›› 2012, Vol. 42 ›› Issue (05): 1251-1256.

Previous Articles     Next Articles

Optimization algorithm for immune real-value detector generation

CHAI Zheng-yi1,2, WU Hui-xin3, WU-Yong1   

  1. 1. School of Information Science and Engineering, Hennan University of Technology, Zhengzhou 450001,China;
    2. School of Computer Science and Technology, Xidian University, Xi'an 710071, China;
    3. Department of Information Engineering, North China University of Water Conservancy & Electric Power, Zhengzhou 450001,China
  • Received:2011-04-20 Online:2012-09-01 Published:2012-09-01

Abstract: A new optimized detector generation algorithm is proposed to overcome the shortcomings of available real-value variable-radius detector generation algorithms. By statistic analysis of the detector generation, a hypothesis testing based detector generation process is proposed. The result of the hypothesis testing is taken as one of the control parameters to end the algorithm, thus, it can effectively avoid the generation of redundant detectors. Meanwhile, the algorithm makes full use of the distribution of self-space, optimizes the center position and expands the radius of the detectors in order to generate the detector with large coverage. The 2DSyntheticData, the actual Irish data set and biomedical data set are used to test the algorithm. Experiment results show that the algorithm performs very well that it improves the detection rate, reduces the number of required detectors.

Key words: computer systems organization, hypothesis testing, negative selection algorithm, detector, anomaly detection, detection performance

CLC Number: 

  • TP18
[1] 柴争义,王献荣,王亮.用于异常检测的实值否定选择算法[J].吉林大学学报:工学版,2012,42(1):176-181. Chai Zheng-yi, Wang Xian-rong, Wang Liang. Real-value negative selection algorithm for anomaly detection[J]. Journal of Jilin University(Engineering and Technology Edition),2012,42(1):176-181.
[2] Bereta M, Burczy'nski T. Comparing binary and real-valued coding in hybrid immune algorithm for feature selection and classification of ECG signals[J].Engineering Applications of Artificial Intelligence, 2008,20(5):571-585.
[3] Gonzalez F, Dasgupta D, Nino L F. A randomized real-valued negative selection algorithm//ICARIS 2003, Edinburgh, UK, 2007: 376-383.
[4] Zhang Feng-bin, Wang Da-wei, Wang Sheng-wen. A self region based real-valued negative selection algorithm[J].Journal of Harbin Institute of Technology, 2009,15(6):851-855.
[5] Zhou Ji, Dasgupta D. Real-valued negative selection algorithm with variable-sized detectors//Proceedings of GECCO, LNCS 3102. Berlin: Springer, 2008: 287-298.
[6] Chmielewski A, Wierzcho S T. V-detector algorithm with tree-based structures//Proccedings of the International Conference on Computer Science and Information Technology. Wisa, Poland, 2009:9-14.
[7] Zeng Jin-quan, Liu Xiao-jie, Li Tao. A self-adaptive negative selection algorithm used for anomaly detection[J].Progress in Natural Science,2009,19(2),261-266.
[8] Wang Yu-jian, Luo Wen-jian. PTS-RNSA: A novel detector generation algorithm for real-valued negative selection algorithm//2010 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing.USA,IEEE Press, 2010:61-66.
[9] Balachandran S, Dasgupta D, Nino L F, et al. A general framework for evolving multi-shaped detectors in negative selection//Proc of the 2009 IEEE Symposium Series on Foundations of Computational Intelligence, FOCI-2008. Honolulu, Hawaii, 2009:401-408.
[10] Zhou Ji, Dasgupta D. An efficient negative selection algorithm with probably adequate detector coverage[J].Information Sciences, 2009,17(9):1390-1406.
[11] 盛骤,谢式千,潘承毅.概率论与数理统计[M].北京:高等教育出版社,2005.
[12] 史宁中.统计检验的理论与方法[M].北京:科学出版社,2010.
[13] Columbia University. 2DSyntheticData.. http://www. zhouji. net/prof/2DSyntheticData.zip.
[14] StatLib Datasets Archive. http://lib.stat.cmu.edu//dataset. 2010-04-12.
[15] 刘大有,谷方明,王生生.基于人工免疫核聚类的支持向量数据描述方法[J].吉林大学学报:工学版,2011,41(5):1369-1373. Liu Da-you, Gu Fang-ming, Wang Sheng-sheng. Support vector data description based on artificial immune kernel clustering[J].Journal of Jilin University(Engineering and Technology Edition),2011,41(5):1369-1373.
[1] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[2] LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[3] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[4] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[5] CAI Hua, CHEN Guang-qiu, LIU Guang-wen, CHENG Shuai, YU Hua-dong. Novelty fragments-based target tracking with multiple instance learning under occlusions [J]. 吉林大学学报(工学版), 2017, 47(1): 281-287.
[6] YU He, QIN Gui-he, SUN Ming-hui, YAN Xin, WANG Xuan-zhe. Cyber security and anomaly detection method for in-vehicle CAN [J]. 吉林大学学报(工学版), 2016, 46(4): 1246-1253.
[7] WANG Yu-lei, ZHAO Chun-hui, QI Bin. Hyperspectral anomaly detection algorithm based on spectral similarity scale [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 148-153.
[8] PANG Hai-yang, LIU Kai-long, WANG Yan-fei. A camouflage effectiveness assessing method based on hypothesis testing and the characteristic of SAR image [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 313-316.
[9] ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340.
[10] WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363.
[11] WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367.
[12] LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242.
[13] LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250.
[14] LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing. Format-preserving encryption for variable-length encoding character data [J]. , 2012, 42(05): 1257-1261.
[15] QU Zhi-guo, WANG Ping, GAO Ying-hui, WANG Peng, SHEN Zhen-kang, LI Jiang. Edge detection based on feature fusion of USAN area [J]. , 2012, (03): 759-765.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!