THE USAGE OF DISTRIBUTED ARTIFICIAL IMMUNE SYSTEMS FOR SOLVING PROBLEMS OF IDENTIFICATION IN ECOLOGY

2016 ◽  
Vol 8 (3) ◽  
pp. 10-14
Author(s):  
Ушаков ◽  
S. Ushakov ◽  
Астахова ◽  
I. Astakhova ◽  
Хицкова ◽  
...  

There is a problem of ecological forecasting identification which is finding power sources for the available experimental data. This task is an inverse problem, the solution of which will be considered by applying the method of symbolic regression. The artificial immune system (AIS) – a model that allows you to solve various problems of recognition, its concept was borrowed from biology. This distributed network can operate in any heterogeneous environment, which is achieved through the use of cross-platform programming language Python. AIS demonstrates the ability to restore the original function in the identification problem, a plot of the solution for test data is presented.

2021 ◽  
Author(s):  
Shafagat Mahmudova

Abstract This study provides information on artificial immune systems. The artificial immune system is an adaptive computational system that uses models, principles, mechanisms and functions to describe and solve the problems in theoretical immunology. Its application in various fields of science is explored. The theory of natural immune systems and the key features and algorithms of artificial immune system are analyzed. The advantages and disadvantages of protection systems based on artificial immune systems are shown. The methods for malicious software detection are studied. Some works in the field of artificial immune systems are analyzed, and the problems to be solved are identified. A new algorithm is developed for the application of Bayesian method in software using artificial immune systems, and experiments are implemented. The results of the experiment are estimated to be good. The advantages and disadvantages of AIS were shown. To eliminate the disadvantages, perfect AISs should be developed to enable the software more efficient and effective.


2016 ◽  
Vol 8 (3) ◽  
pp. 5-10
Author(s):  
Астахова ◽  
I. Astakhova ◽  
Ушаков ◽  
S. Ushakov

In particular, models had only one type of cages , they applied V-lymphocytes. The distribution and a decentralization were the second feature for using artificial immune systems. This article is devoted to creation the artificial immune system (AIS), the creation model and algorithm of IIS is considered. The model for realization of a problem is consid-ered. Accuracy of calculations is compared to other methods, especially to neural networks. The structure of a program complex is described.


2012 ◽  
Vol 21 (06) ◽  
pp. 1250031 ◽  
Author(s):  
MUHAMMAD ROZI MALIM ◽  
FARIDAH ABDUL HALIM

Artificial immune system is inspired by the natural immune system for solving computational problems. The immunological principles that are primarily used in artificial immune systems are the clonal selection principle, the immune network theory, and the negative selection mechanism. These principles have been applied in anomaly detection, pattern recognition, computer and network security, dynamic environments and learning, robotics, data analysis, optimization, scheduling, and timetabling. This paper describes how these three immunological principles were adapted by previous researchers in their artificial immune system models and algorithms. Finally, the applications of various artificial immune systems to various domains are summarized as a time-line.


Author(s):  
Mikhail Gorobetz ◽  
Ivars Alps ◽  
Anatoly Levchenkov

Mathematical Formulation of Public Electric Transport Scheduling Task for Artificial Immune SystemsThis paper describes mathematical formulation and application of artificial immune system for scheduling tasks for public electric transport. Artificial immune system is inspired by human immune system to simulate the process of interaction between antigens and antibodies. The task of scheduling in transport system is represented as one of the most well-known flow shop problem. Artificial immune system as a genetic based method is used to solve such task. Mathematical model and algorithm is proposed to create optimal schedule for public electric transport for minimization of electric energy consumption and time. Numerical example shows several steps of algorithm for artificial immune system for scheduling task solution.


2020 ◽  
Vol 68 (4) ◽  
pp. 790-803
Author(s):  
Danijela Protić

Introduction/purpose: The artificial immune system is a computational model inspired by the biological or human immune system. Of particular interest in artificial immune systems is the way the human body reacts to new pathogens and adapts to remain immune for a long period after a disease has been combated, which refers to the recognition of known malicious attacks and the way the immune system identifies self-cells not to be reacted to, which refers to the anomaly detection. Methods: Negative selection, positive selection, clonal selection, immune networks, danger theory, and dendritic cell algorithm are presented. Results: A variety of algorithms and models related to artificial immune systems and two classification principles are presented; one based on the detection of a particular attack and the other based on anomaly detection. Conclusion: Artificial immune systems are often used in intrusion detection since they are accurate and fast. Experiments show that the models can be used in both known attack and anomaly detection. Eager machine learning classifiers show better results in the decision, which is an advantage if runtime is not a significant parameter. Dendritic cell and negative selection algorithms show better results for real-time detection.


Author(s):  
. Ojasvini ◽  
. Nitesh ◽  
. Piyush ◽  
Narina Thakur ◽  
Arvind Rehalia

Networks are working at their apical efficiency and are increasing in size by every second; emergence of various threats becomes hindrance in the growth and privacy of the users. The network is vulnerable to security breaches, due to malicious nodes. Intrusion detection systems aim at removing this vulnerability. In this paper, intrusion detection mechanisms for large-scale dynamic networks are investigated. Artificial immune system is a concept that works to protect a network the way immune systems of vertebrates work in nature. This paper also illustrates this artificial immune system, the integration of bio-inspired algorithms, and its functionality with the computer networks.


Author(s):  
Maria Petrovna Malykhina ◽  
Vera Arkadyevna Chastikova ◽  
Alexandr Aleksandrovich Biktimirov

The task of developing tools to combat spam is currently focused on creating such techniques for detecting spam, which are endowed with the skills and qualities inherent in a person whose work is not limited to patterns and therefore highly effective. Man has the ability to detect spam signs, which is based on his own knowledge, experience and preferences. There has been substantiated the need to develop a new approach to solving the problem of detecting spam messages, which is based on heuristic methods of optimization, is effective at the initial stage of training and has a low frequency of false operations. This formulation of the problem fully corresponds to modeling mechanisms of the immune systems of living organisms that ensure their survival, these mechanisms being represented, investigated and used by software. There have been identified and described main mechanisms of artificial immune systems intended for solving the problem of spam detection, as well as software and system interacting. The basic concepts of constructing an artificial immune system for the purpose formulated above are determined: class of detectors, presentation of receptors and pathogens. A model of the relationships between them has been worked out. A technique for detecting spam based on the work of an artificial immune system is proposed, an algorithm for its implementation is developed, and the specifics of its members to identify spam messages are described. A software package with advanced research capabilities has been created. Testing and analysis of the results to determine the optimum values of the system operation parameters have been conducted.


Sign in / Sign up

Export Citation Format

Share Document