Chapter and Conference Paper

    A Collision Detection Algorithm Based on Self-adaptive Genetic Method in Virtual Environment

    Collision detection is very important to enhance the sense of reality and immersion in virtual environment. Most of the traditional collision detection algorithms have been analyzed, but there is no algorithm ...

    Jue Wu, Lixue Chen, Lei Yang, Qunyan Zhang, Lingxi Peng in Advances in Swarm Intelligence (2010)

  11. No Access

    Chapter and Conference Paper

    Opposition-Based Learning Estimation of Distribution Algorithm with Gaussian Copulas and Its Application to Placement of RFID Readers

    Estimation of distribution algorithms are a class of optimization algorithms based on probability distribution model. In this paper, we propose an improved estimation of distribution algorithm using opposition...

    Ying Gao, **ao Hu, Huiliang Liu, Fufang Li in Artificial Intelligence and Computational … (2011)

  12. No Access

    Chapter and Conference Paper

    Network Security Evaluation Model Based on Cloud Computing

    Cloud computing is an important innovation in the current computing model. The critical problem of cloud computing faced at present is the security issue. In the current network environment, that relying on a ...

    ** Yang, Cilin Wang, Le Yu, Caiming Liu in Information Computing and Applications (2012)

  13. No Access

    Chapter and Conference Paper

    An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection

    Traditional intrusion detection system is confronted with the pressure of processing massive network traffic data which increases sharply. Besides, its feature of static detection causes the weak adaptability ...

    Caiming Liu, Chunming **e, Yan Zhang, Qin Li in Artificial Intelligence and Computational … (2012)

  14. No Access

    Chapter and Conference Paper

    Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization

    A velocity-free multi-objective particle swarm optimizer with centroid is proposed and applied to optimization of wireless sensor network. Different from the standard PSO, particles in swarm only have position...

    Ying Gao, Lingxi Peng, Fufang Li, MiaoLiu in Artificial Intelligence and Computational … (2012)

  15. No Access

    Chapter and Conference Paper

    Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius

    Negative selection algorithm (NSA) generates the detectors based on the self space. Due to the drawbacks of the current representation of the self space in NSAs, the generated detectors cannot enough cover the...

    **quan Zeng, Weiwen Tang, Caiming Liu in Information Computing and Applications (2012)

  16. No Access

    Chapter and Conference Paper

    Efficient Detect Scheme of Botnet Command and Control Communication

    Botnet is an attack network composed of hundreds of millions of compromised computers. Botnet is emerging as the most serious threat against cyber-security and is used to launch Distributed Denial of Service (...

    **quan Zeng, Weiwen Tang, Caiming Liu in Information Computing and Applications (2012)

  17. No Access

    Chapter and Conference Paper

    Opposition-Based Learning Fully Informed Particle Swarm Optimizer without Velocity

    By applying full information and employing the notion of opposition-based learning, a new opposition based learning fully information particle swarm optimiser without velocity is proposed for optimization prob...

    Ying Gao, Lingxi Peng, Fufang Li, Miao Liu, Waixi Liu in Advances in Swarm Intelligence (2013)

  18. No Access

    Chapter and Conference Paper

    EDA-Based Multi-objective Optimization Using Preference Order Ranking and Multivariate Gaussian Copula

    Estimation of distribution algorithms (EDAs) are a class of evolutionary optimization algorithms based on probability distribution model. This article extends the basic EDAs for tackling multi-objective optimi...

    Ying Gao, Lingxi Peng, Fufang Li, Miao Liu in Advances in Neural Networks – ISNN 2013 (2013)

  19. No Access

    Chapter and Conference Paper

    Immune Network Risk Evaluation Model Based on the Spreading of Infectious Diseases

    From the mechanism of infectious epidemic spreading, the theory of network epidemic spreading was studied in this paper. The process of the developments and changes of the network intrusion behaviors were anal...

    ** Yang, Tang Liu, Lingxi Peng in Proceedings of 2013 Chinese Intelligent Au… (2013)

  20. No Access

    Article

    An Automated Diagnosis System of Liver Disease using Artificial Immune and Genetic Algorithms

    The rise of health care cost is one of the world’s most important problems. Disease prediction is also a vibrant research area. Researchers have approached this problem using various techniques such as support...

    Chunlin Liang, Lingxi Peng in Journal of Medical Systems (2013)

previous disabled Page of 2