artificial immune systems
DESCRIPTION
BY: Nazanin Asadi Zohre Molaei. Artificial Immune Systems. Isfahan University of Technology. Outline. History Natural Immune System Artificial Immune System Application Experiment Result Reference. History. Developed from the field of theoretical immunology in the mid 1980’s. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/1.jpg)
1
ARTIFICIAL IMMUNE SYSTEMS
BY:Nazanin AsadiZohre Molaei
Isfahan University of Technology
![Page 2: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/2.jpg)
2
Outline
History Natural Immune System Artificial Immune System Application Experiment Result Reference
![Page 3: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/3.jpg)
3
History
Developed from the field of theoretical immunology in the mid 1980’s.
1990 – Bersini first use of immune algorithms to solve problems
Forrest et al – Computer Security mid 1990’s
Hunt et al, mid 1990’s – Machine learning
![Page 4: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/4.jpg)
4
Basic Immunology
![Page 5: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/5.jpg)
5
Role of the Immune System
Protect our bodies from infection Primary immune response
Launch a response to invading pathogens
Secondary immune responseRemember past encountersFaster response the second time around
The IS is adaptable (presents learning and memory)
![Page 6: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/6.jpg)
6
Where is it ?
Lymphatic vessels
Lymph nodes
Thymus
Spleen
Tonsils andadenoids
Bone marrow
Appendix
Peyer’s patches
Primary lymphoidorgans
Secondary lymphoidorgans
![Page 7: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/7.jpg)
7
Lymphocytes
Carry antigen receptors that are specificThey are produced in the bone marrow through random re-arrangement
B and T Cells are the main actors of the adaptive immune system
![Page 8: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/8.jpg)
8
B Cell Pattern Recognition
B cells have receptors called antibodies
The immune recognition is based on the
complementarity between the binding
region of the receptor and a portion of the
antigen called the epitope.
Recognition is not just by a single
antibody, but a collection of them
Learn not through a single agent,
but multiple ones
B-cell
BCR or Antibody
Epitopes
B-cell Receptors (Ab)
Antigen
![Page 9: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/9.jpg)
9
T-cells
Regulation of other cells
Active in the immune response
Helper T-cells
Killer T-cells
T-cell
TCR
APC
MHC-II Protein Antigen
Peptide
TH cell
MHC/peptide complex
![Page 10: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/10.jpg)
10
Immune Responses
Antigen Ag1 Antigens Ag1, Ag2
Primary Response Secondary Response
Lag
Response to Ag1
Ant
ibod
y C
once
ntra
tion
Time
Lag
Response to Ag2
Response to Ag1
...
...
Cross-Reactive Response
...
...
Antigen Ag1 + Ag3
Response to Ag1 + Ag3
Lag
![Page 11: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/11.jpg)
11
The Immune System models•The are many different viewpoints•These views are not mutually exclusive
classical
networkdanger
![Page 12: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/12.jpg)
12
Artificial Immune Systems
![Page 13: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/13.jpg)
13
Basic concepts
trained detectors(artificial lymphocytes) that detect nonself
patterns
need a good repository of self patterns or self and non-self
patterns to train ALCs to be self tolerant
need to measure the affinity between an ALC and a pattern
To be able to measure affinity, the representation of the patterns
and the ALCs need to have the same structure
The affinity between two ALCs needs to be measured
memory that frequently detect non-self patterns
When an ALC detects non-self patterns, it can be cloned and the
clones can be mutated to have more diversity in the search
space
![Page 14: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/14.jpg)
14
AIS Framework
Algorithms
Affinity
Representation
Application
Solution
AIS
Shape-Space
Binary
Integer
Real-valued
Symbolic
![Page 15: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/15.jpg)
15
Representation – Shape Space
Used for modeling antibody and antigen
Determine a measure to calculate affinity
Hamming shape space(binary)
1 if Abi != Agi: 0 otherwise (XOR
operator)
Antibody
Antigen
0 0 1 1 0 0 1 1
1 1 1 0 1 1 0 1
Ab:
Ag:
1
0
1
0
![Page 16: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/16.jpg)
16
Representation
Assume the general case: Ab = Ab1, Ab2, ..., AbL Ag = Ag1, Ag2, ..., AgL
Binary representation
Matching by bits Continuous (numeric)
Real or Integer, typically Euclidian Symbolic (Categorical /nominal)
E.g female or male of the attribute Gender.
![Page 17: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/17.jpg)
17
AIS Framework
Algorithms
Affinity
Representation
Application
Solution
AISEuclidean
Manhattan
Hamming
![Page 18: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/18.jpg)
18
Affinity
Euclidean
Manhattan
Hamming
L
1i
2ii )Ag(AbD
L
iii AgAbD
1
L
i
ii AgAbD
1 otherwise0
if1δwhereδ,
![Page 19: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/19.jpg)
19
AIS Framework
Algorithms
Affinity
Representation
Application
Solution
AIS
Bone Marrow Models
Negative Selection
Clonal Selection
Positive Selection
Immune Network Models
![Page 20: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/20.jpg)
20
Basic AIS Algorithm
![Page 21: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/21.jpg)
21
Negative Selection Algorithms
Forrest 1994: Idea taken from the negative selection of T-cells in the thymus
Applied initially to computer security Split into two parts: Censoring Monitoring
Selfstrings (S)
Generaterandom strings
(R0)Match Detector
Set (R)
Reject
No
Yes
No
Yes
Detector Set(R)
ProtectedStrings (S)
Match
Non-selfDetected
![Page 22: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/22.jpg)
22
All patterns and ALCs : as nominal valued attributes or as binary strings
Affinity : r-continuous matching rule
Training set : self patterns
![Page 23: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/23.jpg)
23
Training ALCs with negative selection
![Page 24: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/24.jpg)
24
Clonal Selection
Antigens
Proliferation Differentiation
Plasma cells
Memory cells
Selection
M
M
![Page 25: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/25.jpg)
25
Clonal Selection
selection of a set of ALCs with the highest calculated affinity with a non-self pattern
cloned and mutated
compete with the existing set of ALCs
to be exposed to the next non-self pattern Continuous (numeric)
![Page 26: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/26.jpg)
26
ClONALG algorithm
De Castro and Von presented CLONALG as an algorithm,2001
initially proposed to perform machine-learning pattern recognition
Adapted to be applied to optimization problem
![Page 27: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/27.jpg)
27
ClONALG algorithm
main immune aspects taken into account to develop the algorithm maintenance of a specific memory set selection and cloning of the most stimulated
Antibodies death of non-stimulated antibodies affinity maturation and re-selection of the
clones proportionally to their antigenic affinity generation and maintenance of diversity
![Page 28: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/28.jpg)
28
ClONALG
All patterns in binary strings
Training set : non-self patterns
Affinity : Hamming distance , between ALC and
non-self pattern
Lower Hamming distance = stronger affinity
Assumption : One memory ALC for each of the
patterns that needs to be recognized in training
set
![Page 29: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/29.jpg)
29
ClONALG
![Page 30: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/30.jpg)
30
CLONALG optimization case
an objective function g(⋅) must to be optimized
(maximized or minimized)
antibody affinity corresponds to the objective
function
each antibody Abi represents an element of the
input space
it is no longer necessary to maintain a separate
memory set Ab
![Page 31: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/31.jpg)
31
CLONALG optimization case
![Page 32: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/32.jpg)
32
CLONALG optimization case
![Page 33: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/33.jpg)
33
Immune Network Models
The ALCs interact with each other to learn the
structure of a non-self pattern
The ALCs in a network co-stimulates and/or co-
suppress each other to adapt to the non-self pattern
The stimulation of an ALC based on the calculated affinity between the ALC
and the non-self pattern the calculated affinity between the ALC and
network ALCs as co-stimulation and/or co-suppression.
![Page 34: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/34.jpg)
34
Artificial Immune Network
Timmis and Neal,2000
Application clustering
data visualization
control
optimization domains
AINE defines the new concept of artificial recognition balls
(ARBs)
population of ARBs links between the ARBs a set of antigen training patterns Some clonal operations for learning
![Page 35: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/35.jpg)
35
Artificial Immune Network
![Page 36: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/36.jpg)
36
Artificial Immune Network
all training patterns in set DT are presented to
the set of ARBs
After each iteration, each ARB calculates its stimulation level Allocates resources (i.e. B-Cells) based on its
stimulation level as
The stimulation level antigen stimulation network stimulation network suppression
![Page 37: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/37.jpg)
37
Artificial Immune Network
![Page 38: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/38.jpg)
38
Stimulation level
![Page 39: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/39.jpg)
39
Resource allocation
![Page 40: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/40.jpg)
40
Danger Theory Models
distinguishes between
what is dangerous and
non-dangerous
Include a signal to
determine whether a
non-self pattern is
dangerous or not
![Page 41: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/41.jpg)
41
An Adaptive Mailbox
classifies interesting from uninteresting emails
initialization phase (training)
running phase (testing)
![Page 42: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/42.jpg)
42
initialization phase
![Page 43: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/43.jpg)
running phase
![Page 44: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/44.jpg)
44
Application of AIS
network intrusion and anomaly detection
data classification models
virus detection
concept learning
data clustering
robotics
pattern recognition and data mining
optimization of multi-modal functions
![Page 45: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/45.jpg)
45
PSO and AIS
![Page 46: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/46.jpg)
46
PSO and AIS
PSO performs about 56 percent faster than.
AIS performs faster than PSO (about 14 percent)
for simpler mathematical functions
![Page 47: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/47.jpg)
47
Reference
Computational Intelligence An introduction ,
Adndries P.Engelbrecht
Learning and Optimization Using the Clonal
Selection Principle, Leandro N. de
Castro, ,Fernando J. Von Zuben, IEEE,2002
A Comparative Analysis on the Performance of
Particle Swarm Optimization and Artificial Immune
Systems for Mathematical Test Functions, 1David
F.W. Yap, 2S.P. Koh, 2S.K. Tiong,Australian Journal
of Basic and Applied Sciences, 2009
![Page 48: Artificial Immune Systems](https://reader038.vdocuments.site/reader038/viewer/2022102910/568143b7550346895db04287/html5/thumbnails/48.jpg)
48