Frequency analysis for dendritic cell population tuning
暂无分享,去创建一个
[1] Emmanuel Ifeachor,et al. Digital Signal Processing: A Practical Approach , 1993 .
[2] Julie Greensmith,et al. The dendritic cell algorithm , 2007 .
[3] Peter J. Bentley,et al. Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm , 2006, ICARIS.
[4] Renato Zaccaria,et al. Surveillance robotics: analyzing scenes by colors analysis and clustering , 2003, Proceedings 2003 IEEE International Symposium on Computational Intelligence in Robotics and Automation. Computational Intelligence in Robotics and Automation for the New Millennium (Cat. No.03EX694).
[5] Julie Greensmith,et al. Articulation and Clarification of the Dendritic Cell Algorithm , 2006, ICARIS.
[6] Hobart R. Everett,et al. MOBILE ROBOTS FOR OUTDOOR SECURITY APPLICATIONS , 1999 .
[7] Liangpei Zhang,et al. An unsupervised artificial immune classifier for multi/hyperspectral remote sensing imagery , 2006, IEEE Trans. Geosci. Remote. Sens..
[8] David W. Corne,et al. An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems , 2003, ICARIS.
[9] Julie Greensmith,et al. The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.
[10] J.A. Ramirez,et al. A modified immune network algorithm for multimodal electromagnetic problems , 2006, IEEE Transactions on Magnetics.
[11] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[12] A. Sankaranarayanan,et al. A mobile robot testbed with manipulator for security guard application , 1995, Proceedings of 1995 IEEE International Conference on Robotics and Automation.
[13] Simon S. Young. Computerized Data Acquisition and Analysis for the Life Sciences: How a Data Acquisition System Works , 2001 .
[14] Gerold Schuler,et al. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.
[15] Simon S. Young,et al. Computerized Data Acquisition and Analysis for the Life Sciences: A Hands-on Guide , 2001 .
[16] Hobart R. Everett,et al. Controlling multiple security robots in a warehouse environment , 1994 .
[17] Julie Greensmith,et al. DCA for bot detection , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).
[18] Alex Alves Freitas,et al. Revisiting the Foundations of Artificial Immune Systems for Data Mining , 2007, IEEE Transactions on Evolutionary Computation.
[19] Jonathan Timmis,et al. Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.
[20] Julie Greensmith,et al. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection , 2005, ICARIS.
[21] Y. Meyer,et al. Wavelets and Filter Banks , 1991 .
[22] Julie Greensmith,et al. Dendritic Cells for Anomaly Detection , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[23] Michael J. Swain,et al. Color indexing , 1991, International Journal of Computer Vision.