期刊文献+

基于不等长字符串的免疫匹配规则研究 被引量:1

Research of Match Rule based on unequal-length string
下载PDF
导出
摘要 在人工免疫系统中,免疫计算的关键是对匹配规则的选取和实现。在本文中,针对自体/非自体集合,通过图论对匹配规则个数的选取进行了分析。首次提出了匹配规则相关度的概念,并以此决定对匹配结果的处理。最后,对相似性为基础的几种匹配规则进行研究和分析,并在此基础上提出了一种针对不等长字符串的匹配规则。 In the system of Artificial immune, the sticking point of mmunocomputing is to choose and realize the matching rule. To the point of self/non-self, I will make an analysis of the number of the matching rule ,through the research of Graph Theory in this paper Firstly ,I put forward the conception of relevance through which I decide how to deal with the result of matching .Finally, at the base of researching several kinds of matching rule, I put forward one kind of matching rule to the point of unequal-length string.
出处 《微计算机信息》 2009年第30期162-163,97,共3页 Control & Automation
关键词 免疫计算 匹配规则 相关度 不等长字符串 immune calculation matching rules relevance unequal-length string
  • 相关文献

参考文献6

  • 1张虹,蔡焕夫,高平安,赵国红.入侵检测系统匹配规则的研究[J].微计算机信息,2006,22(11X):120-122. 被引量:6
  • 2矫新华,宋书民,陈喆,程少华.基于r-连续位匹配规则的免疫计算中孔洞的研究[J].微计算机信息,2006(09S):296-298. 被引量:4
  • 3Forrest S, Perelson A S, Allen L, ET al.Self-nonself discrimination in a computer [A]In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy [C]. Los Alamos CA IEEE Computer Society Press, 1994.
  • 4KIM J, BENTLEY P. The Artificial Immune System for Network Intrusion Detection: An Investigation of Colonel Selection with a Nega-tive Selection Operator [A]. The Congress on Evolutionary Computation (CEC-2001) [C]. Seou, 1 Korea, 2001. 1244-1252.
  • 5V. I. Levenshtein, Binary codes capable of correcting deletions, inser-tions, and reversals,SovietPhysicsDoklady,10:707-710, 1966.
  • 6S A H ofmeyr.An Immune logical Model of Distributed Detectionand Its Application to Computer Security [D] [PhD Dissertation], Albuquerque, NM: The University of New M exico, 1999.

二级参考文献7

  • 1杨赞国,程全洲.基于免疫的防火墙系统安全技术研究[J].微计算机信息,2005,21(09X):16-18. 被引量:7
  • 2贾志平,杨武,云晓春.一个分布式高效网络入侵检测系统[J].微计算机信息,2006(01X):33-35. 被引量:6
  • 3Steven A H.An, Immunological model of distributed detection and its application to computer security, Phd thesis, New Mecico:The University of New Mexico, 1999.
  • 4P.D'haeseleer, S.Forrest,and P.Helman.An Immunological Approach to Change Detection: Algorithms,Analysis,and Implication.In:Proceeding of the 1996 IEEE Symposium on Computer Securityand Privacy
  • 5PAN FENG,DING YUN-fei,WANGWEI-nong.An immunity,based technique to detect network intrusions, J Zhejiang Univ SCI 2005 6A(5):371-377
  • 6S A Hofmeyr. An Immunological Model of Distributed Detection and Its Application to Computer Security [D] [PhD Dissertation],.Albuquerque, NM: The University of New Mexico, 1999
  • 7孙啸.生物信息学[EB/OL].东南大学.http://www.lmbe.seu.edu.cn/chenyuan/xsun/bioinfomatics/Web/CharpterThree/3.1.htm

共引文献8

同被引文献6

  • 1GNU Aspell. [EB/OL]. [2011-10-11]. http://aspell.net.
  • 2Schulz K, Mihov S. Fast string correction with Levenshtein au- tomata [J]. International Journal of Document Analysis and Recog- nition, 2002, 5(1): 67-85.
  • 3Wagner R A. The String-to-String Correction Problem [J]. Journal of the ACM, 1974, 21(1): 168-173.
  • 4LEVENSHTEIN IV. Binary codes capable of correcting dele- tions, insertions, and reversals [J]. Soviet Physiscs Doklady, 1966, 10(8): 707-710.
  • 5张扬,何丕廉,向伟,李沐.一种基于判别式重排序的拼写校正方法[J].软件学报,2008,19(3):557-564. 被引量:3
  • 6龚才春,黄玉兰,许洪波,白硕.基于多重索引模型的大规模词典近似匹配算法[J].计算机研究与发展,2008,45(10):1776-1781. 被引量:5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部