[1]时晨 申普兵 沈向余 于鹏飞.基于小生境策略的检测器生成算法[J].计算机技术与发展,2011,(09):81-84.
 SHI Chen,SHEN Pu-bing,SHEN Xiang-yu,et al.An Detector Generation Algorithm Based on Niching Strategy[J].,2011,(09):81-84.
点击复制

基于小生境策略的检测器生成算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年09期
页码:
81-84
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
An Detector Generation Algorithm Based on Niching Strategy
文章编号:
1673-629X(2011)09-0081-04
作者:
时晨1 申普兵1 沈向余1 于鹏飞2
[1]西安通信学院[2]沈阳军区司令部作战指挥数据中心
Author(s):
SHI ChenSHEN Pu-bingSHEN Xiang-yuYU Peng-fei
[1]Xi'an Communications Institute[2]Data Centre for Battle of Shenyang Military Area
关键词:
小生境检测器阴性选择适应度亲和力入侵检测
Keywords:
niche detector negative selection fitness affinity intrusion detection
分类号:
TP309
文献标志码:
A
摘要:
引入小生境思想能够较好地维持解的多样性,同时具有较高的全局寻优能力和收敛速度,特别适合于复杂多峰函数的优化问题。为了提高检测器的生成效率,降低算法开销,引入小生境进化原理用于未成熟检测器的生成;通过计算初始种群个体之间的海明相似度,依据个体之间的亲和力和适应度,构建多个小生境并分别进行进化,提出了基于小生境策略的检测器生成算法;对算法进行了验证,讨论了实验中涉及的参数,与穷举检测器生成算法进行了比较;通过对实验结果的分析,在一定条件下,该算法基本达到了预期的目标
Abstract:
Introducing niching into algorithm could maintain the diversity of results,also have better ability of global optimization and convergence rate,and is more adopted to use in optimization problem of multimodal function.In order to improve the efficiency of generating detectors and reduce the cost of algorithm,it uses niching evolutionary theory in the immature detectors generation.According to the hamming similarity between the strings of initial population and the affinity and fitness of strings,niches are built and evolved respectively,an detector generation algorithm based on niching strategy is proposed.The parameters which involved in simulation experiment are discussed;The algorithm compares with exhaustive detector generation algorithm.Through analysis of experimental results,the algorithm basically reached the expected goal under certain conditions

相似文献/References:

[1]刘国英 陈蔼祥 彭玉楼.一种新的免疫入侵检测器生成算法[J].计算机技术与发展,2006,(05):128.
 LIU Guo-ying,CHEN Ai-xiang,PENG Yu-lou.A New Algorithm for Detector Generating of Immune Intrusion Detection System[J].,2006,(09):128.
[2]王倩云 罗玉漂 陈云芳.未知木马检测免疫算法的r值分析[J].计算机技术与发展,2012,(12):175.
 WANG Qian-yun,LUO Yu-piao,CHEN Yun-fang.Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection[J].,2012,(09):175.
[3]郑志刚,薛菲,周井泉.网络效益最大化的认知无线电频谱分配算法[J].计算机技术与发展,2013,(08):91.
 ZHENG Zhi-gang,XUE Fei,ZHOU Jing-quan.Cognitive Radio Spectrum Assignment Algorithm with Network Benefit Maximization[J].,2013,(09):91.
[4]张明辉. 基于FCM的无检测器交叉口短时交通流量预测[J].计算机技术与发展,2017,27(04):39.
 ZHANG Ming-hui. Short-term Traffic Flow Prediction of Non-detector Intersections Based on FCM[J].,2017,27(09):39.
[5]刘文英,张自鲁,路慎强,等.基于粒子群-遗传混合算法的函数优化研究[J].计算机技术与发展,2019,29(10):170.[doi:10. 3969 / j. issn. 1673-629X. 2019. 10. 033]
 LIU Wen-ying,ZHANG Zi-lu,LU Shen-qiang,et al.Research on Function Optimization Based on Particle Swarm-Genetic Hybrid Algorithm[J].,2019,29(09):170.[doi:10. 3969 / j. issn. 1673-629X. 2019. 10. 033]

备注/Memo

备注/Memo:
2009年度通信和指挥自动化装备军内科研项目(TZ-XATY-Y-B-2009-001)时晨(1986-),女,陕西西安人,硕士研究生,研究方向为网络安全;申普兵,教授,研究方向为网络安全
更新日期/Last Update: 1900-01-01