Deep search:Searching for "immune algorithm" in 'ABSTRACT and KEYWORDGot 6 items.
index Title
1An immunity-based technique to detect network intrusions
Author(s):PAN Feng, DING Yun-fei, WANG Wei-n...  Clicked:6061  Download:2861  Cited:119  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.5 P.371-377  DOI:10.1631/jzus.2005.A0371
2Optimal coordinated voltage control of power systems
Author(s):Li Yan-jun, Hill David J., Wu Tie-...  Clicked:6388  Download:3012  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.2 P.257-262  DOI:10.1631/jzus.2006.A0257
3Immune algorithm for discretization of decision systems in rough set theory
Author(s):Jia Ping, Dai Jian-hua, Chen Wei-d...  Clicked:5919  Download:2798  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.4 P.602-606  DOI:10.1631/jzus.2006.A0602
4Application of an immune algorithm to settlement prediction
Author(s):Jia GUO, Jun-jie ZHENG, Yong LIU  Clicked:5805  Download:3209  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.1 P.93-100  DOI:10.1631/jzus.A0820289
5An immune-tabu hybrid algorithm for thermal unit commitment of electric power systems
Author(s):Wei LI, Hao-yu PENG, Wei-hang ZHU,...  Clicked:5902  Download:3121  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.6 P.877-889  DOI:10.1631/jzus.A0820607
6Optimization of thread partitioning parameters in speculative multithreading based on artificial immune alg...
Author(s):Yu-xiang Li, Yin-liang Zhao, Bin L...  Clicked:7116  Download:2801  Cited:1  <Full Text>  <PPT> 1895
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.3 P.205-216  DOI:10.1631/FITEE.1400172
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE