Tuesday, June 4, 2019

Dentitic Cell and Immune Networks Algorithm Comparison

Dentitic Cell and Immune cyberspaces algorithmic rule ComparisonA Comparative study of Dentitic cell and repellent networks algorithm for ersatz tolerant networks.Jaspreet kaur, Kamal Kumar outline Artificial resistive systems are the systems utilize for advanced computational systems for the need of robust and secure functioning of computer systems. They are the systems inspired by the forgiving immune systems in the human immunity save the body from external threats. We in this opus would be working on the networking branch of the AIS which is c all(prenominal)ed Artificial immune networks which builds up an immunity in the network against the attacks. The accuracy, time synopsis and a few some some other parameters are to be studied using two algorithms of Artificial immune networks. The two algorithms which we are taking in action will be immune networks algorithm and Dentritic cell algorithm.1 INTRODUCTIONAn immune system, nonpareil of the most intricate biologi cal sys-tems, has been used as a metaphor for intelligent computation in a variety of domains. Artificial Immune governance (AIS) has been considered as a family of techniques originated from the community of immunology. As an important constituent of the AIS, the artificial immune networks are based on the rules of the behaviors of both B cells and T cells in the biological immune system. B cell is an integral part of the immune system. Through a process of recognition and stimulation, the B cells can clone and mutate to produce a diverse set of antibodies in an attempt to remove the infection from the body. T cell has two types. One regulates and con-trols the strength of the immune response, and the other di-rectly destroys the cells that live specific antigens. Both the B cells and T cells give way been widely employed to solve a wide range of engineering problems, such as anomaly let onion and data mining. This paper aims at giving a concise overview on the artificial imm une network models including their conjecture, structures, and applications.Functions, principles and models, which can be use to real world problems. According to the mechanis of DCs, the Dendritic cell algorithmic program (DCA) has been put forward by Greensmith and successfully applied to a range of problems, particularly in the area of anomaly sleuthingCompared with the classical AIS algorithms , the DCA has advantages of small calculations, strong recognition ability and few training samples, but it also hasthe defect that it will have promising detection accuracy unlessin ordered data sets, with the increasing of the disorder degree in data sets, the accuracy will reduce and the sour positives and the false negatives will increase obviously. Experiments show that except some noise data most of themistakes occur during the transition phases, this is be courting during a transition phase there is a small degree of confusion regarding temporally and spatially clustered antige ns and DC may sample multiple antigens in assorted types of context.The Dendritic Cell Algorithm (DCA) is a second generation Artificial Immune System (AIS) algorithm. It is based on an abstract model of the function of dendritic cells and their ability to discriminate amid healthy and infected tissue . As a context-aware anomaly detection algorithm, the DCA performs well in malware detection. Current research with this algorithm have suggested that the DCA shows not only excellent cognitive process on detection rate, but also promise in assisting in reducing the number of false positive errors shown with similar systems.However, as the defenses evolve, so does the malware. The DCA distinguishes between normal and potentially malicious antigens on the basis of the concentration of danger signals they cause and neighboring antigens. This feature cabe exploited by discerning malware via mimicry attacks (such as blending with normal activities or mimicking normal behavior) to evade detection by the DCA . For vitrine, some stealthy malware communicate with remote servers only when they detect user activities (such as requesting web pages). This reduces both the frequency and significance of malicious behavior, making the malware less active and more likely to avoid detection by the DCA. In , Gu et al. proposed an improvement for the DCA namely antigen multiplier to overcome the problem of antigen deficiency. As an additional function of the DCA, antigen multiplier can make several(prenominal) copies of each individual antigen which can be fed to multiple dendritic cells (DCs). Then the classification decision is averaged over the replicated population. The experimental results showed that antigen multiplier helped in alter the classification accuracy. But, as antigen multiplier copies every antigen it meets indifferently, it may show less resistance to mimicry attacks since the concentration of potentially malicious antigens is not increased. Similar to the ineffectual detection to hidden and inactive malware by the DCA, biological immune system (BIS) also shows inefficiency when responds to some antigens.2 LITERATURE REVIEWIn this research paper 1 the author has analysed the immune theory and hopfied neural network (HNN), them proposing a new algorithm for multidimensional functionality. A group of solutions are collected for analyses using k means algorithm. Then later on the cluster is taken which is cluster centurions by k means algorithm. In this paper, by making use of the advantages of cluster analysis algorithm, HNN and ia, a new algorithm is proposed to solve the optimal problems of multimodal function with high dimensions. Simulation experiment proves that the new algorithm has much higher accuracy and shorter running time, compared with ia. Especially, at high dimensional function, the new algorithm has clearly advantage.In this paper2, a invigorated multi-modal optimization algorithm, namely Dcopt-aiNet is proposed, whi ch is based on biological immune network mechanism for global numerical optimization. Different from de Castros opt-aiNet algorithm, Dcopt-aiNet models cloning operation using dynamic cloning operation which is adopted from biological immune network mechanism. Based on the multi-modal benchmarks, experiments were carried out to compare the surgery of Dcopt-aiNet with that of opt-aiNet. Experiment results show that when compared with the opt-aiNet method, the new algorithm is capable of improving search performance significantly in successful rate and convergence speed.In this paper 3 the author has proposed the the use of DCA for malwre detection. Artificial adjuvants increase immunogenicity of stealthy malware which speeds up the immunigenicity of them. This is how they improve the malware detection with help of DCA. Future work proposed in this paper is that the experiments need to evaluate their effects on enhancing the detection performance of dca. Further we need to better go steady the mechanisms of immunological adjuvants can be beneficial to design more biologically. Lastly to make more diverse and more general algorithms.In this research paper4 the algorithm is posed to only good in ordered data set but the results in the other elusions are not considered to be great. In instances of different antigens, each instance is accesed and finally all the asessments made are taken into account. Proposed algorithm i.e. Mmdca brings up the nature of each multiplier and also it can be inferred that the false positives is higher, this is because the dca weights matrix used to calculate the semi and mat tends to mat.With the intrinsic properties of multimodal optimization problems, a multi-population artificial immune network algorithm (mopt-aiNet) is proposed to improve the performance of static and time-varing multimodal optimization problems by making use of biologic immune mechanism in this paper5. Compared with other immune network search methods, several novel operations such as multi-population dynamic hypermutation, asynchronous colony evolution, dynamic retrospect solutions management and a hill-valley exploring are designed which can speed upsearching the environment in an optimal way. Two other immune network algorithms are compared against mopt-aiNet by using static and dynamic benchmarks. Comparative analysis illustrates mopt-aiNets potential value.A bi-objective optimization model of berth and great power changes generated by a wind turbine is discussed in this paper6. The model involves two objectives, power maximization and power ramp rate (PRR) minimization. A new constraint for power maximization based on physics and process control theory is introduced. Data-mining algorithms were used to identify the model of power generation from the industrial data collected at a wind farm. The models and constraints derived from the data were integrated to optimize the power itself and the power variability, expressed as the pow er ramp rate. Due to the nonlinearity and complexity of the optimization model, an artificial immune network algorithm was used to solve it. The optimization results, such as computed operation strategies and the corresponding outputs, are demonstrated and discussed.In this paper 7 , the problem of finding the optimal collision free street, path planning for the case of a controllable mobile robot moving in a static environment filled with obstacles with known shape and size is studied. A path planner based on a hybrid memetic algorithm, genetical Artificial Immune Network (GAIN), which provides near optimal collision free path is proposed. Genetic Artificial Immune Network is a hybrid memetic algorithm based on Genetic Algorithm (GA) and Artificial Immune Network (AIN) algorithm. The network cell structures are simple which makes the operators simple and results in a fast calculation with smaller number of cells. The results obtained from GAIN is compared with that of GA and GAIN is found to outperform. GA in terms of convergence speed and result obtained, making it a promising algorithm for solving the mobile robot path planning problem.3 line FORMULATIONAdaptive immunity is directed towards specific invaders either seen before or not previously encountered and gets modified by exposure to invaders. It mainly consists of lymphocytes (white billet cells, more specifically B and T type) that aid the process of recognizing and destroying specific substances, and are antigen-specific.Clonal Selection Clonal selection theory was proposed by Burnet. The theory is used to explain basic response of adaptive immune system to antigenic stimulus. It establishes the idea that only those cells capable of recognizing an antigen will proliferate while other cells are selected against. Clonal selection operates on both B and T cells. B cells, when their antibodies bind with an antigen, are activated and differentiated into plasma or memory cells. Prior to this process, clones of B cells are produced and undergo somatic hyper mutation. As a result, diversity is introduced into the B cell population. Plasma cells produce antigen-specific antibodies that are work against antigen. warehousing cells remain with the host and promote a rapid secondary response.Negative Selection Negative selection is a mechanism to protect body against self-reactive lymphocytes. It utilizes the immune systems ability to detect unknown antigens while not reacting to the self cells. During the generation of T-cells, receptors are made through a pseudo-random genetic rearrangement process. Then, they undergo a censor process in the thymus, called the negative selection. In this process, T-cells that react against self-proteins are destroyed and only those that do not bind to self-proteins are allowed to leave the thymus. These matured T-cells then(prenominal) circulate throughout the body performing immunological functions and protecting the body against foreign antigens .4 OBJECTIVES1. To study intuitively and understand the working of dentritic cell and immune networks technique in artificial immune systems.2. To analyse the two above mentioned techniques on the basis of the following parameters-A. AccuracyB. Response timeC. Fittest cell take aimD. Immune memory strength.3. Mathematical and graphical comparison between dentritic cell and immune networks.5 RESEARCH METHODOLOGYALGORITHM DESIGN ( Dentritic Cell )Its principle is taken up from the original dentritic cell mechanism in the human body with which our human immune system works. It generally takes advantage of the remembering power of our body in which if our body if exposed to a certain infection remembers it prevents it from harming us in at least near future, it also may cause permanent ginmill.ALGORITHM DESIGN ( Immune Networks )Its principle is taken up from the immune network mechanism which does not have fixed idea for prevention of particular disease in all senses. It undoubted ta kes up a more robust way of finding the right vaccine or the attack example for actual prevention.6 RESULTS AND expiryBar graph for less no of attacksBar for all attacksPlot for less no. of attacks.Plot for all attacks.POINTS OF CONCLUSIONThe accuracy varies with no. of attacks.More the no. of attacks in DCT more is the accuracy.Accuracy in INT is not dependent on no. of attacks.Though the accuracy of the DCT is more but the response time of INT takes lead on DCT.In terms of response time INT is much better than DCT.DCT has time consuming behavior because of all internal processes which take place in it like updating memory cells and informing t cell etc.Memory strength of DCT improves with no. of attacks and it is term quo in INT.Fittest cell level show only local behavior of a part of the system having most immunity.In short term goals INT is favored because its less time consuming and can act quick. Also its cheaper as no internal processes prevail.In long term goals DCT is pr eferred because of its stability.We need to have a really fast system to implement DCT because of its time consumptionDCT is a central system because t cells keep record of all previous attacks and which is accessible to every part or ip in the network which makes DCT a central system.7 REFERENCES1 Ruiying Zhou, Qiuhong Fan, Mingjun Wei, Solving for Multimodal Function with High Dimensions Base on Hopfield Neural Network and Immune Algorithm, IEEE 2011 International Conference on Electronic Mechanical Engineering and Information Technology, Print ISBN- 978-1-61284-008-8, pp.3905-3908, 12-14 August 2011.2 Shi Xu-hua, Zhu Yu-guang, Dynamic re-create based immune network Algorithm for multi-modal optimization, IEEE, Seventh International Conference on Natural Computation, 2011, Print ISBN- 978-1-4244-9953-3, pp.522-525.3 Jun Fu, Huan Yang, Introducing Adjuvants to Dendritic Cell Algorithm for sneaky Malware Detection, IEEE, Fifth International Symposium on Computational Intelligence and Design, 2012, Print ISBN- 978-0-7695-4811-1, DOI-10.1109/ISCID.2012.156, pp.18-224 Song Yuan, Qi-juan Chen, Dendritic Cell Algorithm for Anomaly Detection in unconnected Data Set, 4th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2012, Print ISBN- 978-0-7695-4721-3, DOI-10.1109/IHMSC.2012.69, pp.249-2525 Shi Xuhua, Qian Fenq, An Optimization Algorithm Based on Multi-population Artificial Immune Network, IEEE, Fifth International Conference on Natural Computation, 2009, Print ISBN- 978-0-7695-3736-8, DOI-10.1109/ICNC.2009.574, pp.379-3836 Andrew Kusiak, Zijun Zhang, Optimization of Power and its Variability with an Artificial Immune Network Algorithm, IEEE, Print ISBN- 978-1-61284-788-77 Antariksha Bhaduri, A Mobile Robot Path Planning Using Genetic Artificial Immune Network Algorithm, IEEE, World Congress on Nature and biologically inspire Computing, 2009, Print ISBN- 978-1-4244-5612-3, pp.1536-15398 Yong Sun, Weigou Zhang, Meng Zhang, Dan Li, Design on Neural Network Gain Scheduling Flight Control Law using a Modified PSO Algorithm based on Immune Clone Principle, IEEE, Second International Conference on Intelligent Computation Technology and Automation, 2009, Print ISBN- 978-0-7695-3804-4, DOI-10.1109/ICICTA.2009.70, pp.259-2639 Chung-Ming Ou, C.R. Ou, Immunity Inspired Host-Based Intrusion Detection Systems, IEEE, Fifth International Conference on Genetic and Evolutionary Computing, 2011, Print ISBN- 978-0-7695-4449-6, DOI-10.1109/ICGEC.2011.70, pp.283-28610 Maizura Mokhtar, Ran Bi, Jon Timmis, Andy M. Tyrrell, A Modified Dendritic Cell Algorithm for on-line(a) Error Detection in Robotic Systems, IEEE, Congress on Evolutionary Computation, 2009, Print ISBN- 978-1-4244-2959-2, pp.2055-206211 Yunfeng Zhao, Yixin Yin, Dongmei Fu, Zhun Zhou, Ping Yin, Jia Wang, Application of Improved Artificial Immune Network Algorithm to Optimization, IEEE, 2008, Print ISBN- 978-1-4244-2386-6.12 Zhonghua Li, Jianming Li, Jieyeing Zhou, An improved artificial immune network for multimodal function optimization, IEEE, The 26th Chinese Control and Decision Conference, 2014, Print ISBN- 978-1-4799-3707-3, DOI-10.1109/CCDC.2014.6852268, pp.766-771, May 31st June second 2014.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.