Artificial Dendritic Cells: Multi-Faceted Perspectives

@article{Greensmith2009ArtificialDC,
  title={Artificial Dendritic Cells: Multi-Faceted Perspectives},
  author={Julie Greensmith and Uwe Aickelin},
  journal={Innovation Law \& Policy eJournal},
  year={2009}
}
Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body. The detection of such invaders by dendritic cells results in the activation of the adaptive immune system, eventually leading to the removal of the invader from the host body. This mechanism has provided inspiration for the development of a novel bio-inspired algorithm, the Dendritic Cell Algorithm. This algorithm… 

ARTIFICIAL IMMUNE SYSTEM: A REVIEW

TLDR
AIS has various algorithms such as: Immune Theory, Clonal Selection, negative selection, and so on, which are explained in this paper.

Improved Dendritic Cell Algorithm with False Positives and False Negatives Adjustable

TLDR
Experiments show that the two kinds of DCA which can adjust false positives and false negatives can both effectively realize results controlled, comparatively the scoring DCA is more intuitive.

A Novel Clonal Selection Algorithm for Community Detection in Complex Networks

TLDR
One of the well‐known artificial immune system models, named clonal selection algorithm, is introduced to reveal community structures in complex networks by introducing a novel antibody population initialization mechanism and a novel hypermutation strategy.

Immuno-inspired robotic applications: A review

A Dendritic Cell Immune System Inspired Scheme for Sensor Fault Detection and Isolation of Wind Turbines

TLDR
The proposed DCA-based scheme performs both detection as well as isolation of sensor faults given dual sensor redundancy, unlike other works in the literature that only address the fault detection problem and rely on analytical redundancy approach for accomplishing the fault isolation task.

Classification of Software Engineering Documents Based on Artificial Immune Systems

TLDR
After conducting several experiments, evaluations results have shown that the accuracy of the innate immunologic method ( DCM) has reached (DCM) (95%), whereas Naïve classification method (NI) with training and classification speed that doesn’t exceed one minutes shows the feasibility of using the algorithms of AIS systems in the field of information recovery and documents classification.

A Transitional View of Immune Inspired Techniques for Anomaly Detection

TLDR
The goal is to document the development of Immune Inspired approaches for anomaly detection in a transitional view, some aspects which may be considered on these algorithms and on their applicability in engineering problems, with some examples.

Robotic Immune Systems: An Architecture

  • Yamin HuWenjian Luo
  • Computer Science
    2018 IEEE Symposium Series on Computational Intelligence (SSCI)
  • 2018
TLDR
This paper analyzes the necessity of the robotic immune systems for robots to adapt to complex and dynamic environments and proposes an architecture of the robot immune systems, i.e., a multi-layer immune system for robots.

Immune Inspired Fault Diagnosis in Wireless Sensor Network

TLDR
Different approaches to artificial immune system have been discussed in this chapter that can be applied to fault diagnosis of wireless sensor network.

Transform of Artificial Immune System algorithm optimization based on mathematical test function

  • M. YawK. ChongK. Kamil
  • Computer Science
    2016 6th IEEE International Conference on Control System, Computing and Engineering (ICCSCE)
  • 2016
TLDR
This paper demonstrates a hybrid algorithm known as Transform of Artificial Immune System (Trans-AIS) by combining AIS and GA algorithm, which is comparable (if not superior) to other researchers' algorithm.

References

SHOWING 1-10 OF 35 REFERENCES

The dendritic cell algorithm

TLDR
It is shown that the Dendritic Cell Algorithm can perform well as an anomaly detection algorithm and can be applied to real-world, realtime data.

The Deterministic Dendritic Cell Algorithm

TLDR
A deterministic version of the algorithm is proposed, implemented and tested using a port scan dataset to provide a controllable system and a novel metric for the assessment of the algorithms output proves to be a more sensitive metric than the metric used with the original Dendritic Cell Algorithm.

The DCA: SOMe comparison

TLDR
It is shown that the results of the DCA and of a self-organizing map when applied to the detection of SYN port scans are comparable, and both produce false positives for the same processes.

Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows

TLDR
The results suggest that the Dendritic Cell Algorithm is applicable to KDD 99 data set, and the antigen multiplier and moving time windows have the same effect on the DCA for this particular data set.

Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm

TLDR
It is claimed here that sensor networks are such an application area, in which the ideas from AIS can be readily applied, and in particular the Dendritic Cell Algorithm matches the structure and functional requirements of sensor networks.

Artificial Immune Systems: A New Computational Approach

TLDR
This book makes an effort to bring many ideas from AIS together into a single text that can provide some basics for AIS, and discusses several other computational intelligence paradigms, such as computing with biological metaphors and computational intelligence.

libtissue - implementing innate immunity

TLDR
The authors argue the case for incorporating ideas from innate immunity into artificial immune systems (AISs) and build a software system with which AISs with these properties can be implemented and experimentally evaluated - the libtissue system.

Articulation and Clarification of the Dendritic Cell Algorithm

TLDR
The Dendritic Cell algorithm is described in detail, and its use as an anomaly detector is illustrated within the context of computer security.

Janeway's immunobiology

TLDR
The Evolution of the Immune System Appendix I Immunologists' Toolbox Appendix II CD Antigens Appendix III Cytokines and their Receptors Appendix IV Chemokinesand their Receptionors Appendix V Immunological Constants.

Paul Ehrlich, archives and the history of immunology

TLDR
The field of immunology is fortunate to have available this treasure of Ehrlich material, which the Rockefeller Archive Center makes available to researchers by appointment, and the present value of keeping research notebooks and other pertinent papers for the use of future historians.