The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.
|
|
- Calvin Page
- 6 years ago
- Views:
Transcription
1 Aickelin, Uwe (2003) Artificial Immune System and Intrusion Detection Tutorial. In: Introduction Tutorials in Optimization, Search and Decision Support Methodologies, Nottingham, UK. Access from the University of Nottingham repository: Copyright and reuse: The Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions. This article is made available under the University of Nottingham End User licence and may be reused according to the conditions of the licence. For more details see: A note on versions: The version presented here may differ from the published version or from the version of record. If you wish to cite this item you are advised to consult the publisher s version. Please see the repository url above for details on accessing the published version and note that access may require a subscription. For more information, please contact eprints@nottingham.ac.uk
2 Artificial Immune Systems Tutorial By Dr Uwe Aickelin
3 Overview Biological Immune System. Artificial Immune System (AIS). Comparison to other Algorithms. Applications of AIS: Data Mining. Security (Build Your Own). Others. The Future.
4 Antigens Substances capable of starting a specific immune response are referred to as antigens. This includes some pathogens such as viruses, bacteria, fungi etc.
5 Why the Immune System? Robust. Autonomous. Effective Memory. Distributed. Adaptive. Very Successful.
6 Biological Immune System Protect our bodies from pathogens. Primary immune response: Launch a response against invaders. Secondary immune response: Remember past encounters. Faster response the second time.
7 Biological Immune System Innate vs Acquired Cell Mediated vs Humoral T Cell (Killer) T Cell (Helper) B Cell Secretes Antibody
8 Immune System Overview M H C p r o t e i n A n t i g e n A P C ( I ) P e p t i d e ( I I ) T - c e l l ( I I I ) B - c e l l ( V ) ( I V ) A c t i v a t e d T - c e l l L y m p h o k i n e s ( V I ) A c t i v a t e d B - c e l l ( p l a s m a c e l l ) ( V I I )
9 Self-Nonself Discrimination Immune system differentiates between self and nonself cells. Antigenic encounters may result in cell death. Therefore: Some kind of positive selection. Some element of negative selection.
10 Immune Network Theory Idiotypic network (Jerne, 974): B cells stimulate each other. Creates an immunological memory. Ag Suppression (Negative Response) 2 3 Stimulation (Positive Response)
11 Overview Biological Immune System. Artificial Immune System (AIS). Comparison to other Algorithms. Applications of AIS: Data Mining. Security (Build Your Own). Others. The Future.
12 Film Recommender Prediction: What rating would I give a specific film? Recommendation: Give me a top 0 list of films I might like.
13 Film Recommender EachMovie database (70k users). User Profile: set of tuples {movie, rating}. Me: My user profile. Neighbour: User profile of others. Similarity metric: Correlation score. Neighbourhood: Group of similar users. Recommendations: From neighbourhood.
14 Film Recommender User Profile: set of tuples {movie, rating} Antigen Antibody Stimulation Me: My user profile. Neighbour: User profile of others. Affinity metric: Correlation score. Antibody Antigen Binding Antibody Antibody Binding Neighbourhood: Group of similar users. Suppression Group of antibodies similar to antigen and dissimilar to other antibodies Recommendations: From neighbourhood Weighted Score based on Similarities.
15 Film Recommender Start with empty AIS. Encode target user as an antigen Ag. WHILE (AIS not full) && (More Users): Add next user as antibody Ab. IF (AIS at full size) Iterate AIS. Generate recommendations from AIS.
16 Film Recommender Suppose we have 5 users and 4 movies: u={(m,v),(m2,v2),(m3,v3)}. u2={(m,v2),(m2,v22),(m3,v23),(m4,v24)}. u3={(m,v3),(m2,v32),(m4,v34)}. u4={(m,v4),(m4,v44)}. u5={(m,v5),(m2,v52),(m3,v53), (m4,v54)}. We do not have users votes for every film. We want to predict the vote of user u4 on movie m3.
17 Algorithm walkthrough () Start with empty AIS: AIS DATABASE u, u 2, u 3, u 4, u 5 User for whom to predict becomes antigen: DATABASE u, u 2, u 3, u 5 u 4 AIS Ag
18 Algorithm walkthrough (2) Add antibodies until AIS is full DATABASE u Ag AIS u 2, u 3, u 5 Ab DATABASE u 2,u 3 Ag AIS u 4 Ab Ab 2 Ab 3
19 Algorithm walkthrough (3) Ab 2 Ag Ab 3 Ab Table of Correlation between Ab and Ag: MS4, MS24, MS34. Table of Correlation between Antibodies: MS2 = CorrelCoef(Ab, Ab2) MS3 = CorrelCoef(Ab, Ab3) MS23 = CorrelCoef(Ab2, Ab3)
20 Algorithm walkthrough (4) Calculate Concentration of each Ab: Interaction with Ag (Stimulation). Interaction with other Ab (Suppression). AIS Ag Ab Ab 2 Ab 3 Ag Ab Ab 2 Ab 2 Ab 2 Ab Ab Ab 2 2 AIS
21 Algorithm walkthrough (5) Generate Recommendation based on Antibody Concentration. AIS Ag Ab Ab2 Ab 2 Ab Ab 2 Ab Ab 2 2 Recommendation for user u 4 on movie m 3 will be highly based on vote on m 3 of user u 2
22 Film Recommender Results Tested against standard method (Pearson k-nearest neighbours). Prediction: Results of same quality. Recommendation: 4 out of 5 films correct (AIS). 3 out of 5 films correct (Pearson).
23 Evaluation AIS is good for Collaborative Filtering: Idiotypic effect for more varied population. Potential for distribution. Smaller neighbourhoods. General recommendation tool: Webmining (URL Recommender).
24 Overview Biological Immune System. Artificial Immune System (AIS). Comparison to other Algorithms. Applications of AIS: Data Mining. Security (Build Your Own). Others. The Future.
25 Comparison of Algorithms GA (Optimisation) NN (Classification) AIS Components Location of Components Structure Chromosome Strings Dynamic Discrete Components Artificial Neurons Pre-Defined Networked Components Knowledge Storage Chromosome Strings Connection Strengths Dynamics Meta-Dynamics Interaction between Components Interaction with Environment Threshold Activity Evolution Recruitment / Elimination of Components Crossover Fitness Function Crowding / Sharing Learning Construction / Pruning of Connections Network Connections External Stimuli Neuron Activation
26 Comparison of Algorithms GA (Optimisation) NN (Classification) AIS Components Chromosome Strings Artificial Neurons Attribute Strings Location of Components Dynamic Pre-Defined Dynamic Structure Discrete Components Networked Components Discrete components / Networked Components Knowledge Storage Chromosome Strings Connection Strengths Component Concentration / Network Connections Dynamics Evolution Learning Evolution / Learning Meta-Dynamics Recruitment / Elimination of Components Construction / Pruning of Connections Recruitment / Elimination of Components Interaction between Components Crossover Network Connections Recognition / Network Connections Interaction with Environment Fitness Function External Stimuli Recognition / Objective Function Threshold Activity Crowding / Sharing Neuron Activation Component Affinity
27 Overview Biological Immune System. Artificial Immune System (AIS). Comparison to other Algorithms. Applications of AIS: Data Mining. Security (Build Your Own). Others. The Future.
28 Clustering (ainet) Immune System Antibody Antigen Affinity Cell cloning Somatic hypermutation Immune network Metadynamics ainet Internal data vector Training data vector Euclidean distance Duplication of internal data vectors Affinity proportional mutation Network of internal data vectors Removal / creation of internal data vectors
29 Clustering (ainet) Initialization (Create a random population of antibodies). For each antigen do: Clonal selection and Hypermutation. Metadynamics (Removal). Network interactions (Suppression). Cycle (Repeat for a number of iterations).
30 Clustering (ainet) Training Patterns Training Pattern Immune network
31 AIS for Security Self : files, network traffic, system calls. Antibody creation: positive vs. negative. Change detection (Checksums). Advanced Features: Binary strings or symbolic rules. Activation thresholds (vs false positives). Co-stimulation (vs false positives). Memory detectors (secondary response).
32 Design a Simple AIS IDS Feature Positive or Negative Selection? AIS IDS Antibody Antigen Affinity Measure Cloning Somatic Hypermutation Immune Network Metadynamics
33 Forrest s Censoring Self strings (S) Generate random strings (R 0) Match No Detector Set (R) Yes Reject
34 Forrest s Monitoring Detector Set (R) Protected Strings (S) Match Yes No Non-self Detected
35 AIS Security Evaluation Applied to network intrusion, virus detection Good results on test systems. BUT Definition of Self ambiguous. Inefficient to map entire nonself universe. Self / Nonself changes over time.
36 AIS for Optimisation Applied to TSP (of course), job shop scheduling, time series prediction Some good results on test problems. BUT Often little added value to GA. AIS metaphor somewhat strained?
37 Overview Biological Immune System. Artificial Immune System (AIS). Comparison to other Algorithms. Applications of AIS: Data Mining. Security (Build Your Own). Others. The Future.
38 Traditional Self-Nonself Traditional Self-Nonself Problems: No reaction to foreign bacteria in gut. No reaction to food / air / etc. The human body changes over its life. Auto-immune diseases. Tumours / Transplants.
39 Danger Theory Need for discrimination: What should be responded to? Self-Nonself discrimination useful. Respond to Danger not to foreignness. Danger is measured by damage / distress signals. What would be danger signals?
40 Danger Zone Antibodies Antigens Cells Damaged Cell Danger Zone Stimulation Match, but too far No match away Danger Signal
41 The Future Much work is very diverse: More formal approach required? Wide possible application domains. What makes the immune system unique? More work with immunologists: Danger theory. Idiotypic Networks. Self-Assertion.
42 The Future (2) Use Latest Immunological Danger Theory for Intrusion Detetcion. Investigate the Correlation between Good and Bad Cell Deaths. Overcome Self-Nonself Limitations. Supported by 659k EPSRC Adventure Grant (+ 33k Industry).
43 The Future (3) ARTIST: A Network for Artificial Immune Systems (EPSRC funded network). Work towards: A theoretical foundation for AIS. Extraction of accurate metaphors. Application of AIS. Train PhD students. Fund workshops/meetings. Coordinate and Disseminate UK based AIS research.
44 AIS Resources Artificial Immune Systems and Their Applications by D Dasgupta (Editor), Springer Verlag, 999. Artificial Immune Systems: A New Computational Intelligence Approach by L de Castro, J Timmis, Springer Verlag, Immunocomputing: Principles and Applications by A Tarakanov et al, Springer Verlag, Second International Conference on Artificial Immune Systems (ICARIS), September -3, 2003, Napier University, Edinburgh, UK.
An Introduction to Artificial Immune Systems
An Introduction to Artificial Immune Systems Jonathan Timmis Computing Laboratory University of Kent at Canterbury CT2 7NF. UK. J.Timmis@kent.ac.uk http:/www.cs.kent.ac.uk/~jt6 AIS October 2003 1 Novel
More informationStable Clusters Formation in an Artificial Immune System
Stable Clusters Formation in an Artificial Immune System S.T. Wierzchoń Department of Computer Science, Białystok Technical University ul. Wiejska 45 a, 15-351 Białystok, Poland and Institute of Computer
More informationSearching for memory in artificial immune system
Searching for memory in artificial immune system Krzysztof Trojanowski 1), Sławomir T. Wierzchoń 1,2 1) Institute of Computer Science, Polish Academy of Sciences 1-267 Warszwa, ul. Ordona 21 e-mail: {trojanow,stw}@ipipan.waw.pl
More informationAn Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems
An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems Dan W Taylor 1,2 and David W Corne 1 1 Department of Computer Science, University of Reading, Reading,
More informationArtificial Immune Systems
Artificial Immune Systems Julie Greensmith, Amanda Whitbrook and Uwe Aickelin Abstract The human immune system has numerous properties that make it ripe for exploitation in the computational domain, such
More informationImmune and Evolutionary Approaches to Software Mutation Testing
Immune and Evolutionary Approaches to Software Mutation Testing Pete May 1, Jon Timmis 2, and Keith Mander 1 1 Computing Laboratory, University of Kent, Canterbury, Kent, UK petesmay@gmail.com, k.c.mander@kent.ac.uk
More informationCoordination of Cooperative Search and Rescue Robots for Disaster Relief
Proceedings of the 17th World Congress The International Federation of Automatic Control Coordination of Cooperative Search and Rescue Robots for Disaster Relief Henry Y. K. Lau* and Albert W. Y. Ko**
More informationARTICLE IN PRESS. Immune programming
Information Sciences xxx (2005) xxx xxx www.elsevier.com/locate/ins Immune programming Petr Musilek *, Adriel Lau, Marek Reformat, Loren Wyard-Scott Department of Electrical and Computer Engineering, W2-030
More informationA New Approach to Solve Multiple Traveling Salesmen Problem by Clonal Selection Algorithm
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 11005-11017 Research India Publications http://www.ripublication.com A New Approach to Solve Multiple
More informationWhat is Evolutionary Computation? Genetic Algorithms. Components of Evolutionary Computing. The Argument. When changes occur...
What is Evolutionary Computation? Genetic Algorithms Russell & Norvig, Cha. 4.3 An abstraction from the theory of biological evolution that is used to create optimization procedures or methodologies, usually
More informationBrabazon, Anthony; Cahill, Jane; Keenan, Peter; Walsh, Daniel
Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Identifying online credit card fraud using
More informationThe Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.
Burke, Edmund and Eckersley, Adam and McCollum, Barry and Sanja, Petrovic and Qu, Rong (2003) Using Simulated Annealing to Study Behaviour of Various Exam Timetabling Data Sets. In: The Fifth Metaheuristics
More informationArtificial Immune System driven evolution in Swarm Chemistry
Artificial Immune System driven evolution in Swarm Chemistry Nicola Capodieci Università di Modena e Reggio Emilia Modena, Italy Emma Hart Edinburgh Napier University Edinburgh, UK Giacomo Cabri Università
More informationFUNCTION OPTIMIZATION BY THE IMMUNE METAPHOR
TASK QUARTERLY 6 No 3 (2002), 1 16 FUNCTION OPTIMIZATION BY THE IMMUNE METAPHOR SŁAWOMIR T. WIERZCHOŃ Institute o Computer Science, Polish Academy of Sciences, Ordona 21, 01-267 Warsaw, Poland stw@ipipan.waw.pl
More informationCHAPTER 7 CELLULAR BASIS OF ANTIBODY DIVERSITY: CLONAL SELECTION
CHAPTER 7 CELLULAR BASIS OF ANTIBODY DIVERSITY: CLONAL SELECTION The specificity of humoral immune responses relies on the huge DIVERSITY of antigen combining sites present in antibodies, diversity which
More informationGENETIC BASIS OF ANTIBODY STRUCTURE AND DIVERSITY. Steven J. Norris, Ph.D
GENETIC BASIS OF ANTIBODY STRUCTURE AND DIVERSITY Steven J. Norris, Ph.D Topics I. General principles II. The heavy chain Ig locus and VDJ rearrangement III. Light chain rearrangement. IV. Mechanisms of
More informationTuning of 2-DOF PID Controller By Immune Algorithm
Tuning of 2-DOF PD Controller By mmune Algorithm Dong Hwa Kim Dept. of nstrumentation and Control Eng., Hanbat National University, 16-1 San Duckmyong-Dong Yusong-Gu, Daejon City Seoul, Korea, 305-719.
More informationDendritic Cells for SYN Scan Detection
Dendritic Cells for SYN Scan Detection Julie Greensmith and Uwe Aickelin School of Computer Science, University of Nottingham, Nottingham, UK, NG8 1BB. {jqg, uxa}@cs.nott.ac.uk ABSTRACT Artificial immune
More informationImmuno-repairing of FPGA designs
Abstract FPGAs can be used for the design of autonomic reliable systems. Advantages are reconfiguration and flexibility in the design. However commercial FPGAs are first prone to errors. Second, the design
More informationBio-inspired algorithms applied to microstrip antennas design
Journal of Computational Interdisciplinary Sciences (2009) 1(2): 141-147 2009 Pan-American Association of Computational Interdisciplinary Sciences ISSN 1983-8409 http://epacis.org Bio-inspired algorithms
More informationAn Improved Immune Genetic Algorithm for Capacitated Vehicle Routing Problem
Send Orders for Reprints to reprints@benthamscience.ae 560 The Open Cybernetics & Systemics Journal, 2014, 8, 560-565 Open Access An Improved Immune Genetic Algorithm for Capacitated Vehicle Routing Problem
More informationCOMPARISON OF PARETO EFFICIENCY AND WEIGHTED OBJECTIVES METHOD TO SOLVE THE MULTI-CRITERIA VEHICLE ROUTING PROBLEM USING THE ARTIFICIAL IMMUNE SYSTEM
Applied Computer Science, vol. 12, no. 4, pp. 78 87 Submitted: 2016-11-05 Revised: 2016-12-02 Accepted: 2016-12-13 multi-criteria optimization, Pareto efficiency, vehicle routing problem, artificial immune
More informationIs Machine Learning the future of the Business Intelligence?
Is Machine Learning the future of the Business Intelligence Fernando IAFRATE : Sr Manager of the BI domain Fernando.iafrate@disney.com Tel : 33 (0)1 64 74 59 81 Mobile : 33 (0)6 81 97 14 26 What is Business
More informationCEng 713 Evolutionary Computation, Lecture Notes
CEng 713 Evolutionary Computation, Lecture Notes Introduction to Evolutionary Computation Evolutionary Computation Elements of Evolution: Reproduction Random variation Competition Selection of contending
More informationTIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS. Liviu Lalescu, Costin Badica
TIMETABLING EXPERIMENTS USING GENETIC ALGORITHMS Liviu Lalescu, Costin Badica University of Craiova, Faculty of Control, Computers and Electronics Software Engineering Department, str.tehnicii, 5, Craiova,
More informationThe Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.
Burke, Edmund and Drake, John H. and McCollum, Barry and Özcan, Ender (2015) Comments on: An overview of curriculum-based course timetabling. TOP, 23 (2). pp. 355-358. ISSN 1863-8279 Access from the University
More informationRecessive Trait Cross Over Approach of GAs Population Inheritance for Evolutionary Optimisation
Recessive Trait Cross Over Approach of GAs Population Inheritance for Evolutionary Optimisation Amr Madkour, Alamgir Hossain, and Keshav Dahal Modeling Optimization Scheduling And Intelligent Control (MOSAIC)
More informationMachine learning in neuroscience
Machine learning in neuroscience Bojan Mihaljevic, Luis Rodriguez-Lujan Computational Intelligence Group School of Computer Science, Technical University of Madrid 2015 IEEE Iberian Student Branch Congress
More informationGenetic Algorithms in Matrix Representation and Its Application in Synthetic Data
Genetic Algorithms in Matrix Representation and Its Application in Synthetic Data Yingrui Chen *, Mark Elliot ** and Joe Sakshaug *** * ** University of Manchester, yingrui.chen@manchester.ac.uk University
More informationChapter 2. Antibodies
Chapter 2. Antibodies An iddy-biddy antibody Just nanometers long Saved the butt of a sumo man Hundreds of kilos strong Anonymous The main elements of the immune system are firstly antibodies, secondly
More informationUTILIZATION OF ARTIFICIAL IMMUNE SYSTEM IN PREDICTION OF PADDY PRODUCTION
UTILIZATION OF ARTIFICIAL IMMUNE SYSTEM IN PREDICTION OF PADDY PRODUCTION A. B. M. Khidzir 1, M. A. Malek 2, Amelia Ritahani Ismail 3, Liew Juneng 4 and Ting Sie Chun 1 1 Department of Civil Engineering,
More informationEvolutionary Algorithms
Evolutionary Algorithms with Mixed Strategy Liang Shen Supervisors: Dr. Jun He Prof. Qiang Shen Ph.D. Thesis Department of Computer Science Institute of Mathematics, Physics and Computer Science Aberystwyth
More informationEnergy management using genetic algorithms
Energy management using genetic algorithms F. Garzia, F. Fiamingo & G. M. Veca Department of Electrical Engineering, University of Rome "La Sapienza", Italy Abstract An energy management technique based
More informationEvolutionary Algorithms
Evolutionary Algorithms Evolutionary Algorithms What is Evolutionary Algorithms (EAs)? Evolutionary algorithms are iterative and stochastic search methods that mimic the natural biological evolution and/or
More informationSTUDY OF CLASSIFIERS IN DATA MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationLogistics. Final exam date. Project Presentation. Plan for this week. Evolutionary Algorithms. Crossover and Mutation
Logistics Crossover and Mutation Assignments Checkpoint -- Problem Graded -- comments on mycourses Checkpoint --Framework Mostly all graded -- comments on mycourses Checkpoint -- Genotype / Phenotype Due
More informationBIOTECHNOLOGY. Course Syllabus. Section A: Engineering Mathematics. Subject Code: BT. Course Structure. Engineering Mathematics. General Biotechnology
BIOTECHNOLOGY Subject Code: BT Course Structure Sections/Units Section A Section B Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Section C Section D Section E Topics Engineering Mathematics General
More informationAntibody Structure. Antibodies
Antibodies Secreted by B lymphocytes Great diversity and specificity: >10 9 different antibodies; can distinguish between very similar molecules Tag particles for clearance/destruction Protect against
More informationAntibody Structure supports Function
Antibodies Secreted by B lymphocytes Great diversity and specificity: >10 9 different antibodies; can distinguish between very similar molecules Tag particles for clearance/destruction Protect against
More informationGMO Technology Conference
GMO Technology Conference The regulation of Clinical Trials on humans involving therapies containing or consisting of genetically modified organisms The Printworks, Dublin Castle 10 th & 11 th October
More informationIntelligent Techniques Lesson 4 (Examples about Genetic Algorithm)
Intelligent Techniques Lesson 4 (Examples about Genetic Algorithm) Numerical Example A simple example will help us to understand how a GA works. Let us find the maximum value of the function (15x - x 2
More informationChapter 8 Analytical Procedures
Slide 8.1 Principles of Auditing: An Introduction to International Standards on Auditing Chapter 8 Analytical Procedures Rick Hayes, Hans Gortemaker and Philip Wallage Slide 8.2 Analytical procedures Analytical
More informationClassification and Learning Using Genetic Algorithms
Sanghamitra Bandyopadhyay Sankar K. Pal Classification and Learning Using Genetic Algorithms Applications in Bioinformatics and Web Intelligence With 87 Figures and 43 Tables 4y Spri rineer 1 Introduction
More informationUsing Lazy Evaluation to Simulate Realistic-Size Repertoires in Models of the Immune System 1
Using Lazy Evaluation to Simulate Realistic-Size Repertoires in Models of the Immune System 1 Derek J. Smith Department of Computer Science University of New Mexico Albuquerque, NM 87131 USA dsmith@cs.unm.edu
More informationAnt Colony Optimisation: From Biological Inspiration to an Algorithmic Framework
Ant Colony Optimisation: From Biological Inspiration to an Algorithmic Framework Technical Report: TR013 Daniel Angus dangus@ict.swin.edu.au Centre for Intelligent Systems & Complex Processes Faculty of
More informationMulti Agent System-Based on Case Based Reasoning for Cloud Computing System
Multi Agent System-Based on Case Based Reasoning for Cloud Computing System Amir Mohamed Talib and Nour Eldin Mohamed Elshaiekh Faculty of Computer Science, Software Engineering Department, Future University,
More informationIs SharePoint 2016 right for your organization?
Is SharePoint 2016 right for your organization? 1 Table of contents Finding the value of a migration... 3 Investment areas and why they matter...4 1. Improved user experience...5 2. Compliance and reporting...7
More informationOPTIMAL ROUTES SCHEDULING FOR MUNICIPAL WASTE DISPOSAL GARBAGE TRUCKS USING EVOLUTIONARY ALGORITHM AND ARTIFICIAL IMMUNE SYSTEM
TRANSPORT PROBLEMS 2011 PROBLEMY TRANSPORTU Volume 6 Issue 4 artificial intelligence, artificial immune systems, clonal selection, evolutionary algorithm, waste disposal garbage trucks, optimisation Bogna
More informationGenetic Algorithms using Populations based on Multisets
Genetic Algorithms using Populations based on Multisets António Manso 1, Luís Correia 1 1 LabMAg - Laboratório de Modelação de Agentes Faculdade de Ciências da Universidade de Lisboa Edifício C6, Piso
More informationGUIDANCE ON THE EVALUATION OF NON ACCREDITED QUALIFICATIONS
GUIDANCE ON THE EVALUATION OF NON ACCREDITED QUALIFICATIONS 1. Introduction 1.1 This document provides guidance notes for the assessment of academic qualifications that have not been formally accredited
More informationGenetic Algorithms-Based Model for Multi-Project Human Resource Allocation
Genetic Algorithms-Based Model for Multi-Project Human Resource Allocation Abstract Jing Ai Shijiazhuang University of Applied Technology, Shijiazhuang 050081, China With the constant development of computer
More informationMicrobial Biotechnology agustin krisna wardani
Microbial Biotechnology agustin krisna wardani 1. The Structure of Microbes Microbes (microorganisms) are tiny organisms that are too small to be seen individually by the naked eye and must be viewed with
More informationCustomer Relationship Management in marketing programs: A machine learning approach for decision. Fernanda Alcantara
Customer Relationship Management in marketing programs: A machine learning approach for decision Fernanda Alcantara F.Alcantara@cs.ucl.ac.uk CRM Goal Support the decision taking Personalize the best individual
More informationPackage DNABarcodes. March 1, 2018
Type Package Package DNABarcodes March 1, 2018 Title A tool for creating and analysing DNA barcodes used in Next Generation Sequencing multiplexing experiments Version 1.9.0 Date 2014-07-23 Author Tilo
More informationSimulation-Based Analysis and Optimisation of Planning Policies over the Product Life Cycle within the Entire Supply Chain
From the SelectedWorks of Liana Napalkova June, 2009 Simulation-Based Analysis and Optimisation of Planning Policies over the Product Life Cycle within the Entire Supply Chain Galina Merkuryeva Liana Napalkova
More informationJEFFERSON COLLEGE GENERAL MICROBIOLOGY
JEFFERSON COLLEGE COURSE SYLLABUS BIO215 GENERAL MICROBIOLOGY 5 Credit Hours Prepared by: Dr. Cecil M. Hampton Revised Date: November 2005 by Dr. Ken Balak Arts & Science Education Dr. Mindy Selsor, Dean
More informationA Simulation-Evolutionary Approach for the allocation of Check-In Desks in Airport Terminals
A Simulation-Evolutionary Approach for the allocation of Check-In Desks in Airport Terminals Miguel MUJICA Mota a,b c and Catya ZUNIGA a Universitat Autonoma de Barcelona, Campus UAB,08193, Bellaterra,
More informationMining Evolving User Profiles in Noisy Web Clickstream Data with a Scalable Immune System Clustering Algorithm
Mining Evolving User Profiles in Noisy Web Clickstream Data with a Scalable Immune System Clustering Algorithm Olfa Nasraoui, Cesar Cardona, Carlos Rojas, Department of Electrical & Computer Engineering
More information2 Maria Carolina Monard and Gustavo E. A. P. A. Batista
Graphical Methods for Classifier Performance Evaluation Maria Carolina Monard and Gustavo E. A. P. A. Batista University of São Paulo USP Institute of Mathematics and Computer Science ICMC Department of
More informationVisualizing Crowdfunding
Visualizing Crowdfunding Alexander Chao UC Berkeley B.A. Statistics 2015 2601 Channing Way Berkeley, Ca 94704 alexchao56@gmail.com ABSTRACT With websites such as Kickstarter and Indiegogo rising in popular
More informationBiomarkers, Early Prediction of Vaccine Efficacy and Safety
Biomarkers, Early Prediction of Vaccine Efficacy and Safety Giuseppe Pantaleo, M.D. Professor of Medicine Head, Division of Immunology and Allergy Executive Director, Swiss Vaccine Research Institute Lausanne
More informationAntigen-Antibody Interaction
- Interaction JASON BROWNLEE Technical Report 070427A Complex Intelligent Systems Laboratory, Centre for Information Technology Research, Faculty of Information and Communication Technologies, Swinburne
More informationTutorial Segmentation and Classification
MARKETING ENGINEERING FOR EXCEL TUTORIAL VERSION v171025 Tutorial Segmentation and Classification Marketing Engineering for Excel is a Microsoft Excel add-in. The software runs from within Microsoft Excel
More informationGENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad.
GENETIC ALGORITHMS Narra Priyanka K.Naga Sowjanya Vasavi College of Engineering. Ibrahimbahg,Hyderabad mynameissowji@yahoo.com priyankanarra@yahoo.com Abstract Genetic algorithms are a part of evolutionary
More informationAPPLICATION OF ARTIFICIAL IMMUNE SYSTEM IN DESIGNING POWER SYSTEMS STABILIZER FREDDY PRASETIA BIN RIDHUAN
APPLICATION OF ARTIFICIAL IMMUNE SYSTEM IN DESIGNING POWER SYSTEMS STABILIZER FREDDY PRASETIA BIN RIDHUAN A project report submitted in partial fulfillment of the requirements for the award of the degree
More informationMICROBIOLOGY 20 (course #3124)
Stephen Brown (instructor) Los Angeles Mission College, Fall 2008 Lab: TTh 5:30-6:55, INST 2016 email: BrownST@lamission.edu Lecture: TTh 7:00-8:25, INST 2001 voicemail: 818-364-7665 office hours: TTh
More informationPREDICTING EMPLOYEE ATTRITION THROUGH DATA MINING
PREDICTING EMPLOYEE ATTRITION THROUGH DATA MINING Abbas Heiat, College of Business, Montana State University, Billings, MT 59102, aheiat@msubillings.edu ABSTRACT The purpose of this study is to investigate
More informationAn age artificial immune system for order pickings in an AS/RS with multiple I/O stations
An age artificial immune system for order picings in an AS/RS with multiple I/O stations K.L. Ma and Peggy S.K. Lau Abstract This paper proposes an age artificial immune system (AAIS), for optimal order
More informationAtlas of Genetics and Cytogenetics in Oncology and Haematology. IMMUNOGLOBULIN GENES: CONCEPT OF DNA REARRANGEMENT * Introduction
Atlas of Genetics and Cytogenetics in Oncology and Haematology IMMUNOGLOBULIN GENES: CONCEPT OF DNA REARRANGEMENT * Introduction I Historical questions II Answers II.1 Light chains (kappa or lambda) II.1.1
More informationBACTERIA. NO or membrane bound WHAT ARE THE TWO TYPES OF PROKARYOTES? TYPES EUBACTERIA ARCHAEBACTERIA. bilayer embedded with
Bacteria and Virus Notes WHAT ARE PROKARYOTES? ALWAYS organisms BACTERIA NO or membrane bound Very compared to cells WHAT ARE THE TWO TYPES OF PROKARYOTES? TYPES EUBACTERIA ARCHAEBACTERIA MAJOR DIFFERENCES
More informationCertified Digital Marketing Specialist in Search
Certified Digital Marketing Specialist in Search Align your skills with the needs of industry www.digitalandsocialmediaacademy.com Validated by the Syllabus Advisory Council (SAC). Including members from
More information2/23/16. Protein-Protein Interactions. Protein Interactions. Protein-Protein Interactions: The Interactome
Protein-Protein Interactions Protein Interactions A Protein may interact with: Other proteins Nucleic Acids Small molecules Protein-Protein Interactions: The Interactome Experimental methods: Mass Spec,
More informationPredicting user rating for Yelp businesses leveraging user similarity
Predicting user rating for Yelp businesses leveraging user similarity Kritika Singh kritika@eng.ucsd.edu Abstract Users visit a Yelp business, such as a restaurant, based on its overall rating and often
More informationKnowing the formula SHAREPOINT SOLUTIONS USING SERVERLESS FUNCTIONS
Knowing the formula SHAREPOINT SOLUTIONS USING SERVERLESS FUNCTIONS BY: KEN COOPER, Enterprise Architect, Cushman & Wakefield https://www.linkedin.com/in/kj07208 background Explosion of the Cloud Ecosystem
More informationPredictive Modeling Using SAS Visual Statistics: Beyond the Prediction
Paper SAS1774-2015 Predictive Modeling Using SAS Visual Statistics: Beyond the Prediction ABSTRACT Xiangxiang Meng, Wayne Thompson, and Jennifer Ames, SAS Institute Inc. Predictions, including regressions
More informationMICROBIO, IMMUN, PATHOLOGY-MIP (MIP)
Microbio, Immun, Pathology-MIP (MIP) 1 MICROBIO, IMMUN, PATHOLOGY-MIP (MIP) Courses MIP 101 Introduction to Human Disease (GT-SC2) Credits: 3 (3-0-0) Survey of human systems and diseases. Additional Information:
More informationAdobe Certified Expert Exam Guide Exam number: 9A0-394
Adobe Certified Expert Exam Guide Exam number: 9A0-394 Revised 2 April 2015 ABOUT ADOBE CERTIFIED EXPERT EXAMS To be an Adobe Certified Expert is to demonstrate expertise in helping clients realize value
More informationReproduction Strategy Based on Self-Organizing Map for Real-coded Genetic Algorithms
Neural Information Processing - Letters and Reviews Vol. 5, No. 2, November 2004 LETTER Reproduction Strategy Based on Self-Organizing Map for Real-coded Genetic Algorithms Ryosuke Kubota Graduate School
More informationPreprocessing Technique for Discrimination Prevention in Data Mining
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 6 Pages 12-16 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 Preprocessing Technique for Discrimination Prevention in Data Mining
More informationArtificial Life Lecture 14 EASy. Genetic Programming. EASy. GP EASy. GP solution to to problem 1. EASy. Picturing a Lisp program EASy
Artificial Life Lecture 14 14 Genetic Programming This will look at 3 aspects of Evolutionary Algorithms: 1) Genetic Programming GP 2) Classifier Systems 3) Species Adaptation Genetic Algorithms -- SAGA
More informationFacePrints, Maze Solver and Genetic algorithms
Machine Learning CS579 FacePrints, Maze Solver and Genetic algorithms by Jacob Blumberg Presentation Outline Brief reminder genetic algorithms FacePrints a system that evolves faces Improvements and future
More informationGoals, Utilities, and Mental Simulation in Continuous Planning
Goals, Utilities, and Mental Simulation in Continuous Planning Pat Langley, Mike Barley, Ben Meadows Department of Computer Science University of Auckland, Auckland, NZ Dongkyu Choi Department of Aerospace
More informationThis is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail.
Powered by TCPDF (www.tcpdf.org) This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Chattopadhyaya, Somnath; Mukhopadhyay,
More informationAdvanced Analytics through the credit cycle
Advanced Analytics through the credit cycle Alejandro Correa B. Andrés Gonzalez M. Introduction PRE ORIGINATION Credit Cycle POST ORIGINATION ORIGINATION Pre-Origination Propensity Models What is it?
More informationImmunology: Antibody Basics
e-learning JABSOM Immunology: Antibody Basics One :: General Structure Identify the Parts of an Antibody Two :: Isotypes Identify Antibody Isotypes Three :: Function Match Antibody Functions With Isotypes
More informationKeywords Genetic, pseudorandom numbers, cryptosystems, optimal solution.
Volume 6, Issue 8, August 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Apply Genetic
More informationCopyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT
ENTERPRISE MINER: ANALYTICAL MODEL DEVELOPMENT ANALYTICAL MODEL DEVELOPMENT AGENDA Enterprise Miner: Analytical Model Development The session looks at: - Supervised and Unsupervised Modelling - Classification
More informationDesigning High Thermal Conductive Materials Using Artificial Evolution MICHAEL DAVIES, BASKAR GANAPATHYSUBRAMANIAN, GANESH BALASUBRAMANIAN
Designing High Thermal Conductive Materials Using Artificial Evolution MICHAEL DAVIES, BASKAR GANAPATHYSUBRAMANIAN, GANESH BALASUBRAMANIAN The Problem Graphene is one of the most thermally conductive materials
More informationOptimization of Shell and Tube Heat Exchangers Using modified Genetic Algorithm
Optimization of Shell and Tube Heat Exchangers Using modified Genetic Algorithm S.Rajasekaran 1, Dr.T.Kannadasan 2 1 Dr.NGP Institute of Technology Coimbatore 641048, India srsme@yahoo.co.in 2 Director-Research
More informationIBM SPSS Modeler Personal
IBM SPSS Modeler Personal Make better decisions with predictive intelligence from the desktop Highlights Helps you identify hidden patterns and trends in your data to predict and improve outcomes Enables
More informationCOPYRIGHTED MATERIAL. Introduction
1 Introduction The classical approach to genetics starts with the identification of variants which have a specific phenotype, i.e. they are altered in some way that can be seen (or detected in other ways)
More informationSAS Machine Learning and other Analytics: Trends and Roadmap. Sascha Schubert Sberbank 8 Sep 2017
SAS Machine Learning and other Analytics: Trends and Roadmap Sascha Schubert Sberbank 8 Sep 2017 How Big Analytics will Change Organizations Optimization and Innovation Optimizing existing processes Customer
More informationDigital Finance in Shared Services & GBS. Deloitte: Piyush Mistry & Oscar Hamilton LBG: Steve McKenna
Digital Finance in Shared Services & GBS Deloitte: Piyush Mistry & Oscar Hamilton LBG: Steve McKenna Agenda Agenda Content Digital Finance of the Future Uncover the picture of what the future of Finance
More informationLecture 25 (11/15/17)
Lecture 25 (11/15/17) Reading: Ch9; 328-332 Ch25; 990-995, 1005-1012 Problems: Ch9 (study-guide: applying); 1,2 Ch9 (study-guide: facts); 7,8 Ch25 (text); 1-3,5-7,9,10,13-15 Ch25 (study-guide: applying);
More informationB cell Epitopes CENTER FOR BIOLOGICAL SEQUENCE ANALYSIS. Technical University of Denmark - DTU Department of systems biology
B cell Epitopes Antibody Effect Virus or Toxin Antibodies Antibody Effect Virus or Toxin Antibodies Antibodies Antibodies Antibody - Antigen interaction Antigen Antibody Antibody - Antigen interaction
More informationBachelor of Science (Hons) / Bachelor of Science Biomedical Science
Bachelor of Science (Hons) / Bachelor of Science Biomedical Science Awarded by In collaboration with This degree course is designed to give you a broad understanding of the scientific investigation of
More informationUniversity of Groningen. The value of haplotypes Vries, Anne René de
University of Groningen The value of haplotypes Vries, Anne René de IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document
More informationNeural Networks and Applications in Bioinformatics. Yuzhen Ye School of Informatics and Computing, Indiana University
Neural Networks and Applications in Bioinformatics Yuzhen Ye School of Informatics and Computing, Indiana University Contents Biological problem: promoter modeling Basics of neural networks Perceptrons
More information