期刊文献+

基于遗传算法进化业务冲突检测规则的研究 被引量:3

Evolving the Detection Rule of Feature Interaction by Genetic Algorithm
在线阅读 下载PDF
导出
摘要 完备和正确的检测规则是业务冲突管理器在线检测冲突时提高检测率的关键.该文借鉴遗传算法的随机搜索能力提出一种冲突检测规则进化算法,通过加入已知冲突信息的指导和以概率递减选择新业务参与变异的方式提高系统进化速度,对检测规则集进行优化降低系统时间和空间复杂度.实验证明此算法提高了系统检测率. The completeness and correctness of detection rule set are key points to enhance the real-time detection rate of the feature interaction manager (FIM).Based on the random search capability of the genetic algorithm,an evolution algorithm of detection rule set is proposed.In the algorithm,the known interactions are added and the new services are selected to mutate by the degressive probability, which improve the evolution speed. Optimizing the detection rule set can reduce the time and space complexity. The experiment results show that the algorithm advances the performance of the FIM.
作者 魏薇 杨放春
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第4期634-639,共6页 Acta Electronica Sinica
基金 国家杰出青年科学基金(No.60125101) 国家973基础理论研究计划基金(No.2003CB314806)
关键词 下一代网络 业务冲突 检测规则 遗传算法 检测率 next generation network feature interaction detection rule genetic algorithm detection rate
  • 相关文献

参考文献16

  • 1Keck D O,Kuehn P J.The feature and service interaction problem in telecommunications systems:a survey[J].IEEE Transactions on Software Engineering,1998,24(10):779-796.
  • 23GPP TS 29.198-01,Open Service Access Application Programming Interface;Part 1:Overview[S].
  • 3Calder M,Kolberg M,Magill E H,et al.Feature Interaction:a critical review and considered forecast[J].Computer Networks,2003,41(1):115-141.
  • 4Griffeth N D,Velthuijsen H.The negotiating Agents approach to runtime interaction resolution[A].Feature Interactions in Telecommunication and Software Systems[C].Amsterdam:IOS Press,1994.217-235.
  • 5Amer M,Karmouch A,Gray T,et al.An agent model for the resolution of feature conflicts in telephony[J].Journal of Network and Systems Management,2000,8(3):419-437.
  • 6Amer M,Karmouch A,Gray T,et al.Feature-interaction resolution using fuzzy policies[A].Calder M,Magill E.Feature Interaclions in Telecommunications and Software Systems VI[C].Amsterdam:IOS Press,2000:94-132.
  • 7Tsang S,Magill E H.Behaviour based run-time feature interac tion detection and resolution approaches for intelligent networks[A].P Dini,R Boutaba,and L Logrippo.Feature Interactions in Telecommunications Systems Ⅳ[C].Montreal:IOS Press,1997.254-270.
  • 8Tsang S,Magill E H.Learning to detect and avoid run-time feature interaclions in intelligent networks[J].IEEE Transactions on Software Engineering,1998,24(10):818-830.
  • 9Marples D,Magill E H.The use of rollback to prevent incorrect operation of features in intelligent network based systems[A].Kimbler K,Bouma L G.Feature Interactions in Telecommunications and Software Systems V[C].Amsterdam:IOS Press,1998.115-134.
  • 10Reiff-Marganiec S.Runtime Resolution of Feature Interactions in Evolving Telecommunications Systems[D].UK:University of Glasgow Glasgow,2002.

二级参考文献69

  • 1林飞卿 等.细胞免疫学研究进展[M].北京:人民卫生出版社,1981..
  • 2HanJiawei Kamber M 范明等译.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 3徐九韵 杨放春 郭乐深.活锁类业务冲突的检测方法[A]..第六届全国计算机应用联合学术会议[C].,2002..
  • 4E Eskin.Anomaly detection over noisy data using learned probability distributions[A].Proceedings of the 17th International Conference on Machine Learning[C].San Mateo,CA:Morgan Kaufmann,2000.255-262.
  • 5T Lane,C Brodley.Temporal sequence learning and data reduction for anomaly detection[J].ACM Trans Info System Security,1999,2:295-331.
  • 6T Lane,C E Brodley.Data reduction techniques for instancebased learning from human/computer interface data[A].Proceedings of the 17th International Conference on Machine Learning[C].San Mateo,CA:Morgan Kaufmann,2000.519-526.
  • 7D Dasgupta,F Gonzalez.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Transactions on Evolutionary Computation,2002,3(6):281-291.
  • 8E Zitzler,L Thiele.Multi-objective evolutionary algorithms:comparative case study and the strength pareto approach[J].IEEE Trans of Evolutionary Computation,1999,3(4):257-271.
  • 9M Srinivas,M Patnaik.Adaptive probabilities of crossover and mutation in genetic algorithms[J].IEEE Trans on Systems,Man,and Cybernetics,1993,24(4):656-667.
  • 10Timmis J, Neal M, Hunt J. Artificial immune system for data analysis. Biosystems, 2000, 55(1-3):143-150

共引文献256

同被引文献40

引证文献3

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部