Results 11 to 20 of about 1,097,686 (283)
Data-driven methodologies are among the most effective tools for damage detection of complex existing buildings, such as heritage structures. Indeed, the historical evolution and actual behaviour of these assets are often unknown, no physical models are ...
Alberto Barontini +4 more
doaj +1 more source
Image Similarity Search using a Negative Selection Algorithm [PDF]
The Negative Selection Algorithm is an immune inspired algorithm that can be used for different purposes such as fault detection, data integrity protection and virus detection. In this paper we show how the Negative Selection Algorithm can be adapted to tackle the similar image search problem: given a target image, images from a large database similar ...
Keijzers, S. +3 more
openaire +3 more sources
Bagging ensemble selection for regression [PDF]
Bagging ensemble selection (BES) is a relatively new ensemble learning strategy. The strategy can be seen as an ensemble of the ensemble selection from libraries of models (ES) strategy. Previous experimental results on binary classification problems have
D.H. Wolpert +10 more
core +1 more source
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj +1 more source
Non-Negative Sparse Regression and Column Subset Selection with L1 Error [PDF]
We consider the problems of sparse regression and column subset selection under L1 error. For both problems, we show that in the non-negative setting it is possible to obtain tight and efficient approximations, without any additional structural ...
Bhaskara, Aditya, Lattanzi, Silvio
core +1 more source
Comparison of a Greedy Selection Operator to Tournament Selection and a Hill Climber [PDF]
A new deterministic greedy genetic algorithm selection operator with very high selection pressure, dubbed the Jugate Adaptive Method is examined.
Borbone, John, Graham, Lee, Parker, Gary
core +2 more sources
Relevance of Negative Links in Graph Partitioning: A Case Study Using Votes From the European Parliament [PDF]
In this paper, we want to study the informative value of negative links in signed complex networks. For this purpose, we extract and analyze a collection of signed networks representing voting sessions of the European Parliament (EP).
Figueiredo, Rosa +3 more
core +5 more sources
An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm
Negative selection algorithm (NSA) is an important detector generation algorithm of artificial immune system (AIS). Traditional NSAs randomly generate detectors in the whole antigen space without considering the distribution of self/non-self antigens ...
Zhang Fan +4 more
doaj +1 more source
Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks
Defenses against adversarial attacks are essential to ensure the reliability of machine-learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use.
Dipankar Dasgupta, Kishor Datta Gupta
doaj +1 more source
An Improved Negative Selection Algorithm Based on Subspace Density Seeking
Negative selection algorithm (NSA) is an important method for generating detectors in artificial immune systems. Traditional NSAs randomly generate detectors in the whole feature space.
Zhengjun Liu, Tao Li, Jin Yang, Tao Yang
doaj +1 more source

