共查询到20条相似文献,搜索用时 78 毫秒
1.
通过对基本PSO算法进行分析研究,发现PSO是一种有效的全局寻优算法。它操作简单,使用方便,但是极易陷入局部最优。通过对PSO进行改进应用到入侵检测系统中,大大提高检测率。 相似文献
2.
将克隆选择算法应用于入侵检测系统中,利用克隆选择的原理和规则来达到检测和响应入侵行为的效果。数据经过克隆,变异和自然选择的处理之后,能够更好地检测到可疑入侵行为,有效改善入侵数据的漏报现象。 相似文献
3.
磨莉 《中国新技术新产品》2010,(20):1-1
粒子群算法适合求解连续变量优化问题,本文提出了粒子群算法的新离散化方法。常规粒子群算法在电力系统优化问题中取得了成功,但有"趋同性"。本文提出了改进多粒子群优化算法(IPPSO),IPPSO是两层结构:底层用多个粒子群相互独立地搜索解空间以扩大搜索范围;上层用1个粒子群追逐当前全局最优解以加快收敛。粒子群以及粒子状态更新策略不要求相同。 相似文献
4.
粒子群算法是上世纪90年代兴起的群体智能算法,其特点是模拟自然界生物群体行为来构造随机优化算法,它对函数性态要求较弱、寻优结果和初值无关,并具有一定的并行性,因而成为优化算法领域研究的一个热点。介绍粒子群算法的研究现状,重点论述标准粒子群算法以及几种主流的改进型粒子群算法,并提出未来可能的研究方向。 相似文献
5.
作为安全审计的核心技术,入侵检测是网络安全保护一个重要组成部分,它从网络安全立体纵深以及多层防御的角度出发,是一种积极主动的安全保护技术。本文就针对入侵检测技术在图书馆网络安全系统中的应用展开讨论。 相似文献
6.
排课系统的目标是要合理、高效配置教学资源,解决资源的冲突与抢占,并兼顾资源配置的公平性,排课问题是一个NP完全问题,由五大要素组成的非线性优化问题。提出基于免疫接种粒子群的排课算法,在粒子群进化过程中,引入免疫接种及免疫选择机制,通过抗体与抗原的亲和力计算来促进或抵制抗体的进化,保证粒子群进化的多样性,指导粒子群的进化过程,克服粒子群算法的早熟现象,加快收敛速度和提高全局寻优能力。人机交互方式的排课系统可以得到较好的近似最优解。 相似文献
7.
数据挖掘模型在入侵检测系统中的应用 总被引:1,自引:0,他引:1
提出一种具有自学习功能的数据挖掘模型,可发现已知和未知的入侵和异常入侵恬动,基于数据挖掘的关联入侵规则生成算法使系统具有很强的常规入侵检测和协同入侵检测能力。 相似文献
8.
9.
入侵检测系统探讨 总被引:1,自引:0,他引:1
当今世界,互联网迅猛发展,人们在充分享受信息资源共享极大便利的同时,基于互联网的广域开放性,也使网络被攻击和破坏的风险大大增加,各种攻击事件与入侵手法层出不穷,由此催生市场对于网络安全产品的需求不断增加。使用防火墙、访问控制、加密技术等传统的安全技术和产品,在入侵技术快速发展的新形势下,逐步暴露出其局限性。入侵检测系统是继防火墙之后计算机网络安全系统保护的第二道安全闸门,主要收集计算机网络或计算机系统中若干关键点的信息并对其进行分析,从而发现网络或系统中是否存在违反安全策略的行为或被攻击的迹象,引入入侵检测系统,并对入侵检测的分类和存在的问题进行分析与研究,最后分析入侵检测发展方向。 相似文献
10.
提出一种基于粒子群算法的三维坐标反演模型,实现了超声波三坐标测量中三维坐标的高精度反演,提高了坐标反演迭代过程的鲁棒性.同时介绍了超声波测距系统的原理,推导了三维坐标反演的目标函数,建立了基于粒子群算法的反演模型,并进行了实验研究.通过软件仿真,对粒子群算法在超声波三维测量上的可行性和鲁棒性进行了验证,并搭建超声波三维定位平台,在1m×1m×2m空间中进行了测量实验.结果表明,测量的绝对误差小于10mm,具有较高的反演精度. 相似文献
11.
Jacob W. Ulvila John E. Gaffney Jr. 《Journal of research of the National Institute of Standards and Technology》2003,108(6):453-473
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination of two IDSs. The method is illustrated for: 1) determining the best operating point for a single and double IDS based on the costs of mistakes and the hostility of the operating environment as represented in the prior probability of intrusion and 2) evaluating single and double IDSs on the basis of expected cost. A method is also described for representing a compound IDS as an equivalent single IDS. Results are presented from the point of view of a system administrator, but they apply equally to designers of IDSs. 相似文献
12.
13.
14.
直接将入侵检测算法应用在粗糙数据上,其入侵检测分析的效率非常低.为解决该问题,提出了一种基于主成分分析的入侵检测方法.该方法通过提取网络连接中的相关信息,对它进行解码,并将解码的网络连接记录与已知的网络连接记录数据进行比较,发现记录中的变化和连接记录分布的主成分,最后将机器学习方法和主成分分析方法结合实现入侵检测.实验结果表明该方法应用到各种不同KDD99入侵检测数据集中可以有效减少学习时间、降低各种数据集的表示空间,提高入侵检测效率. 相似文献
15.
Cui Fude Yang Lei Jin Jie Piao Hongze Lin Wenhui Cun Dongmei 《Drug development and industrial pharmacy》2013,39(9):999-1007
The preparation of pH-dependent, time-based and enzyme degradable pellets was investigated for use as an oral colonic drug delivery system. It was expected that drug would be released immediately once the pellets reached the colon. The pellets were prepared using extrusion-spheronizing equipment and subsequently coated with three layers of three functional polymers by an air-suspension technique. The core consisted of 5-aminosalicylic acid (5-ASA) as a model drug, CaP as an enzyme-degradable material and microcrystalline cellulose (MCC) as an additive. As far as the three coated layers were concerned, the outer layer was coated with Eudragit L30D-55 for protection against gastrointestinal juices, the intermediate layer was coated with ethylcellulose (EC) to inhibit drug release during passage through the small intestine, and the inner film was coated with pectin for swelling and enzyme-degradation, which required a 30, 10, and 12% weight gain, respectively. Several micromeritic properties of the core pellets, including particle size distribution, particle size, degree of circularity, and friability, were evaluated to investigate the effects of the formulations of the cores and preparation conditions. Also, dissolution testing of the cores showed that the presence of calcium pectinate (CaP) markedly increased the drug release rate from the cores, as determined by scanning electron microscopy (SEM). In-vitro release studies indicated that the coated pellets completely protected the drug release in 0.1 mol/L HCl, while the drug release was delayed for 3–4 hr in pH 6.8 PBS. A synergistic effect of enzyme dependence for the coated pellets was seen following removal of the coated layer and during contact with colonic enzymes. Consequently, it was possible to achieve colon-specific drug delivery using this triple-dependence system. 相似文献
16.
17.
微粒群算法在自动控制系统设计中的应用 总被引:2,自引:0,他引:2
提出了将微粒群优化(Particle Swarm Optimization,PSO)算法与控制系统设计相结合的系统设计思路和方法。系统设计过程包括两个部分:首先基于历史输入输出数据,用微粒群算法建立系统的模型,然后基于得到的模型进行控制器的设计,并用微粒群算法进行控制器的参数优化整定。仿真试验结果表明,微粒群算法在控制系统设计的模型建立、控制器参数优化等方面发挥了重要的作用,简化了控制系统设计任务,提高了设计效率。 相似文献
18.
Raniyah Wazirali 《计算机、材料和连续体(英文)》2021,67(2):1429-1445
Intrusion detection system (IDS) techniques are used in cybersecurity to protect and safeguard sensitive assets. The increasing network security risks can be mitigated by implementing effective IDS methods as a defense mechanism. The proposed research presents an IDS model based on the methodology of the adaptive fuzzy k-nearest neighbor (FKNN) algorithm. Using this method, two parameters, i.e., the neighborhood size (k) and fuzzy strength parameter (m) were characterized by implementing the particle swarm optimization (PSO). In addition to being used for FKNN parametric optimization, PSO is also used for selecting the conditional feature subsets for detection. To proficiently regulate the indigenous and comprehensive search skill of the PSO approach, two control parameters containing the time-varying inertia weight (TVIW) and time-varying acceleration coefficients (TVAC) were applied to the system. In addition, continuous and binary PSO algorithms were both executed on a multi-core platform. The proposed IDS model was compared with other state-of-the-art classifiers. The results of the proposed methodology are superior to the rest of the techniques in terms of the classification accuracy, precision, recall, and f-score. The results showed that the proposed methods gave the highest performance scores compared to the other conventional algorithms in detecting all the attack types in two datasets. Moreover, the proposed method was able to obtain a large number of true positives and negatives, with minimal number of false positives and negatives. 相似文献
19.
20.
为分析多重生物序列的突变结构,首先是要作它们的多重比对,在多重比对基础上可作出各序列的系统树与最小距离树,在最小距离树中如果把它们的弧用突变模结构来表示,那么我们称由此所产生的数学模型为多重序列突变网络系统(以下简称突变网络),突变网络分析的主要问题是如何确定各种不同类型突变的相互关系问题,一种最简单关系是二个突变的突变区域互不重叠,我们称之为正交化。因此突变网络分析的一个重要目的是对突变网络作正交化的简化,本文给出了突变网络正交化的基本定理,并以SARS病毒基因组为例,说明它们的突变网络系统模型与正交化运算,并由此得到SARS病毒从早期传播到爆发的基因突变过程的确定。 相似文献