Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Application Research of Computers》 2001-09
Add to Favorite Get Latest Update

A Constructional and Evolutionary Method of Self set Based on User's Behavior

LIANG Yi wen,LI Jun tao,GUO Xue li,KANG Li shan (Dept.of Computer Science & Technology,State Key Laboratory of Software Engineering,Wuhan University, Wuhan Hubei 430072,China)  
This paper analyses the possibility of the construction of Self set and the principle of the choosing of character code, and proposes a method of the construction of Self set. The character code in the Self set includes the user's operation, the object and parameter of the operation. Then proposes an evolutionary method of Self set through the user's friend factor (ff) and the confidence factor (cf).
【Fund】: 国家自然科学基金资助项目 ( 60 0 730 4 3;;70 0 71 0 4 2 )
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 9 Hits
1 WANG Chang,XUE Su-jing (Institute of Information Engineering, North China Institute of Water Conservancy and Hydroelectric Power, Zhengzhou,Henan 450008,China);Hijack Linux System Call Force Out Core Dump Hole Attack[J];Computer Security;2009-06
2 ZHOU Te~1, LIU Zhen-peng~2, LIU Xun-fang~2,ZHANG Shou-hua~1(1.College of Mathematics and Computer, Hebei University, Baoding 071002, China;2.Department of Automation, Hebei Province Library, Shijiazhuang 050011, China);Constructing Method and Application on a Kind of Non-self Set[J];Journal of Hebei University(Natural Science Edition);2004-04
3 Li Xia Guo Xueli Liang Yiwen Yi Yanhui (State Key Laboratory of Software Engineering,School of Computer Science,Wuhan University,Wuhan430072);An Immune System for Computer Virus[J];Computer Engineering and Applications;2003-31
4 LIU Zhen-peng,ZHANG Cang-sheng,CHANG Sheng,LI Ji-min (School of Computer Science,Hebei University,Baoding Hebei 071002,China);FICSAM:A Learning Method from One-case Fitted in Large Adaptive System[J];Application Research of Computers;2005-02
5 YANG He (Department of Computer Science,Hubei Institute of Education,Wuhan Hubei 430250,China);Evolutionary Compute Used in Artificial Immune Systems[J];Training and Research;2005-02
6 MAO Xin-yu~1, LIANG Yi-wen~2 (1. East Lake school, Wuhan University, Wuhan 430072, China; 2. School of Computer, Wuhan University, Wuhan 430072, China);Research on the model of immune firewall[J];Computer Engineering and Design;2004-08
7 LU Jian-hua1,2,YUAN Xi-guo2,FU Hai-dong2(1.Department of Control Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074,China;2.College of ComputerScience and Technology,Wuhan University of Science and Technology,Wuhan 430081,China);Constructional method of self-set based on fuzzy pattern recognition[J];Computer Engineering and Design;2007-01
8 FU Hai-dong,XIE Qi,YUAN Xi-guo(College of Computer Science and Technology,Wuhan University of Science and Technology,Wuhan 430081,China);Constructional algorithm of principal and subordinate structure self-set based on decision trees[J];Computer Engineering and Design;2008-07
9 FU Hai-dong,LI Chun-xiang(Dept.of Computer Science & Technology,Wuhan University of Science & Technology,Wuhan 430081,China);Construction and Evolutionary Algorithm of Self Sets Based on Rough Sets Theory[J];Computer Technology and Development;2007-12
Chinese Journal Full-text Database 10 Hits
1 Zhou Weiliang He Kun Cao Xianbin 1) Cheng Huixia 2) (Computer Center, Institute of Anhui Economy Management 230059) ( 1) Department of Computer Science and Technology, USTC 2) Department of Computer Science, Anhui;Design of BP Network Based on Immune Genetic Algorithm[J];JOURNAL OF ANHUI UNIVERSITY(NATURAL SCIENCES);1999-01
2 CHEN Lijun(School of Mathematical Sciences,Peking University,Beijing,100871);New Approaches of Immunity from Computer Viruses[J];ACTA SCICENTIARUM NATURALUM UNIVERSITIS PEKINESIS;1998-05
3 HOU Chao zhen, ZHANG Ya jing (Dept. of Automatic Control, Beijing Institute of Technology, Beijing100081, China);Biologically Inspired Immunity Based on Multi-Agent: A New Idea of Research on Computer Anti-Virus Measures[J];Journal of Beijing Institute of Technology;2002-03
4 ;Multi-sensor Information Fusion Based on an OOP Artificial Immune Model[J];Sensor World;2002-04
5 CHEN Xiang-dong,ZHAO Deng-feng,WANG Guo-qiang,XU Chun-xin (JiLin University, Changchun 130025,China);Fault Diagnosis of Rolling Bearing Based on Nerve Net Work[J];Bearing;2003-02
6 ZHAO Li*, WANG Fengxian, LIU Zhenpeng, CHANG Zhuo ( College of Math. and Comput.,Hebei Univ., Baoding 071002, China );Construction of sand box in computer immune system[J];Journal of Dalian University of Technology;2003-S1
7 Li Haifeng 1 ,Wang Haifeng 2 ,Chen Heng 1 (1.Southeast University,Nanjing210096,China)(2.University of Bath,Bath,UK);MODELING OF IMMUNE SYSTEM AND ITS APPLICATION IN POWER SYSTEM VOLTAGE REGULATION[J];Automation of Electric Power Systems;2001-23
8 Sun Yongzhi, Wei Wei (Zhejiang University, Hangzhou 310027, China);SOLUTION OF OPTIMAL POWER FLOW PROBLEM BASED ON ARTIFICIAL IMMUNE ALGORITHM[J];Automation of Electric Power Systems;2002-12
9 WANG Lei,PAN Jin,JIAO Li-cheng (Key Lab for Radar Signal Processing,Xidian Univ.,Xi′an 710071,China);The Immune Algorithm[J];ACTA ELECTRONICA SINICA;2000-07
10 WU Zuo shun,DOU Wen hua,ZHU Xiao jun (School of Computer Science,Nat'l Univ.of Defense Tech,Changsha,Hunan 410073,China);An Algorithm to Generate Detectors in Negative Selection Model[J];Acta Electronica Sinica;2003-05
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 ;生物免疫机理在计算机安全领域的应用与发展[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 ZHAO Xiao-juan (Hunan Urban Construction College Information Engineering Department,Xiangtan 41110,China);Artificial Immune System Sandbox Host of Dynamic Load Balancing Algorithm[J];Computer Knowledge and Technology;2008-35
3 CAO Qiang1,BAI Yin-hui1,YANG Xiao-ping2(1.Dalian Navy Academy,Dalian 116018,China,2.Guangzhou Navy Academy,Guangzhou 510431,China);Application of Artificial Immunology to Military Field[J];Fire Control and Command Control;2007-04
4 Wang Fengxian Liu Zhenpeng Pan Hongtao (College of Mathematics and Computer,Hebei University,Baoding,Hebei 071002);Nonself Feature Extracting Algorithm Based on Rules Reorganization[J];Computer Engineering and Applications;2006-14
5 ZHANG Qing-hua1,QIAN Yu2,XU Bu-gong3,GAO Ting-yu1,4,XIE Ke-ming4 1.College of Electronic Information and Computer,Maoming University,Maoming,Guangdong 525000,China 2.College of Chemistry Engineering,South China University of Technology,Guangzhou 510640,China 3.College of Automation,South China University of Technology,Guangzhou 510640,China 4.College of Information Engineering,Taiyuan University of Technology,Taiyuan 030024,China;Fault detection algorithm of mutation search in non-self space[J];Computer Engineering and Applications;2007-28
6 SU Peng, CHEN Xing-yuan, TANG Hui-lin, ZHU Ning (Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004);Buffer Overflow Attack Impact Detection Based on Process Execution Profile[J];Computer Engineering;2009-06
7 ZHANG Qing-hua1, QIAN Yu2, XU Bu-gong3, GAO Ting-yu1,4, XIE Ke-ming4(1. College of Computer and Electronic Information, Maoming University, Maoming Guangdong 525000, China;2. College of Chemistry Engineering, South China University of Technology, Guangzhou Guangdong 510640, China;3. College of Automation, South China University of Technology, Guangzhou Guangdong 510640, China;4. College of Information Engineering, Taiyuan University of Technology, Taiyuan Shanxi 030024, China);Negative-selection algorithm of mutation search in self space to train detector[J];Journal of Computer Applications;2007-03
8 ZHENG Rui-juan,WANG Hui-qiang,PANG Yong-gang(School of Computer Science & Technology,Harbin Engineering University,Harbin Heilongjiang 150001,China);Study on Three-Net Paralleling of BMNSM[J];Application Research of Computers;2007-04
9 SHI Mai-qing;The Application of Immune Algorithm in Military Field[J];Sci-Tech Information Development & Economy;2009-02
10 CEN Jian1,2,SHAO Long-qiu3,4,ZHANG Qing-hua3,XU Bu-gong1(1.College of Automation,South China Technology University,Guangzhou 510640,China;2.College of Automation,Guangdong Polytechnic Normal University,Guangzhou 510635,China;3.College of Compurter and Electronic Information,Maoming University,Maoming 525000,China;4.College of Information and Engineering,Taiyuan Technology University,Taiyuan 030024,China);Fault Diagnosis Research of Rotating Machinery Based on Artificial Immunity[J];Coal Mine Machinery;2009-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved