Deep search:Searching for "immune algorithm" in 'ABSTRACT and KEYWORDGot 6 items.
index Title
1An immunity-based technique to detect network intrusions
Author(s):PAN Feng, DING Yun-fei, WANG Wei-n...  Clicked:3649  Download:1244  Cited:119  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.371~377  DOI:10.1631/jzus.2005.A0371
2Optimal coordinated voltage control of power systems
Author(s):Li Yan-jun, Hill David J., Wu Tie-...  Clicked:3525  Download:1302  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.2 P.257~262  DOI:10.1631/jzus.2006.A0257
3Immune algorithm for discretization of decision systems in rough set theory
Author(s):Jia Ping, Dai Jian-hua, Chen Wei-d...  Clicked:3429  Download:1245  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.4 P.602~606  DOI:10.1631/jzus.2006.A0602
4Application of an immune algorithm to settlement prediction
Author(s):Jia GUO, Jun-jie ZHENG, Yong LIU  Clicked:3336  Download:1805  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.1 P.93~100  DOI:10.1631/jzus.A0820289
5An immune-tabu hybrid algorithm for thermal unit commitment of electric power systems
Author(s):Wei LI, Hao-yu PENG, Wei-hang ZHU,...  Clicked:3234  Download:1616  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.6 P.877~889  DOI:10.1631/jzus.A0820607
6Optimization of thread partitioning parameters in speculative multithreading based on artificial immune alg...
Author(s):Yu-xiang Li, Yin-liang Zhao, Bin L...  Clicked:2261  Download:1181  Cited:1  <Full Text>  <PPT> 454
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.3 P.205-216  DOI:10.1631/FITEE.1400172
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE