基于免疫系统的协同进化机制及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
传统进化算法在理论上已比较成熟,应用也非常广泛。但是,它有两个方面的缺陷。一个方面是收敛速度较慢、局部搜索能力有限。另一个方面是,在搜索空间规模庞大、搜索空间结构复杂、以及个体的直观评价标准缺乏的应用场合,难以取得很好的性能,这些缺陷制约着其应用。免疫算法和协同进化算法是进化算法的两个研究热点。两者在启发机制和应用领域方面,成果都很多。两者都有效地克服了对传统进化算法的缺点。免疫算法与协同进化算法,在机制模型方面和算子设计方面很多的共同点,同时也有互补性。建立在两者之上的免疫协同进化机制,将有更好的性能和应用价值。
     本论文针对传统进化算法的问题,借鉴免疫计算和协同进化计算的优势,同时考虑到生物免疫中丰富的协同进化机制,通过研究基于免疫系统的协同进化机制,建立协同进化模型,提出协同进化算法或系统,解决在服装设计优化、物流优化和分布式对象计算等领域中的新型复杂应用问题。
     首先,对进化算法、免疫计算、协同进化计算和免疫协同进化机制进行了综述,旨在说明免疫协同进化机制及其启发的计算模型的价值。对于免疫计算和协同进化计算的研究,强调了各自的启发机制、计算模型、算法或人工系统的设计。对于免疫协同进化机制的研究,根据生物免疫系统的结构与功能,提出将免疫协同进化机制分为三大类进行研究,分别是基于免疫群体的协同进化机制、基于免疫网络的协同进化机制、以及基于免疫稳态维持原理的协同进化机制。而免疫协同进化的机制、模型、算法或系统,也在这样的分类模式下进行研究。
     然后,从生物免疫系统中选择了一些机制进行研究,建立模型、提出算法与系统框架,并在物流优化、服装设计和分布式计算等领域进行应用与验证。1)在基于免疫群体的协同进化计算方面,融入和加强了传统进化算法的算子,同时引入和优化了免疫算法的传统算子,并结合应用领域的知识设计了协同进化算子和控制策略,成功地应用于物流配送区域均衡优化和制服分配优化。2)在基于免疫系统的免疫协同进化设计方法的研究方面,提出了基于交互式免疫协同进化算法的服装设计方法;提出了基于神经网络和免疫协同进化算法的服装设计优化的混合方法。3)在基于免疫协同进化网络的模型与应用的研究方面,提出了多亲和度免疫网络的模型并用于设计分布式对象预取技术;提出了基于抗体网络模型和多层次免疫系统模型的分布式对象计算框架;提出了基于多信号协同的危险模式理论的信息安全实时评估模型。4)在免疫稳态协同进化机制与应用方面,提出了抗体网络与多层次免疫系统的稳定性协同进化模型,并用于设计分布式对象计算框架;提出了基于免疫稳态维持的认知系统模型的一种信息检索模型。以上在启发机制、模型、算法与系统框架、以及应用方面进行的理论分析和应用实验的研究,都表明免疫协同进化机制具有很好的研究前景和应用价值。
     最后,对全文研究内容进行了总结,指出研究工作中存在的不足,明确了下一步的研究方向。
Traditional evolutionary algorithms are mature in theory and are applied successfully and widely.However,there are two disadvantages of them.First,the convergence speed is slow and the local search ability is limited.Second,for application problems with large searching space,the structure of the searching space is very complex or there is no intuitive measure to evaluate the individual,as such the traditional evolutionary algorithms fail to be applied with promising performance.Immune computation and co-evolutionary computation are two hot research fields in evolutionary algorithms.And increasing number of the inspiration mechanisms and application fields are discovered.There are a lot of achievements of theory and application in these fields.Moreover,they both overcome the shortcomings of traditional evolutionary algorithms.And immune algorithms and co-evolutionary algorithms share many features in mechanisms,models and design of operators.They are also complementary in some aspects.Immune computation and immune co-evolutionary computation will achieve better performance and increase value of application.
     In this study,the drawbacks of traditional evolutionary algorithms are focused.Based on the superior features of immune algorithm and co-evolutionary algorithm,and considering the abundant co-evolutionary mechanisms in biological immune system,the immune system based co-evolutionary mechanisms are study by building co-evolutionary models,algorithms and system frameworks,and finally applying in the complex and novel application fields such as garment design optimization and distributed object computation.
     First,a general study of evolutionary algorithm,immune computation, co-evolutionary computation and immune co-evolutionary mechanism are given to explain the value and significance of immune co-evolutionary mechanism and their inspired computation paradigm.In the study of immune computation and co-evolutionary computation,the respective inspiration mechanism,computation models,algorithms and artificial systems are emphasized.In the study of immune co-evolutionary mechanisms, according to the structure and function of biological immune system,three categories are proposed including immune population based co-evolutionary mechanisms,immune network based co-evolutionary mechanisms,and immune stability maintenance principle based co-evolutionary mechanisms.And the following study of immune co-evolutionary mechanisms,models,algorithms and systems is also performed in this classification pattern.
     Then,in the three categories,some immune co-evolutionary mechanisms are abstracted from biological immune system,whose models are built for inspiring algorithms and system framework.And they are applied in the fields of garment design optimization and distributed object computation.(1) In the aspect of population based immune co-evolutionary computation,incorporating and strengthening the traditional evolutionary operators,introducing and optimizing traditional immune algorithm,and designing specific co-evolutionary operator by considering domain knowledge,several immune co-evolutionary algorithms are designed for logistic portion balancing optimization and uniform assignment optimization.(2) In the aspect of immune co-evolutionary design approaches,an interactive immune co-evolutionary algorithm based approach is proposed for garment pattern design optimization;a neural network and immune co-evolutionary algorithm based hybrid algorithm is proposed for garment pattern design optimization.(3) In the aspect of immune network based co-evolutionary mechanisms and application,three technologies and system frameworks are studied.A multi-affinity immune network model based object prefetching approach is proposed for distributed object computation.An antibody network and a multi-layered immune model are proposed for a novel framework of distributed object computation.A co-evolutionary multi-signal model based on danger theory is proposed for real-time risk assessment of information security.(4) In the aspect of immune stability maintenance based model and application,a stable co-evolutionary model based on antibody network and multi-layered immune system is proposed to design a framework of distributed object computation,and a immune cognitive model based immune stability maintenance is proposed for information retrieval.The above researches of inspiration mechanisms,models,algorithms and system frameworks,prove that the immune co-evolutionary computation is importance and deserves further studies.
     Finally,a summary of the thesis is made,and the deficiency of the study and the further development are narrated respectively.
引文
[1]Y.-T.Kao,E.Zahara,A hybrid genetic algorithm and particle swarm optimization for multimodal functions.Applied Soft Computing,2008.8(2):849-857.
    [2]I.G.Tsoulos,I.E.Lagaris,GenMin:An enhanced genetic algorithm for global optimization.Computer Physics Communications,2008.178(11):843-851.
    [3]G.Armano,M.Marchesi,A.Murru,A hybrid genetic-neural architecture for stock indexes forecasting.Information Sciences,2005.170(1):3-33.
    [4]R.P.Wiegand,An analysis of cooperative coevolutionary algorithms.2004.
    [5]C.D.Rosin,Coevolutionary search among adversaries.1997:San Diego,CA.
    [6]R.Agarwal,M.K.Tiwari,S.K.Mukherjee,Artificial immune system based approach for solving resource constraint project scheduling problem.International Journal of Advanced Manufacturing Technology,2007.34(5-6):584-593.
    [7]A.Prakash,N.Khilwani,M.K.Tiwari,Y.Cohen,Modified immune algorithm for job selection and operation allocation problem inflexible manufacturing systerns.Advances in Engineering Software,2008.39(3):219-232.
    [8]E.Hart,J.Timmis,Application areas of AIS:The past,the present and the future.Applied Soft Computing,2008.8(1):191-201.
    [9]何维,医学免疫学.2005:人民卫生出版社.
    [10]丁永生,计算智能-理论、技术与应用.2004:科学出版社.
    [11]李涛,计算机免疫学.2004:电子工业出版社.
    [12]肖人彬,曹鹏林,刘勇,工程免疫计算.2007:科学出版社.
    [13]张向锋,任立红,丁永生,基于神经内分泌免疫系统的网络计算仿真平台.系统仿真学报,2005.1(2):79-83.
    [14]N.K.Jerne,Towards a network theory of the immune system.Ann.Immunol.(Inst.Pasteur),1974.125C:373-389.
    [15]N.K.Jerne,Clonal Selection in a lymphocyte network,in Cellular Selection and Regulation in the Immune Response.1974,Raven Press.p.39-48.
    [16]N.K.Jerne,Idiotopic Network and Other preconceived ideas.Immunological Rev.,1984.79:5-24.
    [17]N.K.Jerne,The generative grammar of the immune system.The EMBO Journal,1985.4(4):847-852.
    [18]J.D.Farmer,N.H.Packard,A.S.Perelson,The immune system,adaptation,and machine learning.Physica D,1986.22:187-204.
    [19]莫宏伟,人工免疫系统原理与应用.2002:哈尔滨工业大学出版社.
    [20]焦李成,杜海峰,刘芳,公茂果,免疫优化计算学习与识别.2006:科学出版社.
    [21]肖人彬,王磊,人工免疫系统:原理、模型、分析及展望.计算机学报,2002.25(12):1281-1293.
    [22]丁永生,任立红,人工免疫系统:理论与应用.模式识别与人工智能,2000.13(1):52-59.
    [23]蔡自兴,龚涛,免疫算法的进展.控制与决策,2004.19(8):841-846.
    [24]王磊,免疫进化计算理论及其应用(博士论文).2001,西安电子科技大学.
    [25]M.Oprea,S.Forrest.How the immune system generates diversity:Pathogen space coverage with random and evolved antibody libraries,in Genetic and Evolutionary Computation Conference(GECCO).1999.
    [26]R.Hightower,S.Forrest,A.S.Perelson.The evolution of emergent organization in immune system gene libraries,in Proceedings of the Sixth International Conference on Genetic Algorithms.1995.Morgan Kaufmann,San Francisco,CA.
    [27]D.L.Chao,M.P.Davenport,S.Forrest,A.S.Perelson,A stochastic model of cytotoxic T cell responses.Journal of Theoretical Biology,2004.228(2):227-240.
    [28]D.L.Chao,M.P.Davenport,S.Forrest,A.S.Perelson,Modeling the impact of antigen kinetics on T-cell activation and response.Immunology and Cell Biology,2004.82(1):55-61.
    [29]M.A.Fishman,A.S.Perelson,Modeling T cell-antigen presenting cell interactions.J.Theoret.Biol.,1993.160:311-342.
    [30]J.Carneiro,A.Coutinho,J.Stewart,A model of the immune network with B-T cell cooperation,I-Prototypical Structures and Dynamics.Journal of Theoretical Biology,1996.182:513-529.
    [31]J.H.Carter,The Immune System as a model for Pattern Recognition and classification.Journal of the American Medical Informatics Association,2000.7(1):28-41.
    [32]P.Inho,D.Na,K.H.Lee,D.Lee.Fuzzy Continuous Petri Net-Based Approach for Modeling Helper T Cell Differentiation.in Proceedings of ICARIS,4th International Conference on Artificial Immune Systems.2005.Banff,Canada.
    [33]F.Celada,P.E.Seiden,Affinity maturation and hypermutation in a simulation of the humoral immune response.European Journal of Immunology,1996.26(6):1350-1358.
    [34]周光炎,免疫学原理.2007:上海科学技术出版社.
    [35]莫宏伟,人工免疫网络记忆分类原理与应用研究(博士论文).2005,哈尔滨工程大学.
    [36]孙勇智,人工免疫模型、算法及其应用研究(博士论文).2005,浙江大学.
    [37]D.J.Smith,Towards a Model of Associative Recall in Immunological Memory,in Technical Report,94-9.1994,Masters project,Computer Science Department,University of New Mexico:Albuquerque NM.
    [38]D.J.Smith,S.Forrest,A.S.Perelson,Immunological memory is associative,in Artificial Immune Systems and Their Applications.1999,Springer-Verlag.p.105-112.
    [39]E.Hart,Exploiting the Analogy between the Immune System and Sparse Distributed Memory.special Issues of Genetic Programming and Evolvable Machine,2005.
    [40]E.Hart,Ross.Exploiting the analogy between immunology and sparse distributed memories:a system for clustering non-stationary data.in Proceedings of 1st International Conference on Artificial Immune Systems(ICARIS).2002.University of Kent at Canterbury,UK.
    [41]F.Varela,A.Coutinho,B.Dupire,N.Vaz,Cognitive Networks:Immune and Neural and Otherwise.Theoretical Immunology:Part Two,SFI Studies in the science of Complexity,1988:359-371.
    [42]E.Hart,H.Bersini,F.Santos.Tolerance vs.Intolerance:How Affinity Defines Topology in an ldiotypic Network.in Proceedings of the 5th International Conference on Artificial Immune Systems(ICARIS).2006.Portugal.
    [43]E.Hart.Analysis of a Growth Model for Idiotypic Networks.in Proceedings of the 5th International Conference on Artificial Immune Systems(ICARIS).2006.Portugal.
    [44]J.Timmis,M.Neal,T.Knight.AINE:Machine Learning Inspired by the Immune System.in IEEE Transactions on Evolutionary Computation.2002.
    [45]J.Timmis,Visualizing artificial immune networks,in Technical Report UWA-DCS-00-034.2000,University of Wales and Aberystwyth.
    [46]J.Timmis,M.J.Neal.A Resource Limited Artificial Immune System for Data Analysis.in Research and Development in Intelligent Systems ⅩⅦ.2000.Cambridge,UK.
    [47]L.N.d.C.a.J.Timmis.Hierarchy and Convergence of Immune Networks:Basic Ideas and Preliminary Results.in Proceedings of 1st International Conference on Artificial Immune Systems(ICARIS).2002.University of Kent at Canterbury,UK.
    [48]J.Timmis,M.Neal,J.Hunt,An artificial immune system for data analysis.Biosystems,2000.55(1/3):143-150.
    [49]J.Timmis.aiViS-artificial immune network visualization.in Proceedings of EuroGraphics UK Conference.2001.University College London.
    [50]L.N.d.Castro,F.J.V.Zuben,AiNet:An Artificial Immune Network for Data Analysis,in Data Mining:A Heuristic Approach,H.A.Abbass,R.A.Sarker,and C.S.Newton,Editors.2001,Idea Group Publishing,USA.
    [51]J.Timmis.On Diversity and Artificial Immune Systems:Incorporating a Diversity Operator into aiNet.in Proceedings of International Workshop on Natural and Artificial Immune Systems(NAIS) 2005.Vietri sul Mare,Salerno,Italy.
    [52]L.N.d.Castro.The Immune Response of an Artificial Immune Network(AINet).in IEEE Congress on Evolutionary Computation.2003.Canberra,Australia.
    [53]J.Timmis,C.Edmonds.A Comment on opt-AiNET:An Immune Network Algorithm for Optimization.in Proceedings of International Conference on Genetic and Evolutionary Computation(GECCO).2004.Seattle,Washington USA.
    [54]Y.Ishida.A Constructive systems approach to understanding the immune system as a biological problem solver.in proceedings of IEEE Symposium Series on Computational Intelligence.2007.Honolulu,Hawaii,USA.
    [55]Y.Ishida.Active diagnosis by self-organization:An approach by the immune network metaphor.in Proceedings of the International Joint Conference on Artificial Intelligence,IEEE.1997.Nagoya,Japan.
    [56]Z.Tang,T.Yamaguchi,K.Tashima,O.Ishizuka,K.Tanno.Multiple valued immune network model and its simulations.in Proceedings of the 27th International Symposium on Multiple Valued Logic.1997.Antigonish,Canada.
    [57]R.Puzone,B.Kohler,P.Seiden,F.Celada,IMMSIM,a flexible model for in machina experiments on immune system responses.Future Generation Computer Systems,2002.18(7):961-972.
    [58]V.Baldazzi,F.Castiglione,M.Bernaschi,An enhanced agent based model of the immune system response.Cellular Immunology,2006.244(2):77-79.
    [59]F.Celada,P.E.Seiden,A computer model of cellular interactions in the immune system.Immunology Today,1992.13(2):56-62.
    [60]H.Uvell,Y.Engstr(o|¨)m,A multilayered defense against infection:combinatorial control of insect immune genes.Trends in Genetics,2007.23(7):342-349.
    [61]T.Knight,J.Timmis.A Multi-Layered Immune Inspired Approach to Data Mining.in Proceedings of the 4th International Conference on Recent Advances in Soft Computing.2002.Nottingham,UK.
    [62]H.Y.K.Lau,V.W.K.Wong,I.S.K.Lee,Immunity-based autonomous guided vehicles control.Applied Soft Computing,2007.7(1):41-57.
    [63]V.Rodin,A.Benzinou,A.Guillaud,P.Ballet,F.Harrouet,J.Tisseau,J.L.Bihan,An immune oriented multi-agent system for biological image processing.Pattern Recognition,2004.37(4):631-645.
    [64]P.Ballet,V.Rodin.Immune Mechanisms to Regulate Multi-Agents Systems.in proceedings of the International Conference Genetic and Evolutionary Computation (GECCO).2000.Las Vegas,Nevada,USA.
    [65]S.A.Taheri,G.Calva.Imitating the human immune system capabilities for multi-agent federation formation,in Proceedings of the 2001 IEEE International Symposium on Intelligent Control,(ISIC).2001.
    [66]U.Markowska-Kaezmar,B.Kordas,Multi-class iteratively refined negative selection classifier.Applied Soft Computing,2008.8(2):972-984.
    [67]X.Cao,H.Qiao,Y.Xu,Negative selection based immune optimization.Advances in Engineering Software,2007.38(10):649-656.
    [68]Y.Dong,Z.Sun,H.Jia,A cosine similarity-based negative selection algorithm for time series novelty detection.Mechanical Systems and Signal Processing,2006.20(6):1461-1472.
    [69]C.J.Creevey,J.O.McInerney,An algorithm for detecting directional and non-directional positive selection,neutrality and negative selection in protein coding DNA sequences.Gene,2002.300(1-2):43-51.
    [70]Z.Ji,D.Dasgnpta,Revisiting Negative Selection Algorithms.Evolutionary Computation,2007.15(2).
    [71]P.E.Seiden,F.Celada,A model for simulating cognate recognition and response in the immune system.J Theor Biol.,1992.158(3):329-357.
    [72]焦李成,杜海峰,刘若辰,人工免疫系统中的克隆选择算法.神经网络及其应用,ed.周志化and曹存根.2004:清华大学出版社.
    [73]尚荣华,焦李成,公茂果,马文萍,免疫克隆算法求解动态多目标优化问题.软件学报,2007.18(11):2700-2711.
    [74]张向荣,焦李成,基于免疫克隆选择算法的特征选择.复旦学报,2004.43(5):926-929.
    [75]刘芳,潘晓英,基于免疫克隆选择的匹配运动估计.软件学报,2007.18(4):850-860.
    [76]K.Guney,B.Babayigit,A.Akdagli,Interference suppression of linear antenna arrays by phase-only control using a clonal selection algorithm.Journal of the Franklin Institute,2008.345(3):254-266.
    [77]N.Khilwani,A.Prakash,R.Shankar,M.K.Tiwari,Fast clonal algorithm.Engineering Applications of Artificial Intelligence,2008.21(1):106-128.
    [78]S.Das,B.Natarajan,D.Stevens,P.Koduru,Multi-objective and constrained optimization for DS-CDMA code design based on the clonal selection principle.Applied Soft Computing,2008.8(1):788-797.
    [79]B.K.Panigrahi,S.R.Yadav,S.Agrawal,M.K.Tiwari,A clonal algorithm to solve economic load dispatch.Electric Power Systems Research,2007.77(10):1381-1389.
    [80]W.Dong,G.Shi,L.Zhang,Immune memory clonal selection algorithms for designing stack filters.Neurocomputing,2007.70(4-6):777-784.
    [81]W.Huang,L.Jiao,Artificial immune kernel clustering network for unsupervised image segmentation.Progress in Natural Science,2008.18(4):455-461.
    [82]N.Garcia-Pedrajas,C.Fyfe,Immune network based ensembles.Neurocomputing,2007.70(7-9):1155-1166.
    [83]F.T.Vertosick,R.H.Kelly,The immune system as a neural network:A multi-epitope approach.Journal of Theoretical Biology,1991.150(2):225-237.
    [84]R.J.de Boer,A.S.Perelson,Size and connectivity as emergent properties of a developing immune network.Journal of Theoretical Biology,1991.149(3):381-424.
    [85]张剑,多粒度免疫网络研究及应用(博士论文).2005,西北工业大学.
    [86]李涛,基于免疫的网络监控模型.计算机学报,2006.29(9):1515-1522.
    [87]E.Hart,P.Ross.Improving SOSDM:Inspirations from the Danger Theory.in Proceedings of International Conference on Artificial Immune Systems(ICARIS).2003.Napier University,Edinburgh,UK.
    [88]M.Burgess,Biology,immunology and information security.Information Security Technical Report,2007.12(4):192-199.
    [89]A.Boukerche,K.R.L.Juc(?),J.B.Sobral,M.S.M.A.Notare,An artificial immune based intrusion detection model for computer and telecommunication systems.Parallel Computing,2004.30(5-6):629-646.
    [90]张泽明,罗文坚,王煦法,一种基于人工免疫系统的多层垃圾邮件过滤算法.电子学报,2006.34(9):1616-1620.
    [91]高燕,陈云翔,丁永生,汤兵勇,基于免疫遗传算法的洪灾神经网络评估模型.自然灾害学报,2006.15(1):110-114.
    [92]公茂果,焦李成,张向荣,基于流形距离的人工免疫无监督分类和识别算法.自动化学报,2008.34(3):368-376.
    [93]左兴权,李士勇,一类自适应免疫进化算法.控制与决策,2004.19(3):252-256.
    [94]张著洪.人工免疫系统中的智能优化及免疫网络算法理论与应用研究(博士论文).2004,重庆大学.
    [95]D.Yong-Shou,L.Yuan-Yuan,W.Lei,W.Jun-Ling,Z.De-Ling,Adaptive immune-genetic algorithm for global optimization to multivariable function.Journal of Systems Engineering and Electronics,2007.18(3):655-660.
    [96]L.N.d.Castro,F.J.V.Zuben,G.A.d.D.Jr.,The construction of a Boolean competitive neural network using ideas from immunology.Neuroeomputing,2003.50:51-85.
    [97]P.A.D.Castro,F.J.V.Zuben.Bayesian Learning of Neural Networks by Means of Artificial Immune Systems.in proceedings of IEEE World Congress on Computational Intelligence in Congress on Evolutionary Computation.2006.Vancouver,Canada.
    [98]Z.-J.Lee,C.-Y.Lee,S.-F.Su,An immunity-based ant colony optimization algorithm for solving weapon-target assignment problem.Applied Soft Computing,2002.2(1):39-47.
    [99]G.V.Dozier,D.Brown,J.Hurley,K.Cain.Swarm Intelligence:Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Teams.in Proceedings of the Congress on Evolutionary Computation(CEC).2004.Portland, Oregon USA.
    [100]D.-H.Choi,Cooperative mutation based evolutionary programming for continuous function optimization.Operations Research Letters,2002.30(3):195-201.
    [101]M.W.Feldman,K.N.Laland,Gene-culture coevolutionary theory.Trends in Ecology & Evolution,1996.11(11):453-457.
    [102]J.Zeng,J.Jie,C.Han,An extended mind evolutionary computation model for optimizations.Applied Mathematics and Computation,2007.185(2):1038-1049.
    [103]T.-Y.Chen,Y.-S.Hsu,A multiobjective optimization solver using rank-niche evolution strategy.Advances in Engineering Software,2006.37(10):684-699.
    [104]Y.J.Yang,K.C.Tan,C.K.Goh,A distributed cooperative coevolutionary algorithm for multiobjective optimization.IEEE Transactions on Evolutionary Computation,2006.10(5):527-549.
    [105]M.A.Potter,K.A.D.Jong,Cooperative coevolution:An architecture for evolving coadapted subcomponents.Evolutionary Computation,2000.8(1):1-29.
    [106]B.Dolin,Co-evolution of populations of chasers and evaders that use sonic intensity and intramural time difference as localization cues.2000,California,USA:Stanford Bookstore.
    [107]J.J.Burdon,P.H.Thrall,M.E.Hochberg,J.D.Bever.,Coevolution of symbiotic mutualists and parasites in a community context.Trends in Ecology and Evolution,2007.22(3):120-126.
    [108]J.Henrich,N.Henrich,Culture,evolution and the puzzle of human cooperation.Cognitive Systems Research,2006.7(2-3):220-245.
    [109]M.Kondoh,J.-Y.Ide,Evolution of periodicity in insect mateseeking behaviour:a malecfemale coevolutionary game model.Animal Behaviour,2003.65(5):1013-1020.
    [110]N.-L.Jin.Indirect co-evolution for understanding belief in an incomplete information dynamic game.in GECCO 2006.2006:ACM Press.
    [111]L.Panait,S.Luke,R.P.Wiegand,Biasing coevolutionary search for optimal multiagent behaviors.IEEE Transactions on Evolutionary Computation,2006.10(6).
    [112]V.R.Khare,X.Yao,B.Sendho.Credit assignment among neurons in co-evolving populations,in the Parallel Problem Solving from Nature Ⅷ Conference.2004.Birmingham.
    [113]S.A.Field,Human altruism:Group selection should not be ignored.Journal of Social and Evolutionary Systems,1998.21(2):125-131.
    [114]D.K.Levine,W.Pesendorfer,The evolution of cooperation through imitation.Games and Economic Behavior,2007.58(2):293-315.
    [115]J.H.Koeslag,E.Terblanche,Evolution of cooperation:cooperation defeats defection in the cornfield model Journal of Theoretical Biology,2003.224(3):399-410.
    [116]B.Cooper,C.Wallace,Evolution,partnerships and cooperation.Journal of Theoretical Biology,1998.195(3):315-328.
    [117]B.Villmann,T.Villmann,V.Slowik,Evolutionary algorithms with neighborhood cooperativeness according to neural maps.Neurocomputing,2004.57:151-169.
    [118]S.-R.Yang,S.-B.Cho,Co-evolutionary learning with strategic coalition for multiagents.Applied Soft Computing,2005.5(2):193-203.
    [119]G.S.Hornby,B.Mirtich.Diffuse versus true coevolution in a physics-based world.in Proceedings of the Genetic and Evolutionary Computation Conference.1999.Orlando,Florida,USA.
    [120]A.Madhok,C.Liu,A coevolutionary theory of the multinational firm.Journal of International Management,2006.12(1):1-21.
    [121]M.J.Aitkerthead,A co-evolving decision tree Classification method.Expert Systems with Applications,2008.34(1):18-25.
    [122]Z.Kuscsik,D.Horvath,M.Gmitra,The co-evolutionary dynamics of directed network of spin market agents.Physica A:Statistical Mechanics and its Applications,2006.369(2):780-788.
    [123]F.-z.Huang,L.Wang,Q.He,An effective co-evolutionary differential evolution for constrained optimization.Applied Mathematics and Computation,2007.186(1):340-356.
    [124]R.E.Smith,S.Forrest,A.S.Perelson,Searching for diverse,cooperative subpopulations with Genetic Algorithms.Evolutionary Computation,1993.1(2):127-149.
    [125]G.-P.Nicolas,O.-B.Domingo,A cooperative constructive method for neural networks for pattern recognition.Pattern Recognition,2007.40(1):80-98.
    [126]A.Mathey,E.Kremar,J.Innes,D.Tait,Forest planning using co-evolutionary cellular automata.Forest Ecology and Management,2007.239(1-3):45-56.
    [127]S.Y.Al-Agtash,A.A.Al-Fahoum,An evolutionary computation approach to electricity trade negotiation.Advances in Engineering Software,2005.36(3):173-179.
    [128]F.Seredynski,Competitive coevolutionary multi-agent systems:The application to mapping and scheduling problems.Journal of Parallel and Distributed Computing,1997.47(1):39-57.
    [129]H.Liu,M.-X.Tang,Evolutionary design in a multi-agent design environment.Applied Soft Computing,2006.6(2):207-220.
    [130]R.P.Wiegand,W.C.Liles,K.A.D.Jong.An empirical analysis of collaboration methods in cooperative coevolutionary algorithms,in Proceedings of the Genetic and Evolutionary Computation Conference(GECCO-2001).2001.San Francisco,California,USA.
    [131]E.Popovici,K.D.Jong.The effects of interaction frequency on the optimization performance of cooperative coevolution,in Proceedings of the 8th annual conference on Genetic and evolutionary computation.2006.New York,NY,USA:ACM Press.
    [132]E.Popovici,K.D.Jong,The dynamics of the best individuals in co-evolution.Natural Computing:an International Journal,2006.5(3):229-255.
    [133]P.Funes,J.B.Pollack,Measuring progress in coevolutionary competition.From Animals to Animats,2000:450-459.
    [134]A.Traulsen,J.C.Claussen,C.Hauert.,Coevolutionary Dynamics:From Finite to Infinite Populations.Physical Review Letters,2005.95(23):238-701.
    [135]D.D.B.v.Bragt,F.Alkemade,J.A.L.Poutre,Stabilization of tag-mediated interaction by sexual reproduction in an evolutionary agent system.Information Sciences,2005.170(1):101-119.
    [136]R.Cressman,J.Garay,Stability in n-species coevolutionary systems.Theoretical Population Biology,2003.64:519-533.
    [137]R.P.Wiegand,J.Sarma.Spatial embedding and loss of gradient in cooperative coevolutionary algorithms,in PPSN.2004.
    [138]P.Matzinger,Tolerance,danger,and the extended family.Ann.Rev.Immunol.,1994.12:991-1045.
    [139]P.Matzinger,The danger model:a renewed sense of Self.Science,2002.296:301-305.
    [140]P.Matzinger,Friendly and dangerous signals:is the tissue in control? Nat.Immunol.,2007.8:11-13.
    [141]T.Shon,J.Moon,A hybrid machine learning approach to network anomaly detection.Information Sciences,2007.177(18):3799-3821.
    [142]M.Swimmer,Using the danger model of immune systems for distributed defense in modern data networks.Computer Networks,2007.51(5):1315-1333.
    [143]U.Aickelin,J.Greensmith,Sensing danger:Innate immunology for intrusion detection.Information Security Technical Report,2007.12(4):218-227.
    [144]D.-W.Gong,G.-S.Hao,Y.Zhou,X.-Y.Sun,Interactive genetic algorithms with multi-population adaptive hierarchy and their application in fashion design.Applied Mathematics and Computation,2007.185(2):1098-1108.
    [145]D.Voigt,H.Wirth,W.Dilger.A Computational Model for the Cognitive Immune System Theory Based on Learning Classifier Systems.in ICARIS.2007:Springer-Verlag.
    [146]I.R.Cohen,Tending Adam's Garden:evolving the cognitive immune self.2000,New York:Academic Press.
    [147]I.R.Cohen,The cognitive principle challenges clonal selection.Immunology Today,1992.13:441-444.
    [148]Z.Lei,L.Ren-Hou,Designing of classifiers based on immune principles and fuzzy rules.Information Sciences,2008.178(7):1836-1847.
    [149]X.Yue,H.-W.Mo,Z.-X.Chi,Immune-inspired incremental feature selection technology to data streams.Applied Soft Computing,2008.8(2):1041-1049.
    [150]K.C.Tan,C.K.Goh,A.A.Mamun,E.Z.Ei,An evolutionary artificial immune system for multi-objective optimization.European Journal of Operational Research,2008.187(2):371-392.
    [151]B.Liu,Y.-S.Ding,D.Ruan,A reinforcement learning intelligent controller based on primary-secondary response mechanism of immune system.Dynamics of Continuous,Discrete & Impulsive Systems,Series B:Applications & Algorithms,2007.14(4):557-574.
    [152]M.Bereta,T.Burczynski,Comparing binary and real-valued coding in hybrid immune algorithm for feature selection and classification of ECG signals.Engineering Applications of Artificial Intelligence,2007.20(5):571-585.
    [153]Z.-H.Zhang,Immune optimization algorithm for constrained nonlinear multiobjective optimization problems.Applied Soft Computing Journal,2007.7(3):840-857.
    [154]L.Muyldermans,D.Cattrysse,D.V.Oudheusden,District design for arc-routing applications.Journal of the Operational Research Society,2003.54(11):1209-1221.
    [155]P.Bertolazzi,L.Bianco,S.Ricciardelli,Method for determining the optimal districting in urban emergency services.Computers and Operations Research,1977.4(1):1 - 12.
    [156]F.Caro,T.Shirabe,M.Guignard,A.Weintraub,School redistricting:embedding GIS tools with integer programming.Journal of the Operational Research Society,2004.55(8):836-849.
    [157]L.Muyldermans,D.Cattrysse,D.V.Oudheusden,T.Lotan,Districting for salt spreading operations.European Journal of Operational Research,2002.139(3):521-532.
    [158]F.T.Pereira,J.Figueira,V.Mousseau,B.Roy,Multiple criteria districting problems:The public transportation network pricing system of the Paris region.Annals of Operations Research,2007.154(1):69-92.
    [159]B.Forest,Information sovereignty and GIS:The evolution of "communities of interest"in political redistricting.Political Geography,2004.23(4):425-451.
    [160]C.-I.Chou,S.-P.Li,Spin systems and political districting problem.Journal of Magnetism and Magnetic Materials,2007.310(2):2889-2891.
    [161]B.Bozkaya,E.Erkut,G.Laporte,A Tabu search heuristic and adaptive memory procedure for political districting.European Journal of Operational Research,2003.144(1):12-26.
    [162]L.C.Galv(?)o,A.G.N.Noraes,J.E.S.d.Cursi,J.C.Souza,A multiplicatively-weighted Voronoi diagram approach to logistics districting.Computers and Operations Research,2006.33(1):93-114.
    [163]B.C.Wei,A multiobjective metaheuristic for spatial-based redistricting.Advances in Soft Computing,2006.2006:235-250.
    [164]P.K.Bergey,C.T.Ragsdale,M.Hoskote,A Simulated Annealing Genetic Algorithm for the Electrical Power Districting Problem.Annals of Operations Research,2003.121(1-4):33-55.
    [165]V.Marianov,F.Fresard,A procedure for the strategic planning of locations,capacities and districting of jails:Application to Chile.Journal of the Operational Research Society,2005.56(3):244-251.
    [166]G.W.DePuy,R.J.Moraga,G.E.Whitehouse,Meta-RaPS:a simple and effective approach for solving the traveling salesman problem.Transportation Research Part E:Logistics and Transportation Review,2005.41(2):115-130.
    [167]T.Gao,Z.Michalewicz.Evolutionary algorithms for the TSP.in Proceedings of the 5th Parallel Problem Solving from Nature Conference.1998.Berlin:Springer.
    [168]P.H.Siqueira,M.T.A.Steiner,S.Scheer,A new approach to solve the traveling salesman problem.Neurocomputing,2007.70(4-6):1013-1021.
    [169]M.A.Haughton,Assigning delivery routes to drivers under variable customer demands.Transportation Research Part E:Logistics and Transportation Review,2007.43(2):157-172.
    [170]B.E.Gillett,L.R.Miller,A heuristic algorithm for the vehicle-dispatch problem.Operations Research,1974.22(2):340-349.
    [171]J.M.De Magalha?es,J.P.De Sousa,Dynamic VRP in pharmaceutical distribution-a case study.Central European Journal of Operations Research,2006.14(2):177-192.
    [172]C.D.Tarantilis,C.T.Kiranoudis,A flexible adaptive memory-based algorithm for real-life transportation operations:Two case studies from dairy and construction sector.European Journal of Operational Research,2007.179(3):806-822.
    [173]S.-T.Bae,H.S.Hwang,G.-S.Cho,M.-J.Goan,Integrated GA-VRP solver for multi-depot system.Computers and Industrial Engineering,2007.53(2):233-240.
    [174]S.Barreto,C.Ferreira,J.Paix(?)o,B.S.Santos,Using clustering analysis in a capacitated location-routing problem.European Journal of Operational Research,2007.179(3):968-977.
    [175]Y.-L.Niu,J.-M.Wang,Vehicle route algorithm of logistics distribution.Journal of Traffic and Transportation Engineering,2006.6(2):83-87.
    [176]F.Freschi,M.Repetto,VIS:An artificial immune network for multi-objective optimization.Engineering Optimization,2006.38(8):975-996.
    [177]Z.Zhang,Multiobjective optimization immune algorithm in dynamic environments and its application to greenhouse control.Applied Soft Computing,2008.8(2):959-971.
    [178]M.-G.Gong,L.-C.Jiao,H.-F.Du,L.-F.Bo,Multiobjective Immune Algorithm with Nondominated Neighbor-based Selection.Evolutionary Computation,2008.16(2):225-255.
    [179]D.G.Cattrysse,L.N.V.Wassenhove,A survey of algorithms for the generalized assignment problem.European Journal of operational Research,1992.60(3):260-272.
    [180]M.G.Narciso,L.A.N.Lorena,Lagrangean/surrogate relaxation for generalized assignment problems.European Journal of Operational Research,1999.114(1):165-177.
    [181]S.-S.Liu,C.-J.Wang,Optimization model for resource assignment problems of linear construction projects.Automation in Construction,2007.16(4):460-473.
    [182]U.Deshpande,A.Gupta,A.Basu,Task assignment with imprecise information for real-time operation in a supply chain.Applied Soft Computing,2004.5(1):101-117.
    [183]T.D.Hemazro,B.Jaumard,O.Marcotte,A column generation and branch-and-cut algorithm for the channel assignment problem.Computers & Operations Research,2008.35(4):1204-1226.
    [184]Y.-H.Sun,J.Ma,Z.-P.Fan,J.Wang,A hybrid knowledge and model approach for reviewer assignment.Expert Systems with Applications,2008.34(2):817-824.
    [185]V.K.Shetty,M.Sudit,R.Nagi,Priority-based assignment and routing of a fleet of unmanned combat aerial vehicles.Computers & Operations Research,2008.35(6):1813-1828.
    [186]A.G.H.Kek,R.L.Cheu,Q.Meng,Distance-constrained capacitated vehicle routing problems with flexible assignment of start and end depots.Mathematical and Computer Modelling,2008.47(1-2):140-152.
    [187]P.R.Harper,V.d.Senna,I.T.Vieira,A.K.Shahani,A genetic algorithm for the project assignment problem.Computers & Operations Research,2005.32(5):1255-1265.
    [188]A.Przybylski,X.Gandibleux,M.Ehrgott,Two phase algorithms for the bi-objective assignment problem.European Journal of Operational Research,2008.185(2):509-533.
    [189]S.Salcedo-Sanz,X.Yao,Assignment of cells to switches in a cellular mobile network using a hybrid Hopfield network-genetic algorithm approach.Applied Soft Computing,2008.8(1):216-224.
    [190]M.G.A.Verhoeven,E.H.L.Aarts,P.C.J.Swinkels,A parallel 2-opt algorithm for the Traveling Salesman Problem.Future Generation Computer Systems,1995.11(2):175-182.
    [191]C.V.Trappey,A.J.C.Trappey,C.-J.Huang,C.C.Ku,The design of a JADE-based autonomous workflow management system for collaborative SoC design.Expert Systems with Applications,2009.36(2,Part 2):2659-2669.
    [192]M.Z.Ouertani,Supporting conflict management in collaborative design:An approach to assess engineering change impacts.Computers in Industry,2008.59(9):882-893.
    [193]L.Q.Fan,A.Senthil Kumar,B.N.Jagdish,S.H.Bok,Development of a distributed collaborative design framework within peer-to-peer environment.Computer-Aided Design,2008.40(9):891-904.
    [194]W.-M.Shen,Q.Hao,W.-D.Li,Computer supported collaborative design:Retrospective and perspective.Computers in Industry,2008.59(9):855-862.
    [195]W.-D.Li,W.-M.Shen,Collaborative design:New methodologies and technologies.Computers in Industry,2008.59(9):853-854.
    [196]钱亚东,顾新建,马军,王生发,陈芨熙,支持协同设计的知识管理研究 浙江大学学报(工学版),2007.41(2):304-310.
    [197]K.M.Saridakis,A.J.Dentsoras,Integration of fuzzy logic,genetic algorithms and neural networks in collaborative parametric design.Advanced Engineering Informatics,2006.20(4):379-399.
    [198]高丽萍,刘弘,孙海涛,支持进化的协同设计系统研究及实现.计算机工程,2005.31(2):61-64.
    [199]Y.-C.Yang,W.-Y.Zhang,C.Shan,Investigating the development of digital patterns for customized apparel.International Journal of Clothing Science and Technology,2007.19(3/4):167-177
    [200]C.-M.Chen,Fit evaluation within the made-to-measure process.International Journal of Clothing Science and Technology,2007.19(2):131-144.
    [201]A.Taguchi,T.Aoki,H.Yasuda,A study on trying virtual T-shirt on by using T-shirt pattern recognition.IEIC Technical Report(Institute of Electronics,Information and Communication Engineers),2004.103(540):163-183.
    [202]F.Cordier,H.Seo,N.M.Thalmann,Made-to-measure technologies for an online clothing store.Computer Graphics and Applications,IEEE,2003.23(1):38-48.
    [203]B.A.Oliver,S.Shim,Profile of Male Made-to-Measure Customers:Body Characteristics and Purchase Selection Clothing and Textiles Research Journal 1993.11(2):59-62.
    [204]C.C.L.Wang,Y.Wang,M.M.F.Yuen,Design automation for customized apparel products.Computer-Aided Design,2005.37(7):675-691.
    [205]C.C.L.Wang,M.M.F.Yuen,CAD methods in garment design.Computer-Aided Design,2005.37(6):583-584.
    [206]K.-J.Choi,H.-S.Ko,Research problems in clothing simulation.Computer-Aided Design,2005.37(6):585-592.
    [207]H.-S.Kim,S.-B.Cho,Application of interactive genetic algorithm to fashion design.Engineering Applications of Artificial Intelligence,2000.13(6):635-644.
    [208]M.Sakawa,K.Yauchi,Interactive decision making for multiobjective nonconvex programming problems with fuzzy numbers through coevolutionary genetic algorithms.Fuzzy Sets and Systems,2000.114(1):151-165.
    [209]M.Sakawa,I.Nishizaki,Interactive fuzzy programming for two-level nonconvex programming problems with fuzzy parameters through genetic algorithms.Fuzzy Sets and Systems,2002.127(2):185-197.
    [210]N.K.Jerne,Towards a network theory of the immune system.Ann.Immunol.(Inst.Pasteur),1974.125:373-389.
    [211]N.(O|¨)tz(u|¨)rk,F.(O|¨)tz(u|¨)rk,Hybrid neural network and genetic algorithm based machining feature recognition.Journal of Intelligent Manufacturing,2004.15:287-298.
    [212]S.L.Mok,C.K.Kwong,W.S.Lau,A Hybrid Neural Network and Genetic Algorithm Approach to the Determination of Initial Process Parameters for Injection Moulding.Int J Adv Manuf Technol,2001.18:404-409.
    [213]R.Pino,J.Parreno,A.Gomez,P.Priore,Forecasting next-day price of electricity in the Spanish energy market using artificial neural networks.Engineering Applications of Artificial Intelligence,2008.21(1):53-62.
    [214]B.-R.Chang,H.-F.Tsai,Forecast approach using neural network adaptation to support vector regression grey model and generalized auto-regressive conditional heteroscedasticity.Expert Systems with Applications,2008.34(2):925-934.
    [215]P.C.L.Hui,K.C.C.Chan,K.W.Yeung,F.S.F.Ng,Application of artificial neural networks to the prediction of sewing performance of fabrics.International Journal of Clothing Science and Technology,2007.19(5):291-318
    [216]J.Fan,E.Newton,R.Au,S.C.F.Chan,Predicting garment drape with a fuzzy-neural network.Textile Research Journal,2001.71(7):605-608.
    [217]T.-L.Lee,Back-propagation neural network for the prediction of the short-term storm surge in Taichung harbor,Taiwan.Engineering Applications of Artificial Intelligence,2008.21(1):63-72.
    [218]W.-J.Deng,W.-C.Chen,W.Pei,Back-propagation neural network based importance-performance analysis for determining critical service attributes.Expert Systems with Applications,2008.34(2):1115-1125.
    [219]S.-W.Yu,K.-J.Zhu,F.-Q.Diao,A dynamic all parameters adaptive BP neural networks model and its application on oil reservoir prediction.Applied Mathematics and Computation,2008.195(1):66-75.
    [220]Y.Kimura,K.Ida,Improved genetic algorithm for VLSI floorplan design with non-slicing structure.Computers & Industrial Engineering,2006.50(4):528-540.
    [221]J.-T.Tsai,W.-H.Ho,T.-K.Liu,J.-H.Chou,Improved immune algorithm for global numerical optimization and job-shop scheduling problems.Applied Mathematics and Computation,2007.194(2):406-424.
    [222]K.R.Janesa,S.X.Yanga,R.R.Hacker,Pork farm odour modelling using multiple-component multiple-factor analysis and neural networks.Applied Soft Computing,2005.6:53-61.
    [223]T.-H.Hou,C.-H.Su,H.-Z.Chang,Using neural networks and immune algorithms to find the optimal parameters for an IC wire bonding process.Expert Systems with Applications,2008.34(1):427-436.
    [224]V.Safronov,M.Parashar,Optimizing Web servers using Page rank prefetching for clustered accesses.Information Sciences,2003.150:165-176.
    [225]Y.Leu,J.-J.Hung,An energy efficient re-access scheme for data caching in data broadcast of a mobile computing environment.Information Sciences,2007.177(24):5538-5557.
    [226]H.Sun,Y.Wei,A note on the PageRank algorithm.Applied Mathematics and Computation,2006.179(2):799-806.
    [227]D.J.Higham,Google PageRank as mean playing time for pinball on the reverse web.Applied Mathematics Letters,2005.18(12):1359-1362.
    [228]S.Kamvar,T.Haveliwala,G.Golub,Adaptive methods for the computation of PageRank.Linear Algebra and its Applications,2004.386:51-65.
    [229]B.-J.Chang,R.-H.Hwang,Distributed cost-based update policies for QoS routing on hierarchical networks.Information Sciences,2004.159(1-2):87-108.
    [230]M.-L.Shyu,C.Haruechaiyasak,S.-C.Chen,Category cluster discovery from distributed WWW directories.Information Sciences,2003.155(3-4):181-197.
    [231]S.M.T.Yau,H.V.Leong,A.Si,Distributed agent environment:application and performance.Information Sciences,2003.154(1-2):5-21.
    [232]S.Brin,L.Page.,The anatomy of a large scale hypertextual Web search engine.,in Proceedings of the World Wide Web Conference.1998.
    [233]N.Ma,J.Guan,Y.Zhao,Bringing PageRank to the citation analysis.Information Processing & Management,2008.44(2):800-810.
    [234]F.Bergadano,A.Puliafito,S.Riccobenc,G.Ruffo,L.Vita,Java-based and secure learning agents for information retrieval in distributed systems.Information Sciences,1999.113(1-2):55-84.
    [235]M.Gerber,R.v.Solms,From Risk Analysis to Security Requirements.Computers &Security,2001.20(7):577-584.
    [236]N.Vellani,Information technology risk management,in Strategic Security Management.2007,Butterworth-Heinemann:Burlington.p.133-157.
    [237]A.Zuccato,Holistic security requirement engineering for electronic commerce.Computers & Security,2004.23(1):63-76.
    [238]C.P.Pfleeger,S.L.Pfleeger,Security in Computing.2003:Upper Saddle River,NJ,Prentice Hall.462-475.
    [239]M.T.Siponen,Critical analysis of different approaches to minimizing user-related faults in information systems security:implications for research and practice.Information Management & Computer Security,2000.8(5):197-210.
    [240]G.Dhillon,Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns.Computers & Security,2001.20(2):165-172.
    [241]P.Stephenson,Ensuring consistent security implementation within a distributed and federated environment.Computer Fraud & Security,2006.2006(11):12-14.
    [242]H.A.Raikes,R.A.Thompson,Links between risk and attachment security:Models of influence.Journal of Applied Developmental Psychology,2005.26(4):440-455.
    [243]M.Gerber,R.v.Solms,Management of risk in the information age.Computers &Security,2005.24(1):16-30.
    [244]R.Bojanc,B.Jerman-Blazic,Towards a standard approach for quantifying an ICT security investment.Computer Standards & Interfaces,2008.30(4):216-222.
    [245]H.R.Shahriari,R.Jalili,Vulnerability Take Grant(VTG):An efficient approach to analyze network vulnerabilities.Computers & Security,2007.26(5):349-360.
    [246]M.Blais,S.D.Lapierre,G.Laporte,Solving a home-care districting problem in an urban setting.Journal of the Operational Research Society,2003.54(11):1141-1147.
    [247]H.Meyer,A business approach to effective information technology risk analysis and management.Computers & Security,1996.15(4):321-321.
    [248]A.Boukerche,R.B.Machado,R.L.Juc? Kathia,J.B.M.Sobral,M.S.M.A.Notate,An agent based and biological inspired real-time intrusion detection and security model for computer network operations.Computer Communications,2007.30(13):2649-2660.
    [249]G.Dozier,D.Brown,H.Hou,J.Hurley,Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.Applied Soft Computing,2007.7(2):547-553.
    [250]R.E.Overill,Computational immunology and anomaly detection.Information Security Technical Report,2007.12(4):188-191.
    [251]E.T.Wang,G.Lee,An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining.Data & Knowledge Engineering,2008.65(3):463-484.
    [252]N.Elias,A.Wright,J.E.Marc,Y.L.John,Using Knowledge Management Systems to Manage Knowledge Resource Risks,in Advances in Management Accounting.2006,JAI.p.195-227.
    [253]J.-Q.Yu,Y.V.R.Reddy,S.Selliah,S.Reddy,V.Bharadwaj,S.Kankanahalli,TRINETR:An architecture for collaborative intrusion detection and knowledge-based alert evaluation.Advanced Engineering Informatics,2005.19(2):93-101.
    [254]J.Dhar,Population model with diffusion and supplementary forest resource in a two-patch habitat.Applied Mathematical Modelling,2008.32(7):1219-1235.
    [255]C.(?)elik,The stability and Hopf bifurcation for a predator-prey system with time delay.Chaos,Solitons & Fractals,2008.37(1):87-99.
    [256]R.M.Kauffman,A.K.Ferketich,A.G.Wee,J.M.Shultz,P.Kuun,M.E.Wewers,Factors associated with smokeless tobacco cessation in an Appalachian population.Addictive Behaviors,2008.33(6):821-830.
    [257]K.Saleh,R.Probert,H.Khanafer,The distributed object computing paradigm:Concepts and applications.Journal of Systems and Software,1999.47(2-3):125-131.
    [258]S.Thomassey,M.Happiette,A neural clustering and classification system for sales forecasting of new apparel items.Applied Soft Computing,2007.7(4):1177-1187.
    [259]S.Thomassey,A.Fiordaliso,A hybrid sales forecasting system based on clustering and decision trees.Decision Support Systems,2006.42(1):408-421.
    [260]Benjamin,P.-C.Yen,Electronic commerce front-end in apparel supply chain.Computers and Industrial Engineering,2002.42(2-4):471-480.
    [261]B.Medjahed,A.Bouguettaya,A.K.Elmagarmid,Composing Web services on the Semantic Web.The International Journal on Very Large Data Bases,2003.12:333-351.
    [262]Y.-G.Ha,J.-C.Sohn,Y.-J.Cho,H.Yoon,A robotic service framework supporting automated integration of ubiquitous sensors and devices.Information Sciences,2007.177(3):657-679.
    [263]P.D.Manuel,J.AlGhamdi,A data-centric design for n-tier architecture.Information Sciences,2003.150(3-4):195-206.
    [264]Z.Shen,J.Luo,G.Huang,D.Ming,W.Ma,H.Sheng,Distributed computing model for processing remotely sensed images based on grid computing.Information Sciences,2007.177(2):504-518.
    [265]T.Komiya,T.Enokido,M.Takizawa,Mobile agent model for transaction processing on distributed objects.Information Sciences,2003.154(1-2):23-38.
    [266]P.-R.Patricia,R.-F.M.Jose,P.-L.Jose,An architecture for dynamic and evolving cooperative software agents.Computer Standards & Interfaces,2003.25(3):261-269.
    [267]C.-L.Li,L.-Y.Li,Combine concept of agent and service to build distributed object-oriented system.Future Generation Computer Systems,2003.19(2):161-171.
    [268]T.K.Shih,Mobile agent evolution computing.Information Sciences,2001.137(1-4):53-73.
    [269]Y.Ding,L.Gao,D.Ruan,Communication mechanisms in ecological network-based grid middleware for service emergence.Information Sciences,2007.177(3):722-733.
    [270]L.Gao,Y.-S.Ding,L.-H.Ren,A novel ecological network-based computation platform as a grid middleware system.International Journal of Intelligent Systems,2004.19(10):859-884.
    [271]J.C.Butler,J.S.Dyer,J.Jia,K.Tomak,Enabling e-transactions with multi-attribute preference models.European Journal of Operational Research,2008.186(2):748-765.
    [272]J.A.S.Almeida,L.M.S.Barbosa,A.A.C.C.Pais,S.J.Formosinho,Improving hierarchical cluster analysis:A new method with outlier detection and automatic clustering.Chemometrics and Intelligent Laboratory Systems,2007.87(2):208-217.
    [273]P.A.Vijaya,M.N.Murty,D.K.Subramanian,Efficient bottom-up hybrid hierarchical clustering techniques for protein sequence classification.Pattern Recognition,2006.39(12):2344-2355.
    [274]M.Chavent,Y.Lechevallier,O.Briant,DIVCLUS-T:A monothetic divisive hierarchical clustering method.Computational Statistics and Data Analysis,2007.52(2):687-701.
    [275]D.Z.Zanger,Interpolation of the extended Boolean retrieval model.Information Processing & Management,2002.38(6):743-748.
    [276]C.I.Aasheim,G.J.Koehler,Scanning World Wide Web documents with the vector space model.Decision Support Systems,2006.42(2):690-699.
    [277]W.Mao,W.W.Chu,The phrase-based vector space model for automatic retrieval of free-text medical documents.Data & Knowledge Engineering,2007.61(1):76-92.
    [278]L.Egghe,Vector retrieval,fuzzy retrieval and the universal fuzzy IR surface for IR evaluation.Information Processing & Management,2004.40(4):603-618.
    [279]D.C.Wraith,Avidity and the Art of Self Non-Self Discrimination.Immunity,2006.25(2):191-193.
    [280]J.Miller,Self-nonself discrimination by T lymphocytes.Comptes Rendus Biologies,2004.327(5):399-408.
    [281]H.Atlan,I.R.Cohen,Immune information,self-organization and meaning.International Immunology,1998.10:711-717.
    [282]P.S.Andrews,J.Timmis.Inspiration for the Next Generation of Artificial Immune Systems.in ICARIS 2005.2005:Springer-Vedag.