Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Partner selection based on grey relational analysis and particle swarm optimization algorithm
HUANG Huiqun
Journal of Computer Applications    2015, 35 (4): 1045-1048.   DOI: 10.11772/j.issn.1001-9081.2015.04.1045
Abstract749)      PDF (492KB)(546)       Save

Concerning the slow searching, poor practicability and being difficult to get a perfectly reasonable options of the methods for solving the problem of cloud services partner selection, a new partner selection method was proposed based on grey relational analysis and Particle Swarm Optimization (PSO) algorithm. Firstly, grey relational analysis method was used to select evaluation indexs of cloud providers, then the weight of each index value was calculated. Secondly, the mathematical model of services partner selection problems in cloud environment was built, then it was solved by using PSO algorithm to find the best partners. Performance test results of specific application examples show that the proposed method is feasible and rational, and can select the best partners.

Reference | Related Articles | Metrics
Network intrusion detection based on particle swarm optimization algorithm and information gain
HUANG Huiqun SUN Hong
Journal of Computer Applications    2014, 34 (6): 1686-1688.   DOI: 10.11772/j.issn.1001-9081.2014.06.1686
Abstract218)      PDF (578KB)(413)       Save

In order to improve the detection accuracy of network intrusion, a network intrusion detection model named PSO-IG was proposed based on Particle Swarm Optimization (PSO) algorithm and Information Gain (IG). Firstly, PSO algorithm was used to eliminate redundant features of original network data, and then the weight values of selection features were obtained using IG, and Support Vector Machine (SVM) was used to establish intrusion detection model. Finally, the KDD CUP 99 dataset was used to test the performance of PSO-IG. The results show that the proposed model can eliminate redundant features and reduce the input dimension to improve the detection speed of network intrusion, and it can improve the network intrusion detection accuracy by reasonable selecting weight values.

Reference | Related Articles | Metrics