期刊文献+

基于危险理论的人工免疫模型 被引量:1

An Artificial Immune Model Based on Danger Theory
在线阅读 下载PDF
导出
摘要 人工免疫中的self—nonself识别模型存在识别局限性。危险理论以危险作为识别对象,可有效避免self—nonself识别中难以解决的问题。云模型是一种定性与定量之间相互转换的有效工具,本文从危险是变化产生的这一角度,借鉴云模型的概念判定危险信号的发生,提出了基于危险理论的人工免疫模型,利用"危险"和nonself的识别共同激发免疫响应。 Self--nonself recognition model has the inherent weakness. In danger theory, sanger is the aim for recognition, so the problems in self--nonself recognition can be successfully avoided. C loud model is an effective tool in transforming between qualitative concepts and their quantitative expressions. This paper uses the concept or cloud model to estimate systematic parameters and consequently presents the definition of danger signal. Stimulate model including both self-nonself recognition method and danger recognition method is presented.
作者 尹孟嘉
出处 《电脑与电信》 2012年第3期28-31,共4页 Computer & Telecommunication
基金 2010年北省教育厅科研项目 项目编号:B20102703 孝感学院2010年度科研立项 项目编号:Z2010029
关键词 人工免疫系统 危险理论 云模型 危险信号 artificial immune system danger theory cloud model danger signal
  • 相关文献

参考文献11

  • 1Aickelin U and Cayzer S.The Danger Theory and Its Applicafion to Artificial Immune Systems[C].Proceedings of the1st Intemational Conference on Atticial Immune Systems(ICARIS).Canterbury,UK,2002:141—148.
  • 2Greensmith J,Aieken U and Twyeross J.Detecting Danger:Applying a Novel Immunological Concept to Intrusion Detection Systems[C] ,6th International Conference in Adaptive Computing in Design and Manufacture,Bristol,UK,2004.
  • 3U.Aickelin,P.Bentley,S.Cayzer,J.Kim,and J.McLeod.Danger theory:The link between ais and ids[C].In Proc.of the SecondInternation Conference on Artificial Immune Systems(ICARIS-03),2003.147-155.
  • 4MATZINGER P.The danger model:a renewed sense of self[J].Science,2002,296(5566):301-305.
  • 5KIM J.WISON W,MCLEOD J.Cooperative automated worm response and detection immune algorithm(CARD INAL)inspired by T-cell immunity and tolerance[C] //Proc of the4th International Conference on Artificial Immune Systems.Banff:Springer-Verlag,2005:168-181.
  • 6ZHANG Jun-min,LIANG Yi-wen.A novel intrusion detection model based on danger theory[C] //Proc of IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.Washington DC:IEEE Computer Society,2008:867-871.
  • 7SUN F X,HAN X C,WANG J H,et al.An immune danger theoryinspired model for network security monitoring[C] //Proc of International Conference on Challenges in Environmental Science and Computer Engineering.Washington DC:IEEE Computer Society,2010:33-35.
  • 8P.Matzinger,“The danger model:a renewed sense of self,”2002,301~305.
  • 9李德毅,刘常昱,杜鹢,韩旭.不确定性人工智能[J].软件学报,2004,15(11):1583-1594. 被引量:418
  • 10李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:939

二级参考文献18

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:939
  • 2王梓坤.论混沌与随机[J].北京师范大学学报(自然科学版),1994,30(2):199-202. 被引量:16
  • 3李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1340
  • 4李德毅 淦文燕 刘璐莹.人工智能与认知物理学 [A]..中国人工智能进展2003[C].北京: 北京邮电大学出版社,2003.6-14.
  • 5Zadeh L A. Fuzzy sets [J]. Information and Control, 1965, ( 8): 338~353
  • 6Ross T J. Fuzzy Logic with Engineering Applications [M]. Bei jing:Publishing House of Electronics Industry, 2001
  • 7Russell B. Vagueness [J]. Australasian Journal of Psychology and Philosohys, 1923, (1): 84~92
  • 8Black M. Vagueness [J]. Philosophy of Science. 1937, (4): 422~431
  • 9Pawlak Z. Roughsets [J]. International Journal of Computer and Information Science, 1982, (11): 341~356
  • 10李德毅 王晔 吕辉军.知识发现机理研究 [A].见:钟义信编.CAAI-9(全国第九届人工智能年会)论文集《中国人工智能进展:2001》 [C].北京:北京邮电大学出版社,2001.314-324.

共引文献1268

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部