期刊文献+

树突细胞算法的运行时间属性分析

Analysis on runtime essences of dendritic cells algorithm
下载PDF
导出
摘要 第二代人工免疫系统中的树突细胞算法(DCA)是受先天性免疫系统中树突细胞(DCs)功能的启发而开发的算法,它已被成功运用于许多计算机安全相关领域。但是对DCA理论方面的分析工作很少,对算法理论方面的研究也较少出现,因此对DCA执行相似的理论分析、确定算法的运行时间变量、揭示其他算法属性就显得非常重要。给出了两个基于算法输入数据流的运行时间变量,并且证明了这两个变量是如何对算法输入数据与算法运行时变量进行关联,也揭示了在给定时间窗内基于输入数据的算法行为,而这些都与实际应用执行的算法无关。此研究工作为算法的进一步应用开发提供了指导。 Dendritic cell algorithm (DCA) belong to the second artificial immune system(AIS) is inspired by functions of the dendritic cells (DCs) of the innate immune system, and has been successfully applied to numerous security-related problems. However, theoretical analysis of the DCA has barely been performed, and most theoretical aspects of the algorithm have not yet been revealed. As a result, it is important to conduct a similar theoretical analysis of the DCA, to determine its runtime varia- ble and other algorithmic properties, in line with other artificial immune algorithms. This paper formulated the two runtime variables of the algorithm based on the input data. It proved how these formulas relate the runtime variables of the algorithm to the input data, and how the algorithm behaves within a given time window based on the input data, without actually running the algorithm. These works can be used as guidelines for further application development of the algorithm.
出处 《计算机应用研究》 CSCD 北大核心 2016年第1期17-20,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61240023 61402012)
关键词 树突细胞算法 运行时变量 成熟的树突细胞 处理的抗原 dendritic cells algorithm runtime variable matured dendritic cells processed antigens
  • 相关文献

参考文献18

  • 1Zhao Zengshun,Feng Xiang,Lin Yanyan,et al.Evolved neural network ensemble by multiple heterogeneous swarm intelligence[J].Neuro Computing,2015,149(2):29-38.
  • 2De Castro L N,Timmis J.Artificial immune systems:a new computational intelligence approach[M].London:Springer,2002.
  • 3Greensmith J.The dendritic cell algorithm[D].Nottingham:University of Nottingham,2007.
  • 4Greensmith J,Aicketin U.Dendritic cells for SYN scan detection[C] //Proc of Genetic and Evolutionary Computation Conference.[S.l.] :Elsevier Science Limited,2007:49-56.
  • 5Al-Hammadi A,Aicketin U,Greensmith J.DCA for bot detection[C] //Proc of IEEE World Congress on Computational Intelligence.2008:1807-1816.
  • 6Oates R,Greensmith J,Aickelin U,et al.The application of a dendritic cell algorithm to a robotic classifier[C] //Proc of the 6th International Conference on Artificial Immune System.Berlin:Springer,2007:204-215.
  • 7Greensmith J,Feyereisl J,Aickelin U.The DCA:SOMe comparison a comparative study between two biologically-inspired algorithms[J].Evolutionary Intelligence,2008,1(2):85-112.
  • 8Stibor T,Oates R,Kendall G,et al.Geometrical insights into the dendritic cell algorithm[C] //Proc of the 11th Annual Conference on Genetic and Evolutionary Computation.New York:ACM Press,2009:1275-1282.
  • 9Oates R.The suitability of the dendritic cell algorithm for robotic security applications[D].Nottingham:University of Nottingham,2010.
  • 10Gu Feng,Greensmith J,Aickelin U.The dendritic cell algorithm for intrusion detection[M] //Biologically Inspired Networking and Sensing:Algorithms and Architectures.[S.l.] :IGI Global,2012:84-102.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部