APPLICATION OF THE METHOD AND COMBINED ALGORITHM ON THE BASIS OF IMMUNE NETWORK AND NEGATIVE SELECTION FOR IDENTIFICATION OF TURBINE ENGINE SURGING Lytvynenko.

Slides:



Advertisements
Similar presentations
Estimating the detector coverage in a negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital Dipankar Dasgupta The University of Memphis.
Advertisements

Negative Selection Algorithms at GECCO /22/2005.
V-Detector: A Negative Selection Algorithm Zhou Ji, advised by Prof. Dasgupta Computer Science Research Day The University of Memphis March 25, 2005.
Applications of one-class classification
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Data Mining Classification: Alternative Techniques
2 – In previous chapters: – We could design an optimal classifier if we knew the prior probabilities P(wi) and the class- conditional probabilities P(x|wi)
Fundamentals of Data Analysis Lecture 12 Methods of parametric estimation.
1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.
Data preprocessing before classification In Kennedy et al.: “Solving data mining problems”
Anomaly Detection in Data Docent Xiao-Zhi Gao
Artificial Immune Systems Andrew Watkins. Why the Immune System? Recognition –Anomaly detection –Noise tolerance Robustness Feature extraction Diversity.
Simple Neural Nets For Pattern Classification
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Evolutionary Feature Extraction for SAR Air to Ground Moving Target Recognition – a Statistical Approach Evolving Hardware Dr. Janusz Starzyk Ohio University.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
1 Negative selection algorithms: from the thymus to V-detector Dissertation defense Zhou Ji Major professor: Prof. Dasgupta Advisory committee: Dr. Lin,
Introduction to Machine Learning course fall 2007 Lecturer: Amnon Shashua Teaching Assistant: Yevgeny Seldin School of Computer Science and Engineering.
Pattern Recognition. Introduction. Definitions.. Recognition process. Recognition process relates input signal to the stored concepts about the object.
Collaborative Signal Processing CS 691 – Wireless Sensor Networks Mohammad Ali Salahuddin 04/22/03.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Methods and Philosophy of Statistical Process Control
On the Application of Artificial Intelligence Techniques to the Quality Improvement of Industrial Processes P. Georgilakis N. Hatziargyriou Schneider ElectricNational.
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
EE513 Audio Signals and Systems Statistical Pattern Classification Kevin D. Donohue Electrical and Computer Engineering University of Kentucky.
Distributed Network Intrusion Detection An Immunological Approach Steven Hofmeyr Stephanie Forrest Patrik D’haeseleer Dept. of Computer Science University.
ASK Labs Company We help machines make decisions.
Attention Deficit Hyperactivity Disorder (ADHD) Student Classification Using Genetic Algorithm and Artificial Neural Network S. Yenaeng 1, S. Saelee 2.
Effect of Mutual Coupling on the Performance of Uniformly and Non-
A Genetic Algorithms Approach to Feature Subset Selection Problem by Hasan Doğu TAŞKIRAN CS 550 – Machine Learning Workshop Department of Computer Engineering.
Isolated-Word Speech Recognition Using Hidden Markov Models
Machine Vision for Robots
Automatically Identifying Localizable Queries Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang-hyun Intelligent Database.
Presented by Tienwei Tsai July, 2005
Lecture 12 Statistical Inference (Estimation) Point and Interval estimation By Aziza Munir.
ArrayCluster: an analytic tool for clustering, data visualization and module finder on gene expression profiles 組員:李祥豪 謝紹陽 江建霖.
We introduce the use of Confidence c as a weighted vote for the voting machine to avoid low confidence Result r of individual expert from affecting the.
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
DIGITAL IMAGE PROCESSING Dr J. Shanbehzadeh M. Hosseinajad ( J.Shanbehzadeh M. Hosseinajad)
NEURAL NETWORKS FOR DATA MINING
1 A method of successive elimination of spurious arguments for effective solution the search- based modelling tasks Oleksandr Samoilenko, Volodymyr Stepashko.
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
Image Registration as an Optimization Problem. Overlaying two or more images of the same scene Image Registration.
Effect of Modified Permutation Encoding Mutation in Genetic Algorithm Sandeep Bhowmik Archana Jha Sukriti Sinha Department of Computer Science & Engineering,
Genetic Algorithms. Evolutionary Methods Methods inspired by the process of biological evolution. Main ideas: Population of solutions Assign a score or.
Optimal Paralleling for Solving Combinatorial Modelling Problems Volodymyr Stepashko, and Serhiy Yefimenko International Research and Training Centre of.
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Supervised Learning Resources: AG: Conditional Maximum Likelihood DP:
STATISTICS AND OPTIMIZATION Dr. Asawer A. Alwasiti.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
Chapter 20 Classification and Estimation Classification – Feature selection Good feature have four characteristics: –Discrimination. Features.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
1 Random Disambiguation Paths Al Aksakalli In Collaboration with Carey Priebe & Donniell Fishkind Department of Applied Mathematics and Statistics Johns.
November 21, 2013Computer Vision Lecture 14: Object Recognition II 1 Statistical Pattern Recognition The formal description consists of relevant numerical.
INTELLIGENT SIMULATION OF COMPLEX SYSTEMS USING IMMUCOMPUTING Svetlana P. Sokolova Ludmilla A. Sokolova St. Petersburg Institute for Informatics and Automation.
Soft Computing Lecture 15 Constructive learning algorithms. Network of Hamming.
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
Presentation By SANJOG BHATTA Student ID : July 1’ 2009.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
Research Methodology Proposal Prepared by: Norhasmizawati Ibrahim (813750)
Supervised Learning – Network is presented with the input and the desired output. – Uses a set of inputs for which the desired outputs results / classes.
Fundamentals of Data Analysis Lecture 11 Methods of parametric estimation.
Introduction to Machine Learning, its potential usage in network area,
Data Transformation: Normalization
A Signal Processing Approach to Vibration Control and Analysis with Applications in Financial Modeling By Danny Kovach.
Automatic Picking of First Arrivals
EE513 Audio Signals and Systems
Random Neural Network Texture Model
Immunocomputing and Artificial Immune Systems
Presentation transcript:

APPLICATION OF THE METHOD AND COMBINED ALGORITHM ON THE BASIS OF IMMUNE NETWORK AND NEGATIVE SELECTION FOR IDENTIFICATION OF TURBINE ENGINE SURGING Lytvynenko Volodymyr KHERSON NATIONAL TECHNICAL UNIVERSITY Ukraine

2 Contents: I. Problem statement 1.1 Turbine engine surging 1.2 How it is possible to minimized consequences Surging gas turbine engine (GTE)? 1.3 What are used now methods of the decision of the given problem? 1.3 What are used now methods of the decision of the given problem? II. Solving of the problem 2.1. Use of artificial immune systems 2.1. Use of artificial immune systems - Algorithm of negative selection - Algorithm of negative selection - Problems of use of algorithm of negative selection - Problems of use of algorithm of negative selection 2.2. The decision of problems of algorithm of negative selection 2.2. The decision of problems of algorithm of negative selection - Artificial immune network - Artificial immune network - Adaptation of detectors - Adaptation of detectors - The developed combined algorithm - The developed combined algorithm III. Experiments III. Experiments 3.1. The first experiment 3.1. The first experiment 3.2. The second experiment 3.2. The second experiment 3.3. The third experiment 3.3. The third experiment IV. Current researches V. The future researches VI. Conclusion.

3 I. Problem statement

4 1.1 Turbine engine surging In the given report the algorithm of definition turbine engine surging is offered What is Surging ? Surging (fr.: “pompage”) is stalled operating mode of aviation gas turbine engine (GTE), infringement of its gas-dynamic stability of functioning accompanied by claps, sharp decrease of thrust and powerful vibrations which are capable to destroy the engine 1.2 How it is possible to minimized consequences Surging gas turbine engine (GTE)? Prevention of the coming surging demands a possibility of forecasting of approaching to these modes and their instant registration. 1.3 What are used now methods of the decision of the given problem?  Method Fourier transform  Wavelet-analysis  Neural networks  Robust statistics

5 II. Solving of the problem

6 Our decision of a problem 1. To use for the decision of the given problem artificial immune systems 2. To examine the decision of the given problem as a task of detection of anomalies We examine anomaly as a status of system which is not compatible to normal behavior of this system. According to this, an anomaly detection system will perform a continuous monitoring of the system and an explicit classification of each state as normal or abnormal.

Use of artificial immune systems

8 What methods the given problem by means of artificial immune systems dares? For the decision of the given problem methods based on algorithm of negative selection are used. For the decision of the given problem methods based on algorithm of negative selection are used.

9 Algorithm of negative selection

10 Algorithm of negative selection Formally it is possible to present algorithm of negative selection in the form of expression: Formally it is possible to present algorithm of negative selection in the form of expression:

11 In what an essence of algorithm of negative selection? 1. Initialization: randomly generate strings and place them in a set P of immature T-cells, Assume all molecules (receptors and self-peptides) represented as binary strings of same length L; 2. Affinity evaluation: determine the affinity of all T-cells in V with all elements of the self set S; 3. Generation of the available repertoire: if the affinity of an immature T –cell (element of P) with at least one self- peptide is greater than or equal to a give cross reactive threshold, then the T-cell recognizes this self-peptide and has to be eliminated (negative selection); else the T-cell is introduced into the available repertoire A. The process of generating the available repertoire in the negative selection algorithm was termed censoring phase by the authors. The algorithm is also composed of a monitoring phase. In the monitoring phase, a set S* of protected strings is matched against the elements of the available repertoire A. The set S* might be the own set S, a completely new set, or composed of elements of S. If recognition occurs, then a non-self pattern (string) is detected. The negative selection algorithm suggests the random generation of strings, until an available repertoire A of appropriate size is generated. This approach could be adopted in both algorithms. Even the random generation of the repertoire P results in algorithms with some drawbacks. First, this approach results in an exponential cost to generate the available repertoire A in relation to the number of self strings in S. Second, randomly generating P does not account for any adaptability in the algorithm and neither any information contained in the set S.

12 Graphic representation of objects of algorithm U – universum and set S of vectors which are classified as “Self”, and S  U U – universum and set S of vectors which are classified as “Self”, and S  U

13 Problems of use of algorithm of negative selection

14 Limitation of algorithm of negative selection Casual generation of detectors does not give possibility to define their is minimum necessary quantity, sufficient for a covering of all set of "Non-Self“ Casual generation of detectors does not give possibility to define their is minimum necessary quantity, sufficient for a covering of all set of "Non-Self“ High probability of education of "cavities" that worsens quality of recognition since "cavities" are areas in space of "Non-Self" which are not recognized by any of detectors High probability of education of "cavities" that worsens quality of recognition since "cavities" are areas in space of "Non-Self" which are not recognized by any of detectors Generation too a considerable quantity of detectors essentially slows down a recognition phase since any entering image is necessary for comparing to each of the created detectors Generation too a considerable quantity of detectors essentially slows down a recognition phase since any entering image is necessary for comparing to each of the created detectors

The decision of problems of algorithm of negative selection

16 What it is necessary to make to eliminate limitations of this algorithm? We have set for ourselves a problem to improve a method of generation of detectors which is applied at training of algorithm of negative selection which is capable is adaptive to select their options, quantity and an arrangement in phase space of an investigated signal We have set for ourselves a problem to improve a method of generation of detectors which is applied at training of algorithm of negative selection which is capable is adaptive to select their options, quantity and an arrangement in phase space of an investigated signal

17 How we suggest to solve the given problem? We offer at generation of detectors for their adaptive and options, and also definitions of their optimum quantity and an arrangement in phase space of an investigated signal to use an artificial immune network. We offer at generation of detectors for their adaptive and options, and also definitions of their optimum quantity and an arrangement in phase space of an investigated signal to use an artificial immune network.

18 Artificial immune network

19 What is the artificial immune network?

20 Artificial immune network Initial data (antigenes) Network generation Network activation Network compression Memory formation The trained network

21 Adaptation of detectors

22 Adaptation of detectors of an immune network for a problem of negative selection 1. Representation of an individual (antibody): 2. Population of antigenes: Set of vectors of the training image representing a phase portrait of a normal signal in k-dimensional space Ab Ag

23 Adaptation of detectors of an immune network for a problem of negative selection 3. Calculation of affinity "antibody-antigene": - Euclidean distance - The parameter defining the importance cross-reactivity a threshold r  min

24 Adaptation of detectors of an immune network for a problem of negative selection 4. Calculation of affinity "antibody-antibody": Depending on value f Ab-Ab following situations are possible:

25 The developed combined algorithm

26 THE GENERALIZED SCHEME OF THE COMBINED NEGATIVE SELECTION ALGORITHM AND AN IMMUNE NETWORK

27 III. Experiments

28 Experimental researches 1 Signal without anomalies (a training signal)Phase portrait of a training signal (yt, yt+1) Results of learning AIS Training sample of 200 points. The size of a window = 2 k r = 0.01k r = 0.1 Less steady decision Steadier decision Class «Self»

29 Experimental researches 1 Signal with anomaly (a test signal)Phase portrait of a test signal Results of testing Anomaly deviations on a phase portrait are observed It is recognized by 5th detectors It is recognized by 3th detectors The histogram of the found out anomaly (activation of detectors)

30 Experimental researches 2 (Anomaly of parametre) Investigated signal: Normal signal : = 4.0 Training data: Test data: Anomaly of parametre ( = 3.6 ), data: Structure trained AIS Activation of detectors in a place of occurrence of anomaly

31 IDENTIFICATION OF TURBINE ENGINE SURGING For the third experiment the data have been used received on the test bed for the aviation gas turbine engine. The data represent four time series (Vk_3, Vk_P, Vv_3, Vv_P); the signals received from gauges of vibration of support on which the engine has been fixed. Experimental researches 3 IDENTIFICATION OF TURBINE ENGINE SURGING For the third experiment the data have been used received on the test bed for the aviation gas turbine engine. The data represent four time series (Vk_3, Vk_P, Vv_3, Vv_P); the signals received from gauges of vibration of support on which the engine has been fixed. The graphs of time series, representing the vibration

32 Structure of the trained immune network for various values

33 THE HISTOGRAMS OF DETECTORS ACTIVATION

IV. Current researches : A Hardware-Based realizations of the developed algorithm

35

36

37 V. The future researches and development In the further researches we plan: 1. To carry out comparative researches at the decision of the given problem with such methods as Method Fourier transform, the Analysis of a small wave, the Neural networks, the Steady statistics. 2. To investigate identification possibility turbine engine surging on other parameters. 3. To investigate possibility of the forecast on approximating wavelets-coefficients. 4. To unite the given algorithm with the Bayes network

38 VI. Conclusion 1. The algorithm using mechanisms of artificial immune networks for the decision of a problem of detection of anomalies by a method of negative selection is developed 2. Distinctive feature of algorithm is updating of process of training thanks to which possibility of adaptive selection of options is realized, quantities and arrangements of detectors 3.The experimental study has shown a high efficiency of the offered algorithm which is linked to its computing stability thanks to adaptive selection of the cross-reactive threshold. Also optimality is achieved owing to adaptive adjustment of the size of an immune network, i.e. quantity of necessary detectors; high accuracy of detecting is shown, owing to reduction of quantity and the sizes of "cavities" created. 4.To compare the results of the algorithm an exact benchmark diagnostics was used, supported by experts. Results of diagnostics testify to affinity of the estimates produced by the experts, and the estimates generated by means of the method and algorithm developed.

39 Thanks for attention!