Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2330784.2330930acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
tutorial

Artificial immune systems for optimisation

Published: 07 July 2012 Publication History
  • Get Citation Alerts
  • Abstract

    Artificial immune systems (AIS) are a class of biologically inspired algorithms which are build after different theories from immunology. While the field of AIS is a relatively new area of research, it has achieved numerous promising results in different areas of application, e.g., learning, classification, anomaly detection, and optimization. In this tutorial we focus in particular on AIS build for the purpose of optimization. From an algorithmic point of view AIS show on a high level similarities to other biologically inspired algorithms, e.g. evolutionary algorithms. Due to their different origin concrete AIS for optimization are quite different from evolutionary algorithms. They constitute an interesting alternative approach to current methods. The tutorial gives an overview over different methods in the field of AIS. It addresses everyone who wants to broaden his or her area of research within this emerging field, both practitioners and theoreticians. It enables attendees without prior knowledge of AIS to learn about a novel kind of optimization method that can be used as an alternative to other biologically inspired algorithms. Moreover, it gives researchers with prior knowledge of AIS the opportunity to deepen their understanding of the considered algorithms.
    We start with an overview over the different areas of AIS, including different general approaches and some immunological background. Afterwards, we discuss several examples of AIS for optimization. We introduce concrete algorithms and their implementations and point out similarities and differences to other biologically inspired algorithms. In the last part of the tutorial, we present an overview over recent theoretical results for this kind of algorithms.

    References

    [1]
    J. Brownlee (2011). Clever Algorithms: Nature-Inspired Programming Recipes. LuLu Enterprises. http://www.cleveralgorithms.com
    [2]
    F. M. Burnet (1959). The Clonal Selection Theory of Acquired Immunity. Cambridge University Press.
    [3]
    V. Cutello, G. Narzisi, G. Nicosia, and M. Pavone (2005). Clonal selection algorithms: A comparative case study using effective mutation potentials. In C. Jacob, M. L. Pilat, P. J. Bentley, and J. Timmis, editors, Proceedings of the 4rd International Conference on Artificial Immune Systems (ICARIS 2005), volume 3627 of phLecture Notes in Computer Science, pages 13--28. Springer.
    [4]
    V. Cutello, G. Nicosia, and M. Pavone (2004). Exploring the capability of immune algorithms: A characterization of hypermutation operators. In G. Nicosia, V. Cutello, P. J. Bentley, and J. Timmis, editors, Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004), volume 3239 of phLecture Notes in Computer Science, pages 263--276. Springer.
    [5]
    V. Cutello, G. Nicosia, M. Pavone, and J. Timmis (2007). An immune algorithm for protein structure prediction on lattice models. IEEE Transactions on Evolutionary Computation, 11 (1): 101--117.
    [6]
    L. N. de Castro and J. Timmis (2002a). Artificial Immune Systems: A New Computational Intelligence Approach. Springer.
    [7]
    L. N. de Castro and J. Timmis (2002b). An artificial immune network for multimodal function optimization. In Proceedings of the 4th IEEE Congress on Evolutionary Computation (CEC 2002), pages 699--704. IEEE Press.
    [8]
    L. N. de Castro and F. J. Von Zuben (2002). Learning and optimization using the clonal selection principle. IEEE Transactions on Evolutionary Computation, 6 (3): 239--251.
    [9]
    D. Dasgupta and L. F. Nino (2008). Immunological Computation: Theory and Applications. Auerbach.
    [10]
    M. Elberfeld, J. Textor (2011). Negative selection algorithms on strings with efficient training and linear-time classification. Theoretical Computer Science 412:534--542.
    [11]
    S. Forrest, A.,S. Perelson, L. Allen, R. Cherukuri (1994). Self-nonself discrimination in a computer. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp. 202--212.
    [12]
    J. Greensmith (2007). The Dendritic Cell Algorithm. PhD Thesis, University of Nottingham.
    [13]
    F. Gu (2011). Theoretical and Empirical Extensions of the Dendritic Cell Algorithm. PhD Thesis, University of Nottingham.
    [14]
    J. Hilder, N. Owens, P. Hickey, S. Cairns, D. Kilgour, J. Timmis, A. Tyrrel (2011). Parameter optimisation of the receptor density algorithm. In Proceeding of the 10th International Conference on Artificial Immune Systems (ICARIS 2011), pp. 226--239.
    [15]
    C. Horoba, T. Jansen, C. Zarges (2009). Maximal age in randomized search heuristics with aging. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2009), p. 803--810.
    [16]
    T. Jansen, P.,S. Oliveto and C. Zarges (2011). On the Analysis of the Immune-Inspired B-Cell Algorithm for the Vertex Cover Problem. In Proceedings of the 10th International Conference on Artificial Immune Systems (ICARIS 2011). LNCS 6825, pp. 117--131.
    [17]
    T. Jansen and C. Zarges (2010): Aging beyond restarts. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2010), p. 705--712.
    [18]
    T. Jansen and C. Zarges (2011). Analyzing different variants of immune inspired somatic contiguous hypermutations. Theoretical Computer Science 412(6):517--533.
    [19]
    T. Jansen and C. Zarges (2011). Variation in artificial immune systems: Hypermutations with mutation potential. In Proceedings of the 10th International Conference on Artificial Immune Systems (ICARIS 2011). LNCS 6825, pp. 132--145.
    [20]
    T. Jansen and C. Zarges (2011). On benefits and drawbacks of aging strategies for randomized search heuristics. Theoretical Computer Science 412(6):543--559.
    [21]
    T. Jansen and C. Zarges (2011). On the role of age diversity for effective aging operators. Evolutionary Intelligence 4(2):99--125.
    [22]
    T. Jansen and C. Zarges (2011). Analysis of evolutionary algorithms: From computational complexity analysis to algorithm engineering. Intextit11th ACM SIGEVO Workshop on Foundations of Genetic Algorithms (FOGA 2011), p. 1--14.
    [23]
    T. Jansen and C. Zarges (2012). Fixed budget computations: A different perspective on run time analysis. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2012). To appear.
    [24]
    T. Jansen and C. Zarges (2012). Computing Longest Common Subsequences With the B-Cell Algorithm. Submitted.
    [25]
    N. Jerne (1974). Towards a network theory of the immune system. Annals of Immunology, 125C (1--2): 373--389.
    [26]
    J. Kelsey and J. Timmis (2003). Immune inspired somatic contiguous hypermutation for function optimisation. In Proceedings of the 5th Annual Conference on Genetic and Evolutionary Computation (GECCO 2003), LNCS 2723, pages 207--218. Springer.
    [27]
    P. Matzinger (1994). Tolerance, danger, and the extended family. Annual Reviews of Immunology, 12: 991--1045.
    [28]
    K. Murphy (2012). Janeway's Immunobiology. Garland Science, 8th edition.
    [29]
    N.,D.,L. Owens (2010). From Biology To Algorithms. PhD Thesis, University of York.
    [30]
    T. Stibor, K.,M. Bayarou, C. Eckert (2004). An investigation of r-chunk detector generation on higher alphabets. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2004), pp. 299--307.
    [31]
    J. Timmis (2010) Lecture Course on Collaborative Bio-Inspired Algorithms Available online: http://www.artificial-immune-systems.org/teaching.shtml
    [32]
    C. Zarges (2008). Rigorous runtime analysis of inversely fitness proportional mutation rates. In Parallel Problem Solving from Nature (PPSN X). LNCS 5199, pp. 112--122.
    [33]
    C. Zarges (2009). On the utility of the population size for inversely fitness proportional mutation rates. In Proceedings of the 10th ACM SIGEVO Workshop on Foundations of Genetic Algorithms (FOGA 2009), pp. 39--46.
    [34]
    C. Zarges (2011). Theoretical Foundations of Artificial Immune Systems. PhD Thesis, TU Dortmund.

    Cited By

    View all
    • (2021)Dingo Optimizer: A Nature-Inspired Metaheuristic Approach for Engineering ProblemsMathematical Problems in Engineering10.1155/2021/25718632021(1-12)Online publication date: 9-Jun-2021

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GECCO '12: Proceedings of the 14th annual conference companion on Genetic and evolutionary computation
    July 2012
    1586 pages
    ISBN:9781450311786
    DOI:10.1145/2330784

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 July 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. artificial immune systems
    2. classification
    3. optimization

    Qualifiers

    • Tutorial

    Conference

    GECCO '12
    Sponsor:
    GECCO '12: Genetic and Evolutionary Computation Conference
    July 7 - 11, 2012
    Pennsylvania, Philadelphia, USA

    Acceptance Rates

    Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Dingo Optimizer: A Nature-Inspired Metaheuristic Approach for Engineering ProblemsMathematical Problems in Engineering10.1155/2021/25718632021(1-12)Online publication date: 9-Jun-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media