Results 11 to 20 of about 1,097,686 (283)

Reducing the Training Samples for Damage Detection of Existing Buildings through Self-Space Approximation Techniques

open access: yesSensors, 2021
Data-driven methodologies are among the most effective tools for damage detection of complex existing buildings, such as heritage structures. Indeed, the historical evolution and actual behaviour of these assets are often unknown, no physical models are ...
Alberto Barontini   +4 more
doaj   +1 more source

Image Similarity Search using a Negative Selection Algorithm [PDF]

open access: yesAdvances in Artificial Life, ECAL 2013, 2013
The Negative Selection Algorithm is an immune inspired algorithm that can be used for different purposes such as fault detection, data integrity protection and virus detection. In this paper we show how the Negative Selection Algorithm can be adapted to tackle the similar image search problem: given a target image, images from a large database similar ...
Keijzers, S.   +3 more
openaire   +3 more sources

Bagging ensemble selection for regression [PDF]

open access: yes, 2012
Bagging ensemble selection (BES) is a relatively new ensemble learning strategy. The strategy can be seen as an ensemble of the ensemble selection from libraries of models (ES) strategy. Previous experimental results on binary classification problems have
D.H. Wolpert   +10 more
core   +1 more source

Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

open access: yesIEEE Access, 2020
In Databases, the most prevalent cause of data breaches comes from insiders who misuse their account privileges. Due to the difficulty of discovering such breaches, an adaptive, accurate, and proactive database security strategy is required.
Wael Said, Ayman Mohamed Mostafa
doaj   +1 more source

Non-Negative Sparse Regression and Column Subset Selection with L1 Error [PDF]

open access: yes, 2018
We consider the problems of sparse regression and column subset selection under L1 error. For both problems, we show that in the non-negative setting it is possible to obtain tight and efficient approximations, without any additional structural ...
Bhaskara, Aditya, Lattanzi, Silvio
core   +1 more source

Comparison of a Greedy Selection Operator to Tournament Selection and a Hill Climber [PDF]

open access: yes, 2011
A new deterministic greedy genetic algorithm selection operator with very high selection pressure, dubbed the Jugate Adaptive Method is examined.
Borbone, John, Graham, Lee, Parker, Gary
core   +2 more sources

Relevance of Negative Links in Graph Partitioning: A Case Study Using Votes From the European Parliament [PDF]

open access: yes, 2015
In this paper, we want to study the informative value of negative links in signed complex networks. For this purpose, we extract and analyze a collection of signed networks representing voting sessions of the European Parliament (EP).
Figueiredo, Rosa   +3 more
core   +5 more sources

An Antigen Space Triangulation Coverage Based Real-Value Negative Selection Algorithm

open access: yesIEEE Access, 2019
Negative selection algorithm (NSA) is an important detector generation algorithm of artificial immune system (AIS). Traditional NSAs randomly generate detectors in the whole antigen space without considering the distribution of self/non-self antigens ...
Zhang Fan   +4 more
doaj   +1 more source

Dual-filtering (DF) schemes for learning systems to prevent adversarial attacks

open access: yesComplex & Intelligent Systems, 2022
Defenses against adversarial attacks are essential to ensure the reliability of machine-learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use.
Dipankar Dasgupta, Kishor Datta Gupta
doaj   +1 more source

An Improved Negative Selection Algorithm Based on Subspace Density Seeking

open access: yesIEEE Access, 2017
Negative selection algorithm (NSA) is an important method for generating detectors in artificial immune systems. Traditional NSAs randomly generate detectors in the whole feature space.
Zhengjun Liu, Tao Li, Jin Yang, Tao Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy