Implementation of Artificial Immune System Algorithms

Similar documents
An Introduction to Artificial Immune Systems

Stable Clusters Formation in an Artificial Immune System

Searching for memory in artificial immune system

ARTICLE IN PRESS. Immune programming

Coordination of Cooperative Search and Rescue Robots for Disaster Relief

A New Approach to Solve Multiple Traveling Salesmen Problem by Clonal Selection Algorithm

Chapter 2. Antibodies

An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems

Antibodies and Antigens in the Blood Bank 9/7/2015 NAHLA BAKHAMIS 1

LECTURE: 22 IMMUNOGLOBULIN DIVERSITIES LEARNING OBJECTIVES: The student should be able to:

CHAPTER 7 CELLULAR BASIS OF ANTIBODY DIVERSITY: CLONAL SELECTION

GENETIC BASIS OF ANTIBODY STRUCTURE AND DIVERSITY. Steven J. Norris, Ph.D

Antibody Structure. Antibodies

Antibody Structure supports Function

COMPARISON OF PARETO EFFICIENCY AND WEIGHTED OBJECTIVES METHOD TO SOLVE THE MULTI-CRITERIA VEHICLE ROUTING PROBLEM USING THE ARTIFICIAL IMMUNE SYSTEM

Immune and Evolutionary Approaches to Software Mutation Testing

SPECIFICITY, DIVERSITY, AND IMMUNOGLOBULIN GENES

CHAPTER 3 ANTIBODY STRUCTURE I

Tuning of 2-DOF PID Controller By Immune Algorithm

Artificial Immune Systems

A Viral Systems Algorithm for the Traveling Salesman Problem

THE PATH TO PRECISION MEDICINE IN MULTIPLE MYELOMA. themmrf.org

UTILIZATION OF ARTIFICIAL IMMUNE SYSTEM IN PREDICTION OF PADDY PRODUCTION

Immunotherapy in myeloma

Atlas of Genetics and Cytogenetics in Oncology and Haematology. IMMUNOGLOBULIN GENES: CONCEPT OF DNA REARRANGEMENT * Introduction

PREDICTING EMPLOYEE ATTRITION THROUGH DATA MINING

Energy management using genetic algorithms

Biomarkers, Early Prediction of Vaccine Efficacy and Safety

Antibodies and Antigens In the blood bank

In vitro cultures of bone marrow stromal cells and progenitor B cells can accurately recapitulate the normal steps of B cell development.

B cell development The stages of B cell development

FUNCTION OPTIMIZATION BY THE IMMUNE METAPHOR

Immunology: An Overview

GIVING ANALYTICS MEANING AGAIN

Viruses and Bacteria Notes

Basic Antibody Structure. Multiple myeloma = cancerous plasma cells Monomer = 150,000. Chapter 4. Immunoglobulin Structure and Function

Implementation of Genetic Algorithm for Agriculture System

Course Descriptions. BIOL: Biology. MICB: Microbiology. [1]

Artificial Immune System driven evolution in Swarm Chemistry

Application of Intelligent Methods for Improving the Performance of COCOMO in Software Projects

Immunology: Antibody Basics

Brabazon, Anthony; Cahill, Jane; Keenan, Peter; Walsh, Daniel

Is Machine Learning the future of the Business Intelligence?

Serology as a Diagnostic Technique

A Review of the Clonal Selection Theory of Acquired Immunity

IMMUNOBIOLOGY : AN INTRODUCTION

Antigen-Antibody Interaction

Step-by-Step Description of ELISA

A NEW TECHNIQUE FOR MAXIMUM LOAD MARGIN ESTIMATION AND PREDICTION

What is Evolutionary Computation? Genetic Algorithms. Components of Evolutionary Computing. The Argument. When changes occur...

Intelligent Systems. For more information on partnering with the Kansas City Plant, contact:

APPLICATION OF ARTIFICIAL IMMUNE SYSTEM IN DESIGNING POWER SYSTEMS STABILIZER FREDDY PRASETIA BIN RIDHUAN

COMPUTATIONAL INTELLIGENCE FOR SUPPLY CHAIN MANAGEMENT AND DESIGN: ADVANCED METHODS

GENETIC ALGORITHMS. Narra Priyanka. K.Naga Sowjanya. Vasavi College of Engineering. Ibrahimbahg,Hyderabad.

B cell Epitopes CENTER FOR BIOLOGICAL SEQUENCE ANALYSIS. Technical University of Denmark - DTU Department of systems biology

Machine Learning Technologies for The Hospitality Industry

T and B cell gene rearrangement October 17, Ram Savan

Simulation Study of the Reliability and Robustness of the Statistical Methods for Detecting Positive Selection at Single Amino Acid Sites

ANTIBODY IMMUNOGENICITY

Feature Selection of Gene Expression Data for Cancer Classification: A Review

بسم هللا الرحمن الرحيم. Today we're going to talk about the generation of diversity of the receptors of the lymphocytes

Page 1 of 27

Memory devices for neuromorphic computing

Addressing Predictive Maintenance with SAP Predictive Analytics

Leaf Disease Detection Using K-Means Clustering And Fuzzy Logic Classifier

Immunoglobulins Harry W Schroeder Jr MD PhD

B-cell Epitope Prediction and Cloning monoclonal ADAs

Digital Finance in Shared Services & GBS. Deloitte: Piyush Mistry & Oscar Hamilton LBG: Steve McKenna

Data Warehousing. and Data Mining. Gauravkumarsingh Gaharwar

Strategies for Assessment of Immunotoxicology in Preclinical Drug Development

Molecular Forces in Antibody Maturation*

Protein homology. Antigens & Antibodies I. Administrative issues:

IMMUNOGLOBULIN GENES UNDERGO TWO DNA REARRANGEMENTS

Discovery and Humanization of Novel High Affinity Neutralizing Monoclonal Antibodies to Human IL-17A

Genetic Algorithm and Neural Network

Phylogenetic Assessment of Innate Immunity s Complement Component C3 and Factor B (Bf)

Challenges and Opportunities of Sensors and Intelligent Systems for Food Chain. Suranjan Panigrahi Professor

Advanced Analytics through the credit cycle

Flow Cytometry - The Essentials

In silico prediction of novel therapeutic targets using gene disease association data

They are similar to one another but different from other species: They are capable of breeding: Artificial classification: Natural classification:

Application of Deep Learning to Drug Discovery

i) Wild animals: Those animals that do not live under human supervision or control and do not have their phenotype selected by humans.

Genetic material must be able to:

Real-Time Artificial Intelligence for Scheduling and Planning Make-to-Order Manufacturing

Biomolecular chemistry. 7. Antibodies: structure and function

Dendritic Cells for SYN Scan Detection

Applying Computational Intelligence in Software Testing

2013 W. H. Freeman and Company. 5 Function of Globular Proteins

Biotechnology Unit: Viruses

The Age of Intelligent Data Systems: An Introduction with Application Examples. Paulo Cortez (ALGORITMI R&D Centre, University of Minho)

Human IL10RB ELISA Pair Set ( CRFB4 )

Data Mining in CRM THE CRM STRATEGY

Analysis of Biological Sequences SPH

Sergeant System s Immune System Defense Team Webquest

Gene Transfer 11/4/13. Fredrick Griffith in the 1920s did an experiment. Not until 1944 was DNA shown to be the moveable element

Artificial Intelligence in Automotive Production

Machine learning in neuroscience

Transcription:

Implementation of Artificial Immune System Algorithms K. Sri Lakshmi Associate Professor, Department of CSE Abstract An artificial immune system (AIS) that is distributed, robust, dynamic, diverse and adaptive. It captures many features of the vertebrate immune system and places them in the context of the problem of protecting a network of computers from illegal intrusions.this involved investigating AIS algorithms and implementing a suitable one. A number of AIS algorithms were examined and chosen to achieve high classification accuracies while possessing less computational complexity than other algorithms. Using the AIS concepts and algorithms to find how the human immune system works. The immune recognition is based on the complementarily between the binding region of the receptor and a portion of the antigen called epitope. Antibodies present a single type of receptor, antigens might present several epitopes. This means that different antibodies can recognize a single antigen. Keywords: Self and Non-self discrimination, T cell and B cell, Negative selection, Clonal selection, Positive selection. 1. INTRODUCTION A biological immune system consists of two different response systems: innate and adaptive immune systems. By cooperation of these, the whole immune system defends the body against harmful foreign antigens. The innate system responds to foreign antigens. This mechanism has not been used in artificial immune systems. In contrast, the adaptive part functions against specific targets, which has been available for artificial immune systems. The important functions of the adaptive immune system are to recognize, eliminate and memorize foreign antigens, as well as to discriminate between self and non-self molecules. This means that the immune system is able to react only to non-self molecules. The adaptive immune system consists of two kinds of lymphocytes. One is the B cell, which originates in the bone marrow and has the ability to produce antibodies. B cells can recognize the shape of foreign antigens, eliminate and memorize them. The other is the T cell, which can discriminate between self and non-self molecules in a body. T cells acquire the ability to discriminate by education in an organ named the thymus. What happens in the thymus? If the T cell recognizes self-molecules, it causes apotosis and dies. This is called negative selection. If it does not react, it is tested with non-self molecules. If the T cell is not able to recognize them, it dies. So, T cells that can react with non-self molecules survive. This is positive selection. Tcells that can pass through the thymus are able to react to non-self molecules but unable to react to self molecules (see the Figure). After training in a thymus, T cells circulate throughout the body. When B cells react with foreign antigens, they need the help of T cells. B cells do not react with self molecules if T cells do not recognize it. As a result, the adaptive immune system does not attach self-molecules. Self and non-self classes To apply the self and non-self regions and the mechanism of dividing shape space to classification, it is necessary to divide the data set into two classes: self and non-self classes. Self-class consists of only one class in the problem and non- Volume 3, Issue 6, June 2014 Page 367

self class consists of all the remaining classes. The immune system categorizes self-molecules as self-class and all other molecules as non-self class. Data belonging to self-class are named self data and those in the non-self class are named non-self data. Self and non-self regions in the shape space Modeling of the immune receptor is one of the most important items, because the immune reaction is based on recognition via the receptor. In AIS, it is represented in shape space. It is a phase space whose axes represent the properties of the receptor; for example, the length, width, height of any bump or groove in the Combining site, electrostatic charge, etc. This means that the position in shape space represents the shape of a receptor. The distance between two positions is the affinity between these shapes. The smaller the distance, the higher the affinity. If the distance is smaller than a threshold, these interact with each other. To apply education in a thymus to classification, we need to understand how to represent this mechanism in shape space. There are two kinds of region in shape space. Thyms education makes it possible for survived T cells to be distributed in only one region called the non-self region. The other region is named self region. Negative selection removes T cells from the self-region and positive selection chooses T cells distributed in the non-self region. This is very useful for classification, because the data set belonging to the same class becomes clusters. Antibodies and Antigen Antibodies (also referred to as immunoglobulin and gamma globulins) are Y-shaped proteins that respond to a specific antigen (bacteria, virus or toxin). Each antibody has a special section (at the tips of the two branches of the Y) that is sensitive to a specific antigen and binds to it. When an antibody binds to a toxin it becomes an antitoxin and generally disables the chemical action of the toxin. A large number of antibodies can bind to an invader and signal the complement system, that the invader needs to be removed. Antigens are defective coding on the cell surface that appears soon after the infection of a cell by an infectious agent, but before replication has begun. Epitopes, which are patterns, present on the surface of the antigen are used by the antibody to detect if they constitute a potential threat to the body. Artificial lymphocyte In the immune system, each T cell recognizes these molecules. AIS uses artificial lymphocytes (ALC) to recognize data individually in the same way. The ALC consists of a receptor, a recognition distance threshold (RDT) and a self class. The receptor is represented in shape space. Its definition is such that, if there is a distance (Euclidian distance, hamming distance, etc.) between an ALC and individual data, the ALC can recognize it. Self class of an ALC is one of the classes. The remaining classes are non-self class for the ALC. Self class is decided in a learning process (next subsection).if class i is a self class in a learning process, self class is i.then, ALCi represents the ALC who s self-class is i and the ALCs whose self class is the same are named the same kind of ALC. Volume 3, Issue 6, June 2014 Page 368

Fig: Determination of RDT. 2. Learning Processes We describe the algorithm to acquire the ALCi set so that these ALCi cannot recognize the data belonging to their own self class ( i ).This is inspired by education in a thymus and consists of iteration of some processes. These processes are proliferation and mutation(clonalexpansion), determination of RDT (negative selection) and activation and selection (positive selection). After passing through these processes, the ALCi is named memory ALCi. In the proliferation and mutation process, one ALCi produces clones. Mutation of a cell is done in the immune system and it is important to use this for computation. Changing the receptor of ALC partially makes a clone. This process is the same as the evolutionary computations and is known to be effective. In negative selection, we reverse the idea. We don t choose the ALC that cannot recognize the self data set, but decide the RDT of ALC so that it cannot recognize the self data set. The reason is the computational cost. With a real thymus, only about 3% can survive among an enormous number of T cells and this is costly. RDT is determined by multiplying the minimum distance with the self data set by the constant number α equal to or less than 1. This ensures that ALCs cannot recognize the self-data that are used as the training data. It introduces the variable recognition threshold of ALC and a new negative selection algorithm. Parameter α is the most important in DAIS(Discrimination-based Artificial Immune System). In positive selection, an ALCi is selected in order to perform two kinds of activity. To decide the activities, the non-self data set is divided into two kinds. One is the data that are not recognized by the memory ALCis and the other is the data recognized by them, which are represented as Ui and Ri, respectively. The primary activity of an ALCi is the number of Ui that it can recognize. The secondary activity of an ALCi is the number of Ri that it can recognize. An ALCi is selected in the order of the primary activity. If some ALCis have the same activity, they are selected in the order of the secondary activity. If some ALCis have the same secondary activity, they are selected in the order of RDT. The larger RDT an ALCi has, the wider it can cover. The remaining ALCis are removed. These processes make an ALCi more effective. The above processes are repeated to obtain the more useful ALCi..The learning process is as follows in detail. Antibody and Antigen with Paratope, Epitope and Idiotope Through three big processes with one ALC, we get the more effective ALC. First, in the proliferation and mutation process, the ALC produces its clones. Next, the self data set is presented to these clones and their RDT is determined. In the final process, they are activated by non-self data set and the best ALC is selected. Negative Selection Mechanism The purpose of negative selection is to provide tolerance for self-cells.it deals with the immune system s ability to detect unknown antigens while not reacting to the self-cells. During the generation of T-cells, receptors are made through a pseudo-random genetic rearrangement process. Then, they undergo a censoring process in the thymus, called the negative selection. There, T-cells that react against self-proteins are destroyed; thus, only those that do not bind to self-proteins are allowed to leave the thymus. These matured T-cells then circulate throughout the body to perform immunological functions and protect the body against foreign antigens. Volume 3, Issue 6, June 2014 Page 369

Clonal Selection Principle The clonal selection principle describes the basic features of an immune response to an antigenic stimulus. It establishes the idea that only those cells that recognize the antigen proliferate, thus being selected against those that do not. The main features of the clonal selection theory are that 1. The new cells are copies of their parents (clone) subjected to a mutation mechanism with high rates (somatic hypermutation); 2. Elimination of newly differentiated lymphocytes carrying self-reactive receptors; 3. Proliferation and differentiation on contact of mature cells with antigens. When an antibody strongly matches an antigen the corresponding B-cell is stimulated to produce clones of itself that then produce more antibodies. This (hyper) mutation, is quite rapid, often as much as one mutation per cell division (de Castro and Von Zuben, 1999). This allows a very quick response to the antigens. It should be noted here that in the Artificial Immune System literature, often no distinction is made between B-cells and the antibodies they produce. Both are subsumed under the word antibody and statements such as mutation of antibodies (rather than mutation of B-cells) are common. Experimental Results The immune recognition is based on the complementarily between the binding region of the receptor and a portion of the antigen called epitope. Antibodies present a single type of receptor, antigens might present several epitopes. This means that different antibodies can recognize a single antigen.this involved investigating AIS algorithms and implementing a suitable one. A number of AIS algorithms were examined and the AIRS2 algorithm was chosen due to its abilities to achieve high classification accuracies while possessing less computational complexity than other algorithms The choice between negative and positive selection can be based on various reasons. There are at least two factors that cannot be ignored. First, in many applications, a large amount of normal data is typical, e.g.in network intrusion detection problem. These data are not only too large to be used directly to find anomaly, but contains too much duplicated or similar information. Second, if a method does not provide any inductive ability, for example, clustering or rule extraction, from the raw data, it is not really a learning method, strictly speaking. Both positive selection and negative selection can be a reasonable choice according to the specifics of the problem. One obvious scenario when negative selection is preferred is when we have a large number of self samples and we can potentially generate a relatively small set of detectors. The straightforward positive selection proposed a couple of times by a valid alternative in most cases. When the number of self samples are larger than the number of detectors by more than one order of magnitude, such positive selection method like Self-Detector is not a realistic solution. 3. Results Negative selection Volume 3, Issue 6, June 2014 Page 370

Clonal Selection Positive Selection 4. Conclusion There is no direct analog of our negative-selection algorithm in classifier systems, except the learning rules under which new rules are generated. Bidding for messages in classifier systems is analogous to immune cells competing to bind to foreign datapaths. we have shown here how to embed an architecture for adaptive behavior in a realtime environment with live agents.our research was a collection of pressing unsolved problems in computer security. Over the past several years we have designed and built several successful solutions to real computer security problems. The role of the algorithms is played by our affinity maturation model of learning, although ours is simpler in the sense that we assign credit directly from the environment to the detectors, and do not pass strength among immune cells. A more direct analog of the bucket brigade would occur if we tried to build up idiotypic networks of immune cell in which immune cells stimulate and repress other immune cells. Although this is appealing from an adaptive design perspective, there is little if any experimental evidence that such networks exist in natural immune systems.although the mapping is not 1-1, we believe that the AIS we have described in this paper captures many of the important properties of classifier systems and provides an interesting point of comparison. References [1] De Castro, L. and J. Timmis, 2001. Artificial Immune Systems: A New computational Intelligence Approach. Springer.J. Computer Sci., 3 (4): 204-211, 2007 211. Volume 3, Issue 6, June 2014 Page 371

[2] Chao, D.L. and S. Forrest, 2002. Information filtering systems. Proc. Intl. Conf. on Artificial Immune Systems, pp: 132-140. [3] Timmis, J., M. Neal and J. Hunt, 2000. An artificial immune system for data analysis. BioSystems, 55:143-150. [4] Potter, M.A. and K.A. De Jong, 1998. The coevolution of antibodies for concept learning.proc. PPSN. [5] Watokins, A. and J. Timmis, 2004. Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm.genetic Programming and Evolvable Machines, 5:291-317. [6] De Castro, L. and J. Timmis, 2002. Artificial immune systems: a novel paradigm for pattern recognition. L. Alonso, J. Corchado and C. Fyfe (Eds.), Artificial Neural Networks in Pattern Recognition, University of Paisley, pp: 67-84. [7] Graaff, A.J. and A.P. Engelbrecht, 2006. Optimised coverage of non-self with evolved lymphocytes in an artificial immune system. Intl. J. Computational Intelligence Res., 2: 127-150. [8] Duch, 2000. Datasets used for classification: Comparison of results. http:// www. phys. uni.torun. pl/kmk/ projects/ datasets. html. AUTHOR Sri Lakshmi Kanagala is a Associate Professor in the Department of Computer Science & Engineering, Dadi Institute of Engineering and Technology (Affiliated to JNTUK), Anakapalle, Andhra Pradesh, India. She obtained his M.Tech in Computer Science from JNTU,Kakinada. Her main research interests are data mining, Artificial Intellegence, Computer Networks, Operating Systems. Volume 3, Issue 6, June 2014 Page 372