• 제목/요약/키워드: artificial immune system

검색결과 84건 처리시간 0.031초

공급자 재고 관리 환경하의 차량 경로 문제 (A Vehicle Routing Problem in the Vendor Managed Inventory System)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제10권3호
    • /
    • pp.217-225
    • /
    • 2008
  • The inventory routing problem (IRP) is an important area of Supply Chain Management. The objective function of IRP is the sum of transportation cost and inventory cost. We propose an Artificial Immune System(AIS) to solve the IRP. AIS is one of natural computing algorithm. An hyper mutation and an vaccine operator are introduced in our research. Computation results show that the hyper mutation is useful to improve the solution quality and the vaccine is useful to reduce the calculation time.

Intelligent Control of Multivariable Process Using Immune Network System

  • Kim, Dong-Hwa
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 하계학술대회 논문집 D
    • /
    • pp.2126-2128
    • /
    • 2001
  • This paper suggests that the immune network algorithm based on fuzzy set can effectively be used in tuning of a PID controller for multivariable process or nonlinear process. The artificial immune network always has a new parallel decentralized processing mechanism for various situations, since antibodies communicate to each other among different species of antibodies/B-cells through the stimulation and suppression chains among antibodies that from a large-scaled network. In addition to that, the structure of the network is not fixed, but varies continuously. On the other hand, a number of tuning technologies have been considered for the tuning of a PID controller. As a less common method, the fuzzy and neural network or its combined techniques are applied. However, in the case of the latter, yet, it is not applied in the practical field, in the former, a higher experience and technology is required during tuning procedure. Along with these, this paper used the fuzzy set in order that the stimulation and suppression relationship between antibody and antigen can be more adaptable controlled against the external condition, including noise or disturbance of plant. The immune network based on fuzzy set suggested here is applied for the PID controller tuning of multivariable process with two inputs and one output and is simulated.

  • PDF

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

FAULT DIAGNOSIS OF ROLLING BEARINGS USING UNSUPERVISED DYNAMIC TIME WARPING-AIDED ARTIFICIAL IMMUNE SYSTEM

  • LUCAS VERONEZ GOULART FERREIRA;LAXMI RATHOUR;DEVIKA DABKE;FABIO ROBERTO CHAVARETTE;VISHNU NARAYAN MISHRA
    • Journal of applied mathematics & informatics
    • /
    • 제41권6호
    • /
    • pp.1257-1274
    • /
    • 2023
  • Rotating machines heavily rely on an intricate network of interconnected sub-components, with bearing failures accounting for a substantial proportion (40% to 90%) of all such failures. To address this issue, intelligent algorithms have been developed to evaluate vibrational signals and accurately detect faults, thereby reducing the reliance on expert knowledge and lowering maintenance costs. Within the field of machine learning, Artificial Immune Systems (AIS) have exhibited notable potential, with applications ranging from malware detection in computer systems to fault detection in bearings, which is the primary focus of this study. In pursuit of this objective, we propose a novel procedure for detecting novel instances of anomalies in varying operating conditions, utilizing only the signals derived from the healthy state of the analyzed machine. Our approach incorporates AIS augmented by Dynamic Time Warping (DTW). The experimental outcomes demonstrate that the AIS-DTW method yields a considerable improvement in anomaly detection rates (up to 53.83%) compared to the conventional AIS. In summary, our findings indicate that our method represents a significant advancement in enhancing the resilience of AIS-based novelty detection, thereby bolstering the reliability of rotating machines and reducing the need for expertise in bearing fault detection.

인공 면역계를 이용한 자기변경 검사 알고리즘 (Self-Change Detection Algorithms using the Artificial Immune System)

  • 선상준;심귀보
    • 한국지능시스템학회논문지
    • /
    • 제11권4호
    • /
    • pp.320-324
    • /
    • 2001
  • 최근 컴퓨터와 인터넷의 급속한 발전과 더불어 컴퓨터의 데이터를 파괴하는 바이러스나 정보를 빼내기 위한 해킹 등이 만연하고 있다. 이에 컴퓨터의 데이터를 보호하기 위한 방법들이 연구 중에 있는데 이 중 외부의 침입물질에 대해 자체적인 보호와 제거기능을 가지는 생체면역시스템을 이용한 컴퓨터면역시스템 구축에 대해 활발히 연구가 진행되고 있다. 생체 면역시스템은 바이러스나 병원균 등의 낮선 외부 침입자로부터 자신을 보호하고 침입자를 제거한다. 본 논문에서는 생체면역시스템의 면역세포 중의 하나인 세포독성 T세포의 자기(Self)와 비자기(Nonself)를 구분하는 기능을 이용해서 자기변경 검사 알고리즘을 구현하였다. 구현한 알고리즘은 자기로 인식하는 자기파일에서 자기를 구분하는 MHC 인식부를 구성한다. 이렇게 구성한 MHC 인식부는 자기파일을 대표하는 값을 이용하여 변경된 파일을 구분한다. 이 알고리즘을 변경된 자기파일에 적용함으로써 컴퓨터 해킹이나 바이러스에 의한 자기파일의 변경 검사의 유효성을 검증한다.

  • PDF

An Improved Analytic Model for Power System Fault Diagnosis and its Optimal Solution Calculation

  • Wang, Shoupeng;Zhao, Dongmei
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권1호
    • /
    • pp.89-96
    • /
    • 2018
  • When a fault occurs in a power system, the existing analytic models for the power system fault diagnosis could generate multiple solutions under the condition of one or more protective relays (PRs) and/or circuit breakers (CBs) malfunctioning, and/or an alarm or alarms of these PRs and/or CBs failing. Therefore, this paper presents an improved analytic model addressing the above problem. It takes into account the interaction between the uncertainty involved with PR operation and CB tripping and the uncertainty of the alarm reception, which makes the analytic model more reasonable. In addition, the existing analytic models apply the penalty function method to deal with constraints, which is influenced by the artificial setting of the penalty factor. In order to avoid the penalty factor's effects, this paper transforms constraints into an objective function, and then puts forward an improved immune clonal multi-objective optimization algorithm to solve the optimal solution. Finally, the cases of the power system fault diagnosis are served for demonstrating the feasibility and efficiency of the proposed model and method.

Emotion recognition from brain waves using artificial immune system

  • Park, Kyoung ho;Sasaki Minoru
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2002년도 ICCAS
    • /
    • pp.52.5-52
    • /
    • 2002
  • In this paper, we develop analysis models for classification of temporal data from human subjects. The study focuses on the analysis of electroencephalogram (EEG) signals obtained during various emotional states. We demonstrate a generally applicable method of removing EOG and EMG artifacts from EEGs based on independent component analysis (ICA). All EEG channel maps were interpolated from 10 EEG subbands. ICA methods are based on the assumptions that the signals recorded on the scalp are mixtures of signals from independent cerebral and artifactual sources, that potentials arising from different parts of the brain, scalp and body are summed linearly at the electrodes and that prop...

  • PDF

인공면역계의 자기-인식 알고리즘 (Self-Recognition Algorithm of Artificial Immune System)

  • 심귀보;선상준
    • 한국지능시스템학회논문지
    • /
    • 제11권9호
    • /
    • pp.801-806
    • /
    • 2001
  • 최근 컴퓨터의 사용이 보편화되면서 악의적 사용자에 의해 발생하는 컴퓨터 바이러스와 해킹에 의한 피해가 급속히 증가하고 있다. 남의 컴퓨터에 침입하는 해킹이나 데이터를 파괴하는 컴퓨터 바이러스에 의한 피해를 막기 위해 최근에 생명체의 면역시스템의 특징을 이용해 인공면역계를 구성해 시스템 침입탐지와 바이러스 탐지 및 치료에 대한 연구가 활발히 진행 중에 있다. 생체 면역계는 외부에서 침입해 세포나 장기에 피해를 주는 물질인 항원을 스스로 자기세포와 구분해 인식, 제거하는 기능이 있다. 이러한 면역계의 특징인 항원을 인식하는 기능은 자기세포의 확실한 인식을 가지고 있는 상태에서 다른 물질을 구분하는 자기/비자기(self/non-self) 인식방법으로 볼 수 있다. 본 논문에서는 생체 면역계에서 세포독성 T세포의 생성과정의 하나인 Positive Selection을 모델링하여 침입에 의한 데이터 변경과 바이러스에 의한 데이터 감염 등을 탐지할 때 가장 중요한 요소인 자기-인식 알고리즘을 구현하였다. 제안한 알고리즘은 큰 파일에서의 Detection을 구성하기 용이한 점을 가지며 극소변경과 블록변경에 대한 자기인식률을 통해 알고리즘을 유효성을 검증한다.

  • PDF

IoT-based systemic lupus erythematosus prediction model using hybrid genetic algorithm integrated with ANN

  • Edison Prabhu K;Surendran D
    • ETRI Journal
    • /
    • 제45권4호
    • /
    • pp.594-602
    • /
    • 2023
  • Internet of things (IoT) is commonly employed to detect different kinds of diseases in the health sector. Systemic lupus erythematosus (SLE) is an autoimmune illness that occurs when the body's immune system attacks its own connective tissues and organs. Because of the complicated interconnections between illness trigger exposure levels across time, humans have trouble predicting SLE symptom severity levels. An effective automated machine learning model that intakes IoT data was created to forecast SLE symptoms to solve this issue. IoT has several advantages in the healthcare industry, including interoperability, information exchange, machine-to-machine networking, and data transmission. An SLE symptom-predicting machine learning model was designed by integrating the hybrid marine predator algorithm and atom search optimization with an artificial neural network. The network is trained by the Gene Expression Omnibus dataset as input, and the patients' data are used as input to predict symptoms. The experimental results demonstrate that the proposed model's accuracy is higher than state-of-the-art prediction models at approximately 99.70%.

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

  • Guo, Weipeng;Chen, Yonghong;Cai, Yiqiao;Wang, Tian;Tian, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5574-5591
    • /
    • 2017
  • Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detectors, black hole, overlap problem of NSA have impeded further used in WSN. In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. Therefore, in this paper, a Differential Evolution Constraint Multi-objective Optimization Problem based Negative Selection Algorithm (DE-CMOP based NSA) is proposed to optimize the distribution and effectiveness of the detector. By combining the constraint handling and multi-objective optimization technique, the algorithm is able to generate the detector set with maximized coverage of non-self space and minimized overlap among detectors. By employing differential evolution, the algorithm can reduce the black hole effectively. The experiment results show that our proposed scheme provides improved NSA algorithm in-terms, the detectors generated by the DE-CMOP based NSA more uniform with less overlap and minimum black hole, thus effectively improves the intrusion detection performance. At the same time, the new algorithm reduces the number of detectors which reduces the complexity of detection phase. Thus, this makes it suitable for intrusion detection in WSN.