1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

48
1 ARTIFICIAL IMMUNE SYSTEMS BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology

Transcript of 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

Page 1: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

1

ARTIFICIAL IMMUNE SYSTEMS

BY:Nazanin AsadiZohre Molaei

Isfahan University of Technology

Page 2: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

2

Outline

History Natural Immune System Artificial Immune System Application Experiment Result Reference

Page 3: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

3

History

Developed from the field of theoretical immunology in the mid 1980’s.

1990 – Bersini first use of immune algorithms to solve problems

Forrest et al – Computer Security mid 1990’s

Hunt et al, mid 1990’s – Machine learning

Page 4: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

4

Basic Immunology

Page 5: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

5

Role of the Immune System

Protect our bodies from infection Primary immune response

Launch a response to invading pathogens

Secondary immune responseRemember past encountersFaster response the second time around

The IS is adaptable (presents learning and memory)

Page 6: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

6

Where is it ?

Lymphatic vessels

Lymph nodes

Thymus

Spleen

Tonsils andadenoids

Bone marrow

Appendix

Peyer’s patches

Primary lymphoidorgans

Secondary lymphoidorgans

Page 7: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

7

Lymphocytes

Carry antigen receptors that are specificThey are produced in the bone marrow through random re-arrangement

B and T Cells are the main actors of the adaptive immune system

Page 8: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

8

B Cell Pattern Recognition

B cells have receptors called antibodies

The immune recognition is based on the

complementarity between the binding

region of the receptor and a portion of the

antigen called the epitope.

Recognition is not just by a single

antibody, but a collection of them

Learn not through a single agent,

but multiple ones

B-cell

BCR or Antibody

Epitopes

B-cell Receptors (Ab)

Antigen

Page 9: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

9

T-cells

Regulation of other cells

Active in the immune response

Helper T-cells

Killer T-cells

T-cell

TCR

APC

MHC-II Protein Antigen

Peptide

TH cell

MHC/peptide complex

Page 10: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

10

Immune Responses

Antigen Ag1 Antigens Ag1, Ag2

Primary Response Secondary Response

Lag

Response to Ag1

Ant

ibod

y C

once

ntra

tion

Time

Lag

Response to Ag2

Response to Ag1

...

...

Cross-Reactive Response

...

...

Antigen Ag1 + Ag3

Response to Ag1 + Ag3

Lag

Page 11: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

11

The Immune System models•The are many different viewpoints•These views are not mutually exclusive

classical

networkdanger

Page 12: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

12

Artificial Immune Systems

Page 13: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

13

Basic concepts

trained detectors(artificial lymphocytes) that detect nonself

patterns

need a good repository of self patterns or self and non-self

patterns to train ALCs to be self tolerant

need to measure the affinity between an ALC and a pattern

To be able to measure affinity, the representation of the patterns

and the ALCs need to have the same structure

The affinity between two ALCs needs to be measured

memory that frequently detect non-self patterns

When an ALC detects non-self patterns, it can be cloned and the

clones can be mutated to have more diversity in the search

space

Page 14: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

14

AIS Framework

Algorithms

Affinity

Representation

Application

Solution

AIS

Shape-Space

Binary

Integer

Real-valued

Symbolic

Page 15: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

15

Representation – Shape Space

Used for modeling antibody and antigen

Determine a measure to calculate affinity

Hamming shape space(binary)

1 if Abi != Agi: 0 otherwise (XOR

operator)

Antibody

Antigen

0 0 1 1 0 0 1 1

1 1 1 0 1 1 0 1

Ab:

Ag:

1

0

1

0

Page 16: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

16

Representation

Assume the general case: Ab = Ab1, Ab2, ..., AbL Ag = Ag1, Ag2, ..., AgL

Binary representation

Matching by bits Continuous (numeric)

Real or Integer, typically Euclidian Symbolic (Categorical /nominal)

E.g female or male of the attribute Gender.

Page 17: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

17

AIS Framework

Algorithms

Affinity

Representation

Application

Solution

AISEuclidean

Manhattan

Hamming

Page 18: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

18

Affinity

Euclidean

Manhattan

Hamming

L

1i

2ii )Ag(AbD

L

iii AgAbD

1

L

i

ii AgAbD

1 otherwise0

if1δwhereδ,

Page 19: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

19

AIS Framework

Algorithms

Affinity

Representation

Application

Solution

AIS

Bone Marrow Models

Negative Selection

Clonal Selection

Positive Selection

Immune Network Models

Page 20: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

20

Basic AIS Algorithm

Page 21: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

21

Negative Selection Algorithms

Forrest 1994: Idea taken from the negative selection of T-cells in the thymus

Applied initially to computer security Split into two parts: Censoring Monitoring

Selfstrings (S)

Generaterandom strings

(R0)Match Detector

Set (R)

Reject

No

Yes

No

Yes

Detector Set(R)

ProtectedStrings (S)

Match

Non-selfDetected

Page 22: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

22

All patterns and ALCs : as nominal valued attributes or as binary strings

Affinity : r-continuous matching rule

Training set : self patterns

Page 23: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

23

Training ALCs with negative selection

Page 24: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

24

Clonal Selection

Antigens

Proliferation Differentiation

Plasma cells

Memory cells

Selection

M

M

Page 25: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

25

Clonal Selection

selection of a set of ALCs with the highest calculated affinity with a non-self pattern

cloned and mutated

compete with the existing set of ALCs

to be exposed to the next non-self pattern Continuous (numeric)

Page 26: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

26

ClONALG algorithm

De Castro and Von presented CLONALG as an algorithm,2001

initially proposed to perform machine-learning pattern recognition

Adapted to be applied to optimization problem

Page 27: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

27

ClONALG algorithm

main immune aspects taken into account to develop the algorithm maintenance of a specific memory set selection and cloning of the most stimulated

Antibodies death of non-stimulated antibodies affinity maturation and re-selection of the

clones proportionally to their antigenic affinity generation and maintenance of diversity

Page 28: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

28

ClONALG

All patterns in binary strings

Training set : non-self patterns

Affinity : Hamming distance , between ALC and

non-self pattern

Lower Hamming distance = stronger affinity

Assumption : One memory ALC for each of the

patterns that needs to be recognized in training

set

Page 29: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

29

ClONALG

Page 30: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

30

CLONALG optimization case

an objective function g(⋅) must to be optimized

(maximized or minimized)

antibody affinity corresponds to the objective

function

each antibody Abi represents an element of the

input space

it is no longer necessary to maintain a separate

memory set Ab

Page 31: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

31

CLONALG optimization case

Page 32: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

32

CLONALG optimization case

Page 33: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

33

Immune Network Models

The ALCs interact with each other to learn the

structure of a non-self pattern

The ALCs in a network co-stimulates and/or co-

suppress each other to adapt to the non-self pattern

The stimulation of an ALC based on the calculated affinity between the ALC

and the non-self pattern the calculated affinity between the ALC and

network ALCs as co-stimulation and/or co-suppression.

Page 34: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

34

Artificial Immune Network

Timmis and Neal,2000

Application clustering

data visualization

control

optimization domains

AINE defines the new concept of artificial recognition balls

(ARBs)

population of ARBs links between the ARBs a set of antigen training patterns Some clonal operations for learning

Page 35: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

35

Artificial Immune Network

 

Page 36: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

36

Artificial Immune Network

all training patterns in set DT are presented to

the set of ARBs

After each iteration, each ARB calculates its stimulation level Allocates resources (i.e. B-Cells) based on its

stimulation level as

The stimulation level antigen stimulation network stimulation network suppression

Page 37: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

37

Artificial Immune Network

Page 38: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

38

Stimulation level

 

Page 39: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

39

Resource allocation

Page 40: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

40

Danger Theory Models

distinguishes between

what is dangerous and

non-dangerous

Include a signal to

determine whether a

non-self pattern is

dangerous or not

Page 41: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

41

An Adaptive Mailbox

classifies interesting from uninteresting emails

initialization phase (training)

running phase (testing)

Page 42: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

42

initialization phase

Page 43: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

running phase

Page 44: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

44

Application of AIS

network intrusion and anomaly detection

data classification models

virus detection

concept learning

data clustering

robotics

pattern recognition and data mining

optimization of multi-modal functions

Page 45: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

45

PSO and AIS

Page 46: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

46

PSO and AIS

PSO performs about 56 percent faster than.

AIS performs faster than PSO (about 14 percent)

for simpler mathematical functions

Page 47: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

47

Reference

Computational Intelligence An introduction ,

Adndries P.Engelbrecht

Learning and Optimization Using the Clonal

Selection Principle, Leandro N. de

Castro, ,Fernando J. Von Zuben, IEEE,2002

A Comparative Analysis on the Performance of

Particle Swarm Optimization and Artificial Immune

Systems for Mathematical Test Functions, 1David

F.W. Yap, 2S.P. Koh, 2S.K. Tiong,Australian Journal

of Basic and Applied Sciences, 2009

Page 48: 1 BY: Nazanin Asadi Zohre Molaei Isfahan University of Technology.

48