Download presentation
Presentation is loading. Please wait.
Published byJulie Franklin Modified over 9 years ago
1
1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology
2
2 Outline History Natural Immune System Artificial Immune System Application Experiment Result Reference
3
History Developed from the field of theoretical immunology in the mid 1980’s. 1990 – Bersini first use of immune algorithms to solve problems Forrest et al – Computer Security mid 1990’s Hunt et al, mid 1990’s – Machine learning 3
4
4 Basic Immunology
5
Role of the Immune System Protect our bodies from infection Primary immune response Launch a response to invading pathogens Secondary immune response Remember past encounters Faster response the second time around The IS is adaptable (presents learning and memory) 5
6
Where is it ? 6
7
Lymphocytes Carry antigen receptors that are specific They are produced in the bone marrow through random re- arrangement B and T Cells are the main actors of the adaptive immune system 7
8
B Cell Pattern Recognition B cells have receptors called antibodies The immune recognition is based on the complementarity between the binding region of the receptor and a portion of the antigen called the epitope. Recognition is not just by a single antibody, but a collection of them Learn not through a single agent, but multiple ones 8
9
T-cells Regulation of other cells Active in the immune response Helper T-cells Killer T-cells 9
10
Immune Responses 10
11
The Immune System models The are many different viewpoints These views are not mutually exclusive classical networkdanger 11
12
12 Artificial Immune Systems
13
Basic concepts trained detectors(artificial lymphocytes) that detect nonself patterns need a good repository of self patterns or self and non-self patterns to train ALCs to be self tolerant need to measure the affinity between an ALC and a pattern To be able to measure affinity, the representation of the patterns and the ALCs need to have the same structure The affinity between two ALCs needs to be measured memory that frequently detect non-self patterns When an ALC detects non-self patterns, it can be cloned and the clones can be mutated to have more diversity in the search space 13
14
AIS Framework 14 Algorithms Affinity Representation Application Solution AIS Shape-Space Binary Integer Real-valued Symbolic
15
Representation – Shape Space Used for modeling antibody and antigen Determine a measure to calculate affinity Hamming shape space(binary) 1 if Ab i != Ag i : 0 otherwise (XOR operator) 15
16
Representation Assume the general case: Ab = Ab1, Ab2,..., AbL Ag = Ag1, Ag2,..., AgL Binary representation Matching by bits Continuous (numeric) Real or Integer, typically Euclidian Symbolic (Categorical /nominal) E.g female or male of the attribute Gender. 16
17
AIS Framework 17 Algorithms Affinity Representation Application Solution AIS Euclidean Manhattan Hamming
18
Affinity Euclidean Manhattan Hamming 18
19
AIS Framework 19 Algorithms Affinity Representation Application Solution AIS Bone Marrow Models Negative Selection Clonal Selection Positive Selection Immune Network Models
20
Basic AIS Algorithm 20
21
Negative Selection Algorithms Forrest 1994: Idea taken from the negative selection of T- cells in the thymus Applied initially to computer security Split into two parts: Censoring Monitoring 21
22
All patterns and ALCs : as nominal valued attributes or as binary strings Affinity : r-continuous matching rule Training set : self patterns 22
23
Training ALCs with negative selection 23
24
Clonal Selection 24
25
Clonal Selection selection of a set of ALCs with the highest calculated affinity with a non-self pattern cloned and mutated compete with the existing set of ALCs to be exposed to the next non-self pattern Continuous (numeric) 25
26
ClONALG algorithm De Castro and Von presented CLONALG as an algorithm,2001 initially proposed to perform machine-learning pattern recognition Adapted to be applied to optimization problem 26
27
ClONALG algorithm main immune aspects taken into account to develop the algorithm maintenance of a specific memory set selection and cloning of the most stimulated Antibodies death of non-stimulated antibodies affinity maturation and re-selection of the clones proportionally to their antigenic affinity generation and maintenance of diversity 27
28
ClONALG All patterns in binary strings Training set : non-self patterns Affinity : Hamming distance, between ALC and non-self pattern Lower Hamming distance = stronger affinity Assumption : One memory ALC for each of the patterns that needs to be recognized in training set 28
29
ClONALG 29
30
CLONALG optimization case an objective function g( ⋅ ) must to be optimized (maximized or minimized) antibody affinity corresponds to the objective function each antibody Abi represents an element of the input space it is no longer necessary to maintain a separate memory set Ab 30
31
CLONALG optimization case 31
32
CLONALG optimization case 32
33
Immune Network Models The ALCs interact with each other to learn the structure of a non-self pattern The ALCs in a network co-stimulates and/or co-suppress each other to adapt to the non-self pattern The stimulation of an ALC based on the calculated affinity between the ALC and the non-self pattern the calculated affinity between the ALC and network ALCs as co-stimulation and/or co-suppression. 33
34
Artificial Immune Network Timmis and Neal,2000 Application clustering data visualization control optimization domains AINE defines the new concept of artificial recognition balls (ARBs) population of ARBs links between the ARBs a set of antigen training patterns Some clonal operations for learning 34
35
Artificial Immune Network 35
36
Artificial Immune Network all training patterns in set DT are presented to the set of ARBs After each iteration, each ARB calculates its stimulation level Allocates resources (i.e. B-Cells) based on its stimulation level as The stimulation level antigen stimulation network stimulation network suppression 36
37
Artificial Immune Network 37
38
Stimulation level 38
39
Resource allocation 39
40
Danger Theory Models distinguishes between what is dangerous and non- dangerous Include a signal to determine whether a non- self pattern is dangerous or not 40
41
An Adaptive Mailbox classifies interesting from uninteresting emails initialization phase (training) running phase (testing) 41
42
initialization phase 42
43
running phase
44
Application of AIS network intrusion and anomaly detection data classification models virus detection concept learning data clustering robotics pattern recognition and data mining optimization of multi-modal functions 44
45
PSO and AIS 45
46
PSO and AIS PSO performs about 56 percent faster than. AIS performs faster than PSO (about 14 percent) for simpler mathematical functions 46
47
Reference Computational Intelligence An introduction, Adndries P.Engelbrecht Learning and Optimization Using the Clonal Selection Principle, Leandro N. de Castro,,Fernando J. Von Zuben, IEEE,2002 A Comparative Analysis on the Performance of Particle Swarm Optimization and Artificial Immune Systems for Mathematical Test Functions, 1David F.W. Yap, 2S.P. Koh, 2S.K. Tiong,Australian Journal of Basic and Applied Sciences, 2009 47
48
48
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.