Font Size: a A A

The Research And Application On Artificial Immune System

Posted on:2005-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2168360125964556Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Artificial immune system (AIS) is an application oriented computation model, which is based on the theories and concepts of immunobiology. AIS academic researches mainly focus on network models and algorithms of artificial immune. AIS application researches mainly focus on computer network security and optimize computation, etc. The main works of this thesis include three following points. First, this thesis researches on the main idea of human immune system, and investigate the basic theory and concept of AIS. For an optimization problem, this thesis offers an improved algorithm related to immune vaccine. Second, this thesis proposed an explorative model of artificial immune system for network security. Third, this thesis develops a trial artificial immune system for network security, which used some new invasion detection technology.This thesis consists of six chapters. The first chapter widely investigates the definitions, histories, research fields, and application fields of AIS. The second chapter introduces frameworks and principles of human immune system and systematically narrates the basic theories, models, and algorithms of AIS, after. In the third chapter, the new improved immune algorithm is explored in theory. The problem of simulation test is Traveling Seller Problem. In the fourth chapter, there are a new model of artificial immune system for network security and some analysis about the model. The fifth chapter accomplishes a trial artificial immune system for network security based on the model in the forth chapter, in which a lot of invasion detection technologies employed. The sixth chapter reviews contributions of this thesis and prospects the future works about AIS.
Keywords/Search Tags:Artificial Immune System, Invasion Detection System, Immune Algorithm, Artificial Immune System for Network Security, TSP Problem
PDF Full Text Request
Related items