首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
刘明珍 《计算机工程》2013,(11):131-135
为提高网络入侵检测效果,提出一种结合混沌粒子群优化(CPSO)算法和最小二乘支持向量机(LSSVM)的网络入侵检测模型。将网络特征和LSSVM参数编码成二进制粒子,根据网络入侵检测正确率和特征子集维数权值构造粒子群目标函数。通过粒子群找到最优特征子集和LSSVM参数,同时引入混沌机制保证粒子群的多样性,防止早熟现象的出现,从而建立最优网络入侵检测模型。采用KDD99数据集进行性能测试,结果表明,该模型不仅能获得最优特征子集和LSSVM参数,而且提高了入侵检测速度和正确率,降低了入侵检测误报率和漏报率。  相似文献   

2.
基于粒子群LSSVM的网络入侵检测   总被引:1,自引:0,他引:1  
研究保护网络安全问题,计算机网络攻击的多样性及隐蔽性导致网络入侵检测困难.当前流行的人工神经网络检测方法的网络入侵检测率仅70%左右,不能满足网络安全防护需求,为了解决上述问题,提出基于最小二乘支持向量机和粒子群优化算法(PSO-LSSVM)的网络入侵检测方法,粒子群优化算法用于选择合适的最小二乘支持向量机参数.方法泛化能力强,识别精度高.在网络入侵检测中,通过KDDCup99数据库数据进行仿真,证明方法的优越性.实验结果表明粒子群优化算法与最小二乘支持向量机组合方法的网络入侵检测精度优于LSSVM与SVM.可见,PSO-LSSVM非常适合于网络入侵检测,可为网络保护设计提供参考.  相似文献   

3.
笔者针对网络特征选择问题,提出一种鲶鱼粒子群算法选择特征的支持向量机网络入侵检测(EPSO-SVM)。首先将"鲶鱼效应"因子引入粒子群优化算法,将网络特征子集编码成粒子位置串,其次将入侵检测率作为特征子集选择目标函数,通过鲶鱼粒子群找到最优特征子集,最后支持向量机根据最优特征子集构建网络入侵分类器,在KDDCup99数据集上进行仿真测试。结果表明,EPSO-SVM不仅能提高网络入侵检测率和检测速度,而且适用于现实高速网络应用环境。  相似文献   

4.
为了提高网络入侵检测率,提出一种反向学习粒子群算法和多层次分类器相融合的网络入侵检测模型。首先将反向学习粒子群算法优化最小二乘支持向量机,以提高分类性能;然后利用由粗到精策略构造多层的网络入侵分类器降低计算时间杂度复;最后采用KDD 99数据集进行仿真测试。仿真结果表明,相对于其他检测模型,该模型不仅提高了网络入侵检测率,降低了入侵检测误报率,同时加快了入侵检测速度,为网络安全提供了有效保证。  相似文献   

5.
特征选择是网络入侵检测研究中的核心问题,为了提高网络入侵检测率,提出一种人工鱼群算法(AFSA)和支持向量机(SVM)相融合的网络入侵检测模型(AFSA-SVM)。将网络特征子集编码成人工鱼的位置,以5折交叉验证SVM训练模型检测率作为特征子集优劣的评价标准,通过模拟鱼群的觅食、聚群及追尾行为找到最优特征子集,SVM根据最优特征子集进行网络入侵检测,并采用KDD CUP 99数据集进行仿真测试。仿真结果表明,相对于粒子群优化算法、遗传算法和原始特征法,AFSA-SVM提高了入侵检测效率和检测率,是一种有效的网络入侵检测模型。  相似文献   

6.
论文针对标准量子粒子群算法易陷入局部极值的问题,提出一种改进的量子粒子优化最小二乘支持向量机的方法。利用高斯变异数的局部开发能力以及柯西变异数的全局搜索能力,在量子粒子群优化算法中,引入高斯-柯西变异算子,帮助算法跳出局部极值。并利用该优化模型进行光伏发电量预测实验,对优化的最小二乘支持向量机模型的预测结果与其他模型预测结果进行比较,结果表明:基于高斯-柯西变异算子的量子粒子群优化的最小二乘支持向量机对光伏发电量的预测具备较好的收敛速度和跳出局部收敛困境的能力。  相似文献   

7.
网络入侵检测一直是网络安全领域中的研究热点,针对分类器参数优化难题,为了提高网络入侵检测准确性,提出一种改进粒子群算法和支持向量机相融合的网络入侵检测模型(IPSO-SVM).首先将网络入侵检测率作为目标函数,支持向量机参数作为约束条件建立数学模型,然后采用改进粒子群算法找到支持向量机参数,最后采用支持向量机作为分类器建立入侵检测模型,并在Matlab 2012平台上采用KDD 999数据进行验证性实验.结果表明,IPSO-SVM解决了分类器参数优化难题,获得更优的网络入侵分类器,提高网络入侵检测率,虚警率和漏报率大幅度下降.  相似文献   

8.
入侵检测系统面临的主要问题是计算量大,特征选择被引入解决这一问题。针对现有方法的缺点,利用改进的粒子群算法来搜索最优特征子集,提出了一种基于混合CatfishPSO和最小二乘支持向量机的特征选择方法,利用混合的CatfishBPSO和CatfishPSO选择特征子集并同步对LSSVM的参数进行优化,最后建立了一个基于该特征选择方法的入侵检测模型。在KDD Cup 99数据集上进行的实验结果表明该模型的检测性能较高。  相似文献   

9.
迟滞系统广泛存在于各工程领域,但由于迟滞非线性系统的不确定性、状态不可测等特性,因此迟滞系统在建模方面存在一定的困难。针对上述问题,提出了一种采用最小二乘支持向量回归机的解决方案,对系统进行建模方法的研究,并利用粒子群算法、量子粒子群算法等对最小二乘支持向量机中的惩罚参数γ和核函数参数σ的组合进行优化,以提高模型性能及泛化能力。仿真结果表明,利用粒子群优化算法的最小二乘支持向量回归机对迟滞系统的模型仿真可以得到较好的结果。  相似文献   

10.
网络攻击具有多样性和隐蔽性,为了提高网络安全性入侵检测的正确率,提出一种混沌粒子群算法(CPSO)和最小二乘支持向量机(LSSVM)相融合的网络入侵检测方法(CPSO-LSSVM)。利用混沌粒子群算法对LSSVM模型参数进行搜索,选择LSSVM最优参数,采用KDDCUP99数据集对CPSO-LSSVM性能进行测试,实验结果表明,CPSO-LSSVM提高了网络入侵检测正确率,降低了误报率,可以为网络安全提供有效保证。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
蒙古语言是中国蒙古族使用的通用语言,由于蒙古文区别于其他文字的书写方式和其自身变形机制等特点,在很多通用的文字处理引擎中都不被支持。在嵌入式产品开发与应用领域中Linux加QTE已经成为流行方式。该文给出了一种在QTE环境上实现基于标准Unicode的蒙古文点阵显示和变形算法, 并自定义了支持蒙古文的QTE组件,扩展了QTE功能,为在Linux加QTE方式的嵌入式体系结构中处理蒙古文提供了一种解决方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号