[1]任永昌 朱萍.克隆选择算法分析及其改进的研究与应用[J].计算机技术与发展,2012,(05):101-104.
 REN Yong-chang,ZHU Ping.Research and Application of Clone Selection Algorithm Analysis and Its Improvement[J].,2012,(05):101-104.
点击复制

克隆选择算法分析及其改进的研究与应用()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年05期
页码:
101-104
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Research and Application of Clone Selection Algorithm Analysis and Its Improvement
文章编号:
1673-629X(2012)05-0101-04
作者:
任永昌 朱萍
渤海大学信息科学与技术学院
Author(s):
REN Yong-chang ZHU Ping
College of Information Science and Technology, Bohai University
关键词:
人工免疫克隆选择算法亲和度多峰搜索
Keywords:
artificial immune clone selection algorithm affinity multi-peaks searching
分类号:
TP301.6
文献标志码:
A
摘要:
克隆选择算法被广泛应用到各个领域,为解决DeCastro克隆选择算法中存在的一些问题:需要根据人为经验确定种群规模的大小、种群训练的时间比较长、多峰搜索能力相对较弱,对其进行进一步的改进,运用新的克隆选择、克隆变异和最佳亲和度,并引入了抗体抑制操作,可动态确定种群大小,使算法具有较强的全局和局部搜索能力,同时也可以搜索到全局最优点和尽可能多的局部极值点。简单仿真实验结果表明,该算法的平均运行时间和找到峰值点个数都明显优于DeCastro克隆选择算法
Abstract:
Clone selection algorithm is widely applied to various fields, in order to solve the existed problems of DeCastro clone selection algorithm that are the population size determined by the experience, relatively long population training time, weaker multi-peaks search cap ability, based on the analysis of clone selection algorithm made a further improvement, used new clone selection operation, clone mutation operation and the best affinity, and adopted the antibody suppression operation. The algorithm can dynamically determine the population size and has strong abilities of global and local search, also can search for global optimum and so many local minimum points. Simulation results show that the algorithm found the average running time and numbers of the peaks are much better than DeCastro clone selection algorithm

相似文献/References:

[1]郑钧泽 徐晓峰 郭东辉[].基于克隆选择算法的面向程序路径测试数据生成方法[J].计算机技术与发展,2009,(08):8.
 ZHENG Jun-ze,XU Xiao-feng,GUO Dong-hui.A Path- Oriented Test Data Generation Approach Based on Clonal Selection Algorithm[J].,2009,(05):8.
[2]付玉珍 胡彧 张清华.一种新的自适应网络入侵检测模型[J].计算机技术与发展,2008,(09):148.
 FU Yu-zhen,HU Yu,ZHANG Qing-hua.A New Model of Self- Adaptive Network Intrusion Detection[J].,2008,(05):148.
[3]李京.基于危险理论的网络安全风险评估[J].计算机技术与发展,2012,(08):159.
 LI Jing.Evaluation Model for Network Security RiskBased on Danger Theory[J].,2012,(05):159.
[4]王倩云 罗玉漂 陈云芳.未知木马检测免疫算法的r值分析[J].计算机技术与发展,2012,(12):175.
 WANG Qian-yun,LUO Yu-piao,CHEN Yun-fang.Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection[J].,2012,(05):175.
[5]伍海波,高劲松,唐启涛,等.基于生物免疫原理的网络入侵检测研究[J].计算机技术与发展,2013,(07):167.
 WU Hai-bo[],GAO Jing-song[],TANG Qi-tao[],et al.Research on Network Intrusion Detection System Based on Biological Immune Principle[J].,2013,(05):167.
[6]张葵 袁细国.基于模糊集的免疫克隆选择算法[J].计算机技术与发展,2007,(12):24.
 ZHANG Kui,YUAN Xi-guo.An Immune Colon Selective Algorithm Based on Fuzzy- Set[J].,2007,(05):24.

备注/Memo

备注/Memo:
国家自然科学基金资助项目(70871067);辽宁省自然科学基金资助项目(20072207)任永昌(1969-),男,博士,副教授,从事免疫算法、管理信息系统方面的研究;朱萍(1987-),女,硕士研究生,从事软件开发成本估算方法的研究
更新日期/Last Update: 1900-01-01