Augmented Negative Selection Algorithm with Variable-Coverage Detectors Zhou Ji, Zhou Ji, St. Jude Childrens Research Hospital Dipankar Dasgupta, Dipankar.

Slides:



Advertisements
Similar presentations
High Resolution studies
Advertisements

Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Números.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
PDAs Accept Context-Free Languages
Precise Interprocedural Analysis using Random Interpretation Sumit Gulwani George Necula UC-Berkeley.
/ /17 32/ / /
EuroCondens SGB E.
Worksheets.
Applicability Issues of the (Real-valued) Negative Selection Algorithms Zhou Ji, Dipankar Dasgupta The University of Memphis GECCO 2006: July 11, 2006.
10/14/20051 Dissertation Proposal Negative selection algorithms: from the thymus to V-detector Zhou Ji, advised by Prof. Dasgupta.
V-detector: a real-valued negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital.
Analysis of Dental Images using Artificial Immune Systems Zhou Ji 1, Dipankar Dasgupta 1, Zhiling Yang 2 & Hongmei Teng 1 1: The University of Memphis.
Estimating the detector coverage in a negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital Dipankar Dasgupta The University of Memphis.
Negative Selection Algorithms at GECCO /22/2005.
V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.
Real-valued negative selection algorithms Zhou Ji
Applications of one-class classification
1 When you see… Find the zeros You think…. 2 To find the zeros...
Whiteboardmaths.com © 2004 All rights reserved
Lecture 2 ANALYSIS OF VARIANCE: AN INTRODUCTION
Lecture 7 POWER IN STATISTICAL TESTING
Probability Distributions
Object Recognition Using Locality-Sensitive Hashing of Shape Contexts Andrea Frome, Jitendra Malik Presented by Ilias Apostolopoulos.
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
Sampling in Marketing Research
The basics for simulations
Samples The means of these samples
MM4A6c: Apply the law of sines and the law of cosines.
Network TV Scatter vs. Spot TV Cost Comparison A25-54 CPMs Q Q TVB Analysis of SQAD National and Local Market Cost Estimate Data 1 Updated.
Figure 3–1 Standard logic symbols for the inverter (ANSI/IEEE Std
Online Algorithm Huaping Wang Apr.21
Measuring Personal Growth Attributed to Multicultural Education Constructs Personal Growth Positive psychological changes during time period of interest.
Statistics Review – Part I
Sprayer Economics Gary Schnitkey University of Illinois.
Chapter 1: Expressions, Equations, & Inequalities
“Students” t-test.
1 Termination and shape-shifting heaps Byron Cook Microsoft Research, Cambridge Joint work with Josh Berdine, Dino Distefano, and.
Artificial Intelligence
Before Between After.
Subtraction: Adding UP
Group Meeting Presented by Wyman 10/14/2006
Static Equilibrium; Elasticity and Fracture
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Resistência dos Materiais, 5ª ed.
Lial/Hungerford/Holcomb/Mullins: Mathematics with Applications 11e Finite Mathematics with Applications 11e Copyright ©2015 Pearson Education, Inc. All.
January Structure of the book Section 1 (Ch 1 – 10) Basic concepts and techniques Section 2 (Ch 11 – 15): Inference for quantitative outcomes Section.
Evolving Edge detection Final project by Rubshtein Andrey ( )
2007 COOPERATIVE INSTITUTIONAL RESEARCH PROGRAM (CIRP) First-Year Student Survey Profile Administered August 2007 West Chester University of Pennsylvania.
A Plot for Visualizing Multivariate Data Rida E. A. Moustafa George Mason University ADM Group,AAL
Relevant characteristics extraction from semantically unstructured data PhD title : Data mining in unstructured data Daniel I. MORARIU, MSc PhD Supervisor:
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Anomaly Detection in Data Docent Xiao-Zhi Gao
Self Organizing Maps. This presentation is based on: SOM’s are invented by Teuvo Kohonen. They represent multidimensional.
Some Technical Considerations In negative selection algorithms 4/15/2005.
1 Negative selection algorithms: from the thymus to V-detector Dissertation defense Zhou Ji Major professor: Prof. Dasgupta Advisory committee: Dr. Lin,
Artificial Immune Systems Our body’s immune system is a perfect example of a learning system. It is able to distinguish between good cells and potentially.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
1 Probabilistic Formulation for Skin Detection Sanun Srisuk Seminar I.
Results Comparison with existing approaches on benchmark datasets Evaluation on a uveal melanoma datasetEvaluation on the two-spiral dataset Evaluation.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
A Simple Method to Extract Fuzzy Rules by Measure of Fuzziness Jieh-Ren Chang Nai-Jian Wang.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 2005.ACM GECCO.8.Discriminating and visualizing anomalies.
Classifier Representation in LCS
Chapter 18 From Data to Knowledge
Machine Learning Dr. Mohamed Farouk.
Introduction.
Presentation transcript:

Augmented Negative Selection Algorithm with Variable-Coverage Detectors Zhou Ji, Zhou Ji, St. Jude Childrens Research Hospital Dipankar Dasgupta, Dipankar Dasgupta, The University of Memphis CEC June 20-23, Portland, Oregon.

Introduction AIS – Artificial Immune Systems AIS – Artificial Immune Systems Major types of AIS: Major types of AIS: Negative selection Negative selection Immune networks Immune networks Clonal Selection Clonal Selection Matching rule is one of the most important components in a negative or positive selection algorithm. Matching rule is one of the most important components in a negative or positive selection algorithm.

Introduction (continued) matching rules For binary representation: For binary representation: rcb (r-contiguous bits), rcb (r-contiguous bits), r-chunks, r-chunks, Hamming distance Hamming distance For real-valued representation: For real-valued representation: Usually based on Euclidean distance or other distance measures Usually based on Euclidean distance or other distance measures

Introduction (continued) By allowing the detectors to have some variable properties, V-detector enhances negative selection algorithm from several aspects: By allowing the detectors to have some variable properties, V-detector enhances negative selection algorithm from several aspects: It takes fewer large detectors to cover non-self region – saving time and space It takes fewer large detectors to cover non-self region – saving time and space Small detector covers holes better. Small detector covers holes better. Coverage is estimated when the detector set is generated. Coverage is estimated when the detector set is generated. The shapes of detectors or even the types of matching rules can be extended to be variable too. The shapes of detectors or even the types of matching rules can be extended to be variable too.

Comparison of constant-sized detectors and variable-sized detectors Constant-sized detectors Variable-sized detectors

Algorithm (training stage) Generation of constant-sized detectors Generation of variable-sized detectors

Outline of the algorithm (generation of variable-sized detector set)

Screenshots of the software Message view Visualization of data points and detectors

Experiments and Results Synthetic Data Synthetic Data 2D. Training data are randomly chosen from the normal region. 2D. Training data are randomly chosen from the normal region. Fishers Iris Data Fishers Iris Data One of the three types is considered as normal. One of the three types is considered as normal. Biomedical Data Biomedical Data Abnormal data are the medical measures of disease carrier patients. Abnormal data are the medical measures of disease carrier patients. Pollution Data Pollution Data Abnormal data are made by artificially altering the normal air measurements Abnormal data are made by artificially altering the normal air measurements

Synthetic data - Cross-shaped self space Shape of self region and example detector coverage (a) Actual self space (b) self radius = 0.05 (c) self radius = 0.1

Synthetic data - Cross-shaped self space Results Detection rate and false alarm rateNumber of detectors

Error rates

Synthetic data - Ring-shaped self space Shape of self region and example detector coverage (a) Actual self space (b) self radius = 0.05 (c) self radius = 0.1

Synthetic data - Ring-shaped self space Results Detection rate and false alarm rateNumber of detectors

Iris data Comparison with other methods: performance Detection rateFalse alarm rate Setosa 100%MILA NSA (single level)100 0 V-detector Setosa 50%MILA NSA (single level) V-detector Versicolor 100%MILA NSA (single level) V-detector Versicolor 50%MILA NSA (single level) V-detector Virginica 100%MILA NSA (single level) V-detector Virginica 50%MILA NSA (single level) V-detector

Iris data Comparison with other methods: number of detectors meanmaxMinSD Setosa 100% Setosa 50% Veriscolor 100% Versicolor 50% Virginica 100% Virginica 50%

Iris Data Virginica as normal, 50% points used to train Detection rate and false alarm rateNumber of detectors

Biomedical data Blood measure for a group of 209 patients Blood measure for a group of 209 patients Each patient has four different types of measurement Each patient has four different types of measurement 75 patients are carriers of a rare genetic disorder. Others are normal. 75 patients are carriers of a rare genetic disorder. Others are normal.

Biomedical data Detection rate and false alarm rateNumber of detectors

Air pollution data Totally 60 original records. Totally 60 original records. Each is 16 different measurements concerning air pollution. Each is 16 different measurements concerning air pollution. All the real data are considered as normal. All the real data are considered as normal. More data are made artificially: More data are made artificially: 1. Decide the normal range of each of 16 measurements 2. Randomly choose a real record 3. Change three randomly chosen measurements within a larger than normal range 4. If some the changed measurements are out of range, the record is considered abnormal; otherwise they are considered normal Totally 1000 records including the original 60 are used as test data. The original 60 are used as training data. Totally 1000 records including the original 60 are used as test data. The original 60 are used as training data.

Pollution data Detection rate and false alarm rateNumber of detectors

Conclusion V-detectors advantages: V-detectors advantages: 1. Fewer detectors to achieve similar or better coverage. 2. Smaller detectors can be used when necessary. 3. Coverage estimate is included automatically. Future work: Future work: Variable shape of detectors, variable matching rules Variable shape of detectors, variable matching rules More analysis More analysis