期刊文献+

基于模糊树突状细胞算法的研究

Study of fuzzy dendritic cell algorithm
在线阅读 下载PDF
导出
摘要 利用模糊集合论的理论来改变传统的树突状细胞算法中对半成熟树突状细胞和成熟树突状细胞的清晰化划分问题。传统的树突状细胞算法的基于边界判断的清晰化划分方式对数据的排序敏感,并且存在着一定比例上的误判。提出的模型是基于模糊集合论框架下结合树突状细胞算法建立起来的一种全新的算法模型,实验证明基于模糊树突状细胞算法的实验结果一定程度上减低了误报率,不受排序的影响,更加有效和精确。 This paper discusses how to change the division between immature Dendritic Cells and mature Dendritic Cells in the traditional Dendritic Cell Algorithm by using the fuzzy sets theory.The traditional Dendritic Cell Algorithm attempts to find a notable boundary between the SmDC and the MDC.However,it has been proved that there is no clear division between the SmDC and the MDC.Therefore,certain misjudgments must exist in such a division method based on the boundary judgment.The model proposed in this paper is a new algorithm model built by using the fuzzy sets theoretical framework and the Dendritic Cell Algorithm.Emulation experiments show that the fuzzy Dendritic Cell Algorithm can reduce the false alarm rate to a certain extent.For scattered data sets,this algorithm is more effective and accurate.The method proposed in this paper is more effective and accurate without being affected by the sorting.
出处 《计算机工程与应用》 CSCD 2012年第21期53-57,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.61064002) 江西省教育厅青年基金项目(No.GJJ11029) 吉安市科技计划项目(No.2011-6)
关键词 模糊集合 树突状细胞算法 清晰划分 语言变量 fuzzy set Dendritic Cell Algorithm(DCA) crisp partition linguistic variables
  • 相关文献

参考文献10

二级参考文献24

  • 1王益丰,李涛,胡晓勤,宋程.一种基于人工免疫的网络安全实时风险检测方法[J].电子学报,2005,33(5):945-949. 被引量:30
  • 2郭晨,梁家荣,夏洁武.基于数据密码子的异常入侵检测系统的研究[J].计算机工程与应用,2006,42(24):105-107. 被引量:1
  • 3K C Mcculiough, A Summerfield. Basic concepts of immune response and defense development[ J ]. ILAR, 2005,46(3 ) : 230 --240.
  • 4J Kim,P J Bentley,U Aickelin et al.Immune system approaches to inlrusion detection a review [J ]. Natural Computing, 21307,6(4):413-466.
  • 5U Aickelin, P Bentley, et al. Danger theory: the link between AIS and IDS [A]. Proc of the 2^nd International Conference on Artificial Immune Systems [ C ]. Edinburgh, U. K. : LNCS, 2003.147 - 155.
  • 6Twyeross, U Aickelin. Towards a conceptual framework for innate immunity [A]. Proc of the 4^th International Conference on Artificial Immune Systems [C]. Berlin/Heidelberg: Springer,2005.112 - 125.
  • 7A Somayaji, S Forrest. Automated response using system-call delays[A]. Proc of the 9^th USENIX Security Symposium[ C ]. Berkeley, USA: USENIX Association, 2000. 185 - 198.
  • 8P Matzinger. The danger model: a renewed sense of self[J]. Science, 2002,296 ( 5566 ) : 301 - 305.
  • 9B D Brown, D Lillicrap. Dangerous liaisons: the role of "danger" signals in the immune response to gene therapy[J ]. Blood,2002,100(4) : 1133 - 1140.
  • 10J Banchereau, R M Steinman.Dendritic cells and the control of immunity[J]. Nature, 1998,392(6673) :245 - 252.

共引文献249

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部