• Title/Summary/Keyword: immune algorithm

Search Result 188, Processing Time 0.022 seconds

A study on load frequency control characteristics of power systems using IA-PID controller (IA-PID 제어기를 이용한 전력시스템의 부하주파수 제어 특성에 관한 연구)

  • Kim, C.H.;Lee, J.P.;Mun, M.K.;Chung, H.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.116-119
    • /
    • 2001
  • In this paper. the robust PID controller using immune algorithm(IA) for load frequency control(LFC) is designed. In proposed method. objective function is represented as antigens. An affinity calculation is embedded within the algorithm for determining the promotion or suppression of antibody. Simulation results show that the proposed robust load frequency controller can achieve good performance even in the presence of generation rate constraints.

  • PDF

Intrusion Detection Learning Algorithm based on Aritificial Immune System (인공 면역계기반의 침입탐지 학습 알고리즘)

  • 양재원;이동욱;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.05a
    • /
    • pp.229-232
    • /
    • 2003
  • 나날이 발전하는 인터넷 기반의 네트워크 환경에서 보안의 중요성은 아무리 강조해도 지나치지 않다. 바이러스와 해킹 기술의 발전 속도는 항상 방어자의 능력을 앞지르고 있으며, 공격자들의 능력과 무관한 해킹 툴의 보급은 누구나가 해커가 될 수 있도록 하는데 일조하고 있다. 이제 더 이상 해킹과 바이러스로부터 안전지대는 없다고 해도 과언이 아니다. 이에 본 논문에서는 일정한 환경에서의 침입에 대해 학습을 하여 그 침입을 탐지할 수 있는 디텍터를 생성할 수 있는 알고리즘을 제안한다. 공격 유형의 수에 비해 적은, 그러나 인공 면역계의 T 세포 형성과정인 부정선택을 이용한 학습알고리즘을 기반으로 생성된 디텍터들은 상대적으로 다양한 공격의 침입을 탐지한다. 이의 유효성을 시뮬레이션을 이용하여 확인한다.

  • PDF

Anomaly behavior detection using Negative Selection algorithm based anomaly detector (Negative Selection 알고리즘 기반 이상탐지기를 이용한 이상행 위 탐지)

  • 김미선;서재현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.391-394
    • /
    • 2004
  • Change of paradigm of network attack technique was begun by fast extension of the latest Internet and new attack form is appearing. But, Most intrusion detection systems detect informed attack type because is doing based on misuse detection, and active correspondence is difficult in new attack. Therefore, to heighten detection rate for new attack pattern, visibilitys to apply human immunity mechanism are appearing. In this paper, we create self-file from normal behavior profile about network packet and embody self recognition algorithm to use self-nonself discrimination in the human immune system to detect anomaly behavior. Sense change because monitors self-file creating anomaly detector based on Negative Selection Algorithm that is self recognition algorithm's one and detects anomaly behavior. And we achieve simulation to use DARPA Network Dataset and verify effectiveness of algorithm through the anomaly detection rate.

  • PDF

Adaptive Intrusion Detection Algorithm based on Artificial Immune System (인공 면역계를 기반으로 하는 적응형 침입탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.169-174
    • /
    • 2003
  • The trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online, or an offline internet, so it is expected to make a problem more and more. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators in real time. In fact, the general security system based on Internet couldn't cope with the attack properly, if ever. other regular systems have depended on common vaccine softwares to cope with the attack. But in this paper, we will use the positive selection and negative selection mechanism of T-cell, which is the biologically distributed autonomous system, to develop the self/nonself recognition algorithm and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. For making it come true, we will apply AIS to the network environment, which is a computer security system.

A New Immunotronic Approach to Hardware Fault Detection Using Symbiotic Evolution (공생 진화를 이용한 Immunotronic 접근 방식의 하드웨어 오류 검출)

  • Lee, Sang-Hyung;Kim, Eun-Tai;Lee, Hee-Jin;Park, Mignon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.59-68
    • /
    • 2005
  • A novel immunotronic approach to fault detection in hardware based on symbiotic evolution is proposed in this paper. In the immunotronic system, the generation of tolerance conditions corresponds to the generation of antibodies in the biological immune system. In this paper, the principle of antibody diversity, one of the most important concepts in the biological immune system, is employed and it is realized through symbiotic evolution. Symbiotic evolution imitates the generation of antibodies in the biological immune system morethan the traditional GA does. It is demonstrated that the suggested method outperforms the previous immunotronic methods with less running time. The suggested method is applied to fault detection in a decade counter (typical example of finite state machines) and MCNC finite state machines and its effectiveness is demonstrated by the computer simulation.

An Improved Analytic Model for Power System Fault Diagnosis and its Optimal Solution Calculation

  • Wang, Shoupeng;Zhao, Dongmei
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.1
    • /
    • pp.89-96
    • /
    • 2018
  • When a fault occurs in a power system, the existing analytic models for the power system fault diagnosis could generate multiple solutions under the condition of one or more protective relays (PRs) and/or circuit breakers (CBs) malfunctioning, and/or an alarm or alarms of these PRs and/or CBs failing. Therefore, this paper presents an improved analytic model addressing the above problem. It takes into account the interaction between the uncertainty involved with PR operation and CB tripping and the uncertainty of the alarm reception, which makes the analytic model more reasonable. In addition, the existing analytic models apply the penalty function method to deal with constraints, which is influenced by the artificial setting of the penalty factor. In order to avoid the penalty factor's effects, this paper transforms constraints into an objective function, and then puts forward an improved immune clonal multi-objective optimization algorithm to solve the optimal solution. Finally, the cases of the power system fault diagnosis are served for demonstrating the feasibility and efficiency of the proposed model and method.

A DFT Based Filtering Technique to Eliminate Decaying dc and Harmonics for Power System Phasor Estimation

  • Oh Yong- Taek;Balamourougan V.;Sidhu T.S.
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.2
    • /
    • pp.138-143
    • /
    • 2005
  • During faults, the voltage and current signals available to the relay are affected by the decaying dc component and harmonics. In order to make appropriate and accurate decisions, most of the relaying algorithms require the fundamental frequency phasor information that is immune to decaying dc effect and harmonics. The conventional Fourier ph as or estimation algorithm is affected by the presence of decaying-exponential transients in the fault signal. This paper presents a modified Fourier algorithm, which effectively eliminates the decaying dc component and the harmonics present in the fault signal. The decaying dc parameters are estimated by means of an out-of-band filtering technique. The decaying dc offset and harmonics are removed by means of a simple computational procedure that involves the design of two sets of Orthogonal digital OFT filters tuned at different frequencies and by creating three off-line look-up tables. The technique was tested for different decay rates of the decaying dc component. It was also compared with the conventional mimic plus the full cycle OFT algorithm. The results indicate that the proposed technique has a faster convergence to the desired value compared to the conventional mimic plus OFT algorithms over a wide range of decay rates. In all cases, the convergence to the desired value was achieved within one cycle of the power system frequency.

Adaptive Intrusion Detection Algorithm based on Learning Algorithm (학습 알고리즘 기반의 적응형 침입 탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.75-81
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn`t make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

Intrusion Detection Learning Algorithm using Adaptive Anomaly Detector (적응형 변형 인식부를 이용한 침입 탐지 학습알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Kim, Young-Soo;Lee, Se-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.451-456
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn't make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

Characterizing nonlinear oscillation behavior of an MRF variable rotational stiffness device

  • Yu, Yang;Li, Yancheng;Li, Jianchun;Gu, Xiaoyu
    • Smart Structures and Systems
    • /
    • v.24 no.3
    • /
    • pp.303-317
    • /
    • 2019
  • Magneto-rheological fluid (MRF) rotatory dampers are normally used for controlling the constant rotation of machines and engines. In this research, such a device is proposed to act as variable stiffness device to alleviate the rotational oscillation existing in the many engineering applications, such as motor. Under such thought, the main purpose of this work is to characterize the nonlinear torque-angular displacement/angular velocity responses of an MRF based variable stiffness device in oscillatory motion. A rotational hysteresis model, consisting of a rotatory spring, a rotatory viscous damping element and an error function-based hysteresis element, is proposed, which is capable of describing the unique dynamical characteristics of this smart device. To estimate the optimal model parameters, a modified whale optimization algorithm (MWOA) is employed on the captured experimental data of torque, angular displacement and angular velocity under various excitation conditions. In MWOA, a nonlinear algorithm parameter updating mechanism is adopted to replace the traditional linear one, enhancing the global search ability initially and the local search ability at the later stage of the algorithm evolution. Additionally, the immune operation is introduced in the whale individual selection, improving the identification accuracy of solution. Finally, the dynamic testing results are used to validate the performance of the proposed model and the effectiveness of the proposed optimization algorithm.