相似文献/References:
[1]刘国英 陈蔼祥 彭玉楼.一种新的免疫入侵检测器生成算法[J].计算机技术与发展,2006,(05):128.
LIU Guo-ying,CHEN Ai-xiang,PENG Yu-lou.A New Algorithm for Detector Generating of Immune Intrusion Detection System[J].,2006,(09):128.
[2]王倩云 罗玉漂 陈云芳.未知木马检测免疫算法的r值分析[J].计算机技术与发展,2012,(12):175.
WANG Qian-yun,LUO Yu-piao,CHEN Yun-fang.Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection[J].,2012,(09):175.
[3]郑志刚,薛菲,周井泉.网络效益最大化的认知无线电频谱分配算法[J].计算机技术与发展,2013,(08):91.
ZHENG Zhi-gang,XUE Fei,ZHOU Jing-quan.Cognitive Radio Spectrum Assignment Algorithm with Network Benefit Maximization[J].,2013,(09):91.
[4]张明辉. 基于FCM的无检测器交叉口短时交通流量预测[J].计算机技术与发展,2017,27(04):39.
ZHANG Ming-hui. Short-term Traffic Flow Prediction of Non-detector Intersections Based on FCM[J].,2017,27(09):39.
[5]刘文英,张自鲁,路慎强,等.基于粒子群-遗传混合算法的函数优化研究[J].计算机技术与发展,2019,29(10):170.[doi:10. 3969 / j. issn. 1673-629X. 2019. 10. 033]
LIU Wen-ying,ZHANG Zi-lu,LU Shen-qiang,et al.Research on Function Optimization Based on Particle Swarm-Genetic Hybrid Algorithm[J].,2019,29(09):170.[doi:10. 3969 / j. issn. 1673-629X. 2019. 10. 033]