Emergent damage pattern recognition using immune network theory
Citations
31 citations
Cites methods from "Emergent damage pattern recognition..."
...In 2011, Chen and Zang [8] presented an algorithm based on immune network theory and hierarchical clustering algorithms....
[...]
9 citations
9 citations
6 citations
1 citations
References
214 citations
"Emergent damage pattern recognition..." refers background in this paper
...(Dasgupta et al. 2004) investigate a real-value immune negative selection algorithm for aircraft fault detection....
[...]
162 citations
"Emergent damage pattern recognition..." refers methods in this paper
...Various methods to determine the best number of clusters are discussed in (Kothari and Pitts 1999, Tibshirani et al. 2001, Sugar and James 2003, Salvador and Chan 2004, Cheong and Lee 2008, Qinpei et al. 2008)....
[...]
161 citations
"Emergent damage pattern recognition..." refers methods in this paper
...For example, Zhong et al. (Zhong et al. 2006) employ an AIS-based unsupervised machine-learning algorithm to perform remote sensing image classification....
[...]
148 citations
"Emergent damage pattern recognition..." refers background in this paper
...1(b) (De Castro and Timmis 2002)....
[...]
...Following this recognizing scheme, an immune network of interaction is formed (Timmis et al. 2008)....
[...]
...Freitas and Timmis (Freitas and Timmis 2007) use a problem-oriented approach for the design of AIS for data mining....
[...]
...The continuous recruitment and elimination of memory cells not only provides a competition mechanism to control the survival of memory cells in the network, but also offers great potential to discover memory cells which are able to bind with unpredictable invaders (new data patterns) (De Castro and Timmis 2002)....
[...]
...The artificial immune systems can be defined as the abstract or metaphorical computational systems developed using ideas, theories, and components, extracted from the natural immune system (De Castro and Timmis 2002)....
[...]
144 citations
"Emergent damage pattern recognition..." refers background in this paper
...(Nagayama et al. 2007) investigate the effects of time synchronization accuracy and communication reliability in SHM applications and examine coordinated computing for the management of large amount of SHM data....
[...]