INTELLIGENT SIMULATION OF COMPLEX SYSTEMS USING IMMUCOMPUTING Svetlana P. Sokolova Ludmilla A. Sokolova St. Petersburg Institute for Informatics and Automation.

Slides:



Advertisements
Similar presentations
IEOR 4004: Introduction to Operations Research Deterministic Models January 22, 2014.
Advertisements

Dealing with Complexity Robert Love, Venkat Jayaraman July 24, 2008 SSTP Seminar – Lecture 10.
Face Recognition Face Recognition Using Eigenfaces K.RAMNATH BITS - PILANI.
Flow Charts, Loop Structures
Software Quality Ranking: Bringing Order to Software Modules in Testing Fei Xing Michael R. Lyu Ping Guo.
Decision Making: An Introduction 1. 2 Decision Making Decision Making is a process of choosing among two or more alternative courses of action for the.
SPREADSHEETS IN EDUCATION OF LOGISTICS MANAGERS AT FACULTY OF ORGANIZATIONAL SCIENCES: AN EXAMPLE OF INVENTORY DYNAMICS SIMULATION L. Djordjevic, D. Vasiljevic.
Introduction to Mechatronics and Mechatronics in Real Life Mariya Popovchenko 3 April 2006 JASS 2006, St. Petersburg.
Brian Merrick CS498 Seminar.  Introduction to Neural Networks  Types of Neural Networks  Neural Networks with Pattern Recognition  Applications.
CPE 412 SIMULATION and MODELING n Instructor: Dr. Mahmoud Alrefaei n Various notes and transparencies can be found on web page.
Lecture 10 Comparison and Evaluation of Alternative System Designs.
GAUSSIAN PROCESS REGRESSION FORECASTING OF COMPUTER NETWORK PERFORMANCE CHARACTERISTICS 1 Departments of Computer Science and Mathematics, 2 Department.
Use of GIS for Municipal Economic Development: An Example from Russia.
Oracle Demantra Overview & Utilization in a Demand Driven Supply Network Curtis Ardle February 22, 2008.
1.4 Financial Sector Trends: Cameroon AgriFin encourages use and distribution of its publications. Content from this toolkit may be used freely and copied.
Data Mining Techniques
Datta Meghe Institute of Management Studies Quantitative Techniques Unit No.:04 Unit Name: Time Series Analysis and Forecasting 1.
Presented By Wanchen Lu 2/25/2013
Loans and Investments Lesson 1.5.
Complete Coverage Path Planning Based on Ant Colony Algorithm International conference on Mechatronics and Machine Vision in Practice, p.p , Dec.
DSS Modeling Current trends – Multidimensional analysis (modeling) A modeling method that involves data analysis in several dimensions – Influence diagram.
Modeling.
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
1 1 Slide © 2005 Thomson/South-Western Slides Prepared by JOHN S. LOUCKS St. Edward’s University Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
1 1 Slide © 2007 Thomson South-Western. All Rights Reserved Chapter 13 Multiple Regression n Multiple Regression Model n Least Squares Method n Multiple.
Outline What Neural Networks are and why they are desirable Historical background Applications Strengths neural networks and advantages Status N.N and.
LECTURE 8-9. Course: “Design of Systems: Structural Approach” Dept. “Communication Networks &Systems”, Faculty of Radioengineering & Cybernetics Moscow.
EMIS 8381 – Spring Netflix and Your Next Movie Night Nonlinear Programming Ron Andrews EMIS 8381.
Bill Payment Optimization Algorithms. Purpose To find and/or construct algorithms that will optimize the decision process of paying bills from an account.
Jeff Howbert Introduction to Machine Learning Winter Regression Linear Regression.
Training Course on Basic Statistics for Research August 24-28, 2009 STATISTICAL RESEARCH AND TRAINING CENTER J and S Building, 104 Kalayaan Avenue, Diliman,
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Progress in identification of damping: Energy-based method with incomplete and noisy data Marco Prandina University of Liverpool.
Geoffrey Duval (ISAE-SUPAERO) Naples, October 1 st, 2012.
ACCOUNT OFFICER’S BASIC TRAINING
Term Paper Topics Quantitative Methods for Business Strayer University by Tristan Hübsch Quantitative Methods for Business Strayer University.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Chapter 7. Learning through Imitation and Exploration: Towards Humanoid Robots that Learn from Humans in Creating Brain-like Intelligence. Course: Robots.
MODELING AND ANALYSIS Pertemuan-4
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Design and Analysis of Algorithms (09 Credits / 5 hours per week) Sixth Semester: Computer Science & Engineering M.B.Chandak
Approaches to Selection and their Effect on Fitness Modelling in an Estimation of Distribution Algorithm A. E. I. Brownlee, J. A. McCall, Q. Zhang and.
Seungchan Lee Department of Electrical and Computer Engineering Mississippi State University RVM Implementation Progress.
Operations Research Models and Methods Advanced Operations Research Reference: Operations Research Models and Methods, Operations Research Models and Methods,
Financial Data mining and Tools CSCI 4333 Presentation Group 6 Date10th November 2003.
A Multiobjective Evolutionary Algorithm Using Gaussian Process based Inverse Modeling Ran Cheng 1, Yaochu Jin 1, Kaname Narukawa 2 and Bernhard Sendhof.
The article written by Boyarshinova Vera Scientific adviser: Eltyshev Denis THE USE OF NEURO-FUZZY MODELS FOR INTEGRATED ASSESSMENT OF THE CONDITIONS OF.
A Decision Support Based on Data Mining in e-Banking Irina Ionita Liviu Ionita Department of Informatics University Petroleum-Gas of Ploiesti.
Surface Defect Inspection: an Artificial Immune Approach Dr. Hong Zheng and Dr. Saeid Nahavandi School of Engineering and Technology.
Business Modeling Lecturer: Ing. Martina Hanová, PhD.
CLASSIFICATION OF ECG SIGNAL USING WAVELET ANALYSIS
An approach to Operations Research course in the curriculum for Informatics students KUŠEN EMA, PROF. DR. SC. MARINOVIĆ MARIJA DEPARTMENT OF INFORMATICS,
A Method to Approximate the Bayesian Posterior Distribution in Singular Learning Machines Kenji Nagata, Sumio Watanabe Tokyo Institute of Technology.
Prepared by Fayes Salma.  Introduction: Financial Tasks  Data Mining process  Methods in Financial Data mining o Neural Network o Decision Tree  Trading.
Fuzzy Systems Simulation Session 5
Memory Segmentation to Exploit Sleep Mode Operation
Saint- Petersburg State University of Aerospace Instrumentation
Bisection and Twisted SVD on GPU
Chapter 4 MATLAB Programming
Measurement of Operational Risk
Curriculum in Statistics at the University of Oviedo
Coding & Robots.
AI empowering business
The following slides are taken from:
Biointelligence Laboratory, Seoul National University
Introduction to Modeling
A Block Based MAP Segmentation for Image Compression
Research Institute for Future Media Computing
Immunocomputing and Artificial Immune Systems
Presentation transcript:

INTELLIGENT SIMULATION OF COMPLEX SYSTEMS USING IMMUCOMPUTING Svetlana P. Sokolova Ludmilla A. Sokolova St. Petersburg Institute for Informatics and Automation of RAS Kazan’, of February, 2008

WSC-6, of February, /24 Contents  IMMUNOCOMPUTING POSSIBILITIES  INDEX FORMAL IMMUNE NETWORK  MATHEMATICAL BASIS  APPLICATIONS OF THE IMMUNOCOMPUTING APPROACH

WSC-6, of February, /24 IMMUNOCOMPUTING POSSIBILITIES Immunocomputing represents a bridge between immunology and computer engineering, demonstrating how quantitative advancements in immunology can form the basis for a new computing paradigm Immunocomputing possibilities: capacity for memory the ability to learn and recognize, and make decisions in conditions of uncertainty and incomplete information an excellent information-processing model for designing a powerful computing system

WSC-6, of February, /24 RISK INDEX Indices reduce large quantities of variable data (uncertainty, multidimensional and so on) relating to a complex dynamic systems into a single value (Data Fusion) to achieve a solution to a practical problem Sometimes this is the only way to represent a system and predict risks and trends Risk Index is overall index indicating an irregular situation

WSC-6, of February, /24 FORMAL IMMUNE NETWORK STRUCTURE Index values given for training sample Training module «antibody» «antigen» Pattern recognition module «binding energy» Module of index coefficients optimization Calculating of index values Learning sample “immunization” Index coefficients

WSC-6, of February, /24 TRAINING MODULE Forming of training matrix Singular value decomposition Selection of vector for indices formation Selection of the most significant indices

WSC-6, of February, /24 MODULE OF INDEX COEFFICIENTS OPTIMIZATION Forming of index coefficients matrix Calculating of pseudo inverse matrix Calculating of optimal index coefficients Singular Value Decomposition

WSC-6, of February, /24 Basic Algorithm of Immunocomputing (in pseudo code) Learning // data mapping into FIN space { to receive a learning sample to form learning matrix to calculate SVD of the learning matrix //SVD–singular value decomposition// } Recognition // data classification in FIN { to receive a situation vector //pattern to map a vector in FIN space to find the closest FIN point to assign a vector the closest FIN point class }

WSC-6, of February, /24 Monitoring Plague problem

WSC-6, of February, /24 Plague Risk Index

WSC-6, of February, /24 The analysis of credit status of the borrower - its ability to pay off under the promissory notes completely and in time CREDIT RISK INDEX 1. Interval data: group1 client group2 2. Multidimensional data:

WSC-6, of February, /24 APPLICATION OF THE CREDIT RISK INDEX IndicatorEvaluation 1.Checking Account with Bank1 balance less or equal to zero 2 balance between DM 0 and DM more than DM 199 or used more than one year for regular salary payments 4 no such account with bank 2.Duration of Loan1 <= <... <= <... <= <... <= <... <= <... <= <... <= <... <= <... <= <... <= Foreign Worker1 Yes 2 No

WSC-6, of February, /24 RESULT

WSC-6, of February, /24 Conclusion Application of Immunocomputing approach significantly increases a potential of realization in real systems The considered technologies implementation to a broader problems class, including monitoring systems of various size and orientation

WSC-6, of February, /24 Thank for your attention