Monday, April 1, 2019

Dentitic Cell and Immune Networks Algorithm Comparison

Dentitic Cell and repellent net profits algorithm ComparisonA Comparative study of Dentitic carrel and insubordinate earningss algorithmic ruleic programic rule for drippy resistive internets.Jaspreet kaur, Kamal KumarAbstract ersatz repellent systems argon the systems use for advanced deliberational systems for the need of robust and secure dish outing of computer systems. They be the systems inspired by the human insubordinate systems in the human immunity retain the form from external threats. We in this idea would be working on the networking branch of the AIS which is called Artificial tolerant networks which builds up an immunity in the network against the attacks. The accuracy, time analysis and a some other parameters ar to be studied using two algorithms of Artificial immune networks. The two algorithms which we argon taking in action will be immune networks algorithm and Dentritic cell algorithm.1 INTRODUCTIONAn immune system, one of the most c omposite biological sys-tems, has been used as a metaphor for intelligent computation in a variety of domains. Artificial immune System (AIS) has been considered as a family of techniques originated from the community of immunology. As an important constituent of the AIS, the substitute immune networks are base on the principles of the appearances of both B cells and T cells in the biological immune system. B cell is an integral part of the immune system. Through a process of recognition and stimulation, the B cells croupe copy and mutate to produce a diverse caboodle of antibodies in an drive to remove the contagion from the organic structure. T cell has two types. One regulates and con-trols the effect of the immune reception, and the other di-rectly destroys the cells that have specific antigens. Both the B cells and T cells have been widely employed to solve a wide stray of engineering problems, such as anomalousness spotting and selective information mining. This paper aims at giving a concise overview on the artificial immune network models including their opening, structures, and applications.Functions, principles and models, which can be applied to real world problems. check to the mechanis of DCs, the dendritic cell Algorithm (DCA) has been put forward by Greensmith and luckyly applied to a range of problems, particularly in the area of anomaly discoverionCompared with the classical AIS algorithms , the DCA has advantages of small enumerations, strong recognition ability and few training samples, but it overly hasthe defect that it will have promising sensing accuracy sole(prenominal)in ordered info sets, with the increasing of the disorder occasion point in data sets, the accuracy will reduce and the sense slight positives and the false negatives will increase obviously. Experiments show that except some noise data most of themistakes occur during the transition phases, this is because during a transition phase on that poi nt is a small degree of confusion regarding temporally and spatially meet antigens and DC whitethorn sample multiple antigens in different types of context.The Dendritic Cell Algorithm (DCA) is a second generation Artificial tolerant System (AIS) algorithm. It is ground on an abstract model of the function of dendritic cells and their ability to discriminate betwixt healthy and infected tissue . As a context-aware anomaly detection algorithm, the DCA performs well in malware detection. Current query with this algorithm have suggested that the DCA shows not only excellent performance on detection rate, but also promise in assisting in reducing the number of false positive errors shown with similar systems.However, as the defenses evolve, so does the malware. The DCA distinguishes between normal and potentially catty antigens on the basis of the concentration of jeopardy signals they cause and neighboring antigens. This feature cabe exploited by crafty malware via mimicry att acks (such as blending with normal activities or mimicking normal behavior) to evade detection by the DCA . For example, some stealthy malware communicate with remote servers only when they detect user activities (such as requesting web pages). This reduces both the frequency and significance of malicious behavior, reservation the malware less active and more likely to avoid detection by the DCA. In , Gu et al. proposed an improvement for the DCA namely antigen multiplier to castigate the problem of antigen deficiency. As an additional function of the DCA, antigen multiplier can move over several copies of each individual antigen which can be cater to multiple dendritic cells (DCs). Then the classification decision is averaged over the replicated population. The data-based results showed that antigen multiplier helped in improving the classification accuracy. But, as antigen multiplier copies each antigen it meets indifferently, it may show less resistance to mimicry attacks si nce the concentration of potentially malicious antigens is not increased. Similar to the inefficient detection to hidden and idle malware by the DCA, biological immune system (BIS) also shows inefficiency when responds to some antigens.2 LITERATURE REVIEWIn this research paper 1 the author has analysed the immune theory and hopfied neural network (HNN), them proposing a new algorithm for three-dimensional functionality. A group of solutions are collected for analyses using k center algorithm. Then later on the cluster is taken which is cluster centurions by k means algorithm. In this paper, by making use of the advantages of ball analysis algorithm, HNN and ia, a new algorithm is proposed to solve the optimal problems of multimodal function with high dimensions. Simulation experiment proves that the new algorithm has much higher(prenominal) accuracy and shorter running time, compared with ia. Especially, at high dimensional function, the new algorithm has clearly advantage.In this paper2, a novel multi-modal optimisation algorithm, namely Dcopt-aiNet is proposed, which is based on biological immune network mechanism for global numeric optimization. Different from de Castros opt-aiNet algorithm, Dcopt-aiNet models copy operation using dynamic cloning operation which is adopted from biological immune network mechanism. Based on the multi-modal benchmarks, experiments were carried out to compare the performance of Dcopt-aiNet with that of opt-aiNet. Experiment results show that when compared with the opt-aiNet method, the new algorithm is capable of improving search performance significantly in successful rate and convergence speed.In this paper 3 the author has proposed the the use of DCA for malwre detection. Artificial adjuvants increase immunogenicity of stealthy malware which speeds up the immunigenicity of them. This is how they improve the malware detection with help of DCA. future work proposed in this paper is that the experiments need to evalua te their effects on enhancing the detection performance of dca. Further we need to better understand the mechanisms of immunologic adjuvants can be beneficial to design more biologically. Lastly to make more diverse and more general algorithms.In this research paper4 the algorithm is posed to only good in ordered data set but the results in the other cases are not considered to be great. In instances of different antigens, each instance is accesed and finally all the asessments made are taken into account. Proposed algorithm i.e. Mmdca brings up the nature of each multiplier and also it can be inferred that the false positives is higher, this is because the dca weights matrix used to calculate the fishing tackle and mat tends to mat.With the intrinsic properties of multimodal optimization problems, a multi-population artificial immune network algorithm (mopt-aiNet) is proposed to improve the performance of static and time-varing multimodal optimization problems by making use of bi ologic immune mechanism in this paper5. Compared with other immune network search methods, several novel operations such as multi-population dynamic hypermutation, asynchronous colony evolution, dynamic stock solutions management and a hill-valley exploring are designed which can speed upsearching the environment in an optimal way. Two other immune network algorithms are compared against mopt-aiNet by using static and dynamic benchmarks. Comparative analysis illustrates mopt-aiNets potential value.A bi-objective optimization model of fountain and power changes generated by a wind turbine is discussed in this paper6. The model involves two objectives, power maximization and power ramp rate (PRR) minimization. A new constraint for power maximization based on physics and process control theory is introduced. Data-mining algorithms were used to identify the model of power generation from the industrial data collected at a wind farm. The models and constraints derived from the data w ere integrated to perfect the power it egotism and the power variability, expressed as the power ramp rate. referable to the nonlinearity and complexity of the optimization model, an artificial immune network algorithm was used to solve it. The optimization results, such as computed operation strategies and the corresponding outputs, are demonstrated and discussed.In this paper 7 , the problem of finding the optimal contact free path, path intend for the case of a controllable alert robot moving in a static environment alter with obstacles with known shape and size is studied. A path planner based on a hybrid memetic algorithm, Genetic Artificial insubordinate Network (GAIN), which provides near optimal collision free path is proposed. Genetic Artificial Immune Network is a hybrid memetic algorithm based on Genetic Algorithm (GA) and Artificial Immune Network (AIN) algorithm. The network cell structures are simple which makes the operators simple and results in a fast calcula tion with smaller number of cells. The results obtained from GAIN is compared with that of GA and GAIN is found to outperform. GA in calls of convergence speed and result obtained, making it a promising algorithm for solving the mobile robot path planning problem.3 PROBLEM FORMULATIONAdaptive immunity is directed towards specific invaders either seen before or not previously encountered and gets modified by exposure to invaders. It mainly consists of lymphocytes (white blood cells, more specifically B and T type) that aid the process of recognizing and destroying specific substances, and are antigen-specific.clonal Selection clonal selection theory was proposed by Burnet. The theory is used to explain grassroots response of adaptive immune system to antigenic stimulus. It establishes the idea that only those cells capable of recognizing an antigen will proliferate while other cells are selected against. Clonal selection operates on both B and T cells. B cells, when their antibodie s bind off with an antigen, are activated and differentiated into plasma or memory cells. forward to this process, clones of B cells are produced and change somatic hyper mutation. As a result, renewing is introduced into the B cell population. Plasma cells produce antigen-specific antibodies that are work against antigen. retrospection cells remain with the host and promote a rapid secondary response. prejudicious Selection Negative selection is a mechanism to protect body against self- fightive lymphocytes. It utilizes the immune systems ability to detect unknown antigens while not reacting to the self cells. During the generation of T-cells, receptors are made through a pseudo-random genetic rearrangement process. Then, they undergo a censoring process in the thymus, called the negative selection. In this process, T-cells that react against self-proteins are destroyed and only those that do not bind to self-proteins are allowed to leave the thymus. These matured T-cells then circulate throughout the body performing immunological functions and protecting the body against foreign antigens.4 OBJECTIVES1. To study intuitively and understand the working of dentritic cell and immune networks technique in artificial immune systems.2. To analyse the two above mentioned techniques on the basis of the undermentioned parameters-A. AccuracyB. Response timeC. Fittest cell levelD. Immune memory strength.3. Mathematical and graphical comparison between dentritic cell and immune networks.5 RESEARCH METHODOLOGYALGORITHM DESIGN ( Dentritic Cell )Its principle is taken up from the original dentritic cell mechanism in the human body with which our human immune system works. It generally takes advantage of the remembering power of our body in which if our body if exposed to a certain infection remembers it prevents it from harming us in at least near future, it also may cause permanent prevention.ALGORITHM DESIGN ( Immune Networks )Its principle is taken up from the immun e network mechanism which does not have dogged idea for prevention of particular disease in all senses. It undoubted takes up a more robust way of finding the right vaccine or the attack example for actual prevention.6 RESULTS AND CONCLUSION chuck out graph for less no of attacksBar for all attacksPlot for less no. of attacks.Plot for all attacks.POINTS OF CONCLUSIONThe accuracy varies with no. of attacks. more the no. of attacks in DCT more is the accuracy.Accuracy in INT is not bloodsucking on no. of attacks.Though the accuracy of the DCT is more but the response time of INT takes lead on DCT.In terms of response time INT is much better than DCT.DCT has time consuming behavior because of all infixed processes which take place in it like updating memory cells and ratting t cell etc.Memory strength of DCT improves with no. of attacks and it is placement quo in INT.Fittest cell level show only local behavior of a part of the system having most immunity.In short term goals INT is preferable because its less time consuming and can act quick. similarly its cheaper as no internal processes prevail.In long term goals DCT is preferable because of its stability.We need to have a really fast system to action DCT because of its time consumptionDCT is a central system because t cells go for record of all previous attacks and which is accessible to every part or ip in the network which makes DCT a central system.7 REFERENCES1 Ruiying Zhou, Qiuhong Fan, Mingjun Wei, solvent for Multimodal Function with High Dimensions Base on Hopfield Neural Network and Immune Algorithm, IEEE 2011 International Conference on Electronic Mechanical applied science and Information Technology, fall guy ISBN- 978-1-61284-008-8, pp.3905-3908, 12-14 August 2011.2 Shi Xu-hua, Zhu Yu-guang, Dynamic Cloning based immune network Algorithm for multi-modal optimisation, IEEE, Seventh International Conference on Natural Computation, 2011, publish ISBN- 978-1-4244-9953-3, pp.522-525.3 Jun Fu , Huan Yang, Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware spying, IEEE, Fifth International Symposium on Computational Intelligence and Design, 2012, Print ISBN- 978-0-7695-4811-1, DOI-10.1109/ISCID.2012.156, pp.18-224 line Yuan, Qi-juan Chen, Dendritic Cell Algorithm for Anomaly detection in unordered Data Set, 4th International Conference on knowing Human-Machine Systems and Cybernetics, 2012, Print ISBN- 978-0-7695-4721-3, DOI-10.1109/IHMSC.2012.69, pp.249-2525 Shi Xuhua, Qian Fenq, An Optimization Algorithm Based on Multi-population Artificial Immune Network, IEEE, Fifth International Conference on Natural Computation, 2009, Print ISBN- 978-0-7695-3736-8, DOI-10.1109/ICNC.2009.574, pp.379-3836 Andrew Kusiak, Zijun Zhang, Optimization of Power and its Variability with an Artificial Immune Network Algorithm, IEEE, Print ISBN- 978-1-61284-788-77 Antariksha Bhaduri, A Mobile Robot Path Planning utilise Genetic Artificial Immune Network Algorithm, IEEE , World relative on Nature and Biologically Inspired Computing, 2009, Print ISBN- 978-1-4244-5612-3, pp.1536-15398 Yong Sun, Weigou Zhang, Meng Zhang, Dan Li, Design on Neural Network Gain Scheduling Flight Control uprightness using a Modified PSO Algorithm based on Immune Clone Principle, IEEE, Second International Conference on apt Computation Technology and Automation, 2009, Print ISBN- 978-0-7695-3804-4, DOI-10.1109/ICICTA.2009.70, pp.259-2639 Chung-Ming Ou, C.R. Ou, Immunity Inspired Host-Based Intrusion Detection Systems, IEEE, Fifth International Conference on Genetic and Evolutionary Computing, 2011, Print ISBN- 978-0-7695-4449-6, DOI-10.1109/ICGEC.2011.70, pp.283-28610 Maizura Mokhtar, Ran Bi, Jon Timmis, Andy M. Tyrrell, A Modified Dendritic Cell Algorithm for On-line demerit Detection in Robotic Systems, IEEE, Congress on Evolutionary Computation, 2009, Print ISBN- 978-1-4244-2959-2, pp.2055-206211 Yunfeng Zhao, Yixin Yin, Dongmei Fu, Zhun Zhou, bump Yin, Jia Wang, A pplication of Improved Artificial Immune Network Algorithm to Optimization, IEEE, 2008, Print ISBN- 978-1-4244-2386-6.12 Zhonghua Li, Jianming Li, Jieyeing Zhou, An improved artificial immune network for multimodal function optimization, IEEE, The 26th Chinese Control and Decision Conference, 2014, Print ISBN- 978-1-4799-3707-3, DOI-10.1109/CCDC.2014.6852268, pp.766-771, May thirty-first June 2nd 2014.

No comments:

Post a Comment