期刊文献+

人工免疫系统中危险信号的云方法定义 被引量:8

Definition of Danger Signal in Artificial Immune System Using Cloud Method
下载PDF
导出
摘要 对“危险”的定义是将危险理论用于人工免疫系统所需要解决的核心问题。云模型是一种定性与定量之间相互转换的有效工具。论文借鉴云模型的概念对计算机系统中系统变量的变化进行判定,从而给出危险信号的定义;综合多种危险信号,进而给出“危险”的定义。最后,提出了利用“危险”和nonself的识别共同激发免疫响应的协同识别模型框架。 The definition of danger is one of the most important problems need to be solved in the application of Danger Theory in AIS.Cloud model is an effective tool in transforming between qualitative concepts and their quantitative expressions.This paper uses the concept or Cloud model to estimate systematic parameters and consequently presents the definition of danger signal.Integrate various danger signals the definition of danger is got.At last,a coordinated stimulate model including both self-nonself recognition method and danger recognition method is presented.
机构地区 湖北教育学院
出处 《计算机工程与应用》 CSCD 北大核心 2006年第10期34-36,45,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:90204011) 湖北省科技攻关计划资助项目(编号:2004AA101C01)
关键词 人工免疫 危险理论 云模型 artificial immunology, Danger Theory, Cloud model
  • 相关文献

参考文献7

  • 1S Forrest,A Perelson,L Allen et al.Self-nonself discrimination in a computer[C].In:Proceedings IEEE Symposium on Research in Security and Privacy,Los Alamitos,CA,IEEE Computer Society Press,1994:202~212
  • 2Aickelin U,Cayzer S.The Danger Theory and Its Application to Artificial Immune Systems[C].In:Proceedings of the 1st International Conference on Artificial Immune Systems(ICARIS-2002),Canterbury,UK,2002:141~148
  • 3Jon Timmis,Peter Bentley,Emma Hart.Improving SOSDM:Inspirations from the Danger Theory[C].In:Second International Conference,ICARIS 2003,Edinburgh,UK,Proceedings,2003
  • 4Andrew Secker,Alex Freitas,Jon Timmis.Towards a danger theory inspired artificial immune system for web mining[C].In:A Scime ed.Web Mining:applications and techniques,Idea Group,2005:145~168
  • 5Aickelin U,Bentley P,Cayzer S et al.Danger Theory:The Link between AIS and IDS[C].In:Proceedings ICARIS-2003,2nd International Conference on Artificial Immune Systems,LNCS 2787,Springer-Verlag,Edinburgh,UK,2003:147~155
  • 6Greensmith J,Aickelin U,Twycross J.Detecting Danger:Applying a Novel Immunological Concept to Intrusion Detection Systems[C].In:6th International Conference in Adaptive Computing in Design and Manufacture,Bristol,UK,2004
  • 7李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:890

二级参考文献9

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1231
  • 2李德毅 淦文燕 刘璐莹.人工智能与认知物理学 [A]..中国人工智能进展2003[C].北京: 北京邮电大学出版社,2003.6-14.
  • 3Zadeh L A. Fuzzy sets [J]. Information and Control, 1965, ( 8): 338~353
  • 4Ross T J. Fuzzy Logic with Engineering Applications [M]. Bei jing:Publishing House of Electronics Industry, 2001
  • 5Russell B. Vagueness [J]. Australasian Journal of Psychology and Philosohys, 1923, (1): 84~92
  • 6Black M. Vagueness [J]. Philosophy of Science. 1937, (4): 422~431
  • 7Pawlak Z. Roughsets [J]. International Journal of Computer and Information Science, 1982, (11): 341~356
  • 8李德毅 王晔 吕辉军.知识发现机理研究 [A].见:钟义信编.CAAI-9(全国第九届人工智能年会)论文集《中国人工智能进展:2001》 [C].北京:北京邮电大学出版社,2001.314-324.
  • 9李德毅.知识表示中的不确定性[J].中国工程科学,2000,2(10):73-79. 被引量:197

共引文献889

同被引文献78

引证文献8

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部