Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

Similar presentations

Presentation on theme: "1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology."— Presentation transcript:

1 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology

2 2 Outline  History  Natural Immune System  Artificial Immune System  Application  Experiment Result  Reference

3 History  Developed from the field of theoretical immunology in the mid 1980’s.  1990 – Bersini first use of immune algorithms to solve problems  Forrest et al – Computer Security mid 1990’s  Hunt et al, mid 1990’s – Machine learning 3

4 4 Basic Immunology

5 Role of the Immune System  Protect our bodies from infection  Primary immune response Launch a response to invading pathogens  Secondary immune response Remember past encounters Faster response the second time around  The IS is adaptable (presents learning and memory) 5

6 Where is it ? 6

7 Lymphocytes  Carry antigen receptors that are specific They are produced in the bone marrow through random re- arrangement  B and T Cells are the main actors of the adaptive immune system 7

8 B Cell Pattern Recognition  B cells have receptors called antibodies  The immune recognition is based on the complementarity between the binding region of the receptor and a portion of the antigen called the epitope.  Recognition is not just by a single antibody, but a collection of them Learn not through a single agent, but multiple ones 8

9 T-cells  Regulation of other cells  Active in the immune response Helper T-cells Killer T-cells 9

10 Immune Responses 10

11 The Immune System models The are many different viewpoints These views are not mutually exclusive classical networkdanger 11

12 12 Artificial Immune Systems

13 Basic concepts  trained detectors(artificial lymphocytes) that detect nonself patterns  need a good repository of self patterns or self and non-self patterns to train ALCs to be self tolerant  need to measure the affinity between an ALC and a pattern  To be able to measure affinity, the representation of the patterns and the ALCs need to have the same structure  The affinity between two ALCs needs to be measured  memory that frequently detect non-self patterns  When an ALC detects non-self patterns, it can be cloned and the clones can be mutated to have more diversity in the search space 13

14 AIS Framework 14 Algorithms Affinity Representation Application Solution AIS Shape-Space Binary Integer Real-valued Symbolic

15 Representation – Shape Space  Used for modeling antibody and antigen  Determine a measure to calculate affinity  Hamming shape space(binary)  1 if Ab i != Ag i : 0 otherwise (XOR operator) 15

16 Representation  Assume the general case:  Ab =  Ab1, Ab2,..., AbL   Ag =  Ag1, Ag2,..., AgL   Binary representation Matching by bits  Continuous (numeric) Real or Integer, typically Euclidian  Symbolic (Categorical /nominal) E.g female or male of the attribute Gender. 16

17 AIS Framework 17 Algorithms Affinity Representation Application Solution AIS Euclidean Manhattan Hamming

18 Affinity  Euclidean  Manhattan  Hamming 18

19 AIS Framework 19 Algorithms Affinity Representation Application Solution AIS Bone Marrow Models Negative Selection Clonal Selection Positive Selection Immune Network Models

20 Basic AIS Algorithm 20

21 Negative Selection Algorithms  Forrest 1994: Idea taken from the negative selection of T- cells in the thymus  Applied initially to computer security  Split into two parts: Censoring Monitoring 21

22  All patterns and ALCs : as nominal valued attributes or as binary strings  Affinity : r-continuous matching rule  Training set : self patterns 22

23 Training ALCs with negative selection 23

24 Clonal Selection 24

25 Clonal Selection  selection of a set of ALCs with the highest calculated affinity with a non-self pattern  cloned and mutated  compete with the existing set of ALCs  to be exposed to the next non-self pattern Continuous (numeric) 25

26 ClONALG algorithm  De Castro and Von presented CLONALG as an algorithm,2001  initially proposed to perform machine-learning pattern recognition  Adapted to be applied to optimization problem 26

27 ClONALG algorithm  main immune aspects taken into account to develop the algorithm maintenance of a specific memory set selection and cloning of the most stimulated Antibodies death of non-stimulated antibodies affinity maturation and re-selection of the clones proportionally to their antigenic affinity generation and maintenance of diversity 27

28 ClONALG  All patterns in binary strings  Training set : non-self patterns  Affinity : Hamming distance, between ALC and non-self pattern  Lower Hamming distance = stronger affinity  Assumption : One memory ALC for each of the patterns that needs to be recognized in training set 28

29 ClONALG 29

30 CLONALG optimization case  an objective function g( ⋅ ) must to be optimized (maximized or minimized)  antibody affinity corresponds to the objective function  each antibody Abi represents an element of the input space  it is no longer necessary to maintain a separate memory set Ab 30

31 CLONALG optimization case 31

32 CLONALG optimization case 32

33 Immune Network Models  The ALCs interact with each other to learn the structure of a non-self pattern  The ALCs in a network co-stimulates and/or co-suppress each other to adapt to the non-self pattern  The stimulation of an ALC based on the calculated affinity between the ALC and the non-self pattern the calculated affinity between the ALC and network ALCs as co-stimulation and/or co-suppression. 33

34 Artificial Immune Network  Timmis and Neal,2000  Application  clustering  data visualization  control  optimization domains  AINE defines the new concept of artificial recognition balls (ARBs) population of ARBs links between the ARBs a set of antigen training patterns Some clonal operations for learning 34

35 Artificial Immune Network 35

36 Artificial Immune Network  all training patterns in set DT are presented to the set of ARBs  After each iteration, each ARB calculates its stimulation level Allocates resources (i.e. B-Cells) based on its stimulation level as  The stimulation level antigen stimulation network stimulation network suppression 36

37 Artificial Immune Network 37

38 Stimulation level  38

39 Resource allocation 39

40 Danger Theory Models  distinguishes between what is dangerous and non- dangerous  Include a signal to determine whether a non- self pattern is dangerous or not 40

41 An Adaptive Mailbox  classifies interesting from uninteresting emails  initialization phase (training)  running phase (testing) 41

42 initialization phase 42

43 running phase

44 Application of AIS  network intrusion and anomaly detection  data classification models  virus detection  concept learning  data clustering  robotics  pattern recognition and data mining  optimization of multi-modal functions 44

45 PSO and AIS 45

46 PSO and AIS  PSO performs about 56 percent faster than.  AIS performs faster than PSO (about 14 percent) for simpler mathematical functions 46

47 Reference  Computational Intelligence An introduction, Adndries P.Engelbrecht  Learning and Optimization Using the Clonal Selection Principle, Leandro N. de Castro,,Fernando J. Von Zuben, IEEE,2002  A Comparative Analysis on the Performance of Particle Swarm Optimization and Artificial Immune Systems for Mathematical Test Functions, 1David F.W. Yap, 2S.P. Koh, 2S.K. Tiong,Australian Journal of Basic and Applied Sciences, 2009 47

48 48

Download ppt "1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology."

Similar presentations

Ads by Google