Jason Brownlee Thesis PDF
Jason Brownlee Thesis PDF
Jason Brownlee Thesis PDF
Jason Brownlee
2008
i
Acknowledgements
I could not have completed this work without the help and assistance of a large number
of people and organisations.
ii
Declaration
I declare that: This thesis contains no material which has been accepted for an award to
myself for any other degree or diploma, except where due reference is made in the text
of the thesis. This thesis, to the best of my knowledge contains no material previously
published or written by another person except where due reference is made in the text of
the thesis. Where the work is based on joint research or publications, this thesis discloses
the relative contributions of the respective works or authors.
Jason Brownlee
Date:
Contents
Abstract i
Acknowledgements ii
1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Hypothesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5 Thesis Organisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Background 8
2.1 Chapter Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Artificial and Computational Intelligence . . . . . . . . . . . . . . . . . . . . 8
2.3 Natural and Artificial Immune Systems . . . . . . . . . . . . . . . . . . . . 11
2.4 Three Schools of AIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.5 Distributed Artificial Immune Systems . . . . . . . . . . . . . . . . . . . . . 19
2.6 Open Problems in AIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.7 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.8 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
iv
5 Tissue Clonal Selection 145
5.1 Chapter Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
5.2 Physiology of Lymphocyte Migration . . . . . . . . . . . . . . . . . . . . . . 145
5.3 Abstract Tissue Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
5.4 Realised Tissue Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
5.5 Lymphocyte Recirculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
5.6 Lymphocyte Homing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
5.7 Tissue Inflammation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
5.8 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
9 Conclusions 320
9.1 Research Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
9.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
9.3 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
9.4 Further Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
9.5 Final Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Bibliography 349
v
List of Figures
2.1 Depiction of the conceptual framework for devising Biological Inspired Al-
gorithms, taken from [373] . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.1 Depiction of the shape-space formalism taken from [322] (page 1225). Xi
represents antibodies with corresponding complementary recognition vol-
umes V!i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.2 Theory of receptor editing providing long jumps in the affinity landscape,
from [167]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
vi
4.20 Example plots of the B- (top of each plot) and T-Cell (bottom of each plot)
repertoires from the MCCSA at the end of the run on ACSP-10 for all four
inter-relationship types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
4.21 Examples of more complex relationships that may be formed given receptor-
receptor recognition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
4.22 Depiction of the two-string representation scheme. . . . . . . . . . . . . . . 131
4.23 Example of a simple two-receptor promotion scheme. . . . . . . . . . . . . . 132
4.24 Depiction of the example difference between a natural and remapping scheme.132
4.25 Depiction of the relationship between remapped antigen and receptors (ps
is primary and ss is secondary string). . . . . . . . . . . . . . . . . . . . . . 133
4.26 Box-and-whisker plot’s from the Recurrent NCCSA Empirical Study. . . . . 136
4.27 Example plots from of the response mappings and final repertoire from
R-NCCSA-PS on ACSP-10. . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
4.28 Box-and-whisker plot of the Average Cell Error for the DE-NCCSA schemes
on ACSP-10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
4.29 Example repertoire plots of the four Dual Exposure NCCSA configurations
on ACSP-2 showing primary and secondary representations and antigen left
to right. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
5.1 Multiple tissue model and the situated spatial properties that may affect
antigenic exposure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
5.2 Example of two different Tissue Exposure Regime with controlled selection
of discrete repertoires on exposure events. . . . . . . . . . . . . . . . . . . . 156
5.3 Depiction of the temporal memory effect in a single repertoire model over
time, where the arrows at the top represent information flow into the system
and the arrow along the bottom represents time. . . . . . . . . . . . . . . . 157
5.4 Depiction of the repertoire specialisation that results in the Spatial Self-
Organisation effect, where the arrows from above represent information
flow into the system and the arrows below represent dissipation of acquired
information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
5.5 Depiction of the unbiased dissemination of information that results in the
Spatial Consistency of Response, where the arrow above represents infor-
mation flow into the system and the arrow below represents information
availability throughout the system. . . . . . . . . . . . . . . . . . . . . . . . 159
5.6 Depiction of information sharing and a cross-reactive response, where the
arrows above represent the flow of information into the system as well as
an implicit anticipation for the application of acquired information. . . . . . 160
5.7 Depiction of the trade-off between the general anticipation of exposure and
organised anticipation of exposure. . . . . . . . . . . . . . . . . . . . . . . . 161
5.8 Depiction of the relationship between primary and secondary lymphoid tis-
sues, where the arrows show the sharing of information between primary
tissues and the outward push of information from primary to secondary
tissues.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
5.9 Depiction of the relationship between secondary tissues and secondary and
tertiary tissues, where the arrows show the sharing of information between
secondary tissues and the outward push of information from secondary to
tertiary tissues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
5.10 Depiction of the relationship between tertiary and secondary tissues and
tertiary tissues and the environment, where the arrows depict the flow of
information from the environment to the tertiary tissues and ultimately to
the secondary tissues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
vii
5.11 Depiction of the layered tissue architecture and information flows between
the layers, the arrows show the flow of information from the environment
into the system as well as the outward push of new detectors from the centre
of the system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
5.12 Depiction of the information streaming providing by lymph collecting in
lymph nodes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
5.13 Depiction of the courier-like behaviour of dendritic cell’s. . . . . . . . . . . . 165
5.14 Depiction of the layered information processing properties of the lymphoid
tissue architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
5.15 Depiction of the simple filter model. . . . . . . . . . . . . . . . . . . . . . . 167
5.16 Depiction of the lymph node model. . . . . . . . . . . . . . . . . . . . . . . 167
5.17 Depiction of the host model. . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
5.18 Depictions of general and minimal configuration examples of the Infection
Antigenic Exposure Problem (IAEP). . . . . . . . . . . . . . . . . . . . . . 171
5.19 Depictions of the four different Tissue Exposure Regimes (TER). . . . . . . 172
5.20 Box-and-whisker plot of Host Diversity (HD) across all TER for the RTCSA
study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
5.21 Box-and-whisker plot of Host Error (HE) across all TER for the RTCSA
study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
5.22 Box-and-whisker plot of Average Tissue Diversity (ATD) across all TER
for the RTCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
5.23 Box-and-whisker plot of Average Tissue Error (ATE) across all TER for
the RTCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
5.24 Box-and-whisker plot of Host Diversity (HD) across all TER for the HTCSA
study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
5.25 Box-and-whisker plot of Host Error (HE) across all TER for the HTCSA
study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
5.26 Box-and-whisker plot of Average Tissue Diversity (ATD) across all TER
for the HTCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
5.27 Box-and-whisker plot of Average Tissue Error (ATE) across all TER for
the HTCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.28 Box-and-whisker plot of Host Diversity (HD) across all TER for the ITCSA
study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
5.29 Box-and-whisker plot of Host Error (HE) across all TER for the ITCSA
study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
5.30 Box-and-whisker plot of Average Tissue Diversity (ATD) across all TER
for the ITCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
5.31 Box-and-whisker plot of Average Tissue Error (ATE) across all TER for
the ITCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
6.1 Host Clonal Selection Model and the situated spatial properties that af-
fect antigenic exposure, where the arrows represent interaction between the
discrete components (hosts) in the system. . . . . . . . . . . . . . . . . . . . 216
6.2 Elaboration on figure 5.18b to depict the Minimal Habitat Antigenic Expo-
sure Problem (MAHEP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
6.3 Box-and-whisker plot of Population Diversity (PD) across all HER for the
THCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
6.4 Box-and-whisker plot of Population Error (PE) across all HER for the
THCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
6.5 Box-and-whisker plot of Average Host Diversity (AHD) across all HER for
the THCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
viii
6.6 Box-and-whisker plot of Average Host Error (AHE) across all HER for the
THCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
6.7 Box-and-whisker plot of Population Diversity (PD) across all HER for the
SI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
6.8 Box-and-whisker plot of Population Error (PE) across all HER for the SI-
HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
6.9 Box-and-whisker plot of Average Host Diversity (AHD) across all HER for
the SI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
6.10 Box-and-whisker plot of Average Host Error (AHE) across all HER for the
SI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
6.11 Box-and-whisker plot of Population Diversity (PD) across all HER for the
MI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
6.12 Box-and-whisker plot of Population Error (PE) across all HER for the MI-
HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
6.13 Box-and-whisker plot of Average Host Diversity (AHD) across all HER for
the MI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
6.14 Box-and-whisker plot of Average Host Error (AHE) across all HER for the
MI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
6.15 Box-and-whisker plot of Population Diversity (PD) across all HER for the
EI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
6.16 Box-and-whisker plot of Population Error (PE) across all HER for the EI-
HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
6.17 Box-and-whisker plot of Average Host Diversity (AHD) across all HER for
the EI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
6.18 Box-and-whisker plot of Average Host Error (AHE) across all HER for the
EI-HCSA study. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
7.1 Depiction of the focus on systems and the compression of the environment
in the Hierarchical Clonal Selection Framework (HCSF). . . . . . . . . . . . 262
7.2 Depiction of the compression of both the system and the environment when
the HCSF is compressed to the primary objects of the adaptive system
formalism. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
7.3 Depiction of an expanded realisation of a hierarchical clonal selection system
with all three tiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
7.4 Depiction of the focus on environment and the compression of the systems
in the Hierarchical Antigenic Exposure Framework (HAEF). . . . . . . . . . 269
7.5 Depiction of the focus on system and environment in the Integrated Hier-
archical Clonal Selection Framework (IHCSF). . . . . . . . . . . . . . . . . 273
7.6 Depiction of the integrated hierarchical clonal selection and hierarchical
antigenic exposure frameworks, showing subsumed relationships and com-
ponent cardinalities across the investigated paradigms. . . . . . . . . . . . . 276
ix
List of Tables
x
5.7 Summary of the exposure and re-exposure behaviour of the five defined tis-
sue exposure regimes and how they relate to system information availability
and anticipated need. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
5.8 Summary of general trends and their interpretation for Tissue Clonal Se-
lection Algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
5.9 Summary of the expected behaviours of the defined measures with regu-
lar and irregular exposure regimes on systems with mixing and isolated
information dissemination strategies. . . . . . . . . . . . . . . . . . . . . . . 179
5.10 Summary of the results for MTCSA and RTCSA-LRG on ATER and RTER
and the relative quantitative difference is measures. . . . . . . . . . . . . . . 185
5.11 Summary of confirmed behaviours of global and local information strategies
and exposure regimes, highlighting where expectations were incorrect. . . . 186
5.12 Summary of results from an empirical study into the HTCSA comparing
TER’s with the HTCSA-L information management strategy. . . . . . . . . 197
7.1 Mapping of the cellular, tissue, and host clonal selection perspectives onto
the secondary objects of the adaptive systems formalism. . . . . . . . . . . 263
7.2 Summary of the component cardinality across the principle abstract and
realised clonal selection algorithms, where ∗ represents a wild-card for de-
scendant algorithms of a given base algorithm. . . . . . . . . . . . . . . . . 265
7.3 Summary of the component interaction across the abstract and realised
clonal selection algorithms, where ∗ represents a wild-card for descendant
algorithms of a given base algorithm. . . . . . . . . . . . . . . . . . . . . . . 267
7.4 Summary of the component cardinality across the principle abstract and
realised antigenic exposure problems. . . . . . . . . . . . . . . . . . . . . . . 269
7.5 Summary of the bracketing of spatial exposure across the abstract and
realised antigenic exposure problems. . . . . . . . . . . . . . . . . . . . . . . 271
7.6 Summary of the bracketing of temporal exposure across the principle ab-
stract and realised antigenic exposure problems. . . . . . . . . . . . . . . . . 271
7.7 Summary of the suitability match between clonal selection and antigenic
exposure components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
7.8 Summary of the component cardinality for both the clonal selection and
antigenic exposure models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
7.9 Summary of the Negative Selection AIS paradigm mapped onto the three
tiers of the IHCSF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
7.10 Summary of the Immune Network AIS paradigm mapped onto the three
tiers of the IHCSF. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
7.11 Summary of an interpretation of the field of Evolutionary Computation
in terms of the hierarchical reductionist methodology used to investigate
clonal selection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
7.12 Summary of an interpretation of the field of Connectionist Intelligence in
terms of the hierarchical reductionist methodology used to investigate clonal
selection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
xi
8.1 Summary of the projected applicability of Cellular Clonal Selection Algo-
rithms to Function Optimisation Problems. . . . . . . . . . . . . . . . . . . 308
8.2 Summary of the projected applicability of Tissue Clonal Selection Algo-
rithms to Function Optimisation Problems. . . . . . . . . . . . . . . . . . . 309
8.3 Summary of the projected applicability of Host Clonal Selection Algorithms
to Function Optimisation Problems. . . . . . . . . . . . . . . . . . . . . . . 310
8.4 Summary of the projected applicability of Cellular Clonal Selection Algo-
rithms to Function Approximation Problems. . . . . . . . . . . . . . . . . . 316
8.5 Summary of the projected applicability of Tissue Clonal Selection Algo-
rithms to Function Approximation Problems. . . . . . . . . . . . . . . . . . 316
8.6 Summary of the projected applicability of Host Clonal Selection Algorithms
to Function Approximation Problems. . . . . . . . . . . . . . . . . . . . . . 317
A.1 Summary of results from an empirical study into the RTCSA compared to
the MTCSA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
A.2 Summary of results from an empirical study into the RTCSA comparing
TER’s with the MTCSA local and RTCSA-LRG global information man-
agement strategies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
A.3 Summary of results from an empirical study into the HTCSA. . . . . . . . . 335
A.4 Summary of results from an empirical study into the ITCSA. . . . . . . . . 336
A.5 Summary of results from an empirical study into the THCSA compared to
MP-HCSA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
A.6 Summary of the pathogen transmission and vaccination transmission results
from an empirical study into the THCSA. . . . . . . . . . . . . . . . . . . . 338
A.7 Summary of results from an empirical study into the SI-HCSA compared
to MP-HCSA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
A.8 Summary of results from an empirical study into the MI-HCSA. . . . . . . 340
A.9 Summary of results from an empirical study into the EI-HCSA. . . . . . . . 341
xii
Chapter 1
Introduction
1.1 Motivation
Artificial Intelligence is concerned with the investigation of the information processing
mechanisms that underlie intelligent behaviour in systems that act rationally or like hu-
mans. The traditional approach toward designing and investigating such systems is a
rigorous top-down approach using a symbolic representation that provides clear indica-
tion why such systems work. A newer scruffy paradigm called Computational Intelligence
considers intelligence from a bottom-up perspective of strategies and outcomes. Exam-
ples of systems of this type are prescriptive indicating how they work, although they are
typically too complex to analyse to see why they work. The process for developing such
strategies, like many other fields of science and engineering, is to begin by patterning them
from biological and natural processes. Toward this end, the field of Artificial Immune Sys-
tems is concerned with abstracting and exploiting the computational patterns observed in
the structure and function of the immune system [109].
The immune system is vast in scale and complexity, comprised of specialised organs
and trillions of cells and molecules. The complexity of the system is commonly considered
in the same order as the central nervous system. It is responsible for maintaining the
homoeostasis of a host organism and in particular it is responsible for identifying and
eliminating invading micro-organisms called pathogen [81, 314]. The immune systems of
vertebrates has a capacity to adapt so as to acquire immunity and better respond in the
future to the same and similar infections. The immune system is both essential to a hosts
survival and a powerfully efficient garbage disposal. The precision mechanisms that exist to
keep a host alive can become corrupted and turn on and attack the host, an affliction that
underlies many types of autoimmune disease. The acquired immune system is responsible
for the manufacture of an enormous diversity of detector proteins called antibodies, such
that collectively a repertoire of these molecules can potentially detect many millions or
billions of different molecular structures. Interestingly the information required to prepare
such a potentially diverse army of protective protein conformations is far greater than the
number of genes encoded in a given vertebrates genome. This mismatch between the
limited information that a genome can represent and what the acquired immune system is
capable of detecting is achieved via an adaptive learning process described by the Clonal
1
Selection Theory [63]. This Darwinian inspired theory for antibody diversity begins with a
repertoire of general-purpose detectors that can partially detect most infections. A process
of selection of the fittest and cellular mitosis with mutations that affect what descendant
cells can identify, results in the specialisation of a host organisms detection repertoire to
its environment.
The learning, memory, and adaptive information processing properties of clonal selec-
tion are a ‘corner stone’ in the field of Artificial Immune Systems (AIS). The abstracted
clonal selection strategy has been embodied in optimisation, pattern recognition, and clas-
sification algorithms and provides a foundational improvement procedure for those AIS
that exploit the information processing attributes of other cell-centric immunological the-
ories. Beyond adaptation, clonal selection describes a process by which the acquired im-
mune system coordinates learning and memory of a lifetime of unknown infections without
central control or organisation. This adaptive process occurs autonomously and concur-
rently throughout the distributed tissues of a host organism. Interestingly the distributed
and decentralised attributes are an often cited advantage of patterning strategies from
the immune system, although much of the research in the field has focused on monolithic
systems and algorithms [417, 420]. There has been provoking work on the investigation of
distributed signature based computer security applications [212, 255], and in autonomous
navigation and group decision making in mobile robotics [238, 359, 268], although there
exists no clear framework to guide the realisation of such systems and little work on inves-
tigating the clonal selection paradigm toward this end. Finally, there is some consensus
among leaders in the field of a recent impasse in the general progress in the field of Artificial
Immune Systems. The same authors suggested a trend of turning back to the biological
system to abstract novel and more accurate models to replace the crude first generation
approaches with so-called second generation artificial immune systems [24, 389, 388, 401].
The thesis of this work is that the clonal selection paradigm can be elaborated to
exploit the distributed and decentralised information processing characteristics inherent
in the inspiring metaphor, and that the structure and function of the immune system
provide a path toward realising such computational models. Such information processing
characteristics are beneficial for classes of problems that can be addressed using parallel or
cooperative problem solving strategies, such as those problems partitioned along functional
or information availability axes. This work addresses the open problem of considering a
second generation of artificial immune systems, in this case distributed clonal selection
algorithms, by following the trend of devising novel and more accurate abstractions and
models from the inspiring biological system.
1.2 Hypothesis
The main hypothesis of this research is defined, as follows:
2
rithms.
The aim of this research is to improve the current understanding of the clonal se-
lection paradigm for adaptive information processing and more specifically the state of
distributed and decentralised approaches. This aim was pursued by using an understand-
ing of immunological structure and function to provide a conceptual framework for the
investigation. To verify the effectiveness of the investigated framework and clonal selection
algorithms the hypothesis was divided into a series of goals, defined in Section 1.3.
1.3 Goals
The research thesis is addressed in the context of five main research goals, as follows:
2. Identify limitations with and elaborate upon the base clonal selection
paradigm. The clonal selection paradigm is a core information processing pattern in
cellular immunology and inspired computational models, therefore it is essential that both
the capabilities and limitations of existing adaptive and distributed computational models
are understood.
3
1.4 Contributions
This dissertation makes the following specific contributions:
1. The systematic elaboration and development of the existing clonal selection com-
putational paradigm as an explicit adaptive strategy and suggestion of additional
models based on the interaction of cells and molecules, called the Cellular Clonal
Selection Paradigm (Chapter 3 and Chapter 4).
2. The design and investigation of novel Spatial, Mediated, and Network Cellular Clonal
Selection Algorithms (Chapter 4).
3. The identification and abstraction of the lymphatic system and lymphocyte traf-
ficking as a framework for distributed Clonal Selection Algorithms called the Tissue
Clonal Selection Paradigm (Chapter 5).
4. The design and investigation of novel Recirculation, Homing, and Inflammation Tis-
sue Clonal Selection Algorithms (Chapter 5).
6. The design and investigation of novel Transmission and Shared Immunity Popula-
tion Host Clonal Selection Algorithms, and the Maternal Immunity and Inherited
Immunity Generational Host Clonal Selection Algorithms (Chapter 6).
8. The elicitation of salient features of the Cellular, Tissue, and Host Clonal Selection
Algorithms and systematic assessment of the suitability of application of the algo-
rithms to the foundational problem domains of Function Optimisation and Function
Approximation (Chapter 8).
4
autonomous systems. The three dominant paradigms of the field are reviewed as is the
state of distributed AIS, highlighting the lack of a suitable framework and limited elab-
oration of the clonal selection paradigm toward this end. Finally, this section outlines a
systematic research methodology for realising immune inspired algorithms, an experimen-
tal methodology to ensure systematic assessment of devised systems, and an integrated
methodology that focus on decomposition and an economy of models.
Chapter 3 provides a review of clonal selection theory providing a context for the effec-
tive interpretation of the state of the art of inspired computational models. A taxonomy
is presented of clonal selection algorithms highlighting the commonality, and more impor-
tantly open problems in the field. The placement and assessment of the field is considered
in the broader context of computational intelligence demarcating related research that con-
tributes to an improved understanding of the approach. The underlying computational
strategy is considered in the context of relevant adaptive systems theory demonstrating
the importance of the information environment of the strategy, interactions of compo-
nents, and emergent behaviours. The cellular perspective of the field is addressed and an
agenda is defined which involves the investigation and elaboration of the classical cellular
clonal selection perspective, and the consideration of a ‘host of tissues’ and a ‘population
of hosts’ as distributed cellular perspectives of the immunological theory.
Chapter 4 presents a conceptual framework for the clonal selection paradigm from a
cellular perspective called the Cellular Clonal Selection Paradigm. The framework includes
the principle components and base models that describe the current state of clonal selection
algorithms referred to as Quintessential Clonal Selection. Symmetry is provided to the
framework in the form of a complementary Antigenic Exposure Paradigm that encapsulates
the domain information to which a system governed by clonal selection is triggered and
to which it must respond. Exploiting the predictive properties of the cellular framework,
three clonal selection approaches are defined and investigated: a Spatial, Mediated, and
Network Clonal Selection Algorithm, that are empirically demonstrated on an antigenic
exposure inspired pattern recognition problem domain called Colour Space.
Chapter 5 considers the clonal selection paradigm in the context of the entire host
organism. The structure and function of the human immune system are reviewed, high-
lighting the important role of the lymphoid tissues and related systems in the trafficking
of immune cells around the body. The tissue architecture and cell mobility information
processing are abstracted into a Tissue Clonal Selection Paradigm that both describes the
cellular clonal selection paradigm as a single constrained instance of a tissue-based system,
and predicts a range of tissue-based clonal selection architectures and algorithms. Match-
ing the symmetry provided in the cellular paradigm, an Infection Exposure Paradigm is
defined to satisfy tissue-centric concerns of multiple concurrent points of exposure and
information acquisition. A Lymphocyte Recirculation, Lymphocyte Homing and Tissue
Inflammation Clonal Selection Algorithm are investigated and demonstrated on problem
instances drawn from the colour space pattern recognition domain. Generally, the empiri-
5
cal results confirm the expected localisation and dissemination of acquired information as
emergent behaviours from the decentralised cellular repertoires.
6
selection paradigm is defined by the overlap in features between specific approaches and
problem instances, suggesting at an abundance of ongoing application-centric research.
7
Chapter 2
Background
8
edge representation, machine learning, computer vision, and robotics. Thinking like a
human suggests systems that model the cognitive information processing properties of
humans, for example a general problem solver and systems that build internal models of
their world. Thinking rationally suggests laws of rationalism and structured thought, such
as syllogisms and formal logic. Finally, acting rationally suggests systems that do rational
things such as expected utility maximisation and rational agents. Luger and Stubblefield
suggest that AI is a sub-field of computer science concerned with the automation of intel-
ligence, and like other sub-fields of computer science has both theoretical (how and why do
the systems work? ) and application (where and when can the systems be used? ) concerns
[276]. They suggest a strong empirical focus to research, such that although there may
be a strong desire for mathematical analysis, the systems themselves defy analysis due
to their complexity. The machines and software themselves are not black boxes, rather
analysis proceeds by observing the systems interactions with their environment, followed
by an internal assessment of the system to relate their structure back to their behaviour.
Artificial Intelligence is therefore concerned with investigating mechanisms that un-
derlie intelligence and intelligence behaviour. The traditional approach toward designing
and investigating AI (the so-called ‘good old fashioned’ AI) has been to employ a symbolic
basis for these mechanisms. A newer approach historically referred to as messy artificial
intelligence or or soft computing does not use a symbolic basis, instead patterning these
mechanisms after biological or natural processes. This represents a modern paradigm shift
in interest from symbolic knowledge representations, to inference strategies for adaptation
and learning, and has been referred to as neat versus scruffy approaches to AI. The neat
philosophy is concerned with formal symbolic models of intelligence that can explain why
they work, whereas the scruffy philosophy is concerned with intelligent strategies that
explain how they work [364].
9
Evolutionary Computation A paradigm that is concerned with the investigation of
systems inspired by the neo-Darwinian theory of evolution by means of natural selection.
Popular evolutionary algorithms include the Genetic Algorithm, Evolution Strategy, Ge-
netic and Evolutionary Programming, and Differential Evolution. The evolutionary pro-
cess is considered an adaptive strategy and is typically applied to search and optimisation
domains.
Fuzzy Intelligence An approach that is concerned with the investigation of fuzzy logic
which is a form of logic that is not constrained to true and false, but rather functions
which define degree’s of truth. Fuzzy logic is reasoning strategy and is typically applied
to expert system and control system domains.
10
specifically the Biological Inspired Computation variety motivates the actual principles
and information processing capabilities of the strategy.
Computing with Biology The investigation of substrates other than silicon in which
to implement computation. Common examples include molecular or DNA Computing and
Quantum Computing.
11
The traditional perspective regarding the role of the immune system is divided into
two primary tasks: the detection and elimination of pathogen1 . This behaviour is typi-
cally referred to as the differentiation of self (molecules and cells that belong to the host
organisms) from potentially harmful non-self. The architecture of the immune system is
such that a series of defensive layers protect the host. The most basic of these layers
provide physical barriers to prevent pathogen from entering the host such as skin, and
mucous membranes that trap and filter out pathogen. The next level is physiological
that provides inhospitable conditions for pathogen at entry points to host such as high pH
acidity in the digestive tract and varied temperature to inhibit growth of micro-organisms.
Once a pathogen makes it inside the host, it must contend with the innate and acquired
immune system. These interrelated immunological sub-systems are comprised of many
types of cells and molecules produced by specialised organs and processes to address the
self-nonself problem at the lowest level using chemical bonding, where the surfaces of cells
and molecules interact with the surfaces of pathogen.
Innate Immunity
The innate immune system is named such because the host organism is born with a set of
fast acting detection and elimination mechanisms that do not change over the hosts life-
time. In this regard, the mechanisms are reflexive providing a first line of defence against
pathogen. Innate mechanisms are the most primitive found in all classes of plant and
animal life improving in a species over evolutionary time. The complement system refers
to a mechanism where associated molecules bind to and coat specific types of bacteria.
The activation of this mechanism (a complement cascade) can lead to a rupturing of the
bacteria called lysis, or detection and subsequent killing of the bacteria by macrophage
cells called opsonisation. The process is fast acting, typically occurring within a the first
few hours of an infection. Macrophages are scavenger cells responsible for cleaning up
cellular debris, some bacteria, and micro-organisms that have been identified by the com-
plement system. These cells engulf material and neutralise it using a digestive process.
When a virus infects a cell, the cell may release chemicals called cytokines that provide an
indication to other cells of the infection. Natural Killer (NK) cells are a specialised class of
immune cell responsible for identifying virally infected cells via their chemical signals and
releasing chemicals that trigger apoptosis (programmed cell death) of these cells. These
NK cells are also responsible for identifying and eliminating tumour cells.
Adaptive Immunity
The adaptive immune system, also referred to as the acquired immune system, is named
such because it is responsible for specialising a defence for the host organism based on
the specific pathogen to which it is exposed. Unlike the innate immune system, the
acquired immune system is present only in vertebrates (animals with a spinal column).
The system retains a memory of exposures which it has encountered. This memory is
1
More recent perspectives on the role of the system include a maintenance system [81], and a cognitive
system [403].
12
recalled on reinfection exhibiting a learned pathogen identification. This learning process
may be divided into two types of response. The first or primary response occurs when
the system encounters a novel pathogen. The system is slow to respond, potentially
taking a number of weeks to clear the infection. On re-encountering the same pathogen
again, the system exhibits a secondary response, applying what was learned in the primary
response and clearing up the infection rapidly. The memory the system acquires in the
primary response is typically long lasting, providing pathogenic immunity for the lifetime
of the host, two common examples of which are the chickenpox and measles. White
blood cells called lymphocytes (or leukocytes) are the most important cell in the acquired
immune system. Lymphocytes are involved in both the identification and elimination of
pathogen, and recirculate within the host organisms body in the blood and lymph (the fluid
that permeates tissue). The behaviour of the adaptive immune system may be described
with regard to two general sub-systems: Humoral Immunity for addressing free-floating
pathogen (for example in blood), and Cellular Immunity for addressing virally infected
cells.
Humoral Immunity B-lymphocyte cells are a specialised class of white blood cell that
are created in the bone marrow and are predominantly responsible for the secretion of
antibodies. These are protein molecules that bind to parts or specialised features of
pathogen called pathogenic determinants. B-cells are activated by identifying pathogen via
their surface bound receptors which provide a complementary shape for pathogen surface
features, fitting like a lock and a key. Once activated a B-cell will produce vast quantities
of antibody which enter the blood stream and recirculate around the host organism to
clear up the infection.
Cellular Immunity T-lymphocyte cells are another class of white blood cell that are
matured in the thymus (an immune organ located in the chest). T-cells perform specific
roles both mediating the activation of B-cells (Helper T-cells) and in the identification and
neutralisation of virally infected cells (Killer T-cells). In this latter role, T-cells identify
processed (chopped up) pieces of pathogen on the surfaces of infected cells called histo-
compatibility complex (commonly referred to by its abbreviation: MHC). Cells responsible
for processing pathogen and presenting MHC are appropriately called antigen-presenting
cells, examples of which include some B-cells, macrophages and dendritic cells.
13
approaches were reminiscent of paradigms such as Artificial Neural Networks, Genetic
Algorithms, Reinforcement Learning, and Learning Classifier Systems. The most forma-
tive works in giving the field an identity were those that proposed the immune system
as an analogy for information protection systems in the field of computer security. The
classical examples include Forrest, et al.’s Computer Immunity [151, 148] and Kephart’s
Immune Anti-Virus [248, 249]. These works were formative for the field because they
provided an intuitive application domain that captivated a broader audience and assisted
in differentiating the work as an independent sub-field.
Motivation
The motivation for the field of AIS is the immune system, specifically the architecture,
mechanisms, principles, and theories used to explain observed immunological function.
The authors de Castro and Timmis defend the immune system as an inspiration for com-
putational intelligence by providing a comprehensive listing of abstracted information
processing principles [110] (pages 55-56). This listing contains nineteen desirable compu-
tational attributes, the following of which specifically motivate this research:
• Uniqueness: Each individual with an immune system has distinct and different
capabilities and vulnerabilities.
• Distributivity: The immune cells, molecules, and organs are distributed all over the
body and are not subject to centralised control.
Forrest and Hofmeyr take a similar approach in considering and abstracting the in-
formation processing principles of the immune system [147]. In their work, the authors
focus on three specific information-processing principles, although they highlight a num-
ber of general design principles that have much overlap with the de Castro-Timmis listing.
Perhaps the more important features that strongly entrench the field of Computational
Intelligence are Immune Learning (acquired information through interaction with the en-
vironment) and Immune Memory (persistence and ongoing application of acquired infor-
mation for short and long durations), both of which fit into a broad notion of intelligence.
Using this general description, the mammalian acquired immune system may be considered
rudimentary intelligent.
14
Definitions
Although the motivations of the field are easy to relate, it is important to clarify those
motivations that do not contribute to the specific field. This section focuses on some
standard definitions of what is and is not an Artificial Immune System. The authors
de Castro and Von Zuben [113] define an AIS as “a computational system based upon
metaphors of the biological immune system”. They continue by defining Immune Engi-
neering as the application of an AIS in “a meta-synthesis process that uses the information
contained in the problem itself to define the solution tool to a given problem, and then ap-
ply it to obtain the problem solution”. The distinction is that Immune Engineering is the
engineering process, differentiated from conventional engineering process via its biological
(immunological) motivation. Immune Engineering was later formalised into a framework
by de Castro and Timmis as a set of three principles of what an Artificial Immune System
should contain [109], as follows: (1) A representation for the components of the system,
(2) A set of mechanisms to evaluate the interaction of individuals with the environment
and each other, and (3) Procedures of adaptation that govern the dynamics of the system.
A further, more concise definition of AIS is provided in the same work as “adaptive
systems, inspired by theoretical immunology and observed immunological functions, prin-
ciples and models, which are applied to problem solving”. This definition clearly highlights
the role of theoretical immunology and immunological observations as an inspiration and
not the pursuit of research in AIS, and is the definition adopted in this dissertation. In
addition to the clarification it provides, the authors propose that a system to be referred
to as an AIS must incorporate a minimum level of immunology, such as an immune com-
ponent (for example cell, molecule, and organ), it has to be designed by incorporating
ideas from theoretical and/or experimental immunology, and it has to be directed toward
problem solving. They stipulate that attributing immunological terminology is insufficient
to call a system an artificial immune system.
Another perspective of AIS is provided by one of the pioneers in the field Ishida who
defines an Immunity-Based System (IMBS) as a “self-maintenance systems learned from
and inspired by the immune system” [229]. His IMBS is described as (1) a self-maintenance
system with monitoring of self and nonself, (2) a distributed system with autonomous com-
ponents capable of mutual evaluation, and (3) an adaptive system with diversity and se-
lection. The three properties of Ishida’s AIS complement the de Castro-Timmis definition
by highlighting core information processing characteristics as a baseline when abstracting
from the biological system that may be distilled to (autonomy, distributed, adaptive).
15
gorithms and applications that have been proposed. As such, the review highlights the
central role the adaptive clonal selection theory plays across the principles paradigms in
the field.
16
2.4.2 Negative Selection Paradigm
An important consideration for Burnet in developing the clonal selection theory was the
integration of the fact that such a powerfully destructive process as acquired immunity
does not immediately turn against the host organism in the generation of self-antibodies
(autoimmune response). This ability of the clonal response to maturate lymphocyte cells
for pathogen and not self-tissues became known as self-nonself discrimination [86, 305],
and in conjunction with clonal selection forms paradigms by which the acquired immune
systems is understood in the field of immunology. Clonal selection accounts for this ob-
servation by proposing both that (1) the initial repertoire of immune cells are prepared in
such a way that none are autoimmune, and (2) that during the maturation process in the
ongoing interaction with pathogen, that autoimmune clones are destroyed. Immune cells
are continually being destroyed, therefore there is a constant stream of new immune cells
that must be created and integrated into the repertoire. This theory was confirmed by
the discovery of T-lymphocyte cells that are matured using both a positive and negative
selection process in the thymus.
Self-nonself discrimination primed with a negative selection process has interesting
information processing properties. The theory suggests that the anticipatory guesses made
in clonal selection are filtered by regions of infeasibility (protein conformations that bind
to self-tissues). Further, the self-nonself immunological paradigm proposes the modelling
of the unknown domain (encountered pathogen) by modelling the complement of what is
known. This is unintuitive as the natural inclination is to categorise unknown information
by what is different from what is known rather than guessing at the unknown information
and filtering guesses by what is known.
The information processing principles of the self-nonself discrimination via negative
selection are that of a anomaly and change detection system that model the anticipation
of variation from what is known. The seminal negative selection algorithm was proposed
by Forrest, et al. [151] in which a population of detectors are prepared in the presence of
known information, where those randomly generated detectors that match against known
data are discarded. The population of pattern guesses in the unknown space then monitors
the corpus of known information for changes. The algorithm was applied to the monitoring
of files for changes (corruptions and infections by computer viruses), and later formalised
as a change detection algorithm [129, 130]. It was applied to monitoring changes in the
execution behaviour of Unix processes [149, 215], and to monitor the changes in remote
connections of a network computer (intrusion detection) [211, 212]. The application of the
algorithm has been predominantly to virus host intrusion detection and their abstracted
problems of classification (two-class) and anomaly detection. More recently, the validity
of the application of negative selection algorithms in high-dimensional spaces has been
questioned, specifically given the scalability of the approach in the face of the exponential
increase in volume within the problem space [374].
17
2.4.3 Immune Network Paradigm
A concern of the clonal selection theory is that it presumes that the repertoire of reac-
tive cells remains idle when there are no pathogen to which to respond. Considering this
problem, Niels Jerne proposed an Immune Network Theory (Idiotypic Networks) where
immune cells are not at rest in the absence of pathogen, instead antibody and immune
cells recognise and respond to each other [233, 234, 235]. The theory proposes that anti-
body (both free floating and surface bound) possess idiotopes (surface features) to which
the receptors of other antibody can bind. As a result of receptor interactions, the reper-
toire becomes dynamic, where receptors continually both inhibit and excite each other
in complex regulatory networks (chains of receptors). The network theory suggests that
the clonal selection process may be triggered by the idiotopes of other immune cells and
molecules in addition to the surface characteristics of pathogen, and that the maturation
process applies both to the receptors themselves the idiotopes which they expose.
The immune network theory has interesting resource maintenance and signalling in-
formation processing properties. The clonal selection and negative selection paradigms
integrate the accumulative and filtered learning of the acquired immune system, whereas
the immune network theory proposes an additional order of complexity between the cells
and molecules under selection. In addition to cells that interact directly with pathogen,
there are cells that interact with those reactive cells and with pathogen indirectly, in suc-
cessive layers such that networks of activity for higher-order structures such as internal
images of pathogen (promotion), and regulatory networks (so-called anti-idiotopes and
anti-anti-idiotopes).
Early works, such as Farmer, et al. [138] suggested at the exploitation of the infor-
mation processing properties of network theory for machine learning. A seminal network
theory based algorithm was proposed by Timmis, et al. called the Artificial Immune Net-
work (AIN) [392] (later extended and renamed the Resource Limited Artificial Immune
System [393, 391] and Artificial Immune Network [258]). The algorithm maintains a popu-
lation of adaptive units that operate under a clonal selection process. Units are connected
to each other based on distance measures in the information space (for example Euclidean
distance if the units are real-valued vectors), such that adaptive units that are close in the
information space suppress the activation of each other. Therefore, the more connections
a given unit has with other nodes influences the units potential for being selected and
cloned under clonal selection. Timmis’ system was applied to feature extraction and data
clustering. Another seminal network based algorithm was proposed by de Castro and Von
Zuben called Artificial Immune Network (aiNet) which extended the principles of AIN
and CLONALG and was applied to clustering [115, 116]. The aiNet algorithm was further
extended to optimisation domains and renamed opt-aiNet [108].
2.4.4 Summary
The clonal selection, negative selection, and immune network paradigms represent the
majority of the influences for the information processing properties from immunology
exploited in the field of artificial immune systems. The proposed taxonomy is not complete,
18
for example an additional influence that is not discussed is the Danger Theory of Polly
Matzinger [287, 288] which proposes that the acquired immune system responds to signals
of damage, which opposes the fundamental self-nonself paradigm. This coarse taxonomy
of the field of Artificial Immune Systems clearly highlights the central role clonal selection
to both the cognitive properties assigned to the immune system (learning and memory),
and the three principle paradigms that underlie the field. This centrality and even reliance
on clonal selection suggests that developments and improvements to the understanding of
the paradigm will have follow-on effects to the other cell-based paradigms in the field.
19
rationality, local determinism, and goal or task-directed behaviour are relaxed in favour of
the biologically inspired bottom-up and stochastic mechanisms of Computational Intelli-
gence. Therefore, a distinction is made between centralised, distributed, and distributable,
where a system may be designed or re-engineered to be distributed although the benefits
of such a process are not limited to concurrent, parallel, or distributed implementation in
the computer hardware sense.
In their proposal of a distributed detection system based on the negative selection al-
gorithm Forrest, et al. comment on the characteristics of the acquired immune systems
pathogen identification and memory capabilities, highlighting that they are “highly dis-
tributed ”, and that responses are decentralised and “highly localized ” [148, 212]. Hofmeyr,
et al. extended the approach and applied it to the domain of computer network intrusion
detection [211]. In their system, a central negative selection process (central tolerisation)
prepares a private set of detectors for each machine on a computer network such that the
diversity of each machines detector set contributes to the protection of the entire network.
The system was simulated demonstrating the principle, and was implemented although
not in a distributed manner. The research was abstracted to a general framework for
distributed adaptive systems called the ARTificial Immune System (ARTIS), with the
application to intrusion detection renamed the Lightweight Intrusion Detection System
(LISYS) [214]. The detectors of LISYS involve a life-cycle that extends the negative selec-
tion algorithm including a naı̈ve state for untested detectors, a memory state for proven
detectors, and an activation threshold used to manage the sensitivity of raised intrusion
signals. Three specific distributed characteristics of acquired immunity are not realised in
LISYS, specifically (1) the detectors are not mobile although memory detectors are shared
with neighbouring systems, (2) the detectors do not undergo a clonal selection process
when activated, and (3) the system is not autonomous requiring the intervention of a
human operator in the promotion of activated detector to memory detector.
The Computer Defence Immune System (CDIS) proposed an elaborate multi-agent
system with much commonality to ARTIS and LISYS [432, 197, 17, 18]. Among the
many enhancements to LISYS, the CDIS intrusion detection system facilitated the hier-
archical dissemination of acquired information, specifically the signatures for detectors of
verified intrusion attempts. Kim, et al. proposed an intricate and integrated system of
artificial immune algorithms for intrusion detection [252, 253, 254, 255, 251]. The work
20
approached the problem of network intrusion detection in the same manner as LISYS and
CDIS, although it employed gene library evolution to improve detector generation during
centralised negative selection, and a dynamic clonal selection algorithm to improve detec-
tors successful at identifying anomalies. Although the system was designed for distributed
intrusion detection, it was not simulated or implemented in a distributed environment.
Finally, Dasgupta and Brian proposed a multi-agent system architecture for intrusion de-
tection with mobile agents on a network where anomaly detection was achieved through
a loose analogy of distributed immune cells [107].
Early contributions to the field of AIS were made by Ishida, et al. by phrasing distributed
fault diagnosis problems in the connectionist paradigm of Parallel Distributed Processing,
and exploring the capabilities of Jerne’s network theory on such problems [227]. The
models were graphs of sensor nodes that performed distributed information processing
(sensor fault diagnosis) without a central point of control [295]. Ishida expanded upon the
work to exploit the systems autonomous cooperative decision making and self-organising
capabilities in domains such as coin balancing and flow monitoring [228].
Lee and Jun, et al. proposed a Distributed Autonomous Robotic System that achieved
cooperative control of robots through emergent swarm behaviour for the selection of group
behaviour strategies in autonomous robots [270, 238]. The system was modelled such that
each robot is a B-cell that expresses behaviour strategies antibodies in an environment of
conditions (pathogens), with control parameters managed as T-cells. Robots select their
own behaviour strategies which are communicated with each other, propagating (clonal
selection proliferation) if useful, or suppressed if not, in a simulated immune network. The
robots were simulated in a dynamic environment to perform group tasks collectively se-
lecting action strategies. A similar approach inspired by Lee and Jun, et al. was employed
by Meshref and VanLandingham and applied to the benchmark dynamic control dog-and-
sheep problem, where dogs (B-cells) coordinate their behaviour to get sheep (pathogen)
into a pen [291]. Singh and Thayer proposed an architecture called the Immunology-
derived Distributed Autonomous Robotics Architecture for the large-scale coordination
and control of robot teams (many thousands of robots) simulated on a dynamic mo-
bile mine clearing domain [359]. Tasks in the domain were implements as pathogen,
whereas robot action strategies of varying generality were represented as immune cells
that are selected for a given robots current needs. A uni-directional beacon broadcast
inter-robot communication was used to coordinate behaviour inspired by a histamine-
based recruitment mechanism. The approach resulted in emergent coordination that the
authors claimed did not become apparent without large colonies of robots. The framework
was further applied to simulations of an exploration and mapping domain [384, 361], and
a search-and-rescue domain [360].
Lau, et al. proposed a multi-agent control system for fleets of autonomous guided vehi-
cles where vehicles are antibodies, and unassigned tasks they must perform are pathogen
to which they specialise [267, 266, 268]. Michelan and Von Zuben propose a decentralised
21
autonomous navigation system for a robot for garbage collection (locate, collect, obstacle
avoidance, limited resources), that although not distributed, provided an archetype AIS
application in robotics toward complex autonomous behaviour [294]. Ishiguro, et al. also
proposed a decentralised robotic application with behaviour arbitration for a mobile robot
that although not implemented in multiple robots, demonstrated complex autonomous
behaviour [230, 231].
Network Systems
Boudec and Sarafijanovic proposed an AIS for the detection of irregular dynamic routing
behaviour in mobile ad hoc networks [52]. Their negative selection based system iden-
tified misbehaving relays in a simulated network test bed by observing routing events
with detectors prepared off-line. Their approach was extended through the addition of a
virtual thymus used to maintain a dynamic representation of normal and abnormal relay
behaviour, distributed danger signals to govern the flow of information into the virtual
thymus, and memory detectors for improved secondary response [345, 346]. Ganguly, et al.
proposed an ImmuneSearch algorithm for a peer-to-peer network topology that was decen-
tralised using affinity-based proliferation and mutation to control message movement to
avoid flooding the network with messages [160]. Kephart proposes a vision for a scaled up
automated and adaptive virus signature system providing protection across the Internet
[250]. Mohr, et al. proposed exploiting information processing properties of the immune
system such as continual adaptation, distributedness, and context-dependant response for
a context-aware ubiquitous computing platform (also known as pervasive computing and
ambient intelligence) suitable for integration of hand-held devices [296]. Ishida proposed
the immune system from the perspective of the immune network theory provides the foun-
dational inspiration for developing an Autonomous Distributed Systems (ADS), which is a
general class of system of autonomous decision making agents organised in dynamic struc-
ture that cannot be designed beforehand [228]. Ishida highlights examples of adaptive,
autonomous, and decentralised artificial immune systems, although does not provide any
specific information as to how an ADS may be realised from an immunological basis.
Parallel Algorithms
The work by Watkins, et al. addressed the so-called unexploited inherent parallelism of
the CLONALG algorithm [417]. Their effort extended the algorithm such that pattern
recognition tasks are partitioned and executed concurrently (explicit divide and conquer),
and reassembled after execution. The same parallel strategy was applied to the AIRS
algorithm by Timmis and Watkins [420]. Coello Coello, et al. proposed a parallel im-
plementation of their constraint handling immune algorithm as a strategy for assessing
infeasible solutions [79, 78]. Their approach was implemented as an extension to the
standard genetic algorithm implemented in an multiple island population configuration.
22
Other
Hart and Ross explored the analogy between acquired immunity to addressable mem-
ory, specifically as Sparse Distributed Memories (SDM). These structures are a robust
content-addressable memory which are efficient at storing vast amounts of binary data
with a small number of physical addresses [365]. A hybrid method was applied to clus-
tering dynamic datasets that combined SDM, antigen-antibody matching for addressing,
and a co-evolutionary algorithm [199, 200]. Newborough and Stepney proposed a generic
framework for population based algorithms based on a general biologically-inspired con-
ceptual framework [304] (considered further in Section 2.7.1). Their framework provided
abstractions of common optimisation algorithms (clonal and negative selection, genetic al-
gorithm, swarm algorithms such as particle swarm and Ant Colony Optimisation), and a
proof-of-concept implementation on Field Programmable Gate Array demonstrated both
hardware parallelism and distribution. Toma, et al. proposed an Immune Distributed
Competitive Problem Solver that employed aspects of MHC and immune networks in a
multi-agent system to address division of labour problems such as n-Travelling Salesman
Problem [395].
2.5.3 Summary
The clonal selection, negative selection and immune network cellular immunological the-
ories describe decentralised processes capable of general autonomous (per-cell and per-
pathogen) decision making, suitable for distributed and parallel information processing.
The exploitation of these information processing attributes imposed on the biological sys-
tem is the promise of distributed Artificial Immune Systems, and is one of the principle
areas of research in the field of AIS, enshrined in definition. The three schools of AIS
demonstrated that the first-order realisation of Artificial Immune Systems is typically sim-
plistic and monolithic. The work on distributed detector-based computer security driven
by negative selection, and emergent cooperation in autonomous mobile robots are the two
most promising thrusts of research toward realising this goal. The work towards parallelis-
ing existent monolithic immunological algorithms and network applications may be fruitful
areas, although these are still immature and emergent areas of research. Distributed and
decentralised realisations of artificial immune systems represent the overarching ambition
of the field in general. Such information processing characteristics can be directly har-
nessed for classes of function optimization and function approximation problem domains
suited to parallel and cooperative solving strategies. What is lacking in these efforts is a
clear framework to guide the development of a distributed AIS, although Kephart’s vision
for cyberspace anti-virus, Mohr ubiquitous AIS, and Ishida’s vision for an immunological
ADS are thought provoking.
23
in AIS and the trends of drawing on novel and more accurate models from the inspiring
biological system.
24
lack of theoretical advancement, limited application, and the adoption of naı̈ve biological
models. He proposes a number of challenges in the field to address the impasse: (1)
the development of novel and accurate metaphors that provide benefit to immunology,
(2) improved application of AIS models work toward a killer application for AIS, (3)
to develop a theoretical basis for AIS, and (4) to consider the integration of the immune
system with other biological systems. Hart and Timmis assess the field from an application
centric perspective, highlighting distinct lack and narrow focus of real-world applications
[201]. They consider the so called scatter gun approach to applications is caused by
poor foundational biological metaphors, suggesting three areas that may provide a fertile
future for the field: (1) the innate immune system, (2) embodied immune system working
towards host homoeostasis, and (3) life-long learning of the system. Twycross and Aickelin
consider Timmis’ proposed impasse in AIS, highlighting its causes as limited application to
challenging problems, lack of theoretical advances, and use of naı̈ve biological metaphors
[401]. They proposed to address this impasse by considering two addition unexploited
biological metaphors that are suggested as being less complex than those of the human
immune system: plant immunity and invertebrate immune systems.
2.6.2 Summary
The general open problems and trends to address them are common to the field of Compu-
tational Intelligence, specifically the need for a theoretical underpinning for the the field
and suitability and specialisation of algorithms to application domains. Beyond these
general concerns, there is a specific desire for a field-defining (so-called killer ) applica-
tion domains, and the trend to continue to assimilate more exotic immunological theory
and sub-fields towards this end. Further, there is a concerted general intent to devise
and employ general conceptual frameworks to unify existing algorithms, and in the in-
vestigation of novel Artificial Immune Systems. This work proposes to address the open
problem of a perceived impasse in the field of Artificial Immune Systems by following the
specific emerging trends in the field of (1) exploiting novel and more accurate immuno-
logical metaphor, (2) devising and exploiting a general framework that units the facets of
the novel metaphor, and (3) extending the existing AIS frameworks via integration. This
work does not address the open problems of an improved theoretical underpinning of the
field or killer applications, although it is believed that the work will provide insight toward
these questions.
2.7 Methodology
This section specifically address the research goal of identifying a systematic methodol-
ogy for the development and investigation of immunologically inspired algorithms. The
methodology proposed is comprised of the best practices regarding (1) the abstraction
of immunological properties and development of inspired algorithms in Section 2.7.1, (2)
experimental methodology for the qualitative empirical investigation of developed algo-
rithms in Section 2.7.2, and (3) the important considerations regarding the ‘economy of
25
modelling’ of developed algorithms and the need for patch-quilt integration of findings into
broader frameworks in Section 2.7.3.
1. Biological System: The driving motivation for the work that possess some innate
information processing qualities.
3. Models: From the probes abstract and simplified models of the information process-
ing qualities of the system are build and validated.
5. Algorithms: The framework provides the principles for designing and analysing al-
gorithms that may be general and applicable to domains unrelated to the biological
motivation.
Forrest and Hofmeyr summarised their AIS research efforts at the University of New
Mexico and the Santa Fe Institute as “immunology as information processing” [147].
They define information as spatio-temporal patterns that can be abstracted and described
independent of the biological system, and information processing as computation with
these patterns. They proposed that such patterns are encoded in the proteins and other
molecules of the immune system, and that they govern the behaviour of the biological
system. They suggest that their information processing perspective can be contrasted
26
Figure 2.1: Depiction of the conceptual framework for devising Biological Inspired Algo-
rithms, taken from [373]
The procedure is similar to the outlined in the conceptual framework for Biologically
Inspired Algorithms in that in addition to identifying biological mechanisms (input) and
demonstrating a resultant algorithms (output), the procedure (1) highlights the need for
abstraction involving modelling the identified mechanism, and (2) highlights the need to
analyse the models and abstractions. The procedure of Forrest and Hofmeyr can be used
to specialise Stepney, et al. conceptual framework by clearly specifying the immunological
information processing focus.
27
researcher or practitioner may be paralysed by the perceived pessimism of the no free lunch
theorem that contends the futility of the benchmarking exercise. A pervasive problem in
the field of Computational Intelligence algorithms is the lack of meaningful and consistent
algorithm experimental and benchmarking methodology. This includes but is not limited
to issues of the selection of problem instances, the selection of algorithm specifications, the
algorithm configuration parameters, and interpretation of results. The intention of this
section is to summarise the general concerns of experimental methodology, with a focus
on benchmarking Computational Intelligence algorithms in the face of the ‘no free lunch’
theorem.
No Free Lunch
Wolpert and Macready’s No Free Lunch Theorem of search and optimisation has caused a
lot of pessimism and misunderstanding, particularly in related to the evaluation and com-
parison of computational intelligence algorithms [436, 435]. In simplest terms, the theory
indicates that when searching for an extremum of a cost function, all algorithms perform
the same when averaged over all possible cost functions. The implication is that the often
perused general-purpose optimisation algorithm is theoretically impossible. The theory
applies to stochastic and deterministic optimisation algorithms, and to algorithms that
learn and adjust their search strategy over time. It is invariant to the performance mea-
sure used as well as the representation selected. Perhaps the catalyst for benchmarking
cynicism is a comment accompanying the proof suggesting that: “. . . comparisons report-
ing the performance of a particular algorithm with a particular parameter setting on a few
sample problems are of limited utility” [436]. The theorem is an important contribution
to computer science, although its implications are theoretical. The original paper was
produced at a time when grandiose generalisations were being made as to algorithm, rep-
resentation, or configuration superiority. The practical impact of the theory is to bound
claims of applicability. Wolpert and Macready encouraged effort be put into devising
practical problem classes and the matching of suitable algorithms to problem classes. Fur-
ther they compelled practitioners to exploit domain knowledge in optimisation algorithm
application, now an axiom in the field.
28
haviours. Barr, et al. list a number of properties worthy of a heuristic method making
a contribution, which can be paraphrased as; efficiency, efficacy, robustness, complexity,
impact, generalisability and innovation [33]. Barr, Golden et al. specify a loose experi-
mental set-up methodology with the following intuitive steps; 1) define the goals of the
experiment, 2) select measure of performance and factors to explore, 3) design and exe-
cute the experiment, 4) Analyse the data and draw conclusions, and finally 5) report the
experimental results. They then suggest eight guidelines for reporting results, in summary
they are; reproducibility, specify all influential factors (for example code and computing
environment), be precise regarding measures, specify parameters, use statistical experi-
mental design, compare with other methods, reduce variability of results, ensure results
are comprehensive.
Peer, et al. summarise the problems of algorithm benchmarking (with a bias toward
Particle Swarm Optimisation) to the following points; duplication of effort, insufficient
testing, failure to test against state-of-the-art, poor choice of parameters, conflicting re-
sults, and invalid statistical inference [318]. Eiben and Jelasity site four problems with the
state of benchmarking evolutionary algorithms; (1) test instances are chosen ad hoc from
the literature, (2) results are provided without regard to research objectives, (3) scope
of generalised performance is generally too broad, and (4) results are hard to reproduce
[132]. The general problems with benchmarking methodology may be distilled into the
following sub-problems:
29
optima, and multi-modal with few local optima [441]. Whitley, et al. provide a
detailed study on the problems of selecting test instances for genetic algorithms, and
suggest that difficult problem instances should be non-linear, non-separable, and
non-symmetric [431].
• Measure Selection: There are many ways to measure the performance of an al-
gorithm for a problem instance, although the most common involves measures of
efficacy (problem specific costs) and efficiency (computation space and/or time).
Most Biologically Inspired Algorithms have a stochastic element, typically in their
random starting position(s) and in the probabilistic decisions made during sampling
of the domain. Therefore, the measuring of performance must be repeated a num-
ber of times to account for the stochastic variance2 , which also could be a measure
of comparison between algorithms. The most critical concern in the selection of
measures is that of standardisation for the purposes of comparison [44, 33].
30
algorithms provide procedures for problem-solving when the behaviour of the instantiated
model suitably match the characteristics of a problem.
Goldberg describes the airplane and other products of engineering as material machines,
and distinguishes them from the engineering of genetic algorithms and other adaptive sys-
tems as conceptual machines. He argues the methodological distinction between the two is
counter-productive and harmful from the perspective of conceptual machines, specifically
that the methodology of the material is equally applicable to that of the conceptual [174].
The obsession of mathematical rigour in computer science, although extremely valuable,
is not effective in the investigation of adaptive systems given their complexity. Goldberg
sights the airplane as an example where the engineering invention is used and trusted
without a formal proof that the invention works (that an airplane can fly3 ). This de-
fence leads to what Goldberg refers to the economy of design which is demonstrated with
a trade-off that distinguishes ‘model description’ (mathematician-scientists) that is con-
cerned with model fidelity, and model prescription (engineer-inventor) that is concerned
with a working product. In descriptive modelling the model is the thing (of interest)
whereas in ‘prescriptive modelling’, the object is the thing (of interest). In the latter, the
model (and thus its utility) serves the object, in the former model accuracy may be of
primary concern. This economy of modelling provides a perspective that distinguishes the
needs of the prescriptive and descriptive fields of investigation.
The mathematician-scientist is interested in increasing model accuracy at the expense
of the speed (slow), where as the engineer may require a marginally predictive (inaccurate)
model relatively quickly. This trade-off between high-cost high-accuracy models and low-
cost low-fidelity models is what may be referred to as the modelling spectrum that assists
in selecting an appropriate level of modelling. Goldberg proposes that the field of genetic
algorithms expend too much effort at either ends of this spectrum. There is much work
where there is an obsession with blind-prototyping many different tweaks in the hope of
striking it lucky with the right mechanism, operator, or parameter. Alternatively, there
is also an obsession with detailed mathematical models such as full-blown differential
equations and Markov chains. The middle ground of the spectrum, what Goldberg refers
to as little models is a valuable economic modelling consideration for the investigation of
conceptual machines to do good science through good engineering.
Methodology
The methodology has been referred to as post-modern systems engineering and is referred
to by Goldberg as a methodology of innovation [175]. The core principles of the process
are as follows:
31
2. Modelling: Investigate each sub problem separately (or as separate as possible) using
empirical testing coupled with adequately predictive, low-cost models.
3. Integration: Assemble the sub-solutions and test the overall invention, paying atten-
tion to unforeseen interactions between the sub-problems.
Small Models Given the principle of the economy of modelling presented as a spectrum,
one may extend the description of each of the five presented model types. Small Models
refers to the middle of the spectrum, specifically to the application of dimensional and
facet-wise models. These are mid-range quantitative models that make accurate prediction
over a limited range of states at moderate cost. Once derived, this class of models generally
requires a small amount of formal manipulation and large amounts of data for calibration
and verification. The following summarises the modelling spectrum:
Facet-wise models are an exercise in simple mathematics that may be used to inves-
tigate a decomposition element of a model in relative isolation. They are based on the
idea of bracketing high-order phenomena by simplifying or making assumptions about the
state of the system. An example used by Goldberg from fluid mechanics is a series of
equations that simplify the model by assuming that a fluid or gas has no viscosity, which
matches no known substance. A common criticism of this modelling approach is “sys-
tem X doesn’t work like that, the model is unrealistic”. The source of such concerns with
adaptive systems is that their interactions are typically high-dimensional and non-linear.
32
Goldberg’s response is that for a given poorly understood area of research, any useful
model is better than no model. Dimensional analysis or the so-called dimensional reason-
ing and scaling laws are another common conceptual tool in engineering and the sciences.
Such models may be used to investigate dimensionless parameters of the system, which
may be considered the formalisation of the systemic behaviours.
2. Decompose the design ruthlessly. One cannot address the analytical analysis of a
system like a genetic algorithm in one big ‘gulp’.
3. Use facet-wise models with almost reckless abandon. One should build easy models
that can be solved by bracketing everything that gets in the way.
4. Integrate facet-wise models using dimensional arguments. One can combine many
small models together in a patch-quilt manner and defend the results of such models
using dimensional analysis.
5. Build high-order models when small models become inadequate. Add complexity to
models as complexity is needed (economy of modelling).
33
system to develop new AIS approaches including distributed approaches is currently an
advocated approach in the field given the apparent impasse experienced in the progress
of such approaches. A systematic framework was adopted for the development of new
immunologically inspired approaches, with careful empirical investigation, and awareness
of the economy of models and need for the re-integration of findings. This chapter both
positioned and motivated the research hypothesis outlined in Chapter 1, and defined the
systematic methodology adopted for the development and investigation of adaptive and
distributed clonal selection algorithms throughout the remainder of the dissertation. To-
ward this end, Chapter 3 provides an in depth investigation into the clonal selection
paradigm, both reviewing and elaborating the cellular perspective of such approaches
which is later pursued in Chapter 4, and outlining the agenda for realising distributed
approaches in Chapters 5 and 6.
34
Chapter 3
35
this context.
Theory Development
Paul Ehrlich observed the exponential generation of antibodies triggered by the primary
exposure to antigen in blood. He proposed a side-chain theory (circa 1900) in which
blood cells naturally made side chains (now known as receptors) capable of binding to all
antigens. His theory proposed that the information and capability to detect all antigen was
already possessed by the host (for example in the genome) and expressed by the antibodies.
This model was ultimately rejected because it was demonstrated that antibodies could be
produced in response to synthetic substances of which the antibodies could have no prior
knowledge. Further, the theory could not explain the improvement in the specificity of the
response in the secondary and subsequent exposures to the same antigen. The antigen-
template theory was proposed and suggested that antigen direct the response [315]. In the
theory antibodies use the antigen as a template or model and modify themselves to provide
a more effective complement. The emerging field of genetics suggested the invalidity of this
theory as the specificity of an antibody could not be changed after its creation given that
the process of gene to amino acids to protein conformation is one-way. Niles Jerne had
great difficulty with the template theory and listing a number of observations to which the
theory could not account [232]. The template theory proposed a one-to-one relationship
between antibodies and antigen, although experimental observations suggested that far
more antibodies were produced in the primary response than there were antigen. Further,
the template theory suggested the role of antibodies ended after neutralising the antigen,
whereas observations indicated that antibodies have a short lifespan, therefore failing to
account for observed immunological memory exhibited in the improved specificity of the
secondary response.
Jerne proposed an alternative called the natural selection hypotheses of antibody diver-
sity. His theory proposed that the host contains a small pre-existing collection of randomly
generated antibodies. In generating this pre-existing pool, self-antibodies where proposed
to be somehow neutralised before causing harm to the host. The theory proposed that
antigen naturally select antibodies of high affinity (a good match) from which more anti-
bodies of the same affinity are produced. The result of the antigen-to-antibody selection
mechanism the production of antibodies specific to the antigen in large numbers, which
presented an improved response of the host to the antigen. Finally, he suggested that
copying errors during the triggered production of antibodies may result in an improved fit
with the antigen and account for the observed immunological memory effect. In his work
on antibodies and allergy, David Talmage extended upon the natural selection hypothesis
suggesting that Jerne’s theory was an extension of Ehrlich’s side-chain theory, and that
replicating cells, not antibodies, were the main feature of the immune response [380]. Tal-
mage suggested the notion that immune cells must specialise in producing antibodies with
the same specificity as the receptors of the surface of the cell that trigger its proliferation.
Frank Macfarlane Burnet also extended Jerne’s theory at the same time as Talmage
(and subsequently received priority) focusing on a clone perspective and the self-replicating
36
cellular mechanisms during the immune response [63]. He called his theory the clonal se-
lection hypothesis of antibody diversity. The ‘missing link’ for Burnet was the pre-existing
naı̈ve antibody population that was proposed in Jerne’s theory. As with Talmage’s the-
ory, antigen select the best matching cells, that results in their subsequent replication. He
suggested that for the selectionist theory to hold, that each cell must produce antibody of
one type (all with the same receptor configuration). His theory attributed the exponential
rise in the number of antibodies after infection to the exponential rise in the number of
antibody producing cells due to clonal expansion of selected cells. It also explained the
improved secondary response given the specialisation of receptors during expansion, al-
though the mechanisms by which receptors specialised was only speculated. The following
provides a summary of the characteristics of Burnet’s clonal selection, from [65]:
2. One-to-one: An immune cell can detect and release antibody of one specificity, which
is passed on to descendent cells.
3. Elimination: Those initial cells that are reactive to self-tissues are selected against
(killed).
4. Proliferation: Generation of antibody and the proliferators of the cell after contact
(selection) with antigen.
5. Forbidden: The elimination of progeny that can select for self tissues.
Talmage and Burnet both followed up two years later with monographs elaborating
on the theory, providing a more detailed account of the clonal selection process [381, 64].
Burnet continued his work on the study of immunological tolerance, to which his theory
supported, and with Peter Medawar won the Nobel Prize in 1960 for work that provided
the foundation for viable tissue and organ transplant. It is also interesting to note that
it was Burnet who conceptualised the self-nonself abstraction of the immune system in
his work on immunological tolerance, which like his clonal selection theory has remained
a foundational concept of modern immunology1 . Nossal and Lederberg supported the
one-cell-one-antibody assertion of clonal selection providing first test and confirmatory
evidence for the theory [306]. As mentioned, Burnet speculated as to the mechanisms for
antibody diversification and specialisation in his theory. His prediction of the existence
of such a mechanism was confirmed approximately 20 years later by Tonegawa et al. who
investigated the fine tuning of antibody receptors called somatic hypermutation for which
he later won the Nobel Prize [223, 397].
Theory Detail
37
immune cell which can bind to antigen as well as produce antibodies. The physical surface
of an antigen has a number of different structural features called antigenic determinants.
An antibody and B-cell have receptors which have a specificity (ability to bind) to only
one surface feature of an antigen, although the feature an antibody binds to may be rep-
resented on more than one different antigen. A host possesses a base pool of randomly
generated lymphocytes that define the hosts natural immunity, and are prepared during
the embryonic stage of development. During this time, the immune system learns a tol-
erance for the tissues of the host organism and those lymphocytes that are self-reactive
are removed from the pool. The repertoire of natural lymphocytes possesses the ability
to bind to any antigenic stimulus (natural or synthetic) with some general affinity. The
introduction of an antigen triggers an immune response. The lymphocytes that are most
suited (have the best complementary shape) for the antigen bind to it triggering cell di-
vision and differentiation. Therefore, it is the features of the antigen that select the best
matching lymphocytes from the hosts cellular repertoire. After a lymphocyte binds to an
antigen it moves to lymphatic tissue (germinal centre) to begin the differentiation process.
The function of this process is the preferential proliferation to replicate a clone of cells to
produce antibody capable of neutralising the triggering antigen. The lymphocyte prolifer-
ates and differentiates into two different cell types: plasma cells that continue to replicate
and which release large numbers of antibody, and memory cells that like the parent cell
act as a catalyst for response to subsequent infections.
During the proliferation and differentiation process copying errors (somatic mutations)
may occur with a probability of mutation much higher than the genetic mutations that
occur in typical cell divisions. The result is a clone of lymphocytes that have receptors
similar to the parent cell, although vary slightly in their specificity to the triggering antigen.
This means that on subsequent exposures to the antigen, the host possesses a larger
repertoire of lymphocytes and antibodies capable of neutralising the antigen. Given the
somatic mutations introduced during replication, some of the lymphocytes will contain an
improved match for the antigen, improving their chance of being selected. An antibody
producing lymphocyte will only produce antibodies of the same affinity. This means
that after the cell has formed (after mitosis) it may be considered an antibody factory
where all antibodies produced have the exact same complementary shape for a specific
antigen surface feature. The fact that a surface feature may be represented by more than
one antigen provides the basis for vaccinations. This commonality of shape facilitates
the capability for generalisation, where lymphocytes and antibody may be raised on one
harmless antigen and be effective on other more harmful antigens that possess the same
structures. The memory cells generated during the differentiation process may live for
months and years which is much longer than typical lymphocytes that lives for hours or
days, providing long term memory of the learned antigenic defence.
The problem of antibody diversity was considered for at least 100 years before a co-
herent theory was proposed, although it is important to highlight that the theory in its
original inception was not perfect. Specific details, such as the mechanisms of diversity
where not known for many years after the theory’s acceptance. Silverstein suggested that
38
with regard to the clonal selection theory, like Darwin’s theory of evolution by natural
selection, much of the specifics have been out-dated given scientific progress [358]. Rather
than abandon the core principles, Silverstein emphasises the need to embrace the contin-
ually updated version of the theory. A pioneer himself in immunology, Lederberg suggests
similar sentiments: “Don’t let conflicting and awkward ‘facts’ stand in the way of an es-
thetically satisfying theory whose fundamentals are consistent with the world model and
with one another! And be suspicious of ‘facts’ that seem in the way of any coherent theory”
[269] (page 181).
Finally, the clonal selection process of acquired immunity is not without problems.
An observed effect known as Original Antigenic Sin 2 refers to the commitment of the
immune response and subsequent memory to specific surface characteristics of a pathogen,
such as a virus, then having the virus mutate and change those surface characteristics
[152, 122]. The result of the commitment is that the previously high-affinity lymphocytes
and antibody become low-affinity within the context of the change to the virus. Given the
clonal selection and expansion of lymphocytes in the first exposure, the now low affinity
receptors dominate the subsequent exposures, effectively out-competing other lymphocytes
that may be better suited to the changed virus.
Diversity Mechanisms
The genetics and chemistry of antibody diversity is beyond the scope of this work. This
section provides a summary of the main mechanisms that lead to the diversity of the B-
lymphocyte repertoire, which includes gene recombinations, somatic mutations, receptor
editing, class switching, and gene conversion.
• Genetic Recombination: The process that accounts for the initial and on-going high
diversity of new lymphocytes is called secondary V(D)J rearrangements, which refers
to the recombination of the genetic code during the development of B-lymphocytes.
This genetic recombination process accounts for the diversity of the initial lympho-
cyte repertoire and in the creation of new (known as naı̈ve) B-lymphocytes [396, 397].
• Somatic Hypermutation: Along with genetic recombination was the first discovery
made regarding the genetic component of antibody diversity [396]. It refers to the
point mutations of the genome that occur during the clonal expansion phase when the
cell moves to the germinal centre for differentiation (for more information regarding
cell maturation see [37, 38]). The mutations are targeted at the genes in the genome
that code for the receptors and occur at a rate about one million times higher than
the mutation rates in other genes. Mutations include substitutions, additions, and
deletions of genetic code. Specific sequences (motifs) within the receptor genes are
targeted with high frequency, referred to as ‘hot spots’.
• Receptor Editing: Clonal selection proposes that those cells with receptors that bind
to self-tissues (auto-reactive) are clonally deleted before they can cause damage.
2
“Original Sin” is a term from Christian theology describing the condition of sin that marks all humans
as a result of Adam’s first act of disobedience.
39
Receptor editing is an additional process for re-programming auto-reactive receptors
by recombining their genes [332, 307]. Those cells that have receptors that are still
auto-reactive after this editing process are eliminated from the repertoire. Receptor
editing was proposed to occur before somatic mutation and in response to contact
with antigen (similar to template theory). It has also been proposed that receptor
editing may provide an additional general receptor diversity mechanism for so-called
‘long jumps’ (large changes) in receptor affinity [167].
Shape-Space
Perelson and Oster introduced the shape space formalism in their theoretical investigation
of antibody repertoire size and reliable recognition [321]. Given antibody ab and anti-
gen ag, the authors discretised the physical aspects of the antibodies combining site and
the antigenic determinant into a vector of n so called shape parameters. The parame-
ters included the set of intermolecular forces important to the ab − ag recognition. The
abstraction of a molecule was later referred to as its generalised shape, where the shape pa-
rameters for a ag and ab molecule may be defined as points in an n-dimensional Euclidean
space called shape-space S [320]. The authors suggested that given an adequate method
of defining molecule shape, the dimensionality of such a space could be relatively small (as
low as five dimensions). Further, the formalism simplified the complementarity nature of
ab − ag interactions, thus rather than the matching convention of ab #= ag, the formalism
considers ab = ag. Given this simplification, the formalism defines distances between ab
and ag in the Euclidean shape space as the degree of complementarity or affinity of the
interaction. A generalised affinity function may be defined as cij = f (xi , xj ), where cij
is the affinity between the molecules i and j, and xi and xj are vectors representing the
molecules in shape space, f is an appropriate function for the selected representation. The
shape space is defined as a finite hypercube, with a volume V of uniform density. Each
antibody was defined with a local recognition region in the shape space !, with a Gaussian
falloff. An ab-ag interaction only occurs if the ag is above an affinity threshold, within the
40
triggering hyper-sphere of the ab. In their application of the model, random distributions
of ab and ag were used and self-antigens were ignored.
Figure 3.1: Depiction of the shape-space formalism taken from [322] (page 1225). Xi
represents antibodies with corresponding complementary recognition volumes V!i .
Affinity Landscape
It is typical in physics for systems to minimise some utility in the context of a response
surface, whereas in biology it is common for systems to maximise some utility. This is
highlighted by the already mentioned evolutionary fitness landscape paradigm introduced
by Wright in conceptualising gene combinations [437]. In the immune system, one may
consider the utility of an antibody as its affinity in binding to a specific antigen. A related
concern called avidity, refers to strength of the binding between antigen and antibody.
41
Among the first to employ the conceptualisation of an affinity landscape were Kauffman
and Weinberger who used this geometric paradigm in the field of theoretical immunol-
ogy to investigate and describe the theoretical effects of affinity maturation [242, 243].
They investigated adaptive walks using Kauffman’s NK3 model on the affinity landscape
based on antibody sequences or so called antibody-space in response to a given antigen.
Kauffman and others used the NK model to investigate various molecular sequence spaces
and the corresponding response surfaces, for example [137, 240, 241]. One may define an
affinity landscape as a degree of complementarity response surface for a given collection of
antigen detecting agents (lymphocytes and antibody), for a given specific antigenic deter-
minant. Abstractions of this surface considered in theoretical immunological are typically
continuous, the topology of which consists of many local optima. Detecting agents may
navigate this response surface through the process of affinity maturation, which involves
manipulations to genotypic sequence information (such as the clonal selection diversity
mechanisms discussed in Section 3.2.1).
The affinity landscape is a simple yet important conception, and although Kauffman
et al. were perhaps the first to apply such a name, the geometric formalism was no doubt
in the mind of Perelson and others in the early days of theoretical and computational
immunology. The formalism has played an important role in conceptualising and for-
malising affinity maturation of the immune response by hypermutation (for example see
[325, 356, 385, 386]), which as has been demonstrated is a critical aspect of the clonal selec-
tion theory of antibody diversity. George and Gray used the affinity landscape as a crutch
in describing their theories on receptor editing, which were generalised very effectively on
a simple two-dimensional affinity graph in Figure 3.2 [167, 168].
Figure 3.2: Theory of receptor editing providing long jumps in the affinity landscape, from
[167].
The shape-space and affinity landscape paradigms have been widely used in the field of
Artificial Immune Systems. Some examples include the quintessential binary shape-space
used in negative selection (for example [375]) and immune network algorithms, the recogni-
3
Not to be confused with Natural Killer cells, N and K are parameters of the Kauffman’s model.
42
tion region and threshold used in data mining and classification algorithms [422, 421, 259],
and the affinity landscape cost functions navigated by optimisation algorithms [427, 117].
The usage of these paradigms is unified in the framework for AIS of Engineering de Cas-
tro and Timmis, and listed in Section 2.6.1. The authors presented abstract models of
immune cells, molecules and their interactions including the affinity landscape and shape-
space paradigms in an effort to elaborate the three facets of their framework (represen-
tation, affinity measures, and immune algorithms). One may distil the discussion of the
AIS Engineering Framework and related abstraction by de Castro and Timmis, to a triad
relationship between representation in a shape-space, a mapping function between points
in that space, and an affinity landscape of scores assigned by the mapping function, as
follows:
43
processes are selection, proliferation, and genetic mutations. Further, it showed that the
common measures used to describe the relationship between antibody and antigen are
affinity and avidity, and that the main conceptual formalisms used to describe the con-
straints and effects of such interactions are shape-space and the affinity landscape. This
section reviews the so called clonal selection principle which is the abstraction that moti-
vates the field of clonal selection algorithms. A taxonomy of such algorithms is presented,
highlighting the open problems in the state of the art.
44
algorithms based on the clonal selection principle to be population based, where each
member of the population represents a candidate solution belonging to the combinatorial
fitness landscape of a given computational problem.
What is distinctly common between these two sets of principles is (1) the absence of
concerns of cell and antibody preparation for the task of pathogen identification associ-
ated with the negative selection paradigm, and (2) the absence of the concerns of cell-cell
(inter-repertoire) interactions such as those associated with the immune network paradigm.
Neither sets of principles explicitly exclude these concerns, rather they are not the focus of
the information processing. The Cutello-Nicosia and the de Castro-Timmis abstractions of
the clonal selection theory are the two main sets of principles inspiring the IA and CLON-
ALG families of clonal selection algorithms respectively (Section 3.3.2). Both abstractions
consider clonal selection to be an adaptive process that operates on a finite set of discrete
units, the composition of which is changed though the iterative application of selection
and clonal expansion with variation. Both abstractions also value the diversity provided
through bind mutation that results in pre-committed configurations, some of which offer
a relative selective advantage. The Cutello-Nicosia abstraction considers distinct training
(change) and test (fixed) phases of adaptation, whereas the de Castro-Timmis abstraction
considers affinity-biased controls on a single adaptive phase.
CLONALG
Hidden at the back of a technical report surveying the applications of Artificial Immune
Systems, de Castro and Von Zuben proposed the Clonal Selection Algorithm (CSA) as a
computational realisation of the clonal selection principle for pattern matching and opti-
misation [112]. This algorithm which has become perhaps the most popular in the field of
AIS, was later published and represented [114], and again [117] where it was renamed to
CLONALG (CLONal selection ALGorithm). The general CLONALG model involves the
selection of antibodies (candidate solutions) based on affinity either by matching against
4
This is the scope of clonal selection algorithms to the author’s knowledge. It is not expected to be
complete given the vastness and disparate nature of related publications, nor is it required to be complete
for the purposes of this dissertation.
45
Lineage Algorithms Primary Application
CLONALG CSA, CLONALG, CLONALG (1,2), ACS, Optimisation
CLONCLAS, RCSA, MOCSA, IMCSA,
AISMM, SACSA, ECA
AIRS AIRS, AIRS2, Parallel AIRS Classification
BCA BCA Optimisation
IA IA, SIA, I-PAES, CLIGA, CLIGA+, NC- Optimisation
IA, READ-Alg, opt-IA, opt-IMMALG, Par-IA,
Dyn-IMMALG
MISA MISA Multi-Objective Optimisation
Other Too large and varied to classify Varied
46
Parameter Description
P Repertoire of antibodies.
N The fixed antibody repertoire size.
n The number of antibodies to select for cloning.
L Bitstring length for each antibody.
Nc Number of clones created by each selected antibody. Originally expressed as
a function of the repertoire size (for optimisation) Nc = round(β · N ) (where
β is a user parameter), although a direct integer specification of Nc is simpler.
A rank-based (affinity proportionate) variation of the parameter is presented
for pattern recognition.
d Number of random antibodies to insert at the end of each generation. Random
antibodies replace the d lowest affinity antibodies in the repertoire.
Stop condition Typically a specified number of generations or function evaluations or epochs
of exposure to patterns.
affinity Solution evaluation, typically the solution is decoded into a domain specific
representation and assigned a quality scoring.
clone Duplication of a bitstring.
hypermutate Modification of a bit string where the flipping of a bit is governed by an affinity
proportionate probability distribution. Originally p = exp(−ρ · f ), although
the opt-aiNET variant is also popular p = ( ρ1 ) · exp(−f ) (where ρ is a user
parameter and f is the normalised affinity scoring).
replace The set of the d lowest affinity clones in the population (P ) are replaced with
randomly generated solutions.
to clonal selection algorithms, specifically for function optimisation problem instances, the
extent of which is excluded in the interest of brevity.
After CLONALG, the Artificial Immune Recognition System (AIRS) algorithm is perhaps
the second most popular clonal selection algorithm, although the approach was designed
for and has only been applied to the supervised classification problem domains. The
earliest work on AIRS was in Watkins Masters work [422] that was later published [423].
The approach is a supervised learning algorithm for classification that uses the idea of an
Artificial Recognition Ball (ARB) (introduced in earlier works on the Artificial Immune
Network algorithm) to represent clones (groups) of identical B-cells. The AIRS procedure
involves cloning and somatic hypermutation for preparing a set of real-valued exemplar
vectors suitable for classifying unobserved cases, using a single iteration (epoch is the
machine learning term) over a set of training data. Watkins and Boggess applied the
AIRS to a suite of benchmark classification problems [418], and Goodman and Boggess
problems did the same, comparing to a conceptually similar approach called Learning
Vector Quantization (LVQ) [178].
Given the rapid popularity of the approach Marwah and Boggess investigated the algo-
rithm seeking issues that affect the algorithms performance [286]. They compared various
47
Algorithm 3.1: CLONALG for Function Optimisation.
Input: N, n, L, d, β, ρ
Output: P
1 P ← CreateRandomCells(N, L);
2 while ¬StopCondition() do
3 foreach pi ∈ P do
4 Affinity(pi );
5 end
6 Pselect ← Select(P, n);
7 Pclones ← 0;
8 foreach pi ∈ Pselect do
9 Pclones ← Clone(pi , β);
10 end
11 foreach pi ∈ Pclones do
12 Hypermutate(pi , ρ);
13 Affinity(pi );
14 end
15 P ← Select(P, Pclones , N);
16 Prand ← CreateRandomCells(d, L);
17 Replace(P, Prand );
18 end
19 return P;
variations of the algorithm with modified resource allocation schemes, tie-handling within
the ARB pool, and ARB pool organisation. AIRS was again raced against LVQ by Boggess
and Hamaker on datasets that contained irrelevant features to assess the algorithms ability
to handle noise [49]. Greensmith and Cayzer applied AIRS to hierarchical document clas-
sification [186], that culminated in Greensmith’s masters work [185]. Watkins and Timmis
proposed a new version of the algorithm called AIRS2 which became the replacement for
AIRS1 [419]. The updates reduced the complexity of the approach while maintaining the
accuracy of the results. An investigation by Goodman, et al. into the so called ‘source of
power ’ in AIRS indicated that perhaps the memory cell maintenance procedures played
an important role [179]. A follow-up empirical investigation by Goodman and Boggess
supported the original finding indicating that the process by which new memory cells are
admitted into the ARB pool is critical to the success of the approach [180]. The work
by Watkins, et al., already mentioned briefly in Section 2.5.2 proposed a parallel version
of AIRS permitting the division of training patterns and memory pool suitable to ex-
ploit parallel hardware [420]. The extent of further elaborations and applications of the
approach are excluded in the interest of brevity.
B-Cell Algorithm
Kelsey and Timmis proposed the B-Cell Algorithm (BCA) as an AIS designed for continu-
ous function optimisation [246]. The algorithm maintains a pool of B-cells (binary-encoded
candidate solutions) that are subjected to cloning and mutation. An elitist replacement
population maintenance scheme is applied that ensures only improved cells are admitted
48
into the pool. The mutation operator, which is called contiguous somatic hypermutation
selects a random sub-string of a solution to vary in a probabilistic manner, in what the
authors claim as ‘hot-spot’ mutation. Kelsey, et al. applied the BCA to multi-modal
dynamic chaotic test functions [247]. Empirical algorithm tuning by the authors revealed
that small population sizes (3-5) show better results. In an investigation of AIS applied to
optimisation, Hone and Kelsey provide a case study investigation of the BCA and showed
fractal structures on the complex plane suggesting the potential usefulness of studying
AIS as non-linear dynamical systems [219]. In a further empirical study, Timmis, et al.
compared the BCA to opt-aiNET5 and a Hybrid Genetic Algorithm attributing the partial
success of BCA to the mutation scheme, speculating it results in the escaping of local-
optima search behaviour [390]. The parameters of BCA are summarised in Table 3.3, and
the general procedure for the approach is listed in Algorithm 3.2.
Parameter Description
P Repertoire of antibodies.
N Antibody population size.
Nc Number of clones to create of each antibody.
Nr Number of random antibodies to create and insert each generation.
Stop Condition Typically if no progress is made for a number of generations.
hypermutation Uses a processes called contiguous hypermutation, a random location in the
bit string is selected, and a random bitstring length is selected. Each bit in
the sub-string is flipped with the probability ρ.
replace A parent is replaced only if a member of its clone has a higher affinity (greedy
replacement).
A proof of convergence for the BCA was proposed by Clark, et al. using a Markov Chain
model [76]. The proof simplifies the algorithm to an elitist search with a single population
member suggesting that the members of the population can be treated independently
given the lack of interaction during the optimisation procedure. Further, they speculate
that the introduction of inter-solution interactions in the BCA will have a detrimental
effect on results of a search. Finally, in an empirical study Bull, et al. applied the BCA to
what they refer to as less-smooth test problem instances (Diophantine equations) seeking
empirical convergence heuristics [62]. Four variants of the algorithm were compared: an
approach that used an elitist selection mechanism to introduce inter-solution interactions,
and three of what the authors refer to as mega-mutation schemes that attempt to introduce
further diversity into the search. These less-greedy modifications of the approach achieved
a better final result compared to the classical BCA on the test functions chosen, perhaps
suggesting the use of diversity introduction approaches in further BCA applications.
5
(opt-aiNET) is an immune network algorithm for optimisation specified in [108]
49
Algorithm 3.2: B-Cell Algorithm (BCA).
Input: N, Nc , Nr , ρ, L
Output: P
1 P ← CreateRandomCells(N, L);
2 while ¬StopCondition() do
3 foreach pi ∈ P do
4 Affinity(pi );
5 end
6 foreach pi ∈ P do
7 Pclones ← Clone(pi , Nc );
8 Pclones ← CreateRandomCells(Nr , L);
9 foreach pi ∈ Pclones do
10 Hypermutate(pi , ρ);
11 Affinity(pi );
12 end
13 pi & ← SelectBest(Pclones );
14 if pi &.affinity ≤ pi .affinity then
15 pi ← pi &;
16 end
17 end
18 end
19 return P;
A simple clonal selection inspired algorithm was proposed by Cutello and Nicosia called
Immunological Algorithm (IA) [95, 96]6 later renamed to Simple Immunological Algorithm
(SIA) [97]. The algorithm maintains a population of B-cells that are exposed to a clonal
expansion process each iteration. This expansion process involves the cloning of cells and
the application of a hypermutation operator, and was demonstrated on the Minimum
Hitting Set Problem (MHSP) and the 3-Satisifiability Problem (3-Sat). The SIA was
extended and an applied to the Graph Colouring Problem (GCP) [100]. The extensions
involved the introduction of a local-search procedure that operated upon each B-cell after
the clonal expansion phase. In addition, rather than an elitist selection method of maintain
the population size after each expansion, an aging operator was introduced for each B-
cell. B-cells are probabilistic deleted from the population using an equation inspired by the
biological literature. Two variations of the aging operator were applied, an elitist version
that ensured the best B-cell’s were not deleted, and a pure strategy that probabilistically
deleted irrespective of the elitist concerns. A birthing operator was also added to ‘top-
up’ the population to the configured size, and an information gain (a stabilisation in the
measure of information discovered by the algorithm) measure was used as the termination
criteria for the algorithm. Given the enthusiastic renaming and tweaking of this family of
approaches, the SIA (the simplest variation of the family) is presented in Table 3.4 and
6
The Immunological Algorithm (IA) is renamed and represented many times by its authors. Other
names include Simple Immune Algorithm (SIA), Cloning Information Gain Aging (CLIGA), and Opti-
mization Immune Algorithm (opt-IA, opt-IMMALG). This linage is named the IA family for simplicity.
50
Algorithm 3.3.
Parameter Description
P Antibody population.
L Length of binary string representation.
d Population (repertoire) size.
dup The number of clones created for each antibody.
clone Duplication of the bitstring.
hypermutation Probabilistic modification of a bit string (bit flipping), requires the specifica-
tion (ρ) of the probability of flipping each bit.
The probabilistic aging operator was replaced with a simplified generational aging op-
erator by Cutello, et al. in an application to the 2DHP protein folding problem [102]. In
a more detailed study on different varieties of the same protein folding domain, the aging
operator was further tweaked to facilitate longer life spans on some B-cells deemed useful
to the search process [104]. The clonal expansion aspect of the algorithm (cloning and
hypermutation) was grafted into to an existing evolutionary multiple-object optimisation
technique and called I-PAES [91] . The transformed algorithm (generational aging, in-
formation gain stopping criteria) was reviewed and renamed to the ‘Cloning, Information
Gain, Aging’ (CLIGA) algorithm [97]. A modified version called CLIGA+ was proposed
in which each B-cell contains more than one receptor (pattern), permitting application of
the algorithm to pattern recognition tasks. Also proposed in this work is a Noisy Channel
variation of SIA (NC-IA), and a Reaction-Diffusion variation of SIA (READI-Alg) both of
which were applied to instances of the GCP. Cutello, et al. again renamed the approach
51
to Optimisation Immunological Algorithm (opt-IA) and applied the approach to instances
of binary trap functions [94]. An additional fitness inversely-proportional hypermutation
referred to as hypermacromutation was proposed and compared to the traditional static
approach. This algorithm was evaluated again in a larger study involving a number of
machine learning domains [92], and again on a large number of continuous function opti-
misation instances [93]. Cutello, et al. investigated the hypermutation operators of opt-IA
[101]. Cutello, et al. applied opt-IA to the 3DHP protein folding problem [90]. Cutello
and Nicosia applied opt-IA to graph colouring, MHSP, and satisfiability [98]. Work by
Anile, et al. hybridised opt-IA with a direct search method [27]. An extension of opt-IA
called Aligner was proposed by Cutello, et al. and applied to multiple sequence alignment
of DNA [89].
An extension to opt-IA was proposed by Cutello, et al. called the parallel immune
algorithm (Par-IA) which is a master-slave version of the algorithm applied to numerical
function optimisation [99]. Cutello, et al. renamed the approach to Optimisation Immune
Algorithm (Opt-IMMALG), applying the approach to continuous function optimisation
using a real-valued representation as opposed to the binary representation used in pre-
vious works [103]. Also stated in this work was the use of fitness inversely proportional
hypermutation as the standard mutation operator for the approach. This algorithm was
extended and renamed dynamic immune algorithm (dyn-IMMALG) by Cutello, et al. who
propose a dynamic rather than static clonal operator [88]. The approach was applied to
binary trap functions and compared to opt-IA and variations of CLONALG.
Coello Coello and Cruz Cortes introduced an AIS called the Multi-objective Immune Sys-
tem Algorithm (MISA), and as its name suggests was designed as a population-based
approach for constrained and unconstrained multi-objective optimisation [77]. In the ap-
proach a repertoire of solutions is split into antigens (Pareto non-dominated and feasible
solutions) and antibodies (Pareto dominated and infeasible solutions). A bit-string rep-
resentation is used and antigens are selected at random and matched against antibodies
using Hamming distance. After the selection step, antibodies are cloned, mutated the
population is unioned and reduced back to the configured size, culling the lower quality
solutions. An external (elitist) memory repertoire is maintained of non-dominated feasible
solutions. Solutions are added to the memory set if they are non-dominated by the current
memory set population and sufficiently diverse as determined by a grid-based maintenance
structure. MISA was extended by the same authors and further compared to state of the
art evolutionary approaches for multi-objective optimisation [83]. An EC-AIS hybrid ter-
minology was adopted and an EC-based crossover mechanism was adopted within the
memory set. The main algorithm was simplified such that all population members were
consider antibodies, and only the lower score solutions was selected for cloning and hyper-
mutation. The modified algorithm was shown effective, although it demonstrated rapid
convergence behaviours on benchmark problem instances. Finally, Villalobos-Arias, et al.
proposed a convergence proof for the update MISA showing that the elitism within the
52
algorithm was needed to guarantee convergence [408].
Other
Research into the five core lineages of clonal selection algorithms revealed a large number
(>70 works) on new or extended clonal selection algorithms, predominantly in non-western
conference proceedings. The vast majority of these works involved the application of a
CLONALG, SIA, or derivative algorithms to benchmark and engineering problem domains.
The extent of these works are omitted here for brevity, although the dominant applica-
tions are listed as follows: feature selection for models, parameter tuning for models or
controllers, parameter tuning for a PID controllers, anomaly and/or intrusion detection,
pattern recognition, multi-objective optimisation, function optimisation, general optimi-
sation, multi-user detection, and finally hybridisation with other algorithms.
As discussed in Section 2.4, the clonal selection principle underlies the adaptive quali-
ties of all three of the major paradigms of Artificial Immune Systems. As such, many works
investigating the negative selection and immune network employ B-cells and antibodies
that are modified using processes of selection and expansion with variation. Given that
these approaches do exploit the clonal selection principle they may be considered clonal
selection algorithms, although do not fit into the presented taxonomy as the clonal selec-
tion principle is not the primary focus of the works. This section provides some examples
of such research. Weinand propose a dynamical systems computational model of somatic
mutation of B cells to evaluate the effect of somatic mutation of affinity maturation of the
immune response [424]. Zhang and Hou propose a Niching Clonal Selection Algorithm
(NCSA) that combines negative selection and refinement applied to the pattern matching
problem of anomaly detection [445]. Yu and Hou proposed an extension of CLONALG
called CsAL (Clonal Selection Algorithm) to investigate the negative selection approach
to virus detection [443]. In the body of work on an integrated intrusion detection sys-
tem discussed in Section 2.5.2, the authors propose a static and dynamic clonal selection
algorithms (DynamiCS) which are an augmentation to T-cell inspired negative selection
system that uses clonal selection mechanisms to improve detectors.
53
(2) distinction between cell types and/or antibody molecules, and (3) cell-cell interactions.
The realised clonal selection algorithms are monolithic, considering antibody confor-
mations in binary and real value shape-spaces, mostly against a single affinity landscape.
As such, the dominant application domains are optimisation (function optimisation), and
supervised classification with procedures that closely resemble genetic algorithms (CLON-
ALG, IA, BCA, MISA) and vector quantisation procedures (AIRS), and the dominant
conceptual and quantitative comparisons have been made with evolutionary algorithms.
The review demonstrated that the trend with these approaches have been to (1) enhance
the algorithm procedure through domain specific assumptions (limited resources in the
case of ARB for classification, and affinity proportionate descent with modification in
CLONALG for optimisation), (2) tweaking and parameter tuning (numerous additional
and alternative operators in the IA family, sensitivity analysis of CLONALG, BCA and
AIRS), and (3) application, benchmarking and racing (the majority of the published re-
search). Based on the detailed review of the state of the art of clonal selection algorithms
in the context of clonal selection and related theory, this section identifies three specific
limitations that represent open problems in the field, as follows:
1. Related Approaches: Clonal Selection Algorithms have generally been related and
compared to Evolutionary Algorithms including the Genetic Algorithm and the Evo-
lutionary Strategy, although broader connections with related computational intel-
ligence fields are typically brief and/or non existent. Systematically placing and
contrasting Clonal Selection as a Computational Intelligence metaphor with related
paradigms provides both a context for comparison of behaviour and capability, and
suggests at the specific overlapping features and findings that may be exploited as
well as those features that differentiate the approach and should be pursued.
2. Implicit Adaptive System: Given the adaptive qualities of the clonal selection theory,
computational models are implicitly assumed to be instances of adaptive systems.
Whether or not a CSA is an adaptive system is not in question, rather the more
important concerns of what it means for computational models of clonal selection to
be classified as adaptive systems. Unlike the Genetic Algorithm that emerged from
Holland’s investigation and formalisation of adaptive systems, the inception and in-
vestigation of clonal selection algorithms has been focused on addressing benchmark
instances of difficulty computational problems. The consideration of the clonal se-
lection as a strategy in the context of an adaptive systems formalism will provide a
stronger foundation of understanding, and insights into the broader and unrealised
information processing capabilities of the approach.
3. Cellular Focus: The scope of clonal selection algorithms are concerned with abstrac-
tions of lymphocyte interactions with antigen, specifically with little or not detail
of the molecular basis of such interactions, nor the broader consideration of where
such interactions occur or the effect they have on the host organism. This cellular
focus is reasonable for the preliminary realisation of computational models inspired
by the theory embodied in the present state of the field, although elaboration and
54
development of so-called ‘second generation’ clonal selection algorithms requires a
holistic consideration of the acquired immune system and the restrictions and con-
straints such a broader perspective imposes on improvement-centric adaptive clonal
selection strategies.
3.3.4 Summary
The detailed treatment of the Clonal Selection Theory in Section 3.2 provided the context
for effectively appraising the state of clonal selection algorithms, specifically with regard to
the task of identifying limitations which may be exploited toward elaborating the general
approach. The taxonomy presented in Section 3.3.2 unified disparate works by general
algorithm lineages, that ultimately highlighted both the deep commonality between the
lineages and the algorithms that belong to them, and the simplicity of the overarching
computational abstraction that underlies such approaches. Importantly this insight pro-
vided the context to identify three limitations and open problems with the clonal selection
paradigm that motivate the remainder of this Chapter. Specifically, Section 3.4 reviews
machine learning approaches to clonal selection highlighting the findings that may be ex-
ploited and the features that differentiate the approach. Section 3.5 considers the clonal
selection strategy in the context of adaptive systems theory, highlighting critical features
of the theory excluded and underrated by existing computational abstractions. Finally,
Section 3.6 address the cellular focus of the paradigm, and outlines an agenda for extend-
ing the approach beyond a discrete repertoire of cells toward distributed clonal selection
algorithms.
55
and to the properties of modern Evolution Strategies (ES). See [142, 173] for a classical
treatment of EC and [31, 32] for a modern treatment of the field of EC.
In their work on CLONALG, de Castro and Von Zuben consider the similarity be-
tween a GA and their approach, particularly in regard to the binary representation used
and the stochastic-Darwinian processes employed by both algorithms [112]. They suggest
the differences between the algorithms, include the vocabulary used (genetics and evolu-
tion verses the shape-space formalism and antibody-antigen cellular interactions), and the
somatic mutation and receptor editing used to explore the shape space. The authors also
claim that CLONALG can be categorised as an evolutionary-like algorithm, although they
maintain the same arguments of inspiration, vocabulary, and formalism and the primary
differences [117]. In their book de Castro and Timmis again acknowledge the similarity of
CLONALG to an EA [109]. They are quick to point out that a major difference between
the inspirations of the two approaches is that mutation in evolution is random, whereas the
hypermutation process of clonal selection is controlled and directed, proportional to the
receptors affinity with the triggering antigen (specific to their abstraction). They suggest
that work on EA’s can be leveraged by CSA’s indicating that research on selection oper-
ators (e.g. tournament and roulette wheel selection) may be exploited. The shape-space
formalism is presented as a CSA representation abstraction where non-binary shape-space
schemes and corresponding mutation mechanisms are discussed, also leveraging from re-
search from representation and mutation in EA’s. The authors provide a treatment of
evolution and the clonal selection of the acquired immune system. They suggest an im-
portant difference between the two theories is the fact that in the clonal process expansion
occurs through cell cloning, that there is no sex or genetic recombination, rather only
affinity inversely-proportionate somatic hypermuatation.
In work on the MISA, Coello Coello and Cruz Cortes claim that their approach is not
a genetic algorithm because it does not use recombination (crossover operator) [77], they
later adopt a crossover procedure in their approach, as well as adopt a hybrid of EC and
AIS terminology [83]. In their work evaluating the BCA on function optimisation Timmis,
et al. suggest that BCA is not a GA, based on the empirical performance of the approach
on a small suite of test problem instances, although they are very quick to point out the
limitations of their small study and the requirement for further research [390]. Forrest,
et al. investigated the pattern recognition properties of the immune system [150]. They
used a binary coded GA to model antibody-antigen matching in the immune system, which
included the clonal selection mechanism, claiming “The GA without crossover is a rea-
sonable model of clonal selection, while the GA with crossover models genetic evolution”.
Hightower, et al. use a Binary GA model of somatic hypermutation of clonal selection to
investigate the Baldwin Effect and evolution [207]. Fukuda, et al. [157] and Mori, et al.
[297] used a GA to investigate clonal selection properties and immune network algorithms
for scheduling and resource allocation. The niching-like properties (an EA property in-
spired by theories of population genetics and ecology) were observed by de Castro and
Von Zuben with CLONALG on multi-modal function optimisation [117], and empirically
compared to the fitness sharing approach of Goldberg, et al. [173, 176, 126]. The nich-
56
ing search properties were proposed to occur given the hill-climbing like behaviour of
the independent and semi-independent evolution of B-cells of the various clonal selection
algorithms.
The principle similarity between evolutionary algorithms like the genetic algorithm
and clonal selection algorithms is the Darwinian inspired theories that inspire both fields
(selection and descent with modification). Natural selection accounts for the diversity
of species, whereas clonal selection accounts for the diversity of antibodies. As such,
both processes are imperfect, stochastic process that operate on pre-committed discrete
individuals with short terms goals (relative selective advantage).
The differences between the sub-fields are subtle, related to the functional specifics of
the inspired theories. The theory of natural selection encompasses that of clonal selection,
as the genetics of the organism define the fitness of that organism, one aspect of which is the
structural and function aspects of the organisms adaptive immune system. Related to this
point is that of the time-scales involved, evolution of species such as mammals involves
the accumulation of small changes over geological time, where as the accumulation of
changes in clonal selection are exploited by a single host over its lifetime. Although in
both cases selection, decent, and modification occur on genetic material, the hereditary
of evolution is the entire genome, where as the hereditary of the B-cell lines are those
genes which affect antibody structure. The time-scales also highlight the properties of
learning within the host, evolution involves learning at the species level with a single host
representing a pre-committed unit of adaptation, whereas acquired immunity involves
learning within the host, like the learning that occurs within the brain, so called lifetime
or meta-ontogenetic and meta-epigenetic (non-inheritable changes to DNA) adaptation.
The differences go beyond nomenclature to the specifics of the inspired processes. Selection
in the immune system as a discrete event that triggers (or does not trigger) an immune
response resulting in decent with modification. Selection or survival of the fittest is an
abstraction that involves relative differences in reproductive success not contingent on
anticipated triggered events. The clonal expansion process involves mass replication via
cell division where modification is introduced through high-probability point mutations
in related genes. Darwinian evolution employs both sexual and asexual reproduction,
although evolutionary algorithms typically exploit the crossover of genetic material and
point mutations to introduce variation.
57
This section considers this relationship by providing a brief overview of the state of the
field.
The genetic adaptive plan which became the genetic algorithm operates on a popula-
tion of bit-strings. This representation facilitated the genetic operators of the approach,
and the analysis of the behaviour of the system as processing building blocks (schemata
theorem). One of the generalised genetic operators is mutation, the probabilistic flipping
of bits in the bitstring during genetic replication. Holland proposed that mutation is de-
termined “by a random process where each position has a small probability of undergoing
mutation, independently of what happens in other positions” [216] (page 109). In using
random mutation alone Holland suggested the use of small mutation probabilities such that
the process provides a high probability of maintaining history, which is the dependence of
the approach. Holland pointed out the use of high mutation values results in little depen-
dence between successive generations of individuals, calling such an approach essentially
enumerative. Low probability mutation facilitates the dependence between observations
and new trials, although is suggested to be very unsophisticated compared to genetic
crossover. He proposed the use of low probability mutation as an improvement operator
for existing solutions that rather than used in the construction of new trials. He proposed
the operator should be used to complement the primary genetic operator by restoring lost
genetic material. Further, the application of the mutation operator was described to be
disrupting to the building blocks moved around by the crossover operator, further reinforc-
ing the need for a low probability of occurrence. Holland called mutation a background
operator, and thus the effects of the operator were largely ignored, and the probability
of point-mutations was conventionally kept very small (for example Pm ∈ [0.001, 0.01])
[173, 31]. The probability of a bitstring being mutated is Pm = 1 − (1 − pm )L where Pm
is the mutation rate and L is the string length. Goldberg differentiated between mutation
and crossover by suggesting that selection+mutation provides continual improvement with
limited scope, whereas selection+crossover provides innovation via jumping and remixing
of components [177].
Eiben and Schippers summarised the role of the mutation operator as a uninary (or
asexual) and unbiased operator, highlighting its role as a main operator in evolutionary
strategies (traditionally real numbers) and the primary operator in evolution programming
(traditionally operates on finite state machines) [133]. Spears highlighted the complemen-
tary nature of the two primary genetic algorithm operators suggesting that mutation the
focus if optimality is important and the crossover is useful accumulated payoff is impor-
tant [367]. He suggested that crossover and mutation are two versions of the same general
operator that perturbs genetic representations based on available information. In his dis-
sertation, Spears proposes that mutation has a high exploratory power (in that it is not
dependent on the composition of the population) and no positional dependence (in that
it has the potential to transform a given string into any other string in the search space)
[368]. Work by Schaffer, et al. in the late 1980’s and early 1990’s highlighted the potential
of the mutation operator, suggesting the operators power had been underestimated in ge-
netic algorithms [348, 347]. These works attempted to formalise an optimal mutation rate
58
for genetic algorithms, work that was extended experimentally in [347] and theoretically
[206]. Later work suggested the use of an initially large mutation rate that exponentially
decreased with generational running time of the algorithm. A dynamic and decreasing
mutation rate was further supported by others investigating the potential of the operator
(not limited to [298, 141]). The reason for this is “the probability that a mutation will
give a better string decreases with the number of bits which are correct” [30]. A simplified
genetic algorithm was proposed for investigating the strengths and limitations of the mu-
tation operator, which became known as a mutation hill-climber, (1+1,m) [298] or simply
(1+1) [30]. The algorithm has a static mutation probability (Pm ) applied uniformly and
independently to each bit in the bitstring. The algorithm was called a hill climber because
without crossover, there is no inter-population interaction of genetic information, thus if
a population is used, it is a collection of unrelated parallel hill climbers. The (1+1) is
taken from the Evolution Strategy naming convention ES(µ+λ) where µ parents create λ
offspring, and the best from both ‘+’ are selected. The scheme was reduced to a single
parent and offspring for ease of analysis. The algorithm has the interesting property as a
hill climber that there is no well-defined neighbourhood for a given string. Rather, a prob-
abilistic neighbourhood is defined by the mutation probability. This neighbourhood covers
the entire search space such that it is possible to move from a given string to any other
string in the space, a probability that decreases with the increase in Hamming distance
between strings and the current string. Mühlenbein analysed the algorithm and proposed
an approximate optimal mutation rate (the standard mutation rate) as Pm = L.
1
The CLONALG, BCA and the basis of the IA family (SIA for example) are elaborations
of either a parallel Random Mutation Hill Climbing Algorithm (RMHCA) or the (1+1,m)-
Algorithm. As such, it is reasonable to consider the state of (optimisation-based) clonal
selection algorithms as investigations into parallel hill climbers (GA’s without crossover as
commented by Forrest, et al. [150]). A fair assessment of algorithms such as CLONALG,
BCA, and the IA family requires the consideration of the decades of empirical and theoret-
ical findings from this related field, such as mutation rates, test problems, and existing hill
climbing and mutation-based hill climbing algorithms for comparison. This perspective
may also highlight a severe weakness in the state of the art of optimisation-centric clonal
selection algorithms.
59
learning are: Defer : Store all training data and defer processing until queries are given
that require replies, Demand-Driven: Queries are answered by combining training data,
using a local learning (neighbourhood) approach. Instance are (1) identified in as points
space, (2) a similarity measure is used to define the neighbourhood, (3) prediction function
uses information to answer a query. Discard the answer and any intermediate results after
answering the query.
Instance-based learning may be considered a type of local learning algorithm, where
reasoning is based on models (kernels) constructed from instances similar to the input
instance. A typical concern with such models is the capability of the system to gener-
alise. This represents a trade-off between the capacity (size) of the model and the number
of samples to consider in the model. Bottou and Vapnik rephrased this local learning
trade-off to be between the capacity of the model and the locality of the samples, where
locality is the shape and size of the instance selection region (neighbourhood) [51]. This
locality property of model construction defines how local an algorithm is, such that an
instance-based approach such as k-Nearest Neighbour is highly-local with a low capacity,
and a connectionist approach such as a neural network is non-local with high capacity.
Case-based Reasoning (CBR) (or memory-based reasoning), is a generalised application of
instance-based learning applied to reasoning such as expert systems [5]. Aamodt and Plaza
provide a concise description of the various different identities of instance based learning
from a case-based reasoning perspective [1]. Their taxonomy highlights the perspective
each identity places on this style of learning which covers exemplar, instance, memory,
case, and analogy based learning and reasoning. Further, Aamodt and Plaza propose a
descriptive framework for CBR, which includes a general algorithmic cycle for the appli-
cation of the approach, as follows: Retrieve the most similar case or cases, Reuse the
information and knowledge retrieved to solve the problem, Revise the proposed solution,
and Retain the parts of the experience that may be useful for future problem solving.
There are two primary classes of lazy learning approaches: Nearest Neighbour Meth-
ods, and Kernel Methods. Nearest neighbour methods are function approximation al-
gorithms that search through a database for similar instances (cases) to a given input
instance and make a prediction [84]. The similar points to consider in the prediction
are referred to as the neighbourhood, and the number of points is typically denoted k,
thus the scheme may be referred to as k-nearest neighbour or kNN. A natural extension
to nearest neighbour approaches is that each case generates a local density function or
kernel. Predictions may be made by summing together densities functions. The ker-
nel function depends upon the distance function between cases, where the Gaussian is
a typical function employed. Some techniques include distance weighted regression such
as Linear Weighted Regression methods [29], and a neural-network like approach called
Radial Basis Function [59, 61, 328]. Much of the work on instance based learning algo-
rithms is focused on reduction of storage requirements (thus increasing the efficiency of
the approach), and improving the algorithms robustness to with regard to attribute noise
and irrelevant attributes. Perhaps the most popular concern of nearest neighbour based
approaches is what has been referred to as the curse of dimensionality. This refers to the
60
fact that in common datasets, the nearest neighbour is approximately the same distance
away from a given point as the furthest neighbour. This effect is observed in dimensions
as low as 10-15 [41]. The problem is caused by the exponential increase in volume of a
space by the adding of additional dimensions7 .
The clonal selection principle does share some commonality with the instance based
learning, particularly in the context of the continual adaptation to antigen and Aamodt
and Plaza’s four R’s of CBR. The specific knowledge about the antigen is discarded after
the infection is addressed, although is retained implicitly in the selected cognate receptors.
The AIRS is a realisation of clonal selection that considers the the repertoire as a model
of cases that are compressed (quantised) to a set of exemplars. For example, a recent
work by Seeker and Freitas [353] make the argument that AIRS is nothing more than an
instance-creating algorithm for use by kNN. Exemplar-based modelling is used in a vari-
ety approaches for function approximation problems (such as the LVQ algorithm), which
represent an important application perspective on clonal selection algorithms (considered
further in Section 8.4). A similar approach was taken on the pattern recognition variation
of CLONALG, although the number of patterns was known and not compressed as in the
case of AIRS.
• Global Competition Competition over the entire representation space, with a strong
requirement for inhibition via lateral connections between neurons and the distinc-
tion between hard (single winner) and soft (multiple winner) competition
• Local Competition The division of the representation space such that local experts
(modules of units) compete (known as mixture of experts). Assumes that different
processes generate different parts of the representational space, thus hard competi-
tion assume a one-to-one matching between modules and hidden generator processes
that they model.
7
It should be noted that the curse of dimensionality has been considered in the context of negative
selection algorithms by Stibor, for example [374]
61
• Hierarchical Competition A mixture of global and local competition, where the rep-
resentation space is partitions or split into a hierarchical tree structure.
62
from the domain [282]. The Neural Gas algorithm of Martinetz and Schulten, like SOM is
another self-organising and unsupervised competitive learning algorithm [285, 283, 284].
Unlike SOM (and more like LVQ), the nodes are not organised into a lower-dimensional
structure, instead the competitive Hebbian-learning like rule is applied to connect, order,
and adapt nodes in feature space. Martinetz calls this the winner-take-most learning rule
distinct from Kohonen’s winner-take-all rule. The result of the Neural Gas algorithm is a
set of points that are distributed across feature space in relatively proportion to the input
signal density, with a graph topology that preserves structures in the feature space.
Lymphocytes compete with each other for binding to an antigen. This process has
stochastic aspects (the units are mixed in a diffuse substrate), and deterministic aspects
(physics of the chemical bonding). Generally, the population is scanned and the highest
affinity receptor wins (is proliferated and adapted). Clonal selection is an application of
the winner-take-all principle which is manifest in the clonal dominance of receptors for
antigen. This effect may also account for the antigenic sin, where the greedy-nature of
the winners (winners keep winning) results in lateral inhibition of cells that may be better
suited for an antigen. A second interesting point is that the inhibitory effect of clonal
selection is attrition and dominance not only of the competition, but also with regard to
resource allocation. Cells have a finite lifetime before they are discarded, and the cell
population is continually turned-over. Therefore, those receptors that are not used, are
not preserved in memory (memory cells) and are lost.
63
tions, actions, goals). An adjustment to de Castro and Von Zuben’s description of clonal
selection better relating it to reinforcement learning is as follows: Sensations collectively
are the summation of all antigen perceived by the immune system (for example the ex-
ogenous pathogenic, and/or internal antigenic environment), Actions collectively are the
mechanisms of the clonal selection process applied discretely to each antigenic exposure,
and Goals collectively is the systems efficiency and effectiveness at pathogen identification
and neutralisation toward host survival, the feedback of which may be perceived through
injury to host tissues from infection or the holistic performance of the system for antigen
identification. A reinforcement learning approach that combines aspects of pattern match-
ing and adaptation using a genetic algorithm to evolve a set of binary encoded rules, called
Learning Classifier Systems. The relationship of this approach has been made between
negative selection algorithms (such as ARTIS), which is discussed further in Section 3.5.3.
3.4.6 Summary
This investigation reinforced the important association of clonal selection algorithms with
the field of Evolutionary Computation, specifically with genetic algorithms as they are
generally both stochastic adaptive process that operate on pre-committed discrete units,
motivated by short term relative goals. The review of the related field of binary hill
climbing algorithms demonstrated that the bit-string based CLONALG, BCA and much
of the IA family may be considered population-based elaborations of the Random Mutation
Hill Climbing Algorithm (RMHCA) or variations of the greedy (1+1,m)-Algorithm. The
clonal selection principle and the exemplar-based AIRS share common properties with the
field of lazy learning, specifically the deferred and demand driven properties of instance-
based learning and the retrieve, revise, retain principles of case-based reasoning. Finally,
the principle and algorithms exhibit the competition for selection and winner-take-all
properties of competitive learning, where clonal dominance and proportional allocation of
resources results in an implicit lateral inhibition of less competitive cells.
64
adaptive systems may be evaluated and compared relative to each other, the difficulties
and obstacles of investigating specific adaptive systems are exposed, and the abstracted
principles of different system types may be distilled. This section provides a summary
of the Holland’s seminal adaptive systems formalism and considers clonal selection as an
example of an adaptive plan.
This section presents a brief review of Holland’s adaptive systems formalism taken from
[216] (Chapter 2). This presentation focuses particularly on the terms and their descrip-
tion, and has been hybridised with the concise presentation of the formalism by De Jong
[120] (page 6). The formalism is divided in two sections: (1) Primary Objects summarised
in Table 3.5 and (2) Secondary Objects summarised in Table 3.6. Primary Objects are
the conventional objects of an adaptive system: the environment e, the strategy or adap-
tive plan that creates solutions in the environment s, and the utility assigned to created
solutions U .
Secondary Objects extend beyond the primary objects providing the detail of the for-
malism. These objects suggest a broader context than that of the instance specific primary
objects, permitting the evaluation and comparison of sets of objects such as plans (S),
environments (E), search spaces (A), and operators (O).
A given adaptive plan acts in discrete time t which is a useful simplification for analysis
and computer simulation. A framework for a given adaptive system requires the definition
of a set of strategies S, a set of environments E, and criterion for ranking strategies X. A
given adaptive plan is specified within this framework given the following set of objects:
a search space A, a set of operators O, and feedback from the environment I. Holland
proposed a series of fundamental questions when considering the definition for an adaptive
system, which he rephrases within the context of the formalism (see Table 3.7).
Some Examples
This section provides a few examples of phrasing adaptive systems using the formalism
and examples as to how the formalism may be used as a framework in the investigation of
adaptive systems. Holland provides a series of illustrations rephrasing common adaptive
systems in the context of the formalism [216] (pages 35-36). Examples include: genet-
ics, economics, game playing, pattern recognition, control, function optimisation and the
65
Term Object Description
A Search Space The set of attainable structures, solutions, and the domain of action
for an adaptive plan.
E Environments The range of different environments, where e is an instance. It may
also represent the unknowns of the strategy about the environment.
O Operators Set of operators applied to an instance of A at time t (At ) to transform
it into At+1 .
S Strategies Set of plans applicable for a given environment (where s is an instance),
that use operators from the set O.
X Criterion Used to compare strategies (in the set S), under the set of environ-
ments (E). Takes into account the efficiency of a plan in different
environments.
I Feedback Set of possible environmental inputs and signals providing dynamic in-
formation to the system about the performance of a particular solution
A in a particular environment E.
M Memory The memory or retained parts of the input history (I) for a solution
(A).
central nervous system. Holland applies the formalism to investigate his schemata the-
orem, reproductive plans, and genetic plans, the foundational models became the field
of Evolutionary Computation. From working within the formalism, Holland makes six
observations regarding obstacles that may be encountered whilst investigating adaptive
systems [216] (pages 159-160): (1) High cardinality of A: makes searches long and storage
of relevant data difficult. (2) Appropriateness of credit: knowledge of the properties about
‘successful’ structures is incomplete, making it hard to predict good future structures from
past structures. (3) High dimensionality of U on an e: performance is a function of a large
number of variables which is difficult for classical optimisation methods. (4) Non-linearity
of U on an e: many false optima or false peaks, resulting in the potential for a lot of wasted
computation. (5) Mutual interference of search and exploitation: the exploration (acqui-
sition of new information), exploitation (application of known information) trade-off. (6)
Relevant non-payoff information: the environment may provide a lot more information in
addition to payoff, some of which may be relevant to improved performance.
Cavicchio provides perhaps one of the first applications of the formalism (after Holland)
in his dissertation investigating Holland’s reproductive plans [72] (and to a lesser extent
in [73]). The work summarises the formalism, presenting essentially the same framework,
although he provides a specialisation of the search space A. The search space is broken
down into a representation (codes), devices (solutions), and a mapping function from
codes to devices. The variation highlights the restriction the representation and mapping
have on the designs available to the adaptive plan. Further, such mappings may not be
one-to-one, there may be many instances in the representation space that map to the
same solution (or the reverse). Although not explicitly defined, Holland’s specification
of structures A is clear in pointing out that the structures are not bound to a level of
abstraction, that his definition covers structures at all levels. Nevertheless, Cavicchio’s
66
Question Formal
To what parts of its environment is the organism (system, organisation) adapt- What is E?
ing?
How does the environment act upon the adapting organism (system, organisa- What is I?
tion)?
What structures are undergoing adaptation? What is A?
What are the mechanisms of adaptation? What is O?
What part of the history of its interaction with the environment does the organ- What is M ?
ism (system, organisation) retain in addition to that summarised in the structure
tested?
What limits are there to the adaptive process? What is S?
How are different (hypotheses about) adaptive processes to be compared? What is X?
Table 3.7: Fundamental questions regarding adaptive systems, taken from [216] (page 29).
67
strated in the review of the abstraction of the theory and resultant algorithms, the focus
lies with the clonal selection principle itself, where as the environment, which defines the
scope of the required adaptation, is ignored, and/or simplified to a single antigen (cost
function in the case of optimisation).
Secondary Objects This section considers the detail of the formalism, the secondary
objects, by addressing the questions proposed by Holland (listed in Table 3.7).
Environments (E) The acquired immune system adapts to antigen. Antigen may
be endogenous, such as self-tissues and misbehaving cells (cancer), and exogenous such
as pathogen. The tradition with clonal selection abstractions is to ignore the self-nonself
discrimination problem which is delegated to the negative selection paradigm, thus one
may may either consider a general antigenic environment (exogenous and endogenous), or
just a pathogenic environment (exogenous). Further, each host has a distinct antigenic
environment given the unique internal composition and exposure with the environment.
Feedbacks (I) The environment acts upon the adapting system by explicitly se-
lecting those structures to adapt. The environment is exposed discretely to parts of the
system, where the internal repertoire of cells and molecules is compartmentalised and
distributed throughout the host, and antigen of various sources have discrete entry and
contact points with the repertoire within the host organism. The antigenic-wise feedback
of affinity and avidity is relative to the space and time of the specific antigen and the
specific sub-repertoire. This is an elaboration on the simplified clonal selection models in
which antigen-antibody interaction is holistic with regard to both sets (all antigen interact
with all antibody). In addition, different antigen may have different effects on the host,
such as pathogen virulence or the speed of cancer metastasis. These antigen behaviour
may effect the amount of damage or potential damage a given antigen may cause to the
host organism, perhaps perceived by the acquired immune system as danger signals (Dan-
ger Theory), or through the release of specialised chemicals such as cytokines. Finally,
environmental feedback may be assessed implicitly where the receptor affinity or avidity
for given antigen may be a measure of the responsiveness, and thus the utility of the
system.
Search Space (A) The search space has been well considered in the abstractions
of the theory. The structures undergoing adaptation are the cell receptors, which are
defined by receptor genes of the genome within each cell, and are manifest in protein
conformations. As discussed, the common abstraction for this space is combinatorial
shape-space formalism. One may consider the breakdown of A proposed by Cavicchio
into that of representation, devices, and the mapping which clearly correlates with the
framework proposed by de Castro and Timmis, discussed in Section 3.2.2.
Operators (O) The mechanisms of adaptation have also been well considered in
abstractions of the theory. Beyond the generic selection, expansion, hypermutation, there
68
is an array of genetic diversity mechanisms outlined in Section 3.2.1, there are also inter-
cell interactions such as Helper T-cells, and receptor-receptor recognition described in the
immune network theory. Although the scope of the simple clonal selection operators is well
considered, those operators which may influence such first-order operators are employed
have not (such as cellular interactions during clonal selection).
Memory (M ) The history of the interaction between receptors and antigen is recorded
using two memory mechanisms. Implicit memory occurs through the change in a given
receptors density given the exponential increase in cells that occurs after an exposure.
Explicit memory, which is exploited by some clonal selection algorithms (CLONALG for
example) is achieved through creation and retention of long-lived memory cells.
Strategies (S) The limits to the adaptive process have not been investigated. The
adaptive process may be mediated by helper cells or un-mediated, it may be triggered
by an exogenous or endogenous antigen. Beyond combinations of the operator set O, the
clonal selection is localised to a space and time within the repertoire. Such constraints
on antigen-centric selection have not been considered. Therefore, the consideration that
influences the process suggested in the operators set provide much opportunity for different
strategies beyond simple reflexive clonal selection.
Criterion (X) The adaptive processes may be compared by their general capabilities
of identifying and neutralising antigen in an environment. Some adaptive plans may be
suited to general or specific identification, others may be suited to endogenous or exogenous
antigenic environments. Given that S considers that there are multiple clonal selection
strategies, and E considers that there are multiple of such environments for strategies, the
consideration of general clonal selection centric assessment criterion has not previously
been considered.
69
been investigated.
70
and molecules. They also considered the importance of the systems tight-coupling with
its environment, and specifically the immune systems ability to respond to perpetually
novel stimuli. Vargas, et al. consider the immune system and Artificial Immune Systems
as examples of complex adaptive systems [405], and phrase an AIS inspired Learning
Classifier System [406, 404].
Beyond explicitly investigating immunology as a CAS, the formalisation of such sys-
tems can provide insights into the general properties of the immune system as a complex
adaptive system. For example, Holland suggested that such systems respond instant-
by-instant, and the importance of the systems ability to balance exploration (acquisition
of new information or capabilities) with exploitation (efficient use of information or ca-
pabilities already available) [217]. Arthur proposed a definition of CAS in the context
of economics with six properties [28], all of which resonate with the information pro-
cessing properties of the acquired immune system. Generally these properties are: the
dispersed interaction of possibly heterogeneous agents acting in parallel, the lack of a
global controller, the cross-cutting interaction of units across hierarchical concerns, con-
tinual adaptation in the presence of perpetual novelty, and finally dynamics where the
system operates far from global optimum and equilibrium. Finally, Jost suggests that the
environment in which a CAS exists is more complex than the CAS itself and that CAS
depends on regularities in its environment [237]. Jost provides a rigorous assessment of
CAS in the context of internal and external complexity. External complexity is defined
as the amount of input, information, energy the system obtains from the environment.
Internal complexity is the complexity of the internal representation of the information it
takes as input (model complexity). The goal of the system is to handle as much input as
possible with as simple a model as possible, to attempt to increase the external complexity
and reduce the internal complexity of the system.
Clonal Selection The immune system may be an instance of clonal selection, although
the computational properties of clonal selection alone are not. Clonal selection describes
the structure and function of an opportunistic improvement mechanism for specialising a
repertoire of molecular pattern recognition cells. A broader perspective of clonal selection
that takes into account more than receptors, lymphocytes, and antigen introduces com-
plexity into the adaptive system that will make effective assessment difficult. A complexity
perspective on adaptive systems may be exploited in the investigation of computational
models of clonal selection by focusing effort on a top-down analysis emergent or systemic
effects rather than a bottom-up analysis of the discrete components. Specifically, two
top-down clonal selection centric concerns include: (1) the information composition of the
system which may be explicitly aggregated and assessed in the case of distributed system
(for example information in the holistic repertoire), and (2) the holistic system capabil-
ity in a given environment potentially aggregated across distributed contact points (for
example capability across the holistic repertoire).
71
3.5.4 Summary
Clonal selection is a theory that defines the adaptation of a general repertoire of lympho-
cytes with surface bound immunoglobulin, toward a repertoire with specialised capability
for a hosts antigenic environment. Holland’s adaptive system formalism provided a frame-
work for defining the sub-elements of clonal selection as an adaptive plan, highlighting
the generally underestimated role of the environment and the feedbacks and interactions
between the components of the system. Specifically, the scope of reviewed clonal selection
algorithms may be considered first order adaptive systems where the extent of the feed-
back to the system is presented in the utility function. Modern adaptive systems theory
embodied in the study of Complex Adaptive Systems, highlighted the inherent complexity
of the environment in which a system operates, and the difficulty in using bottom-up ap-
proaches to analyse such systems. The perspective suggested at the consideration of the
immune system as an instance of a CAS, where clonal selection alone provides an adaptive
quality to the system and is in and of itself not an CAS.
72
sation of Wrights fitness landscape formalism that stresses the adaptation of the ‘goodness
of fit’ of structures.
A first-pass exploitation of the underlying information processing qualities of the the-
ory elicited a suite of adaptive algorithms that superficially show a strong resemblance
to parallel mutation hill climbing algorithms for the purposes of global optimisation and
vector quantisation. A deeper assessment of the underlying adaptive strategy in the con-
text of adaptive systems theory provided insights into the behaviour of the approach, and
motivations for elaboration. Regarding behaviours, the strategy uses adaptation toward
information acquisition in a population memory structure using accumulated trial-and-
error with pre-committed structures, each of which is individually redundant. More inter-
estingly, this redundancy may promote degeneracy in contextual emergent specificity in
addition to general fault tolerance. Two specific areas were highlighted for elaboration, as
follows:
73
3.6.2 Toward Distributed Clonal Selection
The discrete population basis of the clonal selection strategy and trigger-based adaptation
provide an inherently parallel process suitable for concurrent implementation. This was
shown to have been highlighted and demonstrated explicitly with AIRS for classification,
although parallisation alone fails to capitalise on the promise of distributed realisations
of the underlying adaptive strategy. Toward this end, the structure and function of the
broader immune system provide motivating metaphors for extending and constraining
the clonal selection strategy for decentralised adaptation in a distributed environment.
Specifically, two broader perspectives of clonal selection are proposed as paths towards
such approaches, as follows:
Host of Tissues A clone of lymphocytes possess the same receptors and are therefore
suited to the same antigen, where a repertoire (pool or population) of cells defines an
aggregation of such groups. In an organism (such as a mammal), this repertoire is spa-
tially distributed throughout the tissues of the host, where diverse groups of lymphocytes
provide antigen surveillance by migrating around the body via the vascular system, whilst
other groups position themselves in tissues awaiting the arrival of pathogen. As such,
the structure and function of the immune organs, tissues, and their connectivity through-
out the general mammal organism provide a template for organising and constraining a
tissue class of clonal selection approaches. Lymphatic tissues and lymphocyte migration
has been proposed as a model for distributed Negative selection specifically in Hofmeyr’s
ARTIS (specifically as read-only broadcast of negative detectors, see Section 2.5.2) and
more generally as an inspiration for decentralised Artificial Immune Systems by Dasgupta
[106], although to the authors knowledge such approaches have not been implemented or
investigated in the context of distributed adaptive clonal selection.
74
3.7 Chapter Summary
The detailed review of the clonal selection theory in Section 3.2 provided the context to
assess the motivations and expected behaviours embodied in the state of the field of clonal
selection algorithms. This insight aided in outlining the three proposed criticisms of the
state of clonal selection algorithms in Section 3.3.3. The first regarding the placement
and assessment of the field in a broader context of related Computational Intelligence
approaches was addressed in Section 3.4 strengthening the relationship with Evolutionary
Computation, and outlining the important relationships with Hill Climbing algorithms,
Instance-Based Learning, and Competitive Learning. The second limitation suggested
that the lack of explicating investigating clonal selection as an adaptive strategy which
was addressed in Section 3.5 highlighting the need for: (1) a clearly defined environment
to complement the adaptive response of the strategy, (2) the importance of interactions
between discrete components of the system, and (3) the focus on emergent behaviours.
Section 3.6 addressed the third and final limitation of the cellular focus of Clonal Se-
lection Algorithms, and in so doing outlined a research agenda for both (1) elaborating
upon the existing cellular clonal selection algorithms, and (2) provided a basis for inves-
tigating distributed clonal selection algorithms. This agenda occupies the remainder of
this dissertation. Specifically, Chapter 4 investigates the Cellular Clonal Selection adap-
tive strategy including both the definition of an Antigenic Exposure Paradigm, as well as
algorithms that incorporate additional forms of intra-repertoire interactions. Chapter 5
defines and investigates the Tissue Clonal Selection Paradigm inspired by the structure
of the lymphatic system and behaviour of migrating lymphocytes, and Chapter 6 defines
and investigates the Host Clonal Selection Paradigm inspired by the immunisation and
evolution of the acquired immune system.
75
Chapter 4
76
clonal selection algorithms and their elaborations.
Constrained Scope
The clonal selection theory is defined at the cell, antibody, and antigen level of immunobi-
ology and immunochemistry to describe what in complex system theory are described as
emergent effects of host immunity. Therefore one may constrain the investigation of the
information processing concerns of clonal selection at this level and consider the emergent
immunity effects within the context of a repertoire of cells with regard to antigen. In this
work, the study of clonal selection under this constraint is referred to as Cellular Clonal Se-
lection, distinct from the consideration of clonal selection under multiple of such repertoires
in Tissue Clonal Selection (Chapter 5), and the consideration of clonal selection across
multiple whole immune systems in Host Clonal Selection (Chapter 6). Cellular Clonal Se-
lection is primarily concerned with the management of a repertoire of discrete cells and its
interaction with antigen. The scope of control for this management is the repertoire in its
entirety. This suggests that the repertoire of cells in cellular clonal selection is centrally
governed with access to complete information regarding the information content of the
repertoire. Therefore the scope of cellular clonal selection algorithms considered in the
reviewed taxonomy (Section 3.3) may be considered Cellular Clonal Selection Algorithms.
As discussed in that section, this level of clonal selection algorithms are strongly related
in mechanism and effect to the Genetic Algorithm (GA) and the Mutation Hill Climbing
Algorithm (MHCA), as well as the related fields of Lazy and Competitive Learning.
77
(specificity and antigenicity) against each other as a cost surface. The antigenic environ-
ment defines the scope of the information a system may acquire and apply (immunity),
the full importance to clonal selection of which is considered in the Antigenic Exposure
Paradigm in Section 4.2.2.
2. Resource allocation is competitive, based on (in some way) the differential ‘goodness
of fit’.
4. Adaptation continues for as long as relative improvements can be made under all of
the constraints of the strategy.
• Selection: A small and specific founding set of cells are selected to found a clonal
response (oligoclonal).
• Cloning: The number of clones created from an exposure is larger than the founding
set of cells selected for the clonal response.
78
• Mutation: The point-wise rate of mutation is higher than that of normal mitosis
although is fixed.
• Integration: Although many clones are created in a clonal response, few are retained
in the repertoire.
79
with multiple exposures, that highlight the spatial-temporal consistency concerns of clonal
selection at the cellular level.
An antigenic exposure is an event that involves the arrival of antigens (information of ex-
ternal origin) to an immune system. The arriving antigen are identified (typically forced
as a requirement of the domain) by the system stimulating a proportionate immune re-
sponse. If correctly identified, the external stimulation results in an internal activation
of some lymphocytes in the immune systems repertoire. The response involves raising a
clone of lymphocytes to address the stimulation with regard to the magnitude and speci-
ficity of the response. The system is concerned with raising a good response quickly. The
principle of an antigen is that it may cause harm to the host in the form of tissue dam-
age promoting the immediacy of the response. The system must raise a clone that can
address the magnitude of the exposure, therefore the effectiveness of the response should
be proportional to the virulence of the antigen, and the response size (clonal expansion)
should be proportional to the number of arriving antigen (amplitude or dose).
Environment
Immune System
Antigenic arrival
Response to stimulation
(internal origin)
This exposure virulence is a property of the antigen thus is not likely to change for
a given immune system unless the antigen itself changes. The virulence may define the
penalty for not identifying a antigen, as well as the amount of resultant specificity de-
sired or required in a clonal selection and expansion response. This concern (virulence-
specificity) is difficult to conceptualise as it defines the relative amount of refinement-based
learning required of the system for a given antigen. The concern of the size of an anti-
gen dose may be conceptualised as the amount or exposure amplitude of information an
antigen represents. The number of simultaneous antigen that arrive to the system in a
given exposure defines the amount of work the system may have to support. The num-
ber of antigenic molecules that arrive in an exposure may be more than the number of
lymphocytes in the repertoire. The result is that selection events may be more intense,
resulting in the delay of some interaction until after the initial cells have proliferated or
additional resources have been recruited. This exposure amplitude mismatch scenario has
two speculated implications: (1) Antigen may not be neutralised as quickly if it arrives
in unexpectedly large quantities, that would result in the antigen arrival being considered
a resources which must be degraded (neutralised over time), and (2) The increased se-
80
lective pressure from the size mismatch may result in the rapid synthesis of a response
large enough to address the exposure. This suggests dynamic and variable response size
capabilities inherent in the clonal selection and expansion response.
One may consider the effects of varied exposure virulence and amplitude on an immune
system. Both properties affect the amount of work required in an immune response,
although in different dimensions. Virulence may determine the desired specificity of a
response such that high damage-causing pathogens are neutralised effectively and low
damage-causing pathogens are neutralised with less specificity. The amplitude of the
exposure defines the number of cells and the size of the clonal response. Therefore, the
immune system must trade-off response strategies to the various anticipated virulence and
amplitude combinations. For a single exposure event, an immune system is only concerned
with quelling the antigen with a response. The scope of the concerns of an immune system
for a single exposure is the specificity of the lymphocytes to the antigen and synthesising
the cells in sufficient numbers. Initial antigen-identification (to trigger a response) may
be assumed. Further, all resources of the repertoire may be allocated to the response
for the exposure, as there are no future exposures. Iterations within a system under
these conditions are concerned with adaptation in the context of a fixed and known single
exposure event.
81
repertoire to devolve to a naı̈ve (random) state.
Variations in the exposure frequency control when the system can and must respond.
Variations in the exposure amplitude control the size (scope or how much) of the response
that a system must synthesise. Variations in exposure virulence and amplitude imply
variations in a systems response strategy in terms of response specificity and response
quantity. A similar relationship exists with multiple exposures with the addition of expo-
sure frequency and the systems memory of the response. There is an inversely proportional
relationship between immunological memory and exposure frequency (with constant vir-
ulence) such that when the exposure frequency is low, the memory must be long lived.
When the exposure frequency is high, memory is short lived, and in fact may be satisfied
with the quantity and specificity effects achieved from the single exposure without mem-
ory. One may consider the effect of combinations of high and low frequency exposures with
high and low amplitude pathogen arrival. From a system perspective, the frequency and
amplitude of exposures may be compressed (multiplicative relationship) into the amount
of work (response effort) required for the interval of time. This compression of exposure
frequency and amplitude may be referred to as the exposure regime of an antigen to a
system through time.
Figure 4.2: Example exposure regimes demonstrating some archetypical pathogen viru-
lence behaviours.
The relationship between a pathogen exposure regime and an immune systems re-
sponse effort is interesting. For a single exposure event, virulence defined the amount of
tissue damage an antigen may cause on a host, therefore it may provide a conception of
the amount of specificity refinement (effort) required of an immune system for the expo-
sure. An exposure regime provides a way of crisply defining antigenic virulence (distinct
from single exposure virulence) as a function of exposures through time. The amount of
specificity refinement by the system for the antigen (response effort) is proportional to the
exposure frequency and exposure amplitude (exposure regime). Antigenic virulence (and
exposure regimes) may be expressed as an exposure amplitude graph against time. From
this level of abstraction, one may give example exposure regimes as archetypical pathogen
virulence strategies with which to subject an immune system (see Figure 4.2). In addition
82
to static antigenic virulence, it is possible for virulence to vary through time. The variance
in virulence may be system-dependant such that virulence changes in response to the inter-
nal actions of the immune system such as in the case of an adversarial antigen (pathogen).
For a multiple exposure event, the system is primarily concerned with devising a response
to each exposure and ultimately using past exposures to anticipate the resources needed
for future exposures. This exposure model supersedes the single exposure event, as in
the case of a single exposure, all resources of the repertoire are allocated to the specific
concerns of the antigen (as there are no other antigens). The learning that the system
may achieve within the context of a single exposure may be limited, as a broader exposure
regime may define how often the exposures arrive to the system. The exposure regime
may impose a quantity and specificity capability constraints for a single exposure, meaning
that a finite amount of specificity learning and/or quantity learning may be achieved for
a single exposure event. The system must learn to anticipate (1) the required specificity
of future exposures, and (2) the required quantity of future exposures, both in the face of
non-exposure events.
Start Time
Exposure
No Is Exposure
Event?
Generate Yes
Response Expose
System
Yes Is antigen
remaining? Yes Is Antigen
Still Alive?
No No
Figure 4.3: Flow diagram of the single and multiple exposure models.
The exposure regime (frequency and amplitude) define the antigenic virulence and the
systems required specificity. Repeated application of blind clonal selection facilitates im-
provement of a repertoire specificity for the antigen, and for a system that enters stasis
during periods of non-stimulation (information acquired by the repertoire does not de-
grade), the density of information (clonal convergence and/or clonal densities) may define
the quantity or scope of information required for the regime. Therefore, a repeated sin-
gle selection on a relatively naı̈ve repertoire fosters a model that matches the virulence
of the antigenic exposure regime. For a repertoire with decoupled maintenance of cells
and triggered adaptation, an explicit memory mechanism is required that retains acquired
information proportional to the frequency of its exposure and complexity. For lower-
83
complexity information, a more efficient strategy may be to generalise or re-acquired as
need.
84
Exposure Models and Control
The environment and the system may be considered two interdependent and required com-
ponents of which neither is meaningful in isolation. In modelling these two components,
one may consider the variable (configurable) aspects of each of which may or may not be
within the control of a given simulation. An intuitive example is to consider the environ-
ment (and therefore all aspects of antigen exposure) as outside of the scope of control, and
all aspects of the system as inside of the scope of control. In this example the system must
do all it can to cope with the specific properties of the exposures it is subjected to by the
environment. The system must operate with finite resource, thus constraints are imposed
on the control over aspects the system. This example may be extended further to consider
that the evolution of antigen (pathogen) is influenced by the existence and evolution of
the host system and that this relationship is reciprocal (co-evolution). Therefore, the sys-
tem has influence (implicit influence via evolution) over aspects of antigen exposure over
longer periods of time, and the antigen has influence (implicit influence via evolution) over
aspects of the systems response over the same longer periods of time. This example may
be generalised such that aspects of control are variable across both the environment and
the system.
Control of
Environment
Open system
with general
applicability
Control of
System
Figure 4.4: Depiction of the trade-off between control of the environment and control of
the system.
In modelling environment and system and their interactions, control may be exhibited
over all aspects of both sides of the interaction. It is important to consider the influence
for control or lack there of (constraints on control) on a system and its environment as
it provides insight into the mapping of domain properties. A constraint may be consid-
ered the prior selection of a configuration parameter of a system or environment. The
fixing of a configuration parameter in the environment influences the suitability of other
unconstrained (controlled) parameters in the interaction, and the influence is likely to
be complementary (such that fixing an aspect of the environment strongly influences the
suitability of related parameters of the system and vice versa). This point highlights the
symmetry of constraint between systems and environments, and the need to specialise
a given system for the constraints of a given environment in which it is to be deployed
(mapped problem domain).
85
4.2.3 Colour-Space Domain
In his book detailing the Cognitive Theory of acquired immunity, Cohen used an example
of cellular degeneracy in the retina as an analogy for the degeneracy of cell-bound receptors
in the immune system [81]. Cohen described how individual cells in the retina have limited
capability, responding to constrained wavelengths of light, although from these specific
degenerate detectors higher-level information such as a coherent image can be perceived
through aggregation. The Self-Organizing Map (SOM) is a competitive and unsupervised
learning algorithm that is renowned for its feature extraction and dimensionality reduction
capabilities (see Section 3.4.4). In his doctoral work, Honkela used a colour domain (red-
green-blue or RGB), and a dataset of known colours in that domain [220] (page 14-18).
The learning and ordering of the domain of RGB colours based on the dataset was used
as an intuitive example of the topological preserving properties of the SOM algorithm.
Although Honkela may not have been the first to employ this example domain to the SOM,
it has become a canonical example domain.2 Inspired by the simplicity and suitability
of the colour domain to qualitatively (visually), and quantifiably (numerical measures)
demonstrate the properties of the SOM, this section defines a colour-space domain from
which a suite of test problem instances may be drawn to investigate clonal selection.
Inspired by Cohen’s analogy to the retina, colour-space is named for the relationship to
the shape-space formalism, and is supported by proven use of the same principle for a
related Competitive Learning paradigm.
Domain Definition
The domain does not provide a framework for investigating the so-called colour space
theory, which refers to the study of colour models used in display and printer systems. Nor
is the intention of the defined test domain for the study of colour theory, the investigation
of colour segregation, colour recognition, palette compression, or colour clustering (or any
other practical colour-based application domain). Given what the intentions are not, this
section outlines a series of general goals for designing a test domain for adaptive systems,
followed by the definition of a simple colour-space domain that meets these goals. The
ambition is to contrive a domain from which trivial problem instances can be drawn to
preliminary assess specific properties of adaptive models. These models may be engaged
in processes that equate to pattern recognition and optimisation, and may involved the
evaluation of broad characteristics such as learning, memory, and adaptation. See Table 4.1
for a list of the general design goals (requirements) for a problem domain suitable for this
purpose.
The colour-space domain formalism meets the list of goals proposed in Table 4.1. The
formalism is comprised of a series of terms to describe the characteristics of a colour
space domain. The characteristics identified include the environment: the cardinality, the
representation, and the mapping function (see Table 4.2 for their definition and summary).
The environment (E) is an n-dimensional hypercube (for visualisation purposes per-
2
There are many applet and tutorial web sites on the Internet that use this example to demonstrate
the SOM, the listing of which is not necessary.
86
G# Goal
G1 The domain must provide a numerical and/or combinatorial basis that may be manipu-
lated meaningfully by operators.
G2 The response surface must be correlated such that localised regions in the response surface
have a gradient.
G3 The domain must be suitable for optimisation tasks.
G4 The domain must be suitable for pattern recognition tasks.
G5 The domain must be parameterised such that the relative complexity may be meaning-
fully adjusted.
G6 The domain must be easily and meaningfully visualised both online (dynamically) and
off-line (end of run).
G7 The domain must be easy to understand, easy to implement, and easy to analyse.
G8 The properties of the domain (e.g. the response surface or visualisation) should facilitate
rather than mask model behaviours being investigated.
haps limited to 1-3 dimensions), where each dimension represents a different colour axis.
The intention is that a distinct coordinate in a given environment (colour space) repre-
sent a distinct colour. For example, a monochrome (one-colour) environment would be
implemented as a one-dimensional space (line) perhaps a gradient of white to black. An
RGB colour space would be implemented as a three-dimensional (cube) environment. An
environment is a volume of feasible discrete points, and the cardinality (C) defines the
number of points in that volume. The granularity of each dimension in the environment
also determines the number of colours, thus cardinality may be thought of as the palette
of the environment. Further, the palette analogy may be exploited further in defining
standard cardinalities, such as those common palettes that are used in computer display
systems (for example, 8-bit colour (28 ) with a pallet of 256 colours). The coordinate-based
representation (R) may be used directly by an adaptive system. Alternatively a symbolic
or sub-symbolic representation may be used (such as bit-strings), which require a mapping
function (M ) to transform representation into a given environments coordinate system.
The task of an adaptive system is called an intention (I), examples may include the opti-
misation of a randomly initialised system to a set of pre-selected points, or the adaptation
of a system to a defined region within the environment.
One may measure the Euclidean distance between points in the colour space as a
quantitative measure of difference. Distances measures may not be limited to Euclidean
distance, for example Manhattan distance (and many others, see [261] pages 17-29) may
be used in the colour space. Distance measures may be augmented with coordinate radii
such that a point of interest in the space may represent a collective of points in its vicinity.
Such regions may be defined as hyper-cubes or spheres, and may have a distance-based
falloff such as linear, Gaussian or exponential. These distances and coordinate neighbour-
hoods are also qualitatively meaningful. Following a line (for example in a monochrome or
RGB) in colour space shows a transition through intermediate colour coordinates (colours).
These intermediate colours are quantifiably distinct (numerical coordinates), and qualita-
87
Term Name Summary
E Environment The search space (colour space) which defines the scope of feasible
coordinates defined by its dimensionality (1-n), a boundary (limits
of each dimension), and cardinality (C).
R Representation An encoding used and manipulated by adaptive models. It may
be binary, integer, real, and may or may not directly represent a
coordinate in the colour space (E).
M Mapping Function Converts a given representation (R) into a coordinate in the colour
space (E). If the representation used matches the coordinate sys-
tem of the environment, then the mapping function returns an
unchanged coordinate.
C Cardinality The number of discrete points in the domain, and ideally (given
display capabilities) the number of colours available for visualisa-
tion.
I Intention The goal of a system within the domain, a task or action it is to
perform or achieve. This is a cover-all term for something to do
in a defined colour-space.
Table 4.2: Summary of terms for the colour space domain formalism.
tively different (assuming the colour transition can be detected by the human eye). This
correlation is also useful for visualisation: agents representing coordinates in the colour
space may be implemented, which may permit qualitative measures and observations of
system behaviour.
Illustrative Examples
88
with corrective categorical based feedback, relaxing the optimisation of the goal
coordinates to that of accuracy of predicting pattern classes.
This section addresses the important consideration’s of the limitations of the formulated
problem domain, as follows:
1. Triviality: The domain and resultant problem definitions are primitive. The problem
instances are likely easily solved rapidly by standard deterministic techniques, and
even by naı̈ve approaches such as enumeration and random search.
3. Difficulty: Although superficiality they appear trivial, there is no innate sense of the
absolute or relative difficulty of the derived problem definitions.
5. Novelty: The colour space domain and derived problem instances are not novel,
they are generalisations and simplifications of existent test domains and benchmark
problems.
89
problem domain in the Antigenic Exposure Problem as a specialisation in colour space,
and the Cellular Clonal Selection Algorithm that provides a basis for investigation into
elaborated cell interaction schemes. A series of cell-based measures are presented for
assessing cellular algorithms on instances of Antigen Exposure Problems that provide
quantitative indicators regarding the concerns of information acquisition and application.
Collectively, this section provides a basis for the implementation and exploratory empirical
investigation into the Cellular Clonal Selection Paradigm, as well as a bridge between the
biology (Section 3.2) existing approaches (Section 3.3), and the abstract clonal selection
and antigenic exposure models (Section 4.2).
For the purposes of discussing exposure, a cellular clonal selection algorithm may be
reduced to its information content, distinct from the specific clonal selection processes
operating upon that information. Specifically, a cellular algorithm may be considered
a population or repertoire (T , that stands for ‘tissue’ which will be made apparent in
proceeding chapter) of discrete cells (C), as follows: T = {C1 , C2 , C3 . . . , Cn }. Therefore
an Antigenic Exposure Problem (AEP) is defined as the discrete interaction with a T ,
with a set (I, which stands for ‘infection’) of antigen (A) at the same level of abstraction,
as follows I = {A1 , A2 , A3 . . . , An }. An antigen is comprised of sub-antigenic information
referred to as determinants (D), such that A = {D1 , D2 , D3 . . . , Dn }.
Algorithm 4.1 defines a simple antigenic exposure problem, with symmetrical informa-
tion content for interaction with a given cellular system, where Ndeterminants and Nantigen
90
define the number of determinants per antigen and total antigen within the scope of the
AEP. The algorithm clearly shows the AEP’s in control of the interactions with a given T ,
where discrete interactions are mediated via an Exposure(I, T ) operation. The algorithm
definition also highlights that from an exposure perspective, the AEP is only concerned
with a systems aggregate responses to exposures. The tissue result set denoted as Trs may
be considered to represent a cellular algorithm’s (T ) capability to address a given antigen
exposure problem (I).
The defined antigenic exposure problem delegates the specifics of algorithm-problem in-
teraction to the Exposure(I, T ) operation, the behaviour of which may be referred to as
a Cellular Exposure Regime (CER). For example, the information content of the problem
may be exposed to a system (1) consistently in the same order, (2) in a randomised order,
or (3) in some biased manner resulting in an asymmetric perspective of such information
content. Referring to such interactions as an exposure regimes also highlights the impor-
tant point that the cellular algorithm is considered a passive information processing system
that responds to the active exposure of antigenic stimuli. Therefore, depending on the spe-
cific problem domain, the concerns of exposure, re-exposure, and multiple exposures (from
Section 4.2.2) may or may not be within the scope of control of the system. Algorithm 4.2
provides an example of a regular and consistent exposure regime Exposure(I, T ) operation
where a system is exposed and must respond to the scope of the AEP each I exposure
called an epoch. The example also delegates the responsibility of specific cell interaction
(selection and response) to the cellular clonal selection algorithm in the Exposure(A, T )
operation. This operation encapsulates the scope of concerns of algorithms in the cellular
paradigm.
Algorithm 4.2: Exposure Function (CER) for the Antigenic Exposure Problem.
Input: I, T
Output: Trs
1 Trs ←0;
2 foreach Ai ∈ I do
3 Ci ← Exposure(Ai , T);
4 Trs ← Ci ;
5 end
6 return Trs ;
The cellular exposure regime represents the uncertainty in the information processing
faced by a cellular algorithm, including but not limited to (1) the number of antigen
(Nantigen ), (2) the number of determinants for a given antigen (Ndeterminants ), the diversity
of the information in the antigenic environment (I), and the ordering of the discrete
information exposures defined in the the exposure regime itself (CER). Finally, discrete
cellular interactions with antigen and determinants may not yield specific information,
rather a general indication. For example from an abstract point of view an Exposure(A, C)
or Exposure(D, C) may result in a relative indication of fit or suitability (affinity or
91
avidity) rather than absolute cost. This is motivated by the pre-committed, iterative, and
trial-based (selectionist) strategy reduced from the clonal selection theory.
The antigenic exposure problem may be specialised in the colour space domain as a pattern
recognition problem called the Antigen Colour Space Problem (ACSP). The problem is
defined as a set of Colour Space Patterns (CSP) each of which is defined as a colour
comprised of three 64-bit colour components. The set of patterns are generated as a set
of random binary strings (A& = {0, 1}L , where L = (3 × 64)) and decoded using the
!
Gray Code method for each colour component (Equation 4.1, where denotes addition
modulo two) to a three dimensional colour vector A = [0, 1]3 . Cellular solutions (C)
to each antigen colour space pattern (A) are 192-bit binary strings that decoded to 3-
dimensional colour vectors using Gray Code. The affinity (avidity) function for a decoded
cell, the Exposure(A, C) is defined as the Euclidean distance between the two vectors
(Equation 4.2).
64−1 64−j
1 $ %
GrayCode(A&) = 64 A&(i − 1)64 + k 2j (4.1)
2 − 1 j=0 k=1
(
) n
)$
EuclideanDistance(A, C) = * (Ai − Ci )2 (4.2)
i=1
This mapping of the colour space problem onto the antigenic exposure problem high-
lights the important point of the minimal cases of the problem, specifically: (1) minimum
determinant, and (2) minimum antigen. From an abstract perspective, a cell matches onto
one determinant, from an antigen of multiple determinants. Therefore, from a system
perspective a one-to-one relationship exists between a given cell and its cognate antigen
mediated via the specific sub-feature (antigenic determinant). A Minimum Determinant
Antigenic Exposure Problem (MDAEP) may be defined where each antigen is comprised
of a single determinant (Ndeterminants = 1, ∀A ∈ I). This case forces such a one-to-one re-
lationship at the cost of the exclusion of the cross-reactivity of cells. In the same manner,
the number of antigen in the set may be minimised (Nantigen = 1) to define a Minimum
Antigenic Exposure Problem (MAEP) where a given system T is assessed based on its
capability with a single antigen with a single determinant. This minimal case (single
or multiple exposures of a single determinant), provides a minimal context in which to
consider fundamental behaviours of cellular algorithms and their extensions.
92
Cellular Clonal Selection Algorithm
A Cellular Clonal Selection Algorithm (CCSA) is defined as the application of the compu-
tational properties of the clonal selection theory constrained by the concerns of the theory
at the cellular-level. These constraints include but are not limited to (1) the interaction
with antigen via their determinants, (2) the embodiment of information in a self-contained
repertoire of discrete cells, and (3) the cellular response to active antigenic exposures. The
extent of the taxonomy of clonal selection algorithms reviewed in Section 3.3 may be con-
sidered to reside in the cellular level (within the scope of the Cellular Clonal Selection
Paradigm). This section considers an abstraction of cellular clonal selection algorithms
in the context the concerns considered in quintessential Clonal Selection in Section 4.2.1.
The Antigen Exposure Problem defined a cellular system in terms of its information con-
tent, where the problem is the active concern and the cellular system is passive until
exposed with stimuli to which it reflexively responds. The scope of the concerns of cellular
clonal selection algorithms are the management of information within the repertoire, and
in particular the management of information under the discrete exposures of an AEP.
Algorithm 4.3 defines an initialisation operation for a the Cellular Clonal Selection
Algorithm, where the CreateCell() may be specialised to create random cells with a
representation appropriate for the specific problem domain (192-bit binary strings in the
case of the ACSP). Algorithm 4.4 defines the Exposure(A, T ) operation for the CCSA that
provides a generalisation of the CLONALG, BCA, AIRS, and IA family of the reviewed
clonal selection taxonomy. Specifically, the algorithm responds to antigen exposures by
assessing the extent of the repertoire and selecting a subset (Nselected ) to comprise a
response. Each cell in the selected set creates a set of clones (Nclones ) with mutations
(Pmutation ) that are assessed against the antigen and compete with the progenitor of the
selected set for a position in the repertoire. This generalisation which strongly resembles
CLONALG, implicitly manages the memory cell set and explicitly returns a best matching
cell (GetBestM atchingCell(T )) for each exposure as the most suitable response within
the scope of the repertoire. Importantly, the CCSA provides the flexibility to assume
a variety of configurations, specialisations (such as the CSA taxonomy), as well as the
extensions considered in this chapter.
The CCSA may be reduced to a minimal configuration to provide a complement to
the Minimal Antigenic Exposure Problem called the Minimal Cellular Clonal Selection
Algorithm (MCCSA). This minimal configuration under the MAEP provides a realisation
93
Algorithm 4.4: Exposure Function for the Cellular Clonal Selection.
Input: A, T, Nselected , Nclones , Pmutation
Output: Trs
1 Trs ← 0;
2 foreach Ci ∈ T do
3 Expose(A, Ci );
4 end
5 Tselected ← Select(T, Nselected );
6 foreach Ci ∈ Tselected do
7 Tclones ← 0;
8 for i←0 to Nclones do
9 C&i ← Clone(Ci );
10 C&i ← Mutate(C&i , Pmutation );
11 Tclones ← C&i ;
12 end
13 Expose(A, Tclones );
14 T &clones ← Select(Tclones , Nselected );
15 for i←0 to Nselected do
16 Cselected ← Tselected i ;
17 Cclone ← T &clones i ;
18 if Cclone .score ≤ Cselected .score then
19 T.Remove(Cselected );
20 T.Add(Cclone );
21 end
22 end
23 end
24 Trs ← GetBestMatchingCell(T);
25 return Trs
of of the ES(1 + 1) algorithm and connection with mutation based hill climbers made in
Section 3.4. For example, ES(1 + 1) would be defined by the configuration: Ncells = 1,
Nselected = 1, Nclones = 1, and Pmutation = L.
1
An expected effect with the Cellular Clonal Selection Algorithm is that it results in the
iterative adaptation of specialised and independent cells. This is expected (1) because it
was observed in CLONALG with regard to a niching-like effect, and (2) because CCSA
and CLONAL resemble a parallel mutation based hill climber. The Replacement Cellu-
lar Clonal Selection Algorithm (RCCSA) defined in Algorithm 4.5 is an extension of the
CCSA where all clones created for an exposures are aggregated into a clonal set, which
then competes with the cells in the repertoire on a per-cell basis for a limited position in
the repertoire. This ‘clonal set-repertoire competition’ is intended to provide more oppor-
tunity for per-exposure resource allocation, by allowing clones to compete and potentially
displace repertoire members that may or may not be the clonal progenitor (progenitor
of clones), clonal siblings (same progenitor), or exposure clonal siblings (same exposure).
This competition is promoted firstly through a cell-to-cell distance assessment that simu-
94
lates the competition the cells face during selection by antigen where similar cells compete
for the same antigenic patterns, and in the affinity comparison that selects those cells that
respond better to the specific antigen to which the system has been exposed. This compe-
tition mechanism decouples intra-repertoire competition for survival in the integration of
clones from the antigenic-based selection that resulted in the creation of the clones. Such
decoupling may be exploited in the integration of cells with varied origins.
95
a given problem instance, and (2) diversity measures that consider the general state of the
information content within a given system.
The error of a cell may be assessed as its affinity for a given antigen, and may be assessed
using the problem domains specific Exposure(A, C) operation, in this case Euclidean Dis-
tance (defined in Equation 4.2). Although not used directly, Cell Error (CE) (defined in
Equation 4.3) provides an error-centric buillding building block for addition error assess-
ments.
An important application of Cell Error is its calculation for each cell in in the result
set (Trs ) returned from a cellular algorithms Exposure(I, T ) operation. The Average Cell
Error (ACE) defined in Equation 4.4 is a problem specific (ACSP) measure for assessing
the general capability of a cellular algorithm on an antigenic exposure problem.
Trsn
1 $
AverageCellError(I, Trs ) = CellError(Ai , Ci ) (4.4)
In i=1
A diversity measure of the cellular repertoire provides some indication of the variation
in the discrete information stored within the repertoire. Low diversity reflects a homoge-
neous repertoire, whereas high diversity reflects a heterogeneous set of cells. Given the
selected bit string basis of the CCSA, diversity between two cells may be measured as
the hamming distance between the cells (see Equation 4.6, where Hamming Distance is
defined in Equation 4.5, and ⊕ denotes exclusive-or (XOR).
L
$
HammingDistance(X, Y ) = (Xi ⊕ Yi ) (4.5)
i=1
Cell Diversity (CD) can be calculated for each cell in the repertoire against all other
cells in the repertoire to provide an indication the average number of bit differences of
a given cell to the rest of the cells in the repertories, called the Average Cell Diversity
(ACD) defined in Equation 4.7.
Tn Tn
1 $ 1 $
AverageCellDiversity(T ) = CellDiversity(Ci , Cj ) (4.7)
Tn i=1 Tn j=1
96
4.3.4 Trends and Behaviours
This section considers the expected emergent effects and behavioural trends of cellular-
based clonal selection algorithms as defined in the specific realisations.
The foundational expectation is that the realised Cellular and Replacement Clonal Selec-
tion Algorithm behave much like CLONALG and AIRS. Specifically, that the algorithm
will acquire information via selection and adaptation. This section outlines the specific
foundational behaviour trends of the algorithms in the context of the pressures and prin-
ciples of the clonal selection strategy discussed in Section 4.2.1.
1. Repertoire Size: The repertoire size must be sufficiently large to ensure that se-
lection of cells and integration of clones do not result in competition between cells
specialised for different antigen. Such competition by an insufficiently sized reper-
toire is expected to result in unstable behaviour.
2. Selection Size: The number of clones selected per antigen exposure defines the
amount of resources allocated to each antigen under fixed clonal integration. An
increase in resource allocation via an increase in selection is expected to result in
increased specialisation via the promotion of ‘concurrent redundant perspectives’ of
a given antigen.
3. Cloning Size: The number of clones created per selected cell reflects the amount of
computational effort expended on re-sampling modifications on a ‘known-to-be-good’
structure. Therefore an increase in cloning and acceptance of limited high-affinity
clones is expected to result in an increased specialisation toward exposed antigen.
This section outlines the specific expectations regarding contextual adaptation both with
regard to the localisation of activated and responding cells.
1. Localised Activation: Strong and non-overlapping (specialised for the same antigen)
competition by selection is expected to sufficiently localise polyclonal activation and
resultant adaptation of the clonal selection strategy (oligoclonal activation).
97
4.3.5 Paradigm Agenda
This section outlines the research agenda regarding the cellular clonal selection paradigm in
the remainder of this chapter. Specifically, the agenda is constrained to the investigation
of the expectations made regarding primitive behavioural trends of the cellular clonal
selection algorithms and the expectations regarding contextual adaptation of cells.
The aim of this empirical study was to investigate the CCSA as a viable realisation of
cellular clonal selection and to assess the expected behaviour of this foundational algorithm
with regard to the number of cells selected and the number of clones created under varied
antigenic environments. Toward this end, the study had the following goals:
1. Assess the repertoire composition and capability of CCSA with small and large
selection and clonal sets.
Method
Problems The colour space specialisation of the Antigenic Exposure Problem (AEP)
was used called the Antigen Colour Space Problem (ACSP). Two variations of the problem
were employed ACSP-1 with a single CSP (Nantigen = 1) also referred to as the Minimal
Antigen Colour Space Problem, and ACSP-10 with 10 CSP (Nantigen = 10)3 . Both prob-
3
It is important to note that 10 patterns does not represent the expected extent of the approaches
capability, rather relative increase over the minimal problem case of one pattern. The scalability of the
pattern recognition capability of the investigated approaches is outsides the scope of this thesis, although
the approach is expected to be effected by the curse of dimensionality faced with similar pattern recognition
systems (see Section 8.4 for further discussion).
98
lem instances used the minimal determinant configuration where the scope of the determi-
nant was defined by the extent of each Colour Space Pattern (Ndeterminants = 1). Colour
Space Patterns were randomly generated at the start of each algorithm-problem run. In
the case of ACSP-10, CSP were randomly generated and accepted with the constraint
that pattern binary strings must have a minimum of a 64-bit Hamming Distance from all
other generated patterns for the run. The simple consistent Cellular Exposure Regime
(CER) defined in Algorithm 4.2 was used to manage the interaction of the problem with
the cellular algorithm.
Algorithms The study considered four different configurations of the Cellular Clonal
Selection Algorithm (defined in Algorithm 4.4). The CCSA configurations for the ACSP-
1 and ACSP-10 are defined in Table 4.3 and Table 4.4 respectively. The mutation rate
(Pmutation ) was fixed at 1
L = 1
192 ≈ 0.005 for all algorithm configurations. In addition
to the CCSA parameters, the tables also list the derived values for the number of clones
created per antigen exposure (Clones (A)), the number of positions in the repertoire under
competition per antigen exposure (Positions), and the total number of clones created per
infection exposure or epoch (Clones (I)). For all configurations, the number of cells was
set to ensure that selection and cloning did not result in explicit competition for resources
between cells specialised for different antigen.
Experiment Each algorithm used the Maximum Epochs Stop Condition (MESC) de-
fined in Equation 4.8 with M axEpochs = 1000, where an epoch was defined as the com-
plete exposure of an I to the T . The two cellular specific measures defined in Section 4.3.3
were collected from the state of the system after the triggering of the stop condition. These
measures included the Average Cell Error (ACE) and the Average Cell Diversity (ACD).
Each algorithm and problem received a new and different random number seed each run.
Algorithm-Problem combinations were repeated 30 times.
99
Results
Table 4.5 provides a summary of results for each algorithm-problem combination including
the mean (x̄) and standard deviation (σ) of collected measure values. The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms in each problem
group. Results are summarised as statistically significant if the null hypothesis that any
two given populations in the group are drawn from the same distribution (H0 : µ0 = µ1 ).
Specifically, H0 is rejected if the calculated p-value < α = 0.05, meaning the results are
statistically significant at the 5% level. Figures 4.5a and 4.5b show the ACD and ACE for
all algorithms on ACSP-1 respectively, and figures 4.5c and 4.5d show the ACD and ACE
for all algorithms on ACSP-10 respectively Figure 4.6 provides an example plot of the Trs
returned from the CCSAN+N algorithm on the ACSP-1 and ACSP-10 problems at after
the triggering of the stop condition (same configurations as experiment, random seed of 5
and 1 for the problem and algorithm respectively).
a
False for CCSA1-1 and CCSA1-N
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study. Specifically, the analysis is broken down into
the selection and clonal set size trends for small and large antigenic environments.
Selection and Clonal Trends (ACSP-1) This section considers the selection and
clonal trends of the CCSA configurations on ACSP-1. The increase in the number of
selected cells from 1 to N resulted in a large increase in diversity as expected given the
required shift in increase in the number of cells in the repertoire to support the increased
selection size. The increase in the number of cells selected resulted in a decrease in error
with a single clone and an increase when multiple clones were created. The increase in the
number of clones created for selected cells from 1 to N resulted in very minor differences
in the repertoire diversity, although did result in a large decrease in the average cell error.
The results confirmed the expectation that in the optimisation of a repertoire for a single
100
(a) Average Cell Diversity (ACD) on ACSP-1. (b) Average Cell Error (ACE) on ACSP-1.
(c) Average Cell Diversity (ACD) on ACSP-10. (d) Average Cell Error (ACE) on ACSP-10.
Figure 4.6: Example plots of Trs from the CCSA(N+N) at the end of the run on left section
on both plots, for both ACSP-1 and ACSP-10, where the problem solution is represented
on the right of each plot, and colour components within each CSP.
101
antigen, the creation of more clones results in an improved system capability given that
each clone represents a new trial and potential improvement over an already relatively
good structure.
Selection and Clonal Trends (ACSP-10) This section considers the selection and
clonal trends of the CCSA configurations on ACSP-10. The increase in the number of
selected cells resulted in a decrease in the system error with a small repertoire, although
in this case the trend held for both small and large repertoire sizes. The increase in the
number of clones resulted in only very minor changes to the average cell diversity, although
resulted in a consistent decrease in the the average cell error. The increase in the size of
the antigenic environment did not disrupt the general trend of increase number of clones
resulting in increase system capability. Unlike the single antigen case, the increase in the
number of selected cells also consistently resulted in a decrease in average cell error.
Conclusions
This section summarises the findings of the empirical study into the Cellular Clonal Se-
lection Algorithm in terms of the primitives that were the focus of the study and the
expectations that motivated the study.
2. The increase in the number of selected cells (allocated resources) results in improved
system capability with small cloning on the single antigen problem, although is
consistently beneficial on the larger antigenic problem.
3. The increase in the number of clones (trials) results in an improved system capability
across the tested antigenic environments.
The aim of this empirical study was to investigate the properties of the CCSA and the
RCCSA as a viable realisation of cellular clonal selection that promote improved utili-
sation of repertoire resources. Improved utilisation will effect the composition and may
effect the capabilities of a repertoire, where the promotion and maintenance of redundant
perspectives is expected to provide benefits in terms of fault tolerance. Toward this end,
the study had the following goals:
1. Assess varied clonal integration mechanisms with CCSA that promote concurrent
redundant perspectives of each antigen.
2. Assess varied clonal integration mechanisms with RCCSA that promote concurrent
perspectives and compare to CCSA.
102
Method
Problems This study used the ACSP-10 problem used for the CCSA empirical study
in Section 4.4.1.
Algorithms This section considers varied configurations of the CCSA and the RCCSA.
The configuration parameters of each algorithm type are presented in Table 4.6. The
chosen configurations of the repertoire, number of selected cells and number of clones fa-
cilitate the allocation of a maximum of six repertoire position per antigen. The CCSA
configurations included the CCSA(N+N) from CCSA empirical study in Section 4.4.1 as
well as two extensions. CCSA(N+N)-G aggregates all clones into a single group which
collectively compete with the Nselected selected cells from the repertoire for their position.
CCSA(N+N)-GS also aggregates all clones into a single clonal group, each of which com-
petes with the same number of the best matching cells as there are in the clonal set drawn
from the repertoire. Two variations of the RCCSA algorithm (defined in Algorithm 4.5)
were assessed, both of which used Hamming Distance (Equation 4.5) between cells in the
replacement mechanism. The RCCSA-H configuration allowed clones to select the most
similar cells in the repertoire to compete with for a position, whereas the RCCSA-H-
ES configuration restricted selection to those cells in the repertoire that were not clonal
siblings (hamming similarity excluding siblings).
Table 4.6: Summary of the assessed configuration for the CCSA-RCCSA empirical study.
Experiment This study used the same experimental configuration including stop condi-
tions, measures, as were used for the CCSA empirical study in Section 4.4.1. An additional
measure was used to provide an assessment of the number of cells (C) in the repertoire
(T ) specialised to each antigen (A) in the scope of the problem (I). This measure is called
the Average Best Matching Cells Per Antigen (ABMCPA) defined in Equation 4.9 that
assessed and located the set of best matching cells for each antigen (Algorithm 4.6) and
averaged the number of cells returned for each antigen.
In
1 $
AverageBM CP erAntigen(I, T ) = ABM CS(Ai , T )n (4.9)
In i=1
Results
Table 4.7 provides a summary of results for each algorithm-problem combination including
the mean (x̄) and standard deviation (σ) of collected measure values. The non-parametric
103
Algorithm 4.6: Best Matching Cells (BMC’s) for a given Antigen.
Input: T, A
Output: TBM C
1 TBM C ←0;
2 for Ci ∈ T do
3 Exposure(A, Ci );
4 if TBM C n > 0 then
5 C& ← TBM C i ;
6 if Ci .affinity < C&.affinity then
7 TBM C ←0;
8 TBM C ← Ci ;
9 else if Ci .affinity ≡ C&.affinity then
10 TBM C ← Ci ;
11 end
12 else
13 TBM C ← Ci ;
14 end
15 end
16 return TBM C ;
Mann-Whitney U statistical test was calculated pair-wise for all algorithms. Figures 4.7a,
4.7b, and 4.7c show the ACD, ACE, and ABMCPA on all algorithms respectively. Fig-
ure 4.8 provides example plots of the state of the repertoire (left of each plot) compared
to the problem domain (right of each plot) from each of the five algorithms (same config-
uration, random seeds of 1 and 5 for the algorithm and problem respectively).
a
False for CCSA(N+N) and RCCSA-H
b
False for CCSA(N+N) and RCCSA-H
Table 4.7: Summary of results from the CCSA-RCCSA empirical study on ACSP-10.
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study.
CCSA Trends With regard to average cell diversity, the aggregation and thus com-
petition between the entire clonal set with the selected set resulted in a slight drop in
diversity, although the relaxing of the competition from progenitor cells to the entire
104
(a) Average Cell Diversity (ACD) on ACSP-10. (b) Average Cell Error (ACE) on ACSP-10.
105
(a) CCSA(N+N). (b) (N+N)-G.
(e) RCCSA-H-ES.
Figure 4.8: Plots of the ordered state of the repertoire after the triggering of the stop
condition (left of each plot) for the assessed CCSA and RCCSA algorithms on the ACSP-
10, where the right of each plot provides the problem optima.
106
repertoire resulted in a further larger decrease in diversity by ≈ 5.5 bits. Interestingly
the CCSA(N+N)-G achieved a slightly lower error than CCSA(N+N) where the further
relaxation of competition in CCSA(N+N)-GS resulted in a large relative increase in the
ACE. Correlating with the decrease in ACD, the relaxation in the integration of the clones
resulted in an increase in the number of best matching cells (BMC’s) per antigen, rising to
an average of ≈ 5 in the case of CCSA(N+N)-GS. The results demonstrate that multiple
concurrent and redundant perspectives of antigen can be achieved by relaxing the replace-
ment competition in CCSA which decreases repertoire diversity. The results also highlight
that competition between the clonal set results in an improved result in terms of ACE
and ABMCPA over CCSA(N+N), although the relaxation from progenitor set to whole
repertoire dramatically increases ABMCPA at expense of increasing the systems general
capability. The specialisation of each antigen’s cellular imprint in the repertoire provided
by CCSA(N+N)-GS is clearly demonstrated in Figure 4.8c compared to CCSA(N+N)-G
in Figure 4.8b.
RCCSA Trends The exclusion of clonal siblings from replacement resulted in a signif-
icant decrease in diversity, the same seen between CCSA(N+N)-G and CCSA(N+N)-GS.
The exclusion of progeny also resulted in a very slight decrease in ACE over RCCSA-
H. Interestingly, the repertoire-wide competition between the aggregated clonal set in
RCCSA-H resulted in a single average BMC per antigen, whereas, the exclusion of progeny
during replacement promoted the competition between the concurrent clonal set such
that ABMCPA increased to ≈ 2.5. Also interesting was that the ACE and ABMCPA
results for RCCSA-H were not significantly different from CCSA(N+N), demonstrat-
ing that unrestricted similarity-affinity based replacement into the repertoire behaves
much like CCSA(N+N) confirming the expectation that motivated the exclusion of clonal
progeny: that they are more similar. Also interesting is that the increase in ABMCPA
with RCCSA-H-ES also resulted in a relative increase in ACE compared to CCSA(N+N)
and CCSA(N+N)-G, suggesting that for the mechanisms used, increasing the specialisa-
tion of the cellular footprint for each antigen comes at the expense of general repertoire
competence.
Conclusions
This section summarises the findings of the empirical study into the CCSA and RCCSA
in terms of the primitives that were the focus of the study and the expectations regarding
proportional resource allocation.
1. Relaxing the constraints for competition in the integration clones into the repertoire
results in increased number of concurrent redundant perspectives of an antigen in
the repertoire for CCSA and RCCSA.
107
3. Repertoire-wide integration restrained by only similarity-and-affinity in RCCSA ap-
proximates CCSA(N+N) in behaviour.
Different
Antigen receptors
Receptor
Different
antigens
Polyclonal Recognition
Clonal selection accounts for the restriction of a potential polyclonal activation of the
repertoire to an oligoclonal activation by dominant clones out competing the less well
fitted clones (referred to as clonal dominance). The classical theory does not account
108
for lack of one-to-one correspondence between cells and antigen (the cross-reactivity of
receptors referred to as polyclonal response). Cognitive immune theory accounts for poly-
clonal response between antigen and receptors by suggesting (1) that cells in isolation are
degenerate and cross-specific, (2) context defines the use for degenerate cells resulting in
emergent specificity.
Aim
Method
Problems The definition of the Colour Space Domain in Section 4.2.3 highlighted a
‘retina and colour perception’ analogy made by Cohen to describe cellular degeneracy and
emergent specificity. The problems in this section are motived by that analogy. This study
used the ACSP-10 problem used for the CCSA empirical study in Section 4.4.1, although
evaluated on a per colour component basis. To differentiate this mode of evaluation from
the holistic ACSP, it is referred to as the Determinant Colour Space Problem (DCSP-
10). A degenerate colour representation was used called component degeneracy where
each colour was divided into the its Red, Green, and Blue components. Components are
denoted D, where a A = {D1 , D2 , D3 } for each colour space pattern. Degenerate compo-
nent cells were assessed using Equation 4.10, where each degenerate component cell was
defined by a 64-bit bitstring and decoded to a real value using Gray Code (Equation 4.1).
Components were considered a symbolic degenerate representation as each component has
direct meaning via their linear aggregation in the the context of a colour space pattern.
ComponentDistance(D, C) = |D − C| (4.10)
Algorithms The study considers a Degenerate Cellular Clonal Selection Algorithm (DCCSA)
as an extension of the RCCSA (defined in Algorithm 4.5) that uses a degenerate repre-
sentation. RCCSA was selected as a base algorithm because (1) it achieves adequate
results in terms of repertoire capability, and (2) because it achieves multiple high-affinity
concurrent perspectives (proportional repertoire composition) on antigen to which it is
exposed. The RCCSA was configured with the following configuration: Ncells = 100,
with Nselected = 3, and Nclones = 1 per determinant exposure, resulting in a resource
allocation of three cells per component, or nine cells per antigen. A Hamming-based sim-
ilarity assessment was used in replacement, with clonal sibling exclusion. Two variations
109
of the degenerate cellular component selection were considered as follows: (1) explicit
per-component selection called DCCSA-E, and (2) pre-committed component cells called
DCCSA-P. Both approaches aggregated the best degenerate cell for each component into a
holistic solution to address each given antigen in the ACSP. Explicit per-component selec-
tion maintained a repertoire of uncommitted components that were assessed and selected
in the context of each component of each colour space pattern. This allowed degenerate
cell reuse across the components of a single antigen and across the components of multiple
antigen. Pre-committed component cells involved the management of one sub-repertoire
for each component, where the size of each repertoire was a fraction of the total number
of cells (. Ncomponents
1
× Ncells /).
Experiment This study used the same experimental configuration including stop condi-
tions, measures, as were used for the CCSA empirical study in Section 4.4.1. An additional
measure was introduced for the degenerate component algorithms that assessed the ex-
tent of the cross-reactivity of the repertoire called the Average Polyclonal Response Error
(APRE), defined in Equation 4.11. APRE provides an indication of the average repertoire
error per component.
+ ,
In A Tn
1 $ $ in
1 $
AP RE(I, T ) = ComponentDistance(Ai j , Ck ) (4.11)
In × Ain i=1 j=1 Tn k=1
Results
Table 4.8 provides a summary of results for each algorithm-problem combination including
the mean (x̄) and standard deviation (σ) of collected measure values. The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms.
Table 4.8: Summary of results from the DCCSA empirical study on DCSP-10.
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study, specifically (1) restrictive selection, and (2)
explicit aggregation.
Restrictive Selection The results showed little significant difference on the selected
measures between the explicit and pre-committed selection mechanisms, other than a
slightly improved cell error for the explicit approach. The strong similarity in results, in
110
particular the Average Polyclonal Response Error demonstrate that the degenerate com-
ponent clonal selection was generally unaffected when the repertoire was split into sub-
repertoires per component compared to an integrated cross-component competitive reper-
toire. The minimum Hamming distance between generated colour space patterns likely
resulted in little cross-colour space pattern reuse given the per-pattern/per-component
specialisation of the repertoire, and the lack of difference between segregated and inte-
grated component repertoires. An important consideration is that CCSA and RCCAS
implicitly rely on restrictive selection to bound polyclonal activation of cells. This is
clear if we consider a principle of cellular clonal selection that the scope of the repertoire
available allowing Ncells interactions (assessments and activations). Without constrained
selection, the scope of repertoire would respond in its entirety each antigen exposure.
Conclusions
This section summarises the findings of the empirical study into the DCCSA in terms of
the primitives that were the focus of the study and the expectations regarding proportional
resource allocation.
1. Degenerate Components
111
(b) A RCCSA results in little difference in the partitioning or aggregation of the
repertoire and thus competition of degenerate cells, suggesting clonal indepen-
dence promoted via replacement is sufficient for non-overlapping clonal special-
isation (assuming a large enough repertoire).
(c) Explicit aggregation provides a context in which to bound polyclonal response
to strongly activated (selected) structures.
(a) Strong selection is required in all cellular clonal selection algorithms to man-
age the implicit polyclonal activation that occurs as a result of each antigens
interaction with the entire repertoire.
(b) Aggregation is independent of the principle clonal selection operations, requir-
ing explicit integration into the process (for those applications that operate on
sub-solution structures).
112
Antigen
Cells
Toroidal lattice
Spatial Selection
The spatial structure may be exploited in the selection of the activated set for a given
antigen. In the selection scheme the repertoire is evaluated, scanned for the highest
affinity cell, which is returned to address the needs of the antigen, and an activated
set is selected from the high-affinity cells. Therefore, the conventional activated set may
be conceptualised as the selection of cells from across the spatial structure. One may
partition antigenic signals and match them to regions (logical partitions) of the spatial
structure, such that regions are directed in a top-down manner to be responsible for
specific antigenic signals. The input space can be partitioned by a measure relevant to
the representation of the antigen or the cells in the repertoire. This partitioning scheme
would be implemented such that activated sets of receptors may only be drawn from
the allocated region of the spatial structure, therefore putting pressure on the region
to produce and develop receptors suitable to the allocated portion of the input space. A
concern with this approach is that information effective for representational partitions may
be developed outside of allocated regions and thus would not be exploited (for example the
cross-reactive response for generalisation). Further, without inter-region competition, the
partitions may be considered isolated repertoires such that the partitioning prevents the
take-over or resizing of spatial regions with proportion to signal frequency and complexity
(an effect maintained by differential resource allocation across the whole repertoire).
Spatial Replacement
The Replacement CCSA investigated in Section 4.4.2 may be elaborated to exploit a spatial
structure such that replacement competition is spatially localised or constrained to the
locations in the repertoire that responded strongest to an antigenic stimulus. Competition
for resources may be constrained to the spatially local neighbourhood of high affinity
cells. The principle parts of a spatial replacement mechanism are as follows: a structured
repertoire or lattice data structure in which grid positions represent cells, a neighbourhood
function that identifies the scope of competition (see Figure 4.11), and a competition
function that defines how resources (lattice positions) are allocated to clones of selected
cells. Spatial competition introduces spatial meaning between positions in the lattice, such
that visualisation of the lattice can highlight relationships and facilitate the extraction of
qualitative information from the repertoire.
The spatially restricted ‘back-end’ selection (neighbourhood function) is expected to
113
Antigen
Activated
Repertoire
Neighbourhood Replacement
Clones
114
proportionate allocation (specialisation) of resources for the automatically identified com-
plexities of the input space with the computational and delay costs for the self-organising
process. Resource allocation is determined automatically, although not all resources may
be utilised effectively. An interesting observation is that one method will lead to the other,
such that the explicit exploitation of the spatial competition of both ends is not required.
The application of upfront spatial partitioning will force regions to adapt to input signals,
thus result in replacements occurring in the same region, reinforcing the partitioning. The
application of back-end partitioning will self-organise the responsibility for antigenic sig-
nals via replacement, which will reinforce future input signals being directed to responsible
areas of the spatial structure.
A B A B
A B A B A
Figure 4.12: Depiction of the explicit versus implicit partitioning of input signals and the
effects on the repertoire.
2. Assess the effects on the repertoire in exploiting the spatial structure to localise
clonal integration via replacement.
Method
Algorithms This study considers the Replacement Cellular Clonal Selection Algorithm
(RCCSA), and two variations of the Spatial Cellular Clonal Selection Algorithm (SCCSA).
The RCCSA defined in Algorithm 4.5 was configured with Ncells = 100, Nselected = 2, and
Nclones = 5 to promote an allocation of ten cells per antigen in ACSP-10. Unlike RCCSA,
SCCSA does not aggregate and integrate clones as a group into the repertoire, instead
clones are replaced individually, with per-progenitor clonal sibling replacement exclusion.
Two variations of the SCCSA algorithm were investigated: (1) a variation that organised
the repertoire into a lattice although was constrained by the spatial organisation called
holistic replacement (SCCSA-HR), and (2) a variation that exploited the spatial repertoire
115
and constrained the integration of clones to the spatial neighbourhood of the progenitor cell
and with exclusion of clonal siblings (like RCCSA and SCCSA-HR) called neighbourhood
replacement (SCCSA-NR). The neighbourhood was defined as the square of the nine cells
surrounding and including a given position in the toroidal lattice. Both SCCSA used the
same configuration as RCCSA, although the lattice dimensions used the square root of
Ncells resulting in a 10-by-10 2-dimensional repertoire.
Problems This study used the ACSP-10 problem used for the CCSA empirical study
in Section 4.4.1.
Experiment This study used the same experimental configuration including stop con-
ditions, measures, as were used for the RCCSA empirical study in Section 4.4.2, including
the Average Best Matching Cells Per Antigen (ABMCPA). An additional measure was
used that calculated the average diversity of the 9-cell neighbourhood for each position in
the lattice, called the Average Cell Neighbourhood Diversity (ACND). The diversity was
calculated using the Average Cell Diversity (Equation 4.7) method for each neighbour-
hood, and averaged across all 100 neighbourhoods.
Results
Table 4.9 provides a summary of results for each algorithm-problem combination including
the mean (x̄) and standard deviation (σ) of collected measure values. The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms. Figures 4.13a,
4.13b, 4.13c, and 4.13d show the ACD, ACE, ABMCPA, and ACND on all algorithms
respectively. Figure 4.14 provides example plots of the state of the repertoire from the two
spatial-based algorithms (same configuration, random seeds of 1 and 5 for the algorithm
and problem respectively).
a
False for RCCSA and SCCSA-NR
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study.
116
(a) Average Cell Diversity (ACD) on ACSP-10. (b) Average Cell Error (ACE) on ACSP-10.
(c) Average BMC Per Antigen on ACSP-10. (d) Average Cell Neighbourhood Diversity on ACSP-
10.
Figure 4.13: Box-and-whisker plot’s from the Spatial Repertoire Empirical Study.
Figure 4.14: Example plots of the spatial repertoire from two variations of SCCSA at the
end of the run on ACSP-10 with BMC represented with circles.
117
Spatial Structure Trends This section considers the effects of storing the repertoire
in a spatial structure by comparing the results of RCCSA to SCCSA with holistic re-
placement. The use of the spatial structure in SCCSA-HR resulted in a small increase
in repertoire diversity and in particular response error where ACE also showed a large
increase in the variance of final ACE scores. The increase in diversity and error corre-
lated with a decrease in the average number of BMC’s. The spatial structure was used in
SCCSA-HR to hold the repertoire although was not exploited in any way. The difference
in the repertoire composition and capability between the approach and RCCSA demon-
strate the effect of the per-progenitor clonal set replacement used in SCCSA compared to
the aggregated clonal set replacement in RCCSA.
Localised Replacement Trends This section considers the exploitation of the spa-
tial structure in the neighbourhood replacement used in SCCSA compared to holistic
replacement. The SCCSA-NR resulted in a the increased organisation of the repertoire
as expected by localising cells for the same antigen into areas on the spatial repertoire
structures. This was demonstrated by the decrease in repertoire diversity compared to
both SCCSA-HR and RCCSA, and a small increase in ABMCPA compared to SCCSA-
NR. Interesting the exploitation of spatial neighbourhood competition resulted in a ACE
not significantly different from RCCSA, suggesting that such competition results in the
same level of per-antigen specialisation within the repertoire as RCCSA. Importantly the
increased organisation was demonstrated by the significant decrease in average repertoire
diversity compared to holistic replacement, which was depicted in the example plot in
Figure 4.14 showing that this decrease was caused as a result of the clear grouping of
similar cells (similar colours) in the spatial repertoire.
Conclusions
This section summarises the findings of the empirical study into the Spatial Cellular Clonal
Selection Algorithm in terms of the primitives that were the focus of the study and the
expectations that motivated the study.
118
4.6.1 Mediated Clonal Selection
Two-signal theories have been proposed in immunology as verification signals permitting
the proliferation and differentiation of lymphocytes. Historically developed for the ac-
tivation of B-lymphocytes (in the context of self-nonself discrimination), the two-signal
approach has also been extended to the various classes of T-cells. The dominant type of B-
cell activation is dependant on Helper T-cells that identify MHC molecules on the surface
of activated antigen-presenting B-cells. The detection of MHC provides a secondary veri-
fication signal to the B-cells, allowing them to proliferate and differentiate. This process
is called the co-stimulation of B-cells by T-cells or T-cell dependant activation of B-cells.
Likewise, T-cell activation requires an antigen specific signal via an antigen-presenting cell
and a co-stimulating ‘antigen non-specific’ verification signal. The theory of the two-signal
activation of T-cells is called associative recognition theory [57].
Mediated Clonal Selection or so-called inter-repertoire recognition decomposes the
clonal selection process such that a mediation process is responsible for selecting those
cells from the activated set that may proliferate. The mediation process is controlled by
a sister repertoire of cells that also perform a clonal selection process using the activated
cells of the first repertoire as input signals. The Helper T-cell metaphor is adopted such
that the repertoire of cells (first repertoire) represents B-lymphocytes, which require a
second verification signal from the helper T-lymphocytes (second repertoire) before pro-
liferating and differentiating. After providing the secondary signal to the activated set of
B-lymphocytes, the helper T-lymphocytes proceed with the cloning and maturation of the
activated T-cells. Therefore, the T-cell repertoire is an application of the clonal selection
algorithm that accepts the activated set of another clonal selection algorithm as a pseudo-
‘antigenic set’. Two concerns that must be reconciled in integrating the two repertoires are
as follows: (1) The T-cells must select those B-cells from the B-cells activated set that may
proliferate (2) The B-cell activated set provides multiple antigens simultaneously to the
T-cell repertoire, to which it is possible to generate a T-cell activated set for each member
of the B-cell activated set. The remainder of this section considers the implications of the
second clonal selection governed repertoire from a variety of different perspectives.
Mapping Function
The proliferation verification signal for the activated B-cell’s may be antigen-dependent
or antigen-independent. If antigen-dependent, the information provided by the verifica-
tion signal may be considered a generalisation of the input signals provided to the B-cell
repertoire. If the verification signal is antigen-independent, then the information pro-
vided is a generalisation of the cells themselves in the B-cell repertoire. This is a subtle
but potentially important difference that effects the representation of information by the
system.
An antigen-dependent mapping from B-cell to T-cell requires that some regularities
of the input signal are preserved. The transformation may be of the whole antigen itself,
or just the part of the antigen recognised by the B-cell receptor. The T-cell repertoire
adapts to a consistent (B-cell invariant) generalisation of the antigenic input patterns. An
119
antigen-dependent mapping between the repertoires provides a top-down organisation of
the relationship between the repertoires, where simply matching onto the second reper-
toire provides the verification signal. A potential concern with antigen dependence is that
the mapping of the input patterns may be achieved in one repertoire, making the second
repertoire redundant. An antigen-independent mapping disregards the regularities of the
input signal, such that the T-cell is performing pattern recognition of B-cell receptors,
rather than a pattern recognition of antigen (whether symbolic or sub-symbolic). The
result is a T-cell repertoire that is developed independent of antigen, and dependent on
the B-cell repertoire (which in turn develops in response to antigen). A potential concern
with an antigen-independent mapping is that it is arbitrary such that T-cells are com-
pletely dependent on specific B-cell lineages, and regularity between B-cell patterns has
no meaning other than ancestry (likely to make the mapping harder).
Interestingly, the relationship between an antigen and cells, as well as cells between reper-
toires may be considered in the context of the formation and maintenance of higher-order
structures. For example in the case of a single repertoire, one antigen may map onto one
cell providing a specialised mapping. This may be elaborated to include the extremes
cardinality of relationship. For example, a one-to-many relationship between antigen and
cells maybe considered a decomposition of feature extraction, particularly if the mapping
is partial or sub-symbolic. Additionally, many antigen may be mapped onto many cells
either directly (generalisation of one-to-one) or partially (cross reactivity), or onto a single
cell, compressing the signal.
The relationship between repertoires adds a second level of complexity to the hierarchi-
cal structure. The same relationships apply although in this case between cells, with the
importance difference that the relationships can be manipulated with mapping schemes,
activated B-cell set size, and activated T-cell set size. For example, it may be desirable
to coerce the B-cell repertoire to decompose antigen into regular features (many), and the
T-cell receptor to generalise those features toward a specific meaning (few). Alternatively,
the B-cell repertoire may be coerced to generalise (compress) based on common antigenic
features (few), and the T-cell repertoire to decompose the B-cell information content into
a variety of different meanings (many).
T-Cells
B-Cells
T-Cells
B-Cells
120
Rather than treating each activated B-cell independently, the activated B-cells may
interact with the T-cell population concurrently, such that multiple B-cells may activate
a single T-cell. The T-cell repertoire may be configured such that a T-cell is required to
match more than one B-cell before it may become activated. This provides a mechanism
in which the T-cell repertoire facilitates the aggregation of multiple antigenic features
into a single T-cell. The second repertoire facilitates the addition of a second layer of
meaning. In the many-to-one case a T-cell may represent a high-order concept as an
aggregate of multiple lower-level concepts (B-cells). The meaning is a single or small
collection of concepts that are dependent on the presence of specific features (specific
context). For example, Many-to-One provides a consensus forming operation in which
many lower-order concepts (such as extracted features) are aggregated together to form
a high-order concept. The One-to-Many relationship provides a descriptive operation in
which a high-order concept is decomposed into a number of lower-order concepts (such
as descriptive features). In both of these examples, the meaning implies a mapping that
manages to preserve some regularities of the input signal, such that higher-order or lower-
order concepts may be described.
The incorporation of additional feedback into the algorithm allows an external process
to assign meaning and supervise the mapping and formation of concepts. For the single
repertoire algorithm, T-cell mediation provides an immunologically plausible basis for
feedback (verification) to supervise the selection of activated receptor patterns in response
to antigenic exposures. For the dual repertoire algorithm, tissue damage provides an
immunologically plausible basis for feedback to supervise the selection of concepts formed
in the T-cell repertoire, which in turn feeds back to the B-cell repertoire via the mediation
process. The proposed integration of feedback results in two flows of information through
the system. The top-down flow of antigenic signals results in B-cell receptors competing for
activation, and T-cell receptors competing for activation of the B-cell receptor activated
set. Those B-cells that receive the secondary signal, proliferate. The bottom-up flow of
tissue-damage input results in T-cells competing for encouragement that the concepts that
they represent are useful. Those T-cells that receive a positive (non-negative, and perhaps
non-neutral) feedback, proliferate. Therefore, the application of feedback (if available) is
to the activated set of T-cells. In the absence of feedback, there is simply the absence of
corrective behaviour: the punishment, or reward of the activated T-cell concept.
Bottom-up supervision of concept formation provides a natural agenda for investigating
mediated clonal selection beyond the basic principles of mappings and structure formation
and maintenance (for example, see Figure 4.16). The integration of a feedback mechanism
provide a natural relationship with the study of Reinforcement Learning (Section 3.4.5).
121
Input signal Input sig nal
B-cells B-cells
T-cells T-cells
Incorrect Correct
Incorrect Correct
Feedback Feedback
Figure 4.16: Depiction of the integration of feedback for supervised structure formation.
The aim of this investigation was to asses the cellular clonal selection algorithm constrained
by inter-cellular repertoire interactions. Toward this end, the study had the following goals:
2. Investigate the effects of varied cellular cardinality in the relationships exploited via
inter-repertoire mapping.
Method
Problems This study used the ACSP-10 problem used for the CCSA empirical study
in Section 4.4.1.
Algorithms Algorithm 4.7 defines the Mediated Cellular Clonal Selection Algorithm
(ECCSA), where Exposure(A, T ) is a modified version of the Exposure operation for RC-
CAS (defined in Algorithm 4.5) that returns the selected set rather than the best matching
cell. The RCCSA uses clonal sibling exclusion and a Hamming similarity function during
replacement.
The modified RCCSA Exposure operation also permits the mapping of a selected set
of cells (Trs ) to be treated as an antigen. This is achieved through use of an exposure
122
operation that provides a mapping function that aggregates affinity for a given cell against
a stimulating set of cells. The first part of this study considers two different examples of the
mapping function: (1) Euclidean Mapping, and (2) Hamming Mapping. The affinity scores
are aggregated within each cell of the repertoire against the stimulating set to provide a
general indication of a cells capability against a stimulating set. In this part of the study,
both the B-cell and T-cell repertoires used identical configurations as follows: Ncells = 100,
Nselected = 1, Nclones = 10 (10% of each repertoire per antigen). The second part of the
study considered varied relationships between the two repertoires in terms of the size of the
selected B-cell set which stimulates the T-cell repertoire, and the size of of the activated
and responding T-cell set. A series of one-to-one and many-to-many relationships were
assessed with the intermediates, where the number of clones and this repertoire assigned
per antigen was kept constant at six (10% of each repertoire per antigen) with regard to
the selection size. The configurations are summarised in Table 4.10. A Euclidean mapping
was used between the repertoires in this second part of the study.
Table 4.10: Summary of the configuration of the ECCSA with a series of inter-repertoire
selection relationships.
Experiment This study used the same general experimental configuration including
stop conditions as were used for the CCSA empirical study in Section 4.4.1. A series of new
measures were defined for the experiment. The Average Cell Diversity measure (defined in
Equation 4.7) was calculated for each of the B-cell and T-cell repertoires referred to as the
Average B-Cell Diversity (ABCD), and the Average T-Cell Diversity (ATCD) respectively.
This treatment was performed to the Average Cell Error measure (defined in Equation 4.4)
referred to as the Average B-Cell Error (ABCE) and the Average T-Cell Error (ATCE)
respectively, where the measure was taken as the best response from each repertoire against
the antigen. The Average BMC per Antigen (defined in Equation 4.9) was adapted for
the two re-repertoire configuration referred to as the Average Best Matching B-Cells Per
Antigen (ABMBCPA) and the Average Best Matching T-Cells Per Antigen (ABMTCPA)
respectively. The system’s response was taken as the best matching cell from the set of
selected (activated) T-cells for each antigen exposure, called the Response Error (RE). A
new measure was defined that calculated the T-cell error after mapping, averaged across
each cell in the T-cell repertoire called the Average T-Cell Mapping Error (ATCME).
This measure provided a general indication of the mapping error between the repertoire
in the units of the specific mapping scheme used. The measure was also taken against
just the set of T-cells activated and selected by the activated B-cells called the Average
T-Cell Selected Set Mapping Error (ATCSSME). Figure 4.17 provides a depiction of the
123
repertoires, the antigen, the selected sub-sets and the system response as well as how all
the collected measures relate to these principle attributes of the ECCSA.
Antigen
RE
ABCE
ABMBCPA
ABCD
Selected
B-Cells T-Cells
ATCME
ABMTCPA ATCD
ATCE ATCSSME
Selected T-Cells
T-Cells
Response
Figure 4.17: Depiction of the principle concerns of the MCCSA and the relationships in
terms of the selected measures.
Results
Table 4.11 and Table 4.12 provide a summary of results for each algorithm-problem com-
bination including the mean (x̄) and standard deviation (σ) of collected measure values.
The non-parametric Mann-Whitney U statistical test was calculated pair-wise for all al-
gorithms. Figures 4.19a, 4.19b, 4.19c, 4.19d, and 4.19e show the ABCD, ABCE, ATCD,
ATCE, and RE respectively. Figure 4.20 provide example plots for all four configurations
on the second relationship part of the study. Results from all example plots are taken
from the end of the run with algorithm and problem configurations matching those used
during experimentation, and a random number generator seed of 1 and 5 for the algorithm
and problem respectively.
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study.
124
Measure Euclidean Hamming Significant
x̄ σ x̄ σ
ABCD 89.399 0.822 89.399 0.822 False
ATCD 89.234 0.718 87.999 0.94 True
ABCE 0.003 0.002 0.003 0.002 False
ATCE 0.009 0.006 0.098 0.029 True
RE 0.009 0.006 0.617 0.123 True
Table 4.11: Summary of results for ECCSA with two different mapping schemes on ACSP-
10.
Figure 4.18: Example plots of the B- (top of each plot) and T-Cell (bottom of each plot)
repertoires from the ECCSA at the end of the run on ACSP-10 for two different inter-
repertoire mapping types.
a
False for ECCSA(N-1) and ECCSA(N-N)
b
False for ECCSA(1-N) and ECCSA(N-N)
c
False for ECCSA(N-1) and ECCSA(N-N)
Table 4.12: Summary of results for ECCSA with four different inter-repertoire relationship
schemes on ACSP-10.
125
(a) Average B-Cell Diversity (ABCD) on ACSP-10. (b) Average B-Cell Error (ABCE) on ACSP-10.
(c) Average T-Cell Diversity (ATCD) on ACSP-10. (d) Average T-Cell Error (ATCE) on ACSP-10.
Figure 4.19: Box-and-whisker plot’s for the relationship configuration with ECCSA.
126
(a) MCCSA(1-1). (b) MCCSA(1-N).
Figure 4.20: Example plots of the B- (top of each plot) and T-Cell (bottom of each
plot) repertoires from the MCCSA at the end of the run on ACSP-10 for all four inter-
relationship types.
127
Mapping Trends This section considers the effects of using the Euclidean and Ham-
ming antigen-dependant inter-repertoire schemes. The B-cell diversity and error show no
significant difference between the mapping schemes. This is an expected result, as the
mapping scheme and the chosen ECCSA does not effect the B-cell repertoire. The T-
cells showed a small decrease in diversity with the Hamming mapping, and more critically
showed a factor of 10 increase in Average T-cell Error compared to the Euclidean mapping.
This difference in error was reflected more strongly in the Response Error that showed a an
increase in error of ≈ 70. The example plots in Figure 4.18 clearly show well organised B-
cell repertoires under both mapping schemes as expected, and the clear organisation and
disorganisation in the T-cell repertoires between the Euclidean and Hamming schemes
respectively. These results demonstrate that under the circumstances investigated, that
Hamming distance is not a sufficient approximation for Euclidean distance, not provid-
ing enough information to promote the same structures in the T-cell repertoire as were
selected in the B-cell repertoire. These results demonstrate the fragility of proxy-based
response to the antigen-centric mapping function.
128
Conclusions
This section summarises the findings of the empirical study into the Mediated Cellular
Clonal Selection Algorithm in terms of the primitives that were the focus of the study and
the expectations that motivated the study.
1. Mappings
2. Relationships
(a) The number of activated B-cells and thus stimulus for the T-cell repertoire
was an important factor in response capability, resulting in a specialisation of
feature detectors for remapping.
(b) The one-to-one and one-to-many relationship configurations between the reper-
toires resulted in the better proxied responses, with more than a factor of two
decrease in capability with an increase in the number of selected B-cells.
(c) One-to-Many selection and clonal integration for a given repertoire results in
improved repertoire capability (lower error), increase repertories organisation
(lower diversity), and an improved mapping given the specialisation it provides
to the adaptive process.
129
and anti-idiotype receptors for the triggering receptor. The theory suggests that the
aggregation of these low-level behaviours results in a network of receptors that may interact
with antigen and each other providing both an antigen-recognition system and the self-
regulation of immune response.
The two direct receptor relationships include: Receptor-Antigen: the traditional relation-
ship where receptors for the antigen (target) are created with minor variations toward
improving recognition, and Receptor-Receptor : the the idiotypic relationship where recep-
tors for the triggering receptor (target) are created (anti-receptor receptors) with minor
variations toward improving recognition. Both of these cases provide examples of direct
relationships, that of a receptor and an antigen or a receptor and another receptor. In the
first case, receptors have an implicit relationship with other receptors that also match for
the same antigen in that they compete with each other for selection by the antigen. The
second case is a lot more interesting, given the recurrent relationships that may result.
These relationships are considered in the context of how a given receptor came to be,
assuming a single matching source is responsible for receptor maturation. For example,
a receptor may match to another receptor that has been matured for an antigen. There-
fore, there is a direct relationship between the first receptor and the second, as well as a
proportional relationship between the first receptor and the second receptors antigen (for
example of both relationships see Figure 4.21).
Matches for
antigen
Receptor Matches for Also matches
Receptor receptor for antigen
Matches for
receptor Receptor
Figure 4.21: Examples of more complex relationships that may be formed given receptor-
receptor recognition.
Matching Function
The clonal selection algorithm results in a repertoire that directly (relationship-wise) mod-
els features of the input space. When receptors themselves are treated as input signals a
variety of representations may be used in the matching. The network theory proposes that
receptors match onto a part of the receptor that is distinct for receptors of that lineage,
although different from the receptors combining region (part of the other receptor that
does the binding). A natural implementation scheme is to assign a random or remapping
of the primary bit string to each naı̈ve receptor that, like the primary string, is inherited
130
and maturated by progeny cells. This results in the co-evolution (co-adaptation) of the
primary string for activation and the secondary string for secondary effects (for example,
see Figure 4.22).
Matching
Antigens and
other receptors
Primary String
Secondary String
Other receptors
Being Matched
A natural representation (using the same string for both) will likely result in a positive
feedback system, where the exposed antigen will be amplified by repeated simulated ex-
posures. Any regularity of the antigenic pattern that is provided on the secondary strings
(such as sub-strings or reordering) will likely have this amplification effect, proportional
to the fidelity of the mapping of the regularity. This amplification of input signal may be
useful to reinforce the acquisition of knowledge. A natural representation will continue
to promote the same instigating signal for as long as activated members are promoted to
antigen-like status.
Higher-Order Structures
131
t-1
Antigen
Receptors
Repertoire
ancestor). In a remapping scheme (such as random), it is possible for the remapped string
to match for a receptor that is also matched for by an antigen (see Figure 4.24).
R1a R1a
R1 R2 R1
A1 A2 A1 A2
Figure 4.24: Depiction of the example difference between a natural and remapping scheme.
The remapping example provides an example of a relationship that may form between
two different antigen (A1 and A2), facilitated by the remapping of receptors using the
two-string scheme. If A2 is withdrawn, the relationship is fostered by A1, which activates
R1, which in turn activates R1a. If A2 is withdrawn for all time, then the relationship will
deteriorate due to genetic drift5 , thus A2 provides a correcting influence to the relationship.
If A1 is withdrawn then the other half of the relationship is reinforced (R1a), and again if
A1 is not returned, then R1a may drift such that R1 does not match to it any longer. The
example relationship is unidirectional, in that the primary string of R1a is a generalisation
of A2 and R1’s secondary string. A natural extension is to consider the implications of
5
The relationship is fostered by activation (usefulness), although here genetic drift refers to the adap-
tation of receptors (their progeny) in response to activation.
132
R1a’s secondary string. If R1a matches for R1 then both R1 and R1a provides surrogates
for A1 and A2 reinforcing each other and the repertoires relationship between A1 and A2.
It requires that R1’s primary string is a generalisation of A1 and R1’s secondary string.
This network may be depicted as follows (R1a is renamed R2).
A1 R1(ps) R2(ps) A2
R1(ss) R2(ss)
Figure 4.25: Depiction of the relationship between remapped antigen and receptors (ps is
primary and ss is secondary string).
The aim of this empirical study is to investigate some of the primiting behaviours of the
cellular clonal selection strategy with intra-repertoire (network) interactions, specifically
the recurrent network model. Toward this end, the study had the following motivating
goals:
1. Investigate the effects on the composition and capability of the repertoire under
recurrent cellular exposures.
Method
Problems This study used the ACSP-10 problem used for the CCSA empirical study
in Section 4.4.1.
133
Algorithms Algorithm 4.8 defines the recurrent variation of the Network Cellular Clonal
Selection Algorithm. Like ECCSA, two exposures occur each epoch, although unlike
ECCSA both exposures occur to the same repertoire of cells. The second exposure involves
the exposure of the Best Matching Cell (BMC) from the last antigen exposure (BM Ct−1 )
to the repertoire. A cellular exposure involves the assessment of the repertoire against the
representation in the cell, specifically using the Euclidean affinity function between the
representation as is used between an antigen and a cell (defined in Equation 4.2).
Table 4.14: Summary of the various replacement configurations for the mapped Recurrent
Exposure Network Cellular Clonal Selection Algorithm (RE-NCCSA).
134
Experiment This study used the same general experimental configuration including
stop conditions as were used for the CCSA empirical study in Section 4.4.1. Two addi-
tional diversity measures were introduced to assess the composition of the repertoire with
regard to secondary mappings. The Average Cell Mapped Diversity (ACMD) assesses
the average Hamming distance of a given cell to all the other cells in the repertoire with
regard to the secondary representation. The Average Network Cell Diversity (ANCD)
provided a similar diversity measure although treats both representations of a given cell
as one providing an indication of the composition of the repertoire independent of repre-
sentations. Both diversity measures use the same mechanism as ACD in Equation 4.7 on
their representations respectively. Finally, a measure was introduced to assess the state
of the mappings between the repertoire and recurrent cellular exposures called the Aver-
age Mapped Best Matching Cell Error (AMBMCE), that averaged the Euclidean distance
between recurrent cells secondary representation and the BMC in the repertoire for each
epoch using the same mechanism as ACE in Equation 4.4.
Results
Table 4.15 provide a summary of results for each algorithm-problem combination including
the mean (x̄) and standard deviation (σ) of collected measure values. The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms. Figures 4.26a,
4.26b, 4.26c show the ACE, ACD, and AMBMCE respectively. Figure 4.27 provide ex-
ample plots of the response mapping and final repertoire. Results from all example plots
are taken from the end of the run with algorithm and problem configurations matching
those used during experimentation, and a random number generator seed of 1 and 5 for
the algorithm and problem respectively.
a
False for RNCCSA-PP and RNCCSA-SS, RNCCSA-PP and RNCCSA-SP, RNCCSA-SS and
RNCCSA-SP
b
False for RNCCSA-PP and RNCCSA-PS, RNCCSA-PP and RNCCSA-SS, RNCCSA-PP and
RNCCSA-SP, RNCCSA-SS and RNCCSA-SP
c
False for RNCCSA-PP and RNCCSA-PS, RNCCSA-PS and RNCCSA-SP, RNCCSA-SS and
RNCCSA-SP
Table 4.15: Summary of results for Recurrent Network Cellular Clonal Selection Algorithm
(R-NCCAS) on ACSP-10
135
(a) Average Cell Error on ACSP-10. (b) Average Cell Diversity on ACSP-10.
Figure 4.26: Box-and-whisker plot’s from the Recurrent NCCSA Empirical Study.
(a) Response Mapping plot for R-NCCSA-PS, (b) Repertoire plot for R-NCCSA-PS, shows pri-
shows A, BM Ct1 a, BM Ct−1 , BM Ct1 b from left mary and secondary representations and antigen
to right, for an epoch. from left to right.
Figure 4.27: Example plots from of the response mappings and final repertoire from R-
NCCSA-PS on ACSP-10.
136
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study.
Promotion Trends This section considers the results of the recurrent network algo-
rithm in the context of the trends for the different promotion schemes. The natural
mapping achieved the best results with regard to ACE as expected, showing a AMBMCE
of zero suggesting that cells mapped onto themselves or clonal siblings with no error on
average by the end of the run, providing an ideal (in the mapping sense) case for compar-
ison. The various promotion schemes for the mapped recurrent algorithm showed little
comparative difference between the three diversity scores: ACD, ACMD, and ANCD. The
ACD scores showed a slight decrease with the remapping approaches compared to the nat-
ural mapping. The similarity between ACD and ACMD scores suggests that organisation
of the information in the primary and secondary representations (pseudo-repertoires) was
generally equivalent across the promotion schemes. The telling results were provided in
the error measures. The two promotion schemes that promoted the primary representation
achieved a much lower ACE as expected than those that promoted the secondary represen-
tation against the antigen. Interestingly the configuration that promoted the secondary
representation against the cellular exposure (PS) performed better than the promotion
of the primary string on both exposures (PP). The error results for the recurrent cellu-
lar exposures were poor compared to error scores for viable ACSP (< 0.1), where the
promotion of the secondary string against antigen exposures resulted in relatively lower
AMBMCE than the promotion of the primary string. A general observation of the state
of the repertoire and exposure mappings during the execution of general runs reviled that
consistent intra-repertoire mappings were unstable across the various promotion schemes
(for example see Figure 4.27). This is reflected in the poor mapping error scores achieved.
Curtailing Instability The complexity of the approach makes analysis difficult al-
though the observed behaviour may be explained by the instability of the general approach.
This instability is likely the result of the competition between similar representations for
antigen and for cells. For example in the case of PP, the promotion of primary strings
in the cellular exposure may be considered the promotion of random secondary strings,
with no explicit pressure of adding meaning to the secondary strings of antigen-selected
BMC’s. This is addressed in PS by the cyclic promotion of secondary strings which are
expected to provide pattern-matching loops which counter some of the instability effective
ACE. The results for secondary string promotion during antigen exposures suggest that
the promotion of BMC’s for antigen in the repertoire via proxy (t+1 cellular exposure),
in particular R-NCCSA-SP, is insufficient for the repertoire to address the ACSP. This
suggests that the de-coupled promotion of antigen-BMC within the repertoire may result
in conflicting competition between primary and secondary representations.
137
Conclusions
This section summarises the findings of the empirical study into the Recurrent Network
Cellular Clonal Selection Algorithm in terms of the primitives that were the focus of the
study and the expectations that motivated the study.
1. Primitives
(a) The Recurrent NCCSA provides a viable approach for investigating the subtle
effects of intra-repertoire remapping of exposure signals and the subtleties of
competition in such a mapping.
2. Behaviours
(a) The recurrent exposure of cells via a natural mapping provides a reinforcement
of antigenic signals
(b) The recurrent exposure of remapped cells requires careful consideration of the
competition between representations to avoid conflicts in such competition.
1. Assess the composition and capability of the repertoire under a dual-exposure model.
Method
Problems This study used the ACSP-10 problem used for the CCSA empirical study
in Section 4.4.1.
Algorithms Dual exposure refers to the way in which the repertoire interacts with
the antigen, specifically two at a time (requiring the ACSP to be comprised of an even
number of CSP). Dual exposure may be considered a variation on the linear Cellular
Exposure Regime considered in Algorithm 4.2 where the first antigen in the pair is always
exposed to the repertoires primary string representation, and the second antigen to the
secondary string representation (see Algorithm 4.9). Such exposure governs the selection
of the BMC returned as a response from the repertoire to satisfy the requirement of the
exposure represented.
138
Algorithm 4.9: Dual Exposure Network Cellular Clonal Selection.
Input: A1 , A2 , T, Nselection , Nclones , Pmutation
Output: Trs
1 Trs ← Exposure(A1 , T, Nselection , Nclones , Pmutation );
2 Trs ← Exposure(A2 , T, Nselection , Nclones , Pmutation );
3 return Trs ;
Table 4.16: Summary of the various replacement configurations for the Dual Exposure
Network Cellular Clonal Selection Algorithm (DE-NCCSA).
Experiment This study used the same general experimental configuration including
stop conditions as were used for the R-NCCSA empirical study in Section 4.7.2.
Results
Table 4.17 provide a summary of results for each algorithm-problem combination including
the mean (x̄) and standard deviation (σ) of collected measure values. The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms. Figure 4.28
shows the Average Cell Error (ACE) for the four different dual exposure configurations.
Figure 4.29 provides example plots of the four schemes at the end of a run on ACSP-2.
The algorithms and problem use a random number generator seed of 1 and 4 respectively.
The configuration of each algorithm was reduced to Ncells = 20 to ensure a proportional
distribution of cells in the repertoire. The smaller ACSP-2 was chosen to clearly high-
light the formation and/or lack of formation of bi-antigen structures in the primary and
secondary representations.
139
System ACD ACE ACMD ANCD
NCCSA x̄ σ x̄ σ x̄ σ x̄ σ
PPSS 89.213 0.647 0.02 0.02 89.069 1.001 178.282 1.267
PSSP 89.231 0.678 0.018 0.016 89.382 0.766 178.613 1.09
SPPS 89.289 0.705 0.211 0.05 89.551 0.751 178.839 1.233
SSPP 89.301 0.876 0.214 0.041 89.581 0.835 178.882 1.382
Sign. False True Falsea False
a
True for DE-NCCSA-PPSS and DE-NCCSA-SSPP
Table 4.17: Summary of results for the Dual Exposure Network Cellular Clonal Selection
Algorithm (DE-NCCSA) on ACSP-10.
Figure 4.28: Box-and-whisker plot of the Average Cell Error for the DE-NCCSA schemes
on ACSP-10.
140
(a) DE-NCCSA-PPSS. (b) DE-NCCSA-PSSP.
Figure 4.29: Example repertoire plots of the four Dual Exposure NCCSA configurations
on ACSP-2 showing primary and secondary representations and antigen left to right.
141
Analysis
This section provides an analysis of the results reported in the previous section in the
context of the goals of the empirical study.
Promotion Trends This section considers the promotion trends for the four different
configuration schemes of the dual exposure algorithm, The results show little difference
with regard to the collected diversity measures. Specifically there was no significant differ-
ence in the ACD and ANCD, and generally no difference in ACMD. As with the empirical
study into recurrent network the effect of the promotion schemes was on the repertoire ca-
pability. For both schemes where the exposed antigen is promoted via assessment (PPSS
and PSSP), the ACE demonstrated viable results against the ACSP-10. This suggests
that regardless of whether the cells are competing with repertoire members for the same
primary or secondary antigen, replacement tournaments must be decided based on the
representation used to satisfy the antigen. Interestingly, this effect can be enhanced by
competing with repertoire members with similar representations that are not the rep-
resentation used for selection and assessment. Specifically, PSSP resulted in a slightly
(although significantly lower) ACE than PPSS. The example repertoire plots provided in
Figure 4.29 highlight the behaviour of this class of NCCSA. specifically, the plots suggest
that the promotion via assessment against selecting antigen results in the specialisation
toward the respective antigen, although decoupled structures. In both cases where re-
placement competition occurred against the complementary antigen (SPPS and SSPP),
the plots strongly suggest that such structured were formed in the repertoire (top of each
plot for SPPS and SSPP). The ACE results recorded suggest that such structures were of
a much lower capability than the promotion of selecting antigen, which can be explained
by the reversal of the specialisation of the representations observed clearly in the example
plots (primary string to second antigen and secondary string to first antigen as opposed
to the reverse case expected by the exposures). Interesting this was not reflected in the
ANCD. This suggests that the cross-promotion can form such structures, although the
selective pressure of the antigen alone was insufficient to promote improved speciality for
exposed antigen.
Conclusions
This section summarises the findings of the empirical study into the Dual Exposure Net-
work Cellular Clonal Selection Algorithm in terms of the primitives that were the focus of
the study and the expectations that motivated the study.
1. Primitives
(a) The dual exposure model provides a viable complementary approach to recur-
rent for investigating promotion pressures in NCCAS.
2. Behaviours
142
(a) Antigen-dependant cross-exposure structures can be formed within the reper-
toire by biasing the integration of clones toward the complementary parts of
the structure.
(b) Such structures cannot be formed by only biasing the similarity pairing alone,
requiring a biasing in the assessment used for competitive tournaments in sim-
ilarity pairs.
Primitives
Extensions
143
1. Spatial : Constraining the integration of clones to the neighbourhood of the antigen
selected cells provides a localising spatial pressure for areas of a spatial repertoire to
take responsibility for specific antigenic signals.
2. Mediated : The use of cell casts to mediate responses to antigen relies heavily on
an antigenic mapping between the casts and an oligoclonal (small founding set)
relationship between the feature detector and concept formation tiers.
4.8.3 Integration
The Cellular Clonal Selection Paradigm defined and investigated in this chapter provides
a bedrock in understanding of clonal selection as an adaptive strategy in the context of
an antigenic exposure paradigm specialised in the colour space domain. The features and
follow-on information processing characteristics set the investigated approaches apart, the
relative merits of which are considered in the context of application problem domains in
Section 8.3 and Section 8.4. The chapters that follow build upon this bedrock providing
a Tissue (Chapter 5) and Host (Chapter 6) constrained perspective on clonal selection as
an adaptive knowledge acquisition strategy, that collectively with the Cellular perspective
provide an integrated hierarchical framework for clonal selection algorithms (Chapter 7).
144
Chapter 5
145
behaviour is controlled at the finest level: through localised molecules and receptors on
the cells themselves. The migration of cells involved in the immune system is highly com-
plex and is still not completely understood. This section reviews some superficial features
of lymphocyte migration in the immune system with the interest of extracting principles
for use in clonal selection-based Artificial Immune Systems. Lymphocyte migration is
reviewed in the context of the human and related mammalian immune systems, providing
perspectives of cell movements from the lymphatic system, movement types, cell types,
and cell classes.
Primary lymphoid organs consist of the thymus and the bone marrow, and are respon-
sible for differentiating stem cells into pre-immune cells (pre-B-cells and pre-T-cells) in
a process that is believed to be independent of antigenic stimulation. The bone marrow
provides a micro-environment for the production of blood cells. B-cells migrate to sec-
ondary lymphoid organs, whereas T-cells migrate to the thymus. The thymus provides an
environment for the further antigen-free maturation of T-lymphocytes. Cells proliferate
and differentiate in a process involving negative and positive selection where the majority
of produced T-cells never leave the thymus. Those cells that do survive (less than 5%
per day) may join the recirculating lymphocyte pool, or migrate to secondary lymphoid
tissues. There are two types of of primary lymphoid tissues, as follows:
• Bone Marrow : Tissue located inside large bones responsible for the production
of many different blood cell types not limited to lymphocytes (white blood cells).
Provides an environment for differentiation of naı̈ve B-cells.
146
• Thymus: An organ located behind the sternum, providing an environment for the
differentiation of naı̈ve lymphocytes from bone marrow. These lymphocytes differ-
entiate into T-lymphocytes, which involves a negative selection maturation process.
The secondary lymphoid tissue is responsible for collecting antigens at points in the or-
ganism where they may enter, and facilitate their exposure to recirculating lymphocytes.
For example, the lymph nodes are primarily responsible for filtering the lymph for anti-
gens, the spleen is responsible for filtering the blood for antigens, and the tonsils for the
respiratory system. Goodnow puts this concisely suggesting that the “. . . central function
of secondary lymphoid tissues is filtering: collecting blood-borne, lymph-borne, or mucus
membrane antigens and holding these so that they can be surveyed by immune cells before
being destroyed ” [181] (page 6). The secondary lymphoid organs are as follows:
• Tonsils: A collection of lymphoid tissue on the side of the throat responsible for pro-
viding lymphocyte access to and protection of the respiratory system from antigen.
• Lymph Nodes: Small gland like structures found throughout the body that filter the
lymph for foreign antigen material, which are then presented to lymphocytes and
other immune system cells.
• Spleen: An organ in the upper abdomen, responsible for the destruction of old red
blood cells. It is the only lymphoid organ that crosses the blood stream, and thus
provides a site where lymphocytes can interact with antigens carried in the blood.
• Lymphatic vessels: Vessels throughout the body that carry lymph. They are respon-
sible for transporting lymph from tissues to the blood (vascular circulatory system)
and to the lymph organs.
147
that are worse die due to the lack of positive selection. GC-like structures may also occur
outside of lymph nodes, such as sites of infection and allergic inflammation [182].
The geography of the lymph nodes and other secondary lymphoid tissues plays an
important structural role for lymphocyte selection and response, for example Zinkernagel,
et al. suggests that the “. . . secondary lymphoid organs present antigen optimally and
enhance the chances of specific antigen encounter and specific cell interactions.” and that
“. . . these requirements render chance encounters of antigen by lymphocytes and activation
elsewhere extremely inefficient and of no biological relevance.” [446] (page 201). It is
likely that the organisation and function of the secondary lymphoid organs has been
optimised for recirculating lymphocytes to efficiently detect and remove pathogens from
the organism, for example Fu and Chaplin suggest that “. . . secondary lymphoid organs
are thought to be organised into structures that optimize cellular interactions that support
the efficient removal of unwanted pathogens” [156] (page 400). Finally, in addition to
providing a scaffold for lymphocyte recirculation, the secondary lymphoid tissues possess
a high regenerative capacity. When circulation routes are disrupted or severed, the tissue
is able to adaptively regenerate a connection between the effected nodes [309].
Summary
For more information regarding the anatomy and physiology of the human lymphoid
system see any current anatomy and physiology text on the subject, such as [280]. Other
references used include lymphoid organ summaries by de Castro and Timmis [109] (page
71), Anderson [19], and Swartz [377]. See Andrian and Mempel for a review of lymph
node anatomy and physiology in the context of cell migration [411].
148
culation of lymphocytes was confirmed experimentally almost 50 years ago by Gowans
and colleagues [183, 184], although the study of the topic is often neglected in favour of
cell interactions [442, 322]. Interestingly much of the modelling work with populations of
lymphocytes does not take into account the spatial heterogeneity of the lymphatic system.
The adhesion properties of cells plays a critical controlling role in the movement of
lymphocytes (see Anderson for a treatment [19]). Adhesion is used by cells to crawl
through tissues, and is used by activated cells to stick to the molecule that activated them.
Adhesive receptors (so-called ‘homing receptors’) and chemicals are little understood and
are a topic for intense study. The adhesive characteristics of a cell are believed to be
selected for and differentiated along with cell antigenic receptor characteristics. These
adhesive interactions provide bottom up control at the finest level [324], believed to be
the basis for homing, recruitment and may ultimately control the extent and scope of the
immune response [416]. A procedure or series of adhesive-based decisions have to be made
for a lymphocyte to be recruited into tissues, in particular from recirculation in the blood
into lymphoid tissues. This process is called the multi-step extravasation or molecular
regulation procedure, which has the following four steps: (1) primary cell adhesion, (2)
rapid cell activation, (3) activation dependant arrest, and (4) diapedesis (the movement
into surrounding tissue).
Movement Types
Physically, there are two ways lymphocyte cells can move: crawling on tissues and flowing
between tissues. In crawling, cells use chemical receptors to adhere to their surroundings
and use this method to slowly migrate through tissues, a place where they spend most
of their time given the slow pace of movement. The second mode is movement in fluid
space such as in blood or lymph where cells are capable of moving a lot faster, covering
great distances within the organism. The process of lymphocyte migration was originally
considered to be random, although it is now known that this is not necessarily the case.
Lymphocytes may be preferentially recirculated, and are able to home in and target specific
tissues. In addition, memory lymphocytes show different migration behaviour to naı̈ve
lymphocytes. For example, memory T-cells preferentially migrate to non-lymphoid tissues.
If a memory cell was created in a lymph node near the skin, the cell will preferentially
migrate into skin tissue near the lymph node, if created in a lymph node near the gut,
it will migrate to neighbouring gut tissue. Naı̈ve T-lymphocyte cells are activated by
dendritic cells and educated as to the chemical properties of the site of infection. These
prepared T-cells recirculate around the host organism in search of their cognate antigen,
and upon detecting the chemical properties of the site of infection, home into the tissue.
The directed trafficking behaviour is called T-lymphocyte homing [67, 66, 324, 416], and
the information which controls the where T-cell traffic is expressed as receptors on the
surface of the cell for the chemical properties of the site of infection [139, 343].
The immune system maintains a pool of recirculating lymphocytes that cycle around
the blood and the lymphatic system. The pace of recirculation is high, the number of
lymphocytes entering the blood from the lymph each day is 10 times the size of the
149
recirculating lymphocyte pool [19]. The number of lymphocytes recirculating at one time
may be anywhere from 1%-2% of all lymphocytes in the body in young adult animals
[442, 371]. Lymphocytes may only stay in circulation in the blood for about 30 minutes.
Trepel provided a seminal, although outdated extrapolation of the number and distribution
of lymphocytes in man [398]. Such numbers may be useful for a general guide, as follows:
2.2% in the circulating blood, 41.3% in the lymph node and tonsils, 15.2% in the spleen,
4.3% in the gut-associated lymphoid tissues, 10.9% in the thymus, 10.9% in the bone
marrow, and about 15% in other tissues. One may summarise the primary types of
lymphocyte migration, as follows:
• Recirculation: The movement of lymphocyte cells around the body from lymphoid
tissue, to the blood, to the lymph, and back to lymphoid tissue to repeat the pro-
cess (circulation or rolling lymphocytes). Naı̈ve and memory cells are the main
recirculating lymphocyte types.
• Stationary: These are cells that selectively arrest their movement, or do not move
from the location of their differentiation. For example in the recruitment of cells,
the differentiation of cells such as plasma B-cells created in germinal centres that
release large amounts of antibody, and sentinel effector cells.
Lymphocyte Types
There are both circulating and non-recirculating populations of B- and T-cells. Although
the behaviours of both cell types are tightly interrelated, both have differing migration
behaviours during their development and life cycle. The general migratory life cycle of
T-lymphocytes is as follows: pre-T-cells migrate from bone marrow to the thymus for
maturation, surviving T-cells may migrate to tissues and becomes sentinel cells. Other
cells may recirculate and seek activation in secondary lymphoid tissue. Memory T-cells
preferentially migrate to non-lymphoid tissues. For B-lymphocytes: pre-B cells migrate
from the bone marrow to secondary lymphoid tissues. Some cells will be activated by
150
antigen in the secondary tissue and differentiate into plasma and memory cells. Other
cells will be activated and migrate to the spleen before differentiating.
There is commonality in the development of both B- and T-cells, specifically in terms
of the generalised classes of lymphocyte they may differentiate into. These include the
classes: naı̈ve, effector, and memory. Naı̈ve cells are untested lymphocytes that seek a
potential cognate antigen. Effector and memory cells result from the union of naı̈ve cells
and antigen. Effector cells, such as Helper T-cells and plasma B-cells remain in lymphoid
tissue. Memory cells make up the majority of the recirculating pool and continue to
circulate between the bloodstream and the lymphatic system, at a higher rate than naı̈ve
cells. One may define the migratory behaviours of the generalised lymphocyte classes or
casts, as follows:
• Naı̈ve Lymphocytes: Recirculate between blood and lymphoid tissue, primarily in-
volved in responding to antigen presented in lymph nodes, differentiating into ef-
fector and memory cells. Relatively homogeneous in their recirculating behaviour.
Naı̈ve cells compete with each other for activation and contribution into the memory
recirculating pool.
• Memory Lymphocytes: Recirculate around blood and lymphoid tissue, but also ex-
travasate to other non-lymphoid tissues. They are heterogeneous in their recircu-
lation behaviour, with restricted and selective recirculation circuits. They home to
areas where they are most likely to encounter, or re-encounter their cognate antigen.
The number of memory cells is maintained within a moderate range during adult
life.
The anatomy and physiology of the immune system may be thought of a defence strategy
for the organism, and cell mobility is an integral part of that strategy. Picker and Butcher
propose such an evolved strategy where the solution to a complex antigenic environment
is “. . . to compartmentalize the principle functions of the lymphoid system into discrete
organs and tissues in the body, and to connect and unify these organs through the operation
of an elegant system of targeted lymphocyte trafficking and recirculation.” [324] (page 562).
Some resources of the immune system are fixed in position and distributed throughout
the body such as lymphoid tissues, and so called sentinel T-cells. Draining lymph into
lymphoid tissue provides a way to localise antigen. Keeping the majority of the immune
responses in movement (the detectors and effectors) provides a patrolling approach to
rapidly deploy resources to wherever they are needed. The immune system has to produce
many cells to detect unknown antigen, and must collect antigen in such a way that rare
detector cells are given a chance to detect them. It must provide a micro-environment
for controlled proliferation and differentiation, and disperse effectors to where they are
151
needed. Further, Rosen, et al. consider a recirculating population as an efficient approach
in the context of alternative designs where “Recirculation contributes to the efficiency of
peripheral immune responses by maximising stochastic probabilities of a productive meeting
between antigen and its cognate T-cell receptor ” [339] (page 161). This tissue-recirculation
adaptive strategy may be considered to have the following general properties:
• Movement: Different cells and cell types have differentiated migration potentials (so-
called ‘differential migration’). The lymphatic system provides a pathway, which al-
lows lymphocytes to recirculate between blood, peripheral tissues, and lymph nodes.
• Balance: The so-called stirring or mixing effect of the recirculating lymphocyte pool
facilitates the survival of the fittest, that is the survival of the most appropriate
clones in the repertoire. The segregation in the repertoire prevents competition
between unrelated lymphocyte subsets. Tissues selectively facilitate the segregation
of lymphocytes to where they are needed. Such a balance between recirculation and
homing may be critical to lymphocyte homoeostasis [66].
152
would either have to be as large as the entire recirculating pool, or a smaller pool
resulting in less antigenic coverage.
The rate and nature of lymphocyte migration does not remain constant, and in fact, it
may be desirable in certain circumstance to manipulate the recirculation behaviour of
lymphocytes. Alternatively, the recirculating behaviour of lymphocytes that provides a
dynamic defence may also facilitate significant problems for the host organism. During
an immune response, the lymph nodes may rapidly recruit cells from blood, temporally
blocking them from leaving the tissue. This in addition to clonal expansion causes the
nodes to swell in size and become sore. This swelling of the glands is a common sign of ill-
ness. It highlights the point that when an antigenic stimulus is detected, it has a profound
effect on the entire system, affecting production and circulation behaviour of lympho-
cytes. There are some diseases that disrupt and decrease the migration and homoeostasis
of lymphocytes [20], thus it may be desirable for the system to temporally increase the
rate of cell migration. Some approaches may include increasing blood flow, increasing the
expression of adhesive chemicals, and manipulating the tissues where immune responses
take place. Alternatively, there are diseases where it is desirable to decrease the recircu-
lation of lymphocytes. Examples include when tissues are transplanted and autoimmune
diseases. In both cases the immune cells seek to destroy healthy tissue, thus strategies
focus on affecting the recruitment of cells to these areas.
The lymphatic system may facilitate the spread of disease in the body. For example,
cancers and tumour cells are able to spread quickly throughout the lymph nodes of a
host. Bacteria can use the lymphatic system to disseminate throughout the body. An
example mentioned by Andrian and Mempel is the bacterium Yersinia pestis one of the
most devastating bacterial pathogen in human history (the cause of the bubonic plague)
[411]. It manages to get in to tissue through flea bites and moves to the lymphatic system
where it proliferates, quickly overwhelming lymph nodes and spreading throughout the
body. Additionally widely cited examples include the human immunodeficiency virus
(HIV) that can lead to the condition of acquired immunodeficiency syndrome (AIDS),
Mycobacterium that causes diseases including tuberculosis and leprosy, and the bacterium
Bacillus anthracis that causes the disease Anthrax.
153
5.3.1 Model Components
Architecture Components
Discretising the repertoire refers to transitioning from an abstracted clonal selection sin-
gle and self-contained repertoire, to multiple of such repertoires. The direct approach
proposed in this work is to focus on the lymphoid tissue as the nodes in a distributed
repertoire and the vascular system (the veins and such that transport the lymphocytes
between the lymphatic tissues) as the edges of the network. This graph-based network for-
malism provides an architecture that separates the transport of lymphocytes on the edges
of a network structure from the cellular-based information processing (antigen-lymphocyte
reactions) that occur in the nodes of that network. Refer to Figure 5.1 for a conceptual-
isation of this relationship. A ‘tissue’ is a generic node in the network topology model,
and may be specialised to various types of tissue with differentiated functional roles. A
tissue contains a repertoire of lymphocytes and facilitates antigen-lymphocyte interaction.
Therefore, a tissue node is a reformation of what might be considered the repertoire in the
Cellular Paradigm. Tissue nodes may be functionally specialised after the general tissues
classes in the lymphatic system, such as primarily, secondary, tertiary lymphoid, and the
germinal centre (Section 5.2.1).
Cellular Components
Lymphocyte cells are discrete information packets that collectively in a repertoire or reper-
toires are an internally generated model of the external domain. Antigen may also be
considered information packets and/or direct interaction with the domain, themselves be-
ing of external origin with regard to the lymphocyte model. The cellular components are
the interest of the Cellular Paradigm, although this section exploits the rise in the level
of abstraction provided by tissue to re-define cells from an amorphous information packet
into functional classes outlined in Section 5.2.2. The classes define different information
process behaviour, particularly with regard to the mobility of the cells within the network
topology architecture.
Movement Mechanisms
154
tion of localised acquired knowledge. Both of these points may be considered to influence
a trade-off between recirculation and localisation of lymphocytes that movement operators
must address. A node may have finite capacity for the number of cellular components.
Further movement may be quantified in terms of the number of cellular components over
time (a rate). This rate may be aggregate or fine-grained by component class. Seeking
points of stability or equilibria (homoeostasis) may involve direct and dynamic manip-
ulation of these movement rates1 . Homoeostasis is perturbed by movement operators
themselves and can be controlled through the management of aggregate movement rates.
Another influence is the dynamic creation of lymphocytes (potentially on a large scale)
in germinal centres and the recruitment behaviour at sites of infection and inflammation.
Such functional behaviours have a potential to overwhelm the homoeostasis capabilities
of the model.
The Antigenic Exposure Paradigm (Section 4.2.2) was presented as a series of three ex-
posure types which increase in complexity: (1) single exposure, (2) multiple exposure,
and (3) multiple pathogens. The primary different between the tissue model type and
a single repertoire model, is that the system has multiple points of exposure which may
be all or a subset of the repertoires of the a given tissue model. Figure 5.1 provides a
conceptualisation of a simple chain of discrete repertoires situated in an antigenic envi-
ronment with an asymmetric antigenic exposure pattern. A concern raised with regard
to reconciling the exposure model with multiple points of exposure is referred to as the
Tissue Exposure Regime (TER). A given systems exposure pattern defines the selection of
tissue repertoires of the model to expose with antigen in the event of an exposure event.
For example, a natural inclination may be to use a uniform repertoire exposure pattern
for a single exposure (see Figure 5.2a). In the case of multiple sequential exposures, a uni-
form exposure pattern may not be desirable. Antigen may be considered to arrive to the
system in different locations, thus the antigen-to-repertoire patterns may be irregular (see
Figure 5.2b). In the case of multiple antigens with multiple exposures, not only may the
exposure patterns be irregular, but also the timing of antigen-type exposures. Exposures
may occur concurrently to the system across different repertoires.
In order to provide symmetry in the problem domain with the raise in the level of ab-
straction in the system, a new abstraction of the antigenic exposure paradigm is required.
The exposure paradigm at the cellular level was concerned with an antigen of determi-
nants, thus a suitable metaphor for an exposure of a tissue is an Infection of Antigen.
An infection is defined as the invasion and multiplication of a pathogenic micro-organism
that may cause injury the the tissues. This definition provides a suitable metaphor for
the point-wise exposure of tissue for two reasons (1) invasion and replication suggests a
1
An alternative strategy for direct influence of homoeostasis is that of cellular component deletion
(cellular removal). Implemented models are expected to combine deletion and movement in an effort to
seek homoeostasis, such as stable repertoire sizes.
155
Figure 5.1: Multiple tissue model and the situated spatial properties that may affect
antigenic exposure.
(a) Example Symmetric Tissue Exposure. (b) Example Asymmetric Tissue Exposure.
Figure 5.2: Example of two different Tissue Exposure Regime with controlled selection of
discrete repertoires on exposure events.
single antigenic type (pattern) perhaps with variation, and (2) tissue injury promotes ur-
gency which may be interpreted as efficient and effective response, whether it is acquired
in the tissue or imported from surrounding tissues. Although the abstraction is pathogen-
centric given both the exogenous origin and selected metaphor, one may just as easily use
a endogenous-centric metaphor such as tumour occurrence and growth. In both cases the
abstraction properties of discrete (point-wise) information mediation hold.
Spatial-Temporal Exposures
The specifics of the Tissue Exposure Regime may or may not be in the control of tissue
model, which is dependant on the application domain and model configuration. One may
consider a possibility space of all exposure-to-repertoire interactions and consider ques-
tions of lymphocyte movement types in the context of desirable system behaviours under
different regimes. Irrespective of the exposure properties, the concern of the system is to
address what repertoires are exposed at what times. These concerns may be generalised to
that of spatial and temporal consistency of exposure patterns. Temporal consistency refers
to the systems anticipation of the amount of memory required. Spatial consistency refers
to systems anticipation and the positioning of lymphocytes across the repertoires. A lack
of consistency in either dimension removes the ability of a system to anticipate specifically,
requiring general (all-repertoire, all-time) anticipation. It is important to highlight that
the temporal memory applies system-wide without spatial memory (in the face of spatial
inconsistency), and spatial memory applies for all time without temporal memory (in the
156
face of temporal inconsistency). Therefore, the default case is remember everything every-
where for all time in the face of spatial and temporal inconsistency. This is an important
implication of the antigenic exposure paradigm as it defines the role of inter-repertoire cell
movement as the exploitation of patterns in the combination of spatial and temporal con-
sistency of system exposures such that the response memory may be generated and shifted
(adapted) in response to changes in the spatial or temporal properties of the exposure.
The Temporal Memory Effect refers to the systems capability to retain an impression
of an exposure event and recall that impression to provide an improved (compared to
random) response under similar circumstances in the future. The effect is intuitive for a
single repertoire model where it may be facilitated by memory cells or a change in cell
compositional densities. The exploitation of the cells becomes a probabilistic function of
the antigen encountering a memory in the repertoire. Figure 5.3 provides a depiction of
the temporal memory effect in a single repertoire, where cell attrition via repertoire ‘turn
over’ results in the fading of acquired information over time.
Time
Figure 5.3: Depiction of the temporal memory effect in a single repertoire model over
time, where the arrows at the top represent information flow into the system and the
arrow along the bottom represents time.
The multiple repertoire model further requires the dissemination of memory across
multiple repertoires. The memory represents a system-wide spatial anticipation of future
exposures to the same or similar antigen. The following summarise the properties of
temporal memory in the single repertoire model:
• Short Term: A response results in a large short-term memory in the form of ef-
fector cells (short lifespan), which are useful initially at the point of exposure, and
disseminated throughout the system.
• Long Term: A response results in a small long-term memory in the form of memory
cells (long lifespan), which also disseminate throughout the system.
• Memory Size: The larger the antigen dose, the larger the short-term and long-term
memories.
• Memory Stability: With the increases in the frequency of exposures (over the sys-
tems lifetime), the larger and more stable the long-term memory. The memory
size is expected to reach a point of stability where antigen-to-memory cell match is
practically assured.
157
This Spatial Self-Organisation Effect is an emergent property of point-wise exposure
of repertoires in the face of lymphocyte recirculation. The exposure and stimulation of
a repertoire results in a response to the pathogen. The exposure is spatial, therefore the
response is spatial. The following summarises the properties of spatial self-organisation in
the discrete repertoire model:
Figure 5.4: Depiction of the repertoire specialisation that results in the Spatial Self-
Organisation effect, where the arrows from above represent information flow into the
system and the arrows below represent dissipation of acquired information.
The result of the general behaviours of the tissues and the cells is a specific spatial
response strategy that attempts to get the best from the system at the point of exposure
in a bottom-up manner. The spatial organisation may extend through time, such that
in addition to the patrolling effectors and memory cells that disseminate throughout the
system, effectors may remain behind and provide a short-term memory and spatial antici-
pation of response. The following summarises the effects of spatial self-organisation in the
discrete repertoire model:
• Localisation: Specific response at the time and the location of the exposure. Natural
spatial-temporal response.
158
• Surveillance: Long-term and short-term memory in recirculation anticipating the
exposure system wide. The premise that the system may be exposed to the same
pathogen again the future.
Spatial anticipation is facilitated in the short-term by sentinel effectors and in the long-
term by memory cell homing patterns. In addition to the spatial self-organisation effect,
the system mixes (perhaps disorganisation) the acquired immunity across the repertoires
of the system. The principles of spatially mixing response effectors and memory provide a
system-wide uniform (or consistent) response to a previously encountered pathogen. This
ensures that immunity learned at one exposure point of the system, may be exploited
elsewhere (anywhere) in the system.
Figure 5.5: Depiction of the unbiased dissemination of information that results in the
Spatial Consistency of Response, where the arrow above represents information flow into
the system and the arrow below represents information availability throughout the system.
This effect called the Spatial Consistency of Response is achieved through the in-
formation dispersal properties of lymphocyte recirculation that ensure that a fraction
of the larger lymphocyte pool is in motion between the repertoires (immunosurveillance).
The effect promotes system-anticipation rather than the more specific spatial-anticipation,
and provides a distributed knowledge or memory that may rapidly self-organise to varied
repertoire exposure patterns. The consistency provided is not strictly uniform, rather it
is quasi-uniform, driven by the bottom-up stochastic decision properties that govern lym-
phocyte recirculation. From a lymphocyte perspective, movement in the face of unknown
exposure patterns provides the system-wide goal of antigen-selection maximisation. That
is, lymphocytes exist to be selected by antigen, thus the behaviours of movement between,
and residence within repertories seeks to maximise the change of this event occurring. As
already described, this is already facilitated by the homing behaviour of memory lympho-
cytes, and the patrolling recirculation behaviour of effectors and naı̈ve lymphocytes. Some
concerns of this behaviour are (1) the quantity of the immunity acquisition, and (2) the
rate of dispersal of the memory. The following summarises the concerns with achieving
consistency of response:
159
• Acquisition Quantity: The system response may be proportional to the exposure,
although the memory (both short-term and long-term) must be sufficient to provide
coverage to all repertoires of the system. This memory is additive, and is expected
to expand in proportion to additional exposures by the same pathogen.
The dispersal or mixing effect in the consistency of response facilitates the blind (re-
circulation) and specific (recruitment) sharing of acquired immunity between repertoires.
Sharing may refer to the exploitation of specific immunity at a exposure location different
from that at which it was acquired. Further, sharing may also refer to the cross-reactive
effects achieved through less specific acquired immunity. This effect includes the abil-
ity of the system to generalise from varied exposure types such that new variations and
combinations may also be exploited.
Figure 5.6: Depiction of information sharing and a cross-reactive response, where the
arrows above represent the flow of information into the system as well as an implicit
anticipation for the application of acquired information.
This section describes a lymphoid tissue model in which the tissue types (nodes) constrain
the cell-based information processing that may occur to the cells housed within. Tissues
are considered the units of adaptation that may receive and transmit information. Cells
160
System Repertoire
Exposure Anticipation Exposure Anticipation
Figure 5.7: Depiction of the trade-off between the general anticipation of exposure and
organised anticipation of exposure.
are the substrate for tissues knowledge representation, communication, and adaptation.
This section describes a number of tissue-tissue interactions.
Cell Formation Naı̈ve lymphocytes are created in primarily lymphoid tissue. A naı̈ve
lymphocyte is generated in a pseudo-random manner. It represents an untested guess of
a unit of information that may be useful to the system. A naı̈ve cell may be created in
one primarily lymphoid tissue and migrate to another for specialisation, similar to the
migration of pre-lymphocyte cells from the bone marrow to the thymus to become naı̈ve
T-cells. Those cells that remain in the bone marrow become B-cells. The primary tissue
nodes may condition the formed naı̈ve cells. For example, the cells may be subjected to a
negative and positive selection process such as that subjected to T-cells in the thymus. The
result of such a process is the assessment and ultimate judgement of the feasibility of the
proposed information guesses that the cells represent. In addition to the migration of naı̈ve
cells between primary lymphoid tissue for maturation, naı̈ve cells may uni-directionally
migrate from primary to secondary lymphoid tissue. This represents an upgrade in status
for the cell from unprepared to prepared naı̈ve cells, ready for information processing in
the secondary tissue. As an interaction between primary and secondary lymphoid tissue
it represents a transmission of feasible quasi-random information that may be useful to
the system.
Primary
Tissue
Secondary
Tissue
Figure 5.8: Depiction of the relationship between primary and secondary lymphoid tissues,
where the arrows show the sharing of information between primary tissues and the outward
push of information from primary to secondary tissues..
Cell Maturation Secondary tissues houses many naı̈ve lymphocytes as well as some
memory cells and effectors if available. The tissue accepts a steady stream of naı̈ve lym-
phocytes from primary tissue and integrates them into the cell population. Secondary
161
tissue is responsible for exposing resident cells to antigen and facilitating any immune
response that occurs as a result. Exposure is selection of cognate receptors for a given
antigen, and response is the clonal selection process or similar as outlined in previous
models. The result of the response are memory cells which have demonstrated their use-
fulness, and effector cells for addressing the immediate concerns of the antigen. Effector
cells may or may not be given an impression of the tissue origin of the antigen (site of
infection), as considered in the case of T-cell homing. Memory cells and non-homing ef-
fector cells recirculate between secondary tissues (lymph nodes for example), using the
vascular system as the transport mechanism. The recirculation of memory and effector
cells between secondary lymphoid tissue represents a transmission of acquired information
regarding the environment. Portions of acquired information (individual cells) are shared
between secondary tissues such that the information may be available for application or
further maturation. Acquired information in the form of effector cells is transmitted from
the location of maturation in the secondary tissue, to the location of application in the
tertiary tissue.
Secondary
Tissue
Tertiary
Tissue
Figure 5.9: Depiction of the relationship between secondary tissues and secondary and
tertiary tissues, where the arrows show the sharing of information between secondary
tissues and the outward push of information from secondary to tertiary tissues.
Cell Application Tertiary tissues accept and house many effector cells. The tissues
accept a steady stream of effectors from locally connected secondary tissues, which are
integrated into the population. Tertiary tissues are responsible for being receptive to
pathogenic infection, thus may be considered receptive fields for information from the
environment. The effector cells are employed at the sites of infection as needed, addressing
the major function of their life cycle: application. Samples of the antigen may be taken
from the site of infection in the tertiary tissue and transported into secondary tissue by
courier cells, taking in addition information as to where the antigen was collected (to
facilitate homing). Samples of antigen and some effector cells may be drained back into
locally connected secondary tissue. This draining effect is facilitated by the lymph fluid
that permeates tertiary tissues. The secondary tissue collections and filters the lymph for
antigen, which are presented to resident lymphocytes. Pathogen exposure to tertiary tissue
represent samples of the environment collected by the system. Different tertiary tissues
may collect samples in different ways (for example skin, food, respiratory). The couriering
162
and streaming of samples of pathogen back to secondary tissue provides a transmission of
sensory information from the environment to areas of the system that can be adapted to
address it.
Tertiary
Tissue
Secondary
Tissue
Figure 5.10: Depiction of the relationship between tertiary and secondary tissues and
tertiary tissues and the environment, where the arrows depict the flow of information
from the environment to the tertiary tissues and ultimately to the secondary tissues.
Integration
The aggregation of all three tissue types describes an integrated model with layered in-
formation processing. From the inside out, the information availability increases in mat-
uration (usefulness). The tertiary tissue contains no other cells than those known to be
immediately useful, the primary tissue contains no other cells than those whose usefulness
is unknown. The secondary tissues act as the mediator between these two extremes, pro-
viding the testing and maturation processes for information acquisition. The outward flow
of prior knowledge through the layers of the system, whereas information about the en-
vironment flows inward. Principle pathogen exposures occur in the tertiary tissue where
it may be addressed by resident effectors. If sufficiently large or novel, samples of the
pathogen find their way into secondary tissue (courier or stream) for presentation to the
learning mechanisms of the system. Therefore, lymphocytes migrate from the centre of the
system outward, increasing in proficiency as they approach the surface, whereas pathogen
are housed in the outer layer and seep into the second tier.
Antigens that penetrate the system and manage to take-up residence in the tertiary
tissue are drawn to the lymph nodes of the secondary tissue by fluid called lymph. Lymph
drains into the lymph nodes, which in turn filter the fluid collecting antigens, which
are presented to local and recirculating lymphocytes. From an information processing
perspective, a lymph node is provided an information stream from the regionally located
tertiary tissue. A proportionally large region of tertiary tissue feeds pathogen to a single
lymph node, in effect proving multiple feeding information channels. The information
is collected is specialised regions within the node. B-cells are exposed to the presented
information, and if sufficiently activated may migrate to another specialised region on
the node and form a germinal centre in which bouts of selection, proliferation, receptor
maturation and ultimately cell differentiation occur. The product of this learning process
are effector cells called plasma cells that produce antibodies for the triggering antigen
163
Pathogen
Primary
Secondary
Tertiary
Figure 5.11: Depiction of the layered tissue architecture and information flows between
the layers, the arrows show the flow of information from the environment into the system
as well as the outward push of new detectors from the centre of the system.
in large numbers, and mature long-lived memory cells. The antibodies enter the blood
stream and seek a serendipitous interaction with their cognate antigen. The memory cells
recirculate between the secondary tissue and sometimes move into the tertiary lymphoid
tissue, with the same mission. There is no homing effect for the B-cells. Their effectors
flood the system, and their memory cells patrol. Importantly, the effectors and the memory
cells are created and released in the vicinity of where the pathogen was encountered. Thus,
they are more likely to encounter their cognate antigen sooner rather than later.
Tertiary tissue
Pathogen
Lymph
Lymph Node
Another type of cell, called a dendritic cells, patrol tertiary tissue for pathogen. Once
detected, these cells collect the material and migrate into the secondary lymphoid tissue
(such as lymph nodes). In the secondary tissue, the dendritic cells present the pathogenic
material to T-cells that respond, proliferate, and differentiate. The product of this learning
process is mature T-cells in the form of effectors and likely long-lived memory cells. The
effector T-cells are imprinted by the dendritic cell as to the location in the tertiary tissue
of the pathogen exposure. The effectors recirculate the system and penetrate the tertiary
tissue when the specific chemical signature is detected. Information is streamed from the
tertiary tissue to the secondary tissue although the streaming is facilitated by courier
cells. These cells are aware of where they collected their material and thus are capable
of imprinting that information onto the produced effector cells. The result is an effect
164
that differentiates the lymphocyte movement behaviour from that of the B-cells (that
blindly seek their cognate antigen), to the T-cells (that home into the chemical signature
of infected tissue).
Tertiary Tissue
Lymph
Node
Homing
T-cell
Tissue Modes
The information properties of the system have been described with regard to the trans-
mission of the information substrate (immune cells) between the layers and within the
layers. Table 5.1 lists the abstracted immunological functional behaviour required to meet
the information processing needs outlined for the architecture.
Table 5.1: Summary of information processing needs, and proposed algorithms that meet
those needs.
The information processing constraints of each tissue type, outline a clear respon-
sibility for each tier of the architecture. Primary tissue is concerned with information
generation and the pre-processing of information before it is employed in a learning pro-
cess. Secondary tissue is responsible for learning, for identifying which internal information
is presently useful and attempting to improve it (maturation), whilst at the same time
applying it (effectors). The second tier is also responsible for the generation and main-
tenance of longer term memory, and the selective application of acquired memory. The
tertiary tissue is responsible for providing an interface to the environment, mediating the
application of acquired knowledge to sensory signals, with the filtering of temporally novel
signals to secondary tissues for response generation.
The majority of the clonal selection information processing occurs in the secondary
lymphoid tissue. The other two layers may be easily incorporated into the secondary
165
Tissue Type Responsibility
Primary Tissue Information generation (preparation)
Secondary Tissue Information maturation (learning and memory)
Tertiary Tissue Information application (sensory)
Table 5.2: Summary of the principle responsibility of each tier of the architecture.
tissue, providing only conceptual attributes of the tissue model. This compression of re-
sponsibility has been implicit in previously proposed clonal selection, negative selection,
and other cell-theory based algorithms. Given that the tissues may be compressed, it is im-
portant to consider the utility of separating the proposed responsibilities into a dependant
hierarchy of layers.
Environment
Figure 5.14: Depiction of the layered information processing properties of the lymphoid
tissue architecture.
This section proposes three different models that employ the proposed lymphoid tissue
architecture. Each model is inspired by a different aspect of the acquired immune system,
from a lymphatic system (tissue) perspective. The principles for separated responsibility
are (1) the centralised generation of naı̈ve cells facilitating centralised prior knowledge,
(2) consolidated secondary tissue for a networked learning architecture large enough to
meet the needs of the system, (3) a large host consisting predominantly of tertiary tissue,
which provides a distributed sensor platform for receiving and responding to environmental
signals.
Filter Model
The filter model is inspired by the specialisation of the lymphatic system at the primary
entry points for exogenous antigen (pathogen). Examples include the tonsils and related
tissues for addressing pathogen that enter the host via the respiratory system, the Peyer’s
patch tissues in the intestines that addressing pathogen that enter the host via the digestive
system, and the spleen that filters the blood for pathogen. The model contains a single
point of entry for pathogen (tertiary tissue), which is monitored by one or a small collection
of secondary lymphoid tissues. The secondary tissue is supported by a single source of
naı̈ve cells (primary tissue).
Although the model is called a filter (the basis for its inspiration) it is not restricted to
166
Environment
Tertiary
Secondary
Primary
filtering information processing tasks. The focus of this model is on the system possessing a
single point of entry for pathogen (sensory signals) although at a high load (many signals),
and one or a small number of specialised secondary tissues to address the needs of the
tertiary tissue.
The lymph node model is inspired by the network of lymph nodes, connected by the
vascular system, that receive antigen as a stream in the lymph. The model is more complex
than the filter model as it contains a network of moderately sized secondary lymphoid
tissues that recirculate memory and effector cells. Further, unlike the filter model, it has
a large receptive field of tertiary tissue, which provides a single broad sensory system.
Environment
Tertiary
Secondary
Primary
The focus in this model is the large tertiary tissue receptive field, and the network
167
of secondary tissues (lymph nodes), in particular the capabilities of the lymph nodes to
recirculate mature cells (share acquired information), and their capabilities in trafficking
effectors into tertiary tissues (applying acquired information).
Table 5.4: Configuration of the architecture for the lymph node model.
Host Model
The host model is an integration of one or more filter models with the lymph node model.
The resultant model is a larger-scale tissue architecture that may be equated to a lymphatic
system of a host. The model is composed of a variety of different tertiary tissue types and
thus different meanings for the secondary tissue to be provided with antigen to present
to resident cells. In addition, the secondary tissue is made of a core network of lymph
nodes, as well as collections of specialised lymphoid tissue to address principle pathogen
penetration areas. Finally, the system has one or more primary lymphoid tissues for the
creation and dissemination of naı̈ve cells to secondary tissues.
Environment
Tertiary
Secondary
Primary
The focus of the model is the integration of the lymph node network (and related
method for sampling antigen from tertiary tissue) with a number of filter-based models
centred around primary pathogen access points. This host model represents a hybrid
integration of the two sub-types of tissue architectures, and culminating (pinnacle in com-
plexity) lymphatic tissue model.
Summary
The lymphoid tissue components, exposures, and architecture models provide a context
for the previously defined adaptive models of the Cellular Paradigm concerning immune
168
Tissue Type Configuration
Primary Set of primary tissues feeding the secondary tissue.
Secondary A backbone of a consolidated network as well as specialised regions for each
major entry point (diverse.
Tertiary Multiple tertiary tissues of varied size and scope (diverse)
cells (intra-tissue), and a context for novel cell migration adaptive models to be investi-
gated (inter-tissue). The applications of the architecture in the proposed lymphoid tissue
models provides three specific settings for integrated lymphoid tissue-based information
processing. This section suggested at the potential for Tissue Clonal Selection and more
generally tissue-based Artificial Immune System algorithms, as a scale above the state of
classical cell-based Artificial Immune System algorithms.
169
are reconsidered and a number of specialised Tissue Exposure Regimes are defined.
The Antigenic Exposure Problem (AEP) defined in Algorithm 4.1 provides a general prob-
lem definition where a Tissue T is exposed to an Infection I. A given Cellular Clonal Selec-
tion Algorithm may be considered a single T in a Host of Tissues (H = {T1 , T2 , T3 . . . , Tn }).
Therefore the AEP must be generalised for interaction with an H. The Infection Anti-
genic Exposure Problem (IAEP) defined in Algorithm 5.1 provides a generalised exposure
problem in which an H is exposed to a Habitat B of Infections I (B = {I1 , I2 , I3 , . . . , In }).
The parameters Ndeterminants , Nantigen , and Ninf ections define the properties of B with a
symmetrical number of I which are passed to CreateHabitat to create a problem instance.
Exposure refers to a given exposure mechanism, such as the variety of Tissue Exposure
Regimes (TER) defined later in this section. An exposure regime returns a result set Hrs
that represents the state of a given H with regard to its ability respond to the B under
the given TER.
The IAEP may be specialised as an infection extension of the Antigen Colour Space Prob-
lem (ACSP) defined in Section 4.3.1 called the Infection Colour Space Problem (ICSP).
An instance of the ACSP involved the exposure of a T to a set of Colour Space Patterns
(CSP), where the goal of the problem is to minimise average error in the response Trs . The
ICSP specialisation of IAEP exposes a H to a set of sets of CSP (B of I’s), with the goal
of minimising the average error in the response Hrs (defined in Equation 5.1). One may
define a minimal configuration of the IAEP and thus the ICSP that focus the concerns of
the problem on the highest level of abstraction, the Habitat B. This focus is provided by
reducing the configuration at levels below the desired level to minimal levels of complexity.
A Minimal Infection Antigenic Exposure Problem (MIAEP) is defined where Ninf ections is
variable, although Nantigen and Ndeterminants are fixed at 1. In the case of a minimal ICSP,
the number of I defines the number of CSP (A), each of which has a single D comprised
of all three Colour Space Components (Red, Green, and Blue).
170
Habitat
Habitat
Infection Infection ( )
Infection Infection ( )
Determinant Determinant
Determinant Determinant ( )
Figure 5.18: Depictions of general and minimal configuration examples of the Infection
Antigenic Exposure Problem (IAEP).
Section 5.3.2 defined the two important aspects of the problems that Tissue Clonal Selec-
tion Algorithms must address: (1) discrete tissue exposures, and (2) the spatial temporal
properties of exposure anticipation defined by the regularity of a given tissue exposure
regime. Toward this end, this section explicitly defines five different Tissue Exposure
Regimes (TER) for specialising the Exposure(H, B) of the IAEP providing examples
from the range of possible regular and irregular exposures (spatial-temporal exposure of
tissues) with some and all of the information in the problem domain. The schemes in-
clude: Symmetric Exposure, Asymmetric Exposure, Point Exposure, Random Exposure,
and Probabilistic Exposure. The TER provides a mechanism by which to specialise an
the infection exposures of a habitat to the tissues of a host, providing an generalisation of
the limitations imposed by the structure, organisation, and properties of different tissues
as described by the various tissue architectures in Section 5.3.3. Figure 5.19 provides a
depiction of four of the five exposure regimes to a host of tissues.
Symmetric The Symmetric Tissue Exposure Regime (STER) defined in Algorithm 5.2
involves the exposure of each Infection I to each Tissue T (see Figure 5.19a). Thus, each
tissue is exposed to and must address the scope of the antigenic habitat B.
Asymmetric The Asymmetric Tissue Exposure Regime (ATER) defined in Algorithm 5.3
involves the exposure of each I Infection to a single Tissue T in a consistent manner, such
171
(a) Symmetric Tissue Exposure Regime (STER). (b) Asymmetric Tissue Exposure Regime (ATER).
(c) Random Tissue Exposure Regime (RTER). (d) Point Tissue Exposure Regime (PTER).
Figure 5.19: Depictions of the four different Tissue Exposure Regimes (TER).
that once established the same T -to-I mapping is used for each exposure (see Figure 5.19b).
The number of T may match the number of I such that each T addresses 1
Ninf ections per
host exposure.
Point The Point Tissue Exposure Regime (PTER) defined in Algorithm 5.4 restricts the
exposure of all I to a single and consistent T across all host exposures (see Figure 5.19d).
The choice of T that becomes the point of exposure for the host may be randomly selected
from H.
Random The Random Tissue Exposure Regime (RTER) defined in Algorithm 5.5 is
similar to the asymmetric exposure regime, although the matching of T with I occurs
randomly with re-selection each exposure (see Figure 5.19c). Thus, a given T may be
exposed to a different subset of the antigenic habitat B each host exposure where it is
possible for the set to be empty.
172
Algorithm 5.5: Random Tissue Exposure Regime (RTER).
Input: H, B
1 foreach Ii ∈ B do
2 Tpoint ← RandomTissue(H);
3 Exposure(Ii , Tpoint );
4 end
Probabilistic The Probabilistic Tissue Exposure Regime (OTER) defined in Algorithm 5.6
provides an intermediate specialisation of the RTER and ATER in which the selection of
T is probabilistic based on past selections providing probabilistic spatial consistency of
re-exposure. In addition, the I-to-T mapping is maintained for an extended number of
host exposures before a probabilistic reselection is made, providing temporal regularity
to the spatial exposures. The duration parameter defines the number of host exposures
(the HostExposureN umber state variable) a selected T is exposed to a given I. The
state variable Histogram keeps track of the frequency each T is exposed to each I, and
biasedRouletteW heelSelection(Histogram) uses a biased roulette wheel selection routine
on the histogram for a given I over all T to select a T to expose for duration host expo-
sures. The Itissues state variable keeps track of which T each I has selected and should
expose.
173
CCSA without concern for the specifics of the initialisation and response to exposure. This
provides flexibility in TCSA’s to focus the tissue paradigm concerns such as cell trafficking
and potentially making use of a heterogeneous set of CCSA, whilst at the same time forcing
responsibility for tissue-level responses (Trs ) onto the CCSA. The construction of a Hrs is
the linear aggregation of the specific Trs from each T produced through the interaction of
an I and a T as paired according to the TER. The TCSA is immune system centric unlike
the IAEP that is environment centric, providing a flip in responsibility from a passive H
responding to Exposures according to a TER in the case of IAEP, to an active H that
invokes Exposures on a B, although still delegating the TER to the IAEP. This conceptual
flip provides a computationally equivalent system-environment relationship that facilitates
bi-modal realisations suitable for different implementation specific concerns. The use of a
TER provides an important decoupling of the Host from the controlled governance with
the information provided by the antigenic habitat, specifically with regard to the selection
of the Hrs and the adaptation within exposed tissues. This decomposing in which control is
a facet of the specific problem-system implementation provides a clear and simple platform
for investigating the behaviour of decentralised clonal selection distributed across a set of
potentially interacting independent repertoires of cells.
One may define a minimal implementation of the T issueInteractions(H) that does not
facilitate any interaction between tissues. This Minimal Tissue Clonal Selection Algorithm
(MTCSA) of isolated tissues provides a baseline for comparison with extensions of the
TCSA that do facilitate tissue interactions. The important behaviour that the MTCSA
provides is an example of segregated adaptive tissues, highlighted in the trade-off between
information organisation in a regular TER and information mix in an irregular TER (see
Figure 5.7).
174
measures are classified as system that provide general holistic information about the algo-
rithm’s information state and component that provide information about the algorithm’s
component information state. As with the cellular paradigm, an important consideration
with the proposed measures in exploratory experimentation is not their absolute value,
but rather their relative change in value with changes to the systems being investigated.
System Measures
Host Error The Average Cell Error (ACE) defined in Equation 4.4 provides a gener-
alised measure of error for a single Tissue Result Set of cells Trs against a given Infection
of antigenic patterns I. For the purposes of investigating TCSA the ACE measure may
be renamed Tissue Error (TE) that may be calculated for each Trs in a Host Result Set
Hrs and averaged to define a Host Error (HE) (see Equation 5.1). HE provides an indi-
cation of instantaneous average error for each Trs for a given Hrs provided by a TCSA in
response to an Tissue Exposure Regime. HE is in the units of the B problem space, for
example Euclidean distance for a colour space specialisation. HE provides an indication
of a systems capability of addressing a given Habitat problem B under the constraints of
a given TER, in particular the spatial-temporal regularity or lack thereof in exposures.
n
1$
HostError(B, Hrs ) = T issueError(Ii , Trsi ) (5.1)
n i=1
Host Diversity Host Diversity (HD) defined in Equation 5.3 provides an instantaneous
diversity a TCSA. Each Tissue T in a Host H is compressed to a Bit Frequency Histogram
(BFH) defined in Algorithm 5.8 which records the occurrence of each bit for all bit vector
based Cells C. The BFH provides a compression of the information content of a given
T that may be directly compared with that a BFH from another T as the absolute Bit
Frequency Difference (BDF) defined in Equation 5.2. The measure calculates the average
BDF for a given T against all other T in H, which is then averaged across all T . HD
provides a holistic indication of the diversity of the information content of an H. An
increase in the HD suggests a more heterogeneous set of information, whereas a decreases
in HD suggests a more homogeneous set of information that may indicate an improved
system-wide specialisation of resources toward the H.
n
$
BitF requencyDif f erence(BF Hi , BF Hj ) = | BF Hik − BF Hj k | (5.2)
k=1
n n
1$ 1$
HostDiversity(H) = BitF requencyDif f erence(BF H(Ti ), BF H(Tj ))
n i=1 n j=1
(5.3)
175
Algorithm 5.8: Bit Frequency Histogram (BFH).
Input: T
Output: BFH
1 BFH ←0;
2 foreach Ci ∈ T do
3 foreach cj ∈ Ci do
4 if cj ≡ 1 then
5 BF Hj ← BF Hj + 1;
6 end
7 end
8 end
9 return BFH;
Component Measures
Average Tissue Diversity The Average Cell Diversity (ACD) defined in Equation 4.7
provides a measure of Hamming distance for the average cell from all other cells in a Tissue
repertoire of cells T . As such, the ATD may be referred to as Tissue Diversity (TD) which
may be calculated for each T in a Host H and averaged to provide the Average Tissue
Diversity (ATD). ATD provides an instantaneous measure of the diversity of the average
T in a host, measured in bits. ATD provides a general indication about the distribution of
information in the system. A relative increase in ATD suggests that the average T has a
more diverse cell composition, whereas relative decrease in ATD suggests that the average
T has a less diverse cell composition. Decreased homogeneity may suggest an increase
in the organisation of information across the system and a decrease in homogeneity may
suggest an increase in the mixing of the information content across the system respectively.
n
1$
AverageT issueDiversity(H) = T issueDiversity(Ti ) (5.4)
n i=1
Average Tissue Error The Host Error defined in 5.1 provides an indication of a Host
system’s error with regard to the Hrs prepared as a result of where a give TER interacted
with the Host. Alternatively, a Hrs may be prepared systematically for each T in response
to the Habitat B, and averaged across all T in H called the Average Tissue Error (ATE).
ATE provides an instantaneous measure of the error for the average Tissue component T
in the system in the units of the problem space B. ATE provides a general indication of
the capability of the average tissue in the system. A relative increase in ATE suggests the
average T has a more generalise response capability, whereas a relative decrease may sug-
gest a more specialised response capability. Importantly, an increased generalised response
capability suggests an increased mixing of the information content across the system.
Tn Bn
1 $ 1 $
AverageT issueError(B, H) = T issueError(Ij , Trs i ) (5.5)
Tn i=1 Bn j=1
176
5.4.4 Trends and Behaviours
Section 5.3.2 highlighted two points of concern regarding the behaviour of tissue-based sys-
tems under different exposure regimes: (1) the spatial organisation of information based
on the spatial temporal regularity of tissue exposures, and (2) the system-wide consistency
of response. These two concerns provide a trade-off in the organisation of cell-based infor-
mation within a multiple tissue model between a uniform mix for a completely irregular
tissue exposure pattern and isolated tissues for completely fixed regular tissue exposure
patterns (see Figure 5.7). This provides a primarily research agenda for the Tissue Clonal
Selection Paradigm for investigating Tissue Clonal Selection Algorithm behaviour under a
variety of different Tissue Exposure Regimes. The results from such an investigation pro-
vide a basis for using such algorithms as tools in problems in which the exposure and/or
use of information is controlled, uncontrolled or some combination (a consideration that
is further investigated in the Host Paradigm, see Section 6.3.2).
One may clearly distinguish between the measurable emergent effects, the information
management strategy that such effects represent, and the grounded (component-wise mech-
anisms) of TCSA’s that promote such strategies and effects (summarised in Table 5.6).
Table 5.6: Summary of the difference in effect, strategy and mechanism between the
complementary concerns of tissue algorithms under discrete exposures.
The two identified emergent effects of interest are the systems holistic consistency of
response and the systems spatial organisation. These represent two different information
management strategies, specifically the dissemination and thus promoted availability of all
acquired information across the entire system, and the specialisation and thus availability
of acquired information at the point of use. As discussed in Section 5.3.2, these two
strategies represent two different relationships between acquisition and anticipated need,
specifically local acquisition with global anticipated need and local acquisition with local
anticipated need. The first strategy may be promoted via the global mixing via continuous
high-amplitude inter-component sharing of information, and the second strategy may be
promoted via the segregation and thus isolation of acquired information. These strategies
represent extremes in mechanism and behaviour with many intermediate states promoted
via variation in mechanism, and thus variation in emergent effect.
The five exposure regimes may be considered with regard to their exposure regularity
and irregularity in terms of the scope of system information acquisition and anticipated
need (summarised in Table 5.7). For example, the asymmetric regimes represents an
177
archetype of regular exposure with local exposure and anticipation whereas the random
regime represents the archetype of irregular exposure with global exposure and antici-
pation. Both symmetric and point regimes expose the system in a regular manner and
thus with expected local availability and anticipatory system expectation. This is the case
for PTER, although given that STER is PTER applied to all components of the system,
there is opportunity for the same information to be useful (anticipated) at any point of
the system. The probabilistic regime provides an intermediate between the asymmetric
regime and the random regime. For example, with a duration of 1 and frequency-biased
re-exposure OTER provides a version of RTER with probabilistically increased regularity
(local re-exposure and anticipation), whereas random is OTER with duration 1 and un-
biased selection and ATER is OTER with an infinite duration. OTER with a moderate
duration provides an explicit intermediate between the global-global behaviour of RTER
with the local-local behaviour of ATER.
Table 5.7: Summary of the exposure and re-exposure behaviour of the five defined tissue
exposure regimes and how they relate to system information availability and anticipated
need.
The proposed measures provide information content both quantitatively as required, al-
though more usefully qualitatively as relative differences between similar systems and the
same systems under varied exposure regimes. Table 5.8 provides a summary of the sys-
tem and component level measures and an interpretation of the relative movement trends.
These general trends may be used as a guide for assessing results.
Table 5.8: Summary of general trends and their interpretation for Tissue Clonal Selection
Algorithms.
178
System Behaviour Expectations
Table 5.9 provides expected qualitative comparisons for a given tissue-based system with
global and local anticipation strategies under local-local and global-global tissue exposure
regimes. The qualitative expectations are given in terms of the system and component
level diversity and error, where diversity reflects information content and error ultimately
reflects correctness of anticipation. The ATER may be consider an archetype local-local
(regular) TER given the piece-wise exposure of information to fractions of the informa-
tion environment (antigenic habitat). RTER may be consider the archetype global-global
(irregular) TER given the unbiased mapping between components and exposure. The re-
maining TER’s provide intermediates for investigation. The error and diversity measures
at host and tissue scope may be generalised to system and component, thus making the
extended trends broadly applicable (such as in the case of the Host Paradigm in Chapter
6). As discussed, high-rate inter-tissue mixing provides an example of a global anticipa-
tion strategy, and isolation such as that used in the MTCSA provides an archetype of
a local anticipation strategy. Remaining variations and elaborations of the TER provide
intermediates between these strategies.
Table 5.9: Summary of the expected behaviours of the defined measures with regular and
irregular exposure regimes on systems with mixing and isolated information dissemination
strategies.
Expected system error predictably follows the matching between strategy and TER,
and the inverse of the relationship. Thus, the expectation is that system error is a cor-
related match between TER and information management strategy, whereas component
error is generally invariant to TER and is correlated with the information management
strategy. Both system and component level diversity are also expected to be generally
invariant to the TER and correlated with the strategy. System diversity is expected to
decrease with a global strategy as the system becomes information-homogeneous and be-
come information-heterogeneous with a local strategy. This relationship is expected to be
inverted for component level diversity in which components generally increase in diversity
with the global strategy and decrease with a local strategy given the correlated decrease
and increase in intra-tissue specialisation respectively. A final axis to these expectation
is responses, specifically the time allocated to address an environment given sufficient re-
sources. It is expected that both system strategy types will arrive at the same or similar
final system error after a prolonged period of time. Thus, the expected behaviours for this
measure must be observed after a limited although reasonable amount of time.
179
5.4.5 Paradigm Agenda
This section outline a high-level research agenda for exploratory empirical experimentation
for the Tissue Paradigm, considered in the remainder of this chapter.
(a) System-Error correlation between Strategy and TER, specifically Local strategy
with Local TER and Global strategy with Global TER.
(b) System-Diversity and Component-Error and Diversity invariance on Strategy
and TER, specifically Decrease in System-Diversity and Component-Error with
Global strategy and Increase with Local strategy, as well as Increase in Component-
Diversity with Global strategy and Decrease with Local strategy.
(a) Graceful falloff in measure with intermediate strategies and/or exposure regimes,
generally a predictable continuum between the extremes in behaviour and thus
measure.
(b) Intermediate information management strategies provide varied intermediate
behavioural effects.
180
5.5.2 Recirculation Tissue Algorithm
The tissue interaction step of the Tissue Clonal Selection Algorithm (TCSA) may be spe-
cialised for cell recirculation involving the selection of cells to depart a given tissue and
the integration of cells arriving to the tissue. These may be separate decision processes
although they are clearly related. For example, a simple model involves the removal of
a single lymphocyte (posted to a neighbouring tissue) which frees a position in a fixed-
size repertoire for one-arriving lymphocyte from a neighbouring tissue. The trafficking
of lymphocytes may be elaborated as the configuration of a migration and integration
operators, which may be specialised as the selection of a subset of a given repertoire for
removal and integration into a neighbouring repertoire (a remove-insert strategy). A sim-
plified tissue architecture may be defined as a ring network topology with uni-directional
communication (directed cyclic graph) that superficially resembles a circulatory system
between the tissue nodes. The migration configuration is defined by the number of cells
per migration event (amplitude) and how often migration events occur (frequency). The
number and consistency of the sample of lymphocytes posted to the neighbouring tissue
ideally should be representative of the acquired information content of a given repertoire.
The lymphocytes arriving from neighbouring tissue to be integrated into the repertoire
should have the similar information content, thus meeting the goals of the recirculation
strategy. In addition to providing a suitable sample of the receptors in the repertoire, the
strategy should permit the further development of information in the repertoire. Arriving
lymphocytes must be integrated into the repertoire. This may be more involved if there
is a size mismatch between the number of cells selected and sent compared to the number
arriving (for example if cells arrive from multiple tissue locations). Arriving cells may
fill the vacant slots provided by the departed cells, and use a replacement strategy (as
discussed for clone integration in the elaborated clonal selection algorithm) in the case of
overflow.
The Recirculation Tissue Clonal Selection Algorithm (RTCSA) is defined (Algorithm 5.9)
as a specialisation of the T issueInteractions operation in TCSA in which a sample
T i& is taken sample(Ti , Nmigration ) of Nmigration cells from each Tissue T and trans-
181
mitted to a single and consistent neighbouring tissue Ti+1 where they are integrated
integrate(Ti+1 , Ti &). The RTCAS is configured with a remove-insert migration strategy
that selects a consistent amplitude (Nmigration ) random sample of cells for migration,
which is applied each epoch of the algorithm (fixed frequency). Each tissue in the system
participates in the trafficking which is applied in a lock-step manner of selection-removal-
insertion after the exposures of the epoch have been satisfied. The default realisation of
the Sample(Ti , Nmigration ) operation is to take a random sample (Ti &), and the default
realisation of the Integrate(Ti+1 , Ti &) operation is concatenation to the repertoire filling
the positions made by the sampling operation.
The aim of this empirical study was to investigate RTCSA as a viable mechanism for
realising the ‘Consistency of Response’ emergent effect. Toward this end, the study had
the following goals:
1. Confirm the expectations outlined in Section 5.4.5 using the RTCSA and the MTCSA.
Method
Algorithms The study considers two algorithms, the Minimal Tissue Clonal Selection
Algorithm (MTCSA), and the Recirculation Tissue Clonal Selection Algorithm. MTCSA
is a specialisation of the TCSA defined in Algorithm 5.7, that was configured with Ntissues =
10. Each T was an instance of the Replacement Cellular Clonal Selection Algorithm
(RCCSA) defined in Algorithm 4.5, with the configuration Ncells = 50, Nselection = 1,
and Nclones = 5. RTCSA is a specialisation of TCSA with a T issueInteractions(H) that
connects all T into a directed cyclic graph defined in Algorithm 5.9. The same Ntissues
and RCCSA configuration was adopted as was used in MTCSA. Three different migration
sizes were used including: small (RTCSA-SML) with Nmigration = 5 (10% of each T ),
medium (RTCSA-MED) with Nmigration = 20 (40% of each T ), and large (RTCSA-LRG)
with Nmigration = 40 (80% of each T ).
Problems The colour space specialisation of the Infection Antigenic Exposure Paradigm
(IAEP) defined in Algorithm 5.1 was used called the Infection Colour Space Problem
(ICSP). The minimal variation of ICSP was used with Ninf ections = 10, and Ndeterminants =
Nantigen = 1. Each I was a Colour Space Pattern (CSP) randomly generated at the
beginning of each run. The five different Tissue Exposure Regimes (TER) defined in
Section 5.4.1 were used for the ICSP. These included the ATER where the number of T
matched the number of I (one-to-one), STER, RTER, PTER where Tpoint was fixed at
tissue 1, and OTER with duration = 15.
182
Experiment Each algorithm used the Maximum Epochs Stop Condition (MESC) de-
fined in Equation 4.8 with M axEpochs = 1000. The four tissue specific measures defined
in Section 5.4.3 were collected from the state of the system after the triggering of the stop
condition. These included the system measures HE and HD, and the tissue measures ATE
and ATD. Each algorithm and problem received a new and different random number seed
each run. Algorithm-Problem combinations were repeated 30 times.
Results
Table A.1 in Appendix A.1.1 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
ues. Box-and-whisker plots are provided in which the results for each algorithm are aggre-
gated across all TER for a each measure. Figure 5.20 shows HD, Figure 5.21 shows HE,
Figure 5.22 shows ATD, and Figure 5.23 shows ATE.
Figure 5.20: Box-and-whisker plot of Host Diversity (HD) across all TER for the RTCSA
study.
Analysis
This section provides an analysis of the results summarises in the previous section. Ta-
ble 5.7 was used to consider the general behaviour of each of the specific TER’s. Table 5.6
was used to consider the general behaviour of the global and local information management
strategies of RTCSA and MTCSA. Finally, Table 5.8 was used to qualitative interpret the
summarised results.
183
Figure 5.21: Box-and-whisker plot of Host Error (HE) across all TER for the RTCSA
study.
Figure 5.22: Box-and-whisker plot of Average Tissue Diversity (ATD) across all TER for
the RTCSA study.
184
Figure 5.23: Box-and-whisker plot of Average Tissue Error (ATE) across all TER for the
RTCSA study.
Information Management Trends This section considers the expected trends of the
local and global information management trends under local and global information ex-
posure regimes outlined in Table 5.9 from Section 5.4.4. ATER and RTER are considered
local and global information exposure regimes (exposure and re-exposure) respectively,
and MTCSA and RTCSA-LRG are considered local and global information management
(anticipation) respectively. Table 5.10 provides a variation on the expected trends sum-
mary presented in Table 5.9 in which the specific measures of the selected algorithms are
provided with qualitative comparison. Direct comparison between these tables addresses
the primary aim of the experiment, to confirm or reject the behaviour expectations out-
lined in the tissue paradigm agenda in Section 5.4.5.
Table 5.10: Summary of the results for MTCSA and RTCSA-LRG on ATER and RTER
and the relative quantitative difference is measures.
Considered first are the algorithm results for the local information exposure regime
(ATER). From a system perspective both the HD and HE met the expectations in which
the MTCSA resulted in decreased error and increased diversity, whereas the RTCSA-LRG
185
resulted in the inverse behaviour of increased error and decreased diversity. From a com-
ponent perspective the comparison in diversity (ATD) did not meet expectations. Instead
of an increase in average component diversity with a global strategy, this behaviour was
observed by the local strategy. This means that the expectation that the global strat-
egy would decrease component specialisation was interpreted incorrectly, demonstrating
that a general increase in specialisation with a local strategy results in an increase in
the diversity within the average component. Also unexpected was the lack of significant
difference between the average component error between the two strategies. This was a
surprising result as the mixing of acquired information provided by RTCSA-LRG provided
no measured performance improvement over segregated repertoires on the local exposure
regime.
The algorithm results from the global information exposure regime (RTER) are also
considered. From a system perspective the diversity matched the expectation in which
the segregation of MTCSA resulted in an increase in diversity compared to the decreased
provided by recirculation in RTCSA-LRG. The expectation that system error would de-
crease with RTCSA-LRG was not confirmed as there was no significant difference between
the two strategies. This is a surprising result as it generally suggests that consistency
of response may not improve system performance under an irregular global information
exposure regime2 . From a component level the expectation of component error was con-
firmed in which the global strategy resulted in a decrease in HE compared to an increase
seen with the local strategy. The expectation of component diversity was not confirmed
as their was no significant difference between the two strategies. This finding, together
with the lack of significant difference in HE demonstrates that RTER alone was sufficient
to engender a ‘consistency of response’ irrespective of the information management strat-
egy, promoting a reconsideration of cause and effect between management strategies and
exposure regimes. This is considered in the remainder of this section. Table 5.11 provides
a reproduction of the expectations from Table 5.9 of global and local information manage-
ment strategies and information exposure regimes, with those results that did not meet
the expectations highlighted.
Table 5.11: Summary of confirmed behaviours of global and local information strategies
and exposure regimes, highlighting where expectations were incorrect.
Information Exposure Trends This section relaxes the notions of local and global
information exposure regimes and considers general trends across the TER’s in the con-
2
This suggestion is further supported by the lack of significance between MTCSA and all tested varia-
tions of RTCSA on RTER as shown in Table A.1.
186
text of both the local and global management strategies (MTCSA and RTCSA-LRG re-
spectively). Table A.2 in Appendix A.1.1 provides a restricted summary of results that
provides direct comparison and statistical significance between TER’s for the local and
global management strategies in which the effects of the exposure regimes may be teased
from their information management strategies.
Observations may be drawn firstly from the behaviour of the five TER’s with the
local management strategy (MTCSA). From a system perspective, PTER resulted in the
least diverse system whereas RTER resulted in the most diverse system. This suggests
that the holistic adaptation the system was exposed to in RTER and other system-wide
exposure regimes (ATER, STER and OTER) result in a system information content that
is more diverse than the random repertoires under PTER (besides the single exposed
tissue). ATER achieved the lowest error, which is unsurprising given the T -I specialisation
fostered by the TER, and RTER achieved the highest error which was also expected given it
provides the least T -I specialisation (the most irregular regime). From a component level,
PTER achieved the highest ATD and ATE3 suggesting that from a component perspective
point-wise exposure of information results in the expected behaviour of repertoires that
individually perform poorly on average. This behaviour was not restricted to PTER as was
also demonstrated to a lesser degree on the other restricted exposure regimes (ATER and
OTER). RTER resulted in the lowest average component diversity, although with similar
behaviour exhibited by STER, suggesting system-wide exposure of information results in
repertoires that have consistent internal information content on average. STER achieved
the lowest ATE followed by RTER demonstrating that the same effect on component
diversity results in improved tissue capability.
Observations may be summarised from the behaviour of the five TER’s with the global
management strategy (RTCSA-LRG). From a system perspective STER resulted in the
lowest diversity and error. RTER resulted in the highest diversity although was not sig-
nificantly different from many of the other TER’s. Interestingly, PTER resulted in the
highest error suggesting that global management presented a major disruptive influence to
localised exposure regimes, demonstrated by the equally poor HE for ATER and OTER
compared to the much improved STER and RTER. Further, this inverse in behaviour
from the local management strategy results demonstrate the suitability of holistic expo-
sure regimes to the global management strategy, and localised exposure regimes to the
local management strategy. From a component level, PTER achieved the highest average
component diversity and error demonstrating the same trend with the MTCSA manage-
ment strategy. RTER resulted in the lowest ATD with no significant difference in result
with the STER and ATER system-wide exposure regimes. Likewise STER resulted in the
lowest ATE followed closely by RTER mirroring the pattern observed with MTCSA.
Toward teasing apart the influences of TCSA’s and TER’s the observations may be
reduced into the following trends that describe the generalised relationship between infor-
mation exposure strategy and information management strategy:
187
(a) Localising information exposure increases average component diversity, global-
ising information exposure decreases average component diversity.
(b) Localising information exposure increases average component error, globalising
information exposure decrease average component error.
(a) Globalising information management increases diversity and error under lo-
calised information exposure, and decreases diversity and error under globalised
information exposure.
(b) Localising information management decreases diversity and error with localised
information exposure, and increases diversity and error with a globalised expo-
sure strategy.
The component measure invariance trend with information management strategy demon-
strates that the information exposure regime is the determining factor. This trend was ob-
served independently for both the MTCSA and RTCSA-LRG strategies across the TER’s,
although specific and typically minor differences for strategies on specific TER’s. The
system measure dependence on information management strategy demonstrates the suit-
ability of a localised strategy on localising information exposure and the suitability of
a globalised strategy on globalising information exposure. This trend was observed in-
dependently and complementary (the inverse case) for both MTCSA and RTCSA-LRG
strategies across the TER’s, although with differences in the specific TER in each case.
An important implication regarding TER’s in addition to that of their spatial-temporal
regularity is the scope of their exposure behaviour as either system-wide or restricted,
providing a defining quality for localisation and dissemination management strategies.
These trends suggest that TER’s can predictably influence the component-wise organisa-
tion of information in terms of holistic problem error and information content diversity.
The system-level suitability trends also suggest that MTCSA does demonstrate the spa-
tial organisation (localisation) of information emergent effect and that RTCSA-LRG does
demonstrate the consistency of response (dissemination) emergent effect, confirming the
expectations regarding each approaches mechanism.
188
clear intermediates in system-level behaviour (localisation and dissemination) as defined
by the captured measures HD and HE. From a component perspective the trends are
less bold as a the system level. ATD demonstrate no clear TER invariant trends with
recirculation size, although there was clear commonality in behaviour. For both the ATER
and OTER exposure regimes, the increase in recirculation size resulted in a step decrease
in average component diversity that seemingly levelled off after the drop from MTCSA
to RTCSA-SML. This demonstrates that a sufficiently small sample size was required to
effect a decrease in the average tissue diversity under those regimes, after which further
increases in sample size had little effect. Interestingly, a different effect was observed for
RTER and STER where a small recirculation size resulted in a small increase in ATD, after
which further increases in size resulted in decreases. These effects were not observed with
PTER, where the increase in recirculation size resulted in the progressive increase in ATD.
The variation in recirculation size demonstrated a common trend across all TER’s except
PTER for ATE, where a small increase resulted in a decreased error, and subsequently
larger recirculation sizes increased error. This trend demonstrates that a sufficiently small
recirculation size is needed to effect a drop in AE under those exposure regimes. The
inverse of this trend was observed with PTER where small recirculation resulted in an
increase in ATE and larger sample sizes decreased this error toward the MTCSA score.
The observed measure-based may be reduced into the following generalised trends
regarding RTCSA recirculation size:
Conclusions
This section summarises the findings of the empirical study into the Recirculation Tissue
Clonal Selection Algorithm, in terms of the primitives that were the focus of the study
and the expectations that motivated the study.
1. Study Primitives
(a) The MTCSA is a viable realisation of the spatial organisation effect (localisa-
tion) via an isolation mechanism.
189
(b) The RTCSA is a viable realisation of the consistency of response effect (dis-
semination) via a recirculation mechanism.
(a) The behavioural expectations for the two different management strategies under
two archetype exposure regimes were considered with a mixture of system and
component level expectations being confirmed and rejected.
(b) The localisation or globalisation (exposure/re-exposure) of an exposure regimes
defines the component-level error and diversity that is generally invariant to the
information management strategy
(c) The localisation or globalisation of an exposure regime is suited to a localising
and disseminating information management strategy with regard to system-
level error and diversity.
(d) In addition to the regularity and holistic information exposure/re-exposure
properties of tissue exposure regimes, a third important consideration is the
scope of system exposure, specifically system-wide or constrained exposure/re-
exposure.
3. Intermediates
This final point about intermediates motivates the two remaining investigations in this
chapter, and likely the whole Tissue Clonal Selection Paradigm.
190
In addition to specialising the resources of the system to the antigenic exposures, the
specialised resources (lymphocyte receptors for antigen) must be positioned such that they
are used in the right locations. The distribution (space and time) of antigenic exposures
is unknown to the system (defined by a TER), thus the system recirculates specialised
resources between the locations of exposure to maximise the chance application of the
resource in an exposure event. Lymphocytes interact with each other and interact with
antigen in this spatial structure. Each tissue type associated with a region of the host has
its own unique chemical makeup, which may be used to differentiate tissues types and thus
regions of the host. Lymphocytes may interact with tissues using specialised receptors that
detect and differentiate between tissue types. This interaction occurs when the lymphocyte
recirculates around the host, and may be used by the cell to travel specific pathways and
to enter and remain in a specific tissue in search of its cognate antigen. These navigation
receptors are not expressed in naı̈ve lymphocytes, instead are expressed in matured cells
that are produced after an interaction with antigen. A mature receptor (memory or
effector) expresses navigation receptors for the tissue surroundings when it is conceived.
Therefore, mature cells are specialised both for an antigenic stimulus, and for the spatial
location (tissue) that is known to have been exposed to the antigenic stimulus. This Cell
Imprinting process occurs irrespective of whether a selected (high-affinity) lymphocyte is
mature or naı̈ve. In effect, specialised resources may be re-educated in that their progeny
may be imprinted with a different location than themselves (presuming the cell was selected
in a tissue different from that it may home to). This imprinting mechanism facilitates both
the spatial anticipation of antigen exposure based on past exposures, and in addition to
recirculation, it facilitates the use and re-education of lymphocytes.
Imprinting empowers individual mature lymphocytes to assert preference for their lo-
cations allowing tissues to discriminate preferential residence during the selection of cells
to traffic. Homing requires an imprinting apparatus, which includes both a unique identity
or signature for tissues, and a way for lymphocytes to be impregnated with that signa-
ture. The match of information between a given lymphocyte and a tissue may be used
to bias the selection of cells from the repertoire to migrate. One may consider a Boolean
match/no-match for lymphocytes in their home tissue, and those not in their home tis-
sue. Those progeny lymphocytes created as a result of the clonal selection process are
already in their home tissue, thus they have a match to their tissue’s signature. All those
lymphocytes that migrate from another tissue will not match. Thus, a migration sample
selection policy that biases toward no-matches and away from matches (1) exercises a pref-
erence for lymphocytes (2) facilitates an automatic recirculation population of homeless
lymphocytes. This process is called Differential Recirculation where the probability that
a mature lymphocyte is selected in an outbound migration sample is biased by the match
between a given lymphocyte and the tissue’s signature. This mechanism facilitates homing
but introduces the problem of recruitment into the recirculation pool. Those cells in the
recirculating pool will continue recirculating until they return their ‘home’, unless they
get used or killed elsewhere. The initial recruitment probability will be uniform across
the repertoire as there are no migrant cells to consider. If a recirculating cell is replaced
191
(killed) by the proliferation strategy at another (non-home) tissue, then that tissue will
fill the gap in the recirculating population.
192
Algorithm 5.11: Differential Migration for Homing Tissue Clonal Selection.
Input: H, Nmigration
1 H& ← 0;
2 foreach Ti ∈ H do
3 Ti & ←0;
4 while Ti &N #= Nmigration do
5 C& ← SelectSingleCell(Ti );
6 if C&.TissuePreference #= Ti .id then
7 Ti & ← C&;
8 end
9 end
10 H& ← Ti &;
11 end
12 foreach Ti & ∈ H& ∧ Ti ∈ H do
13 if Ti ≡ TN then
14 Integrate(Ti , T1 &);
15 else
16 Integrate(Ti , Ti+1 &);
17 end
18 end
The aim of this empirical study was to investigate the Homing Tissue Clonal Selection
Algorithm (HTCSA) as an intermediate information strategy between high migration
RTCSA and the segregated MTCSA. Toward this end, the study had the following goals:
Method
Algorithms The study considers three algorithms, the Minimal Tissue Clonal Selection
Algorithm (MTCSA), and the Recirculation Tissue Clonal Selection Algorithm (RTCSA),
and the Homing Tissue Clonal Selection Algorithm (HTCSA). The MTCSA and RTCSA
algorithm are configured as was defined for the RTCSA empirical study in Section 5.5.3
with Ntissues = 10, Ncells = 50, Nselection = 1, Nclones = 5 for MTCSA and RTCSA,
and Nmigration = 5 (10% of each T ) fixed for the RTCSA. HTCSA is an extension of
RTCSA with the addition of an imprinting operation as defined in Algorithm 5.10 for
each exposure and a differential migration as defined in Algorithm 5.11. The imprinting
mechanism was specialised such that a variable number Nimprint of the best-matching
cells were imprinted for each exposure, as follows: small (HTCSA-S) Nimprint = 1 (2% of
T ), medium (HTCSA-M) Nimprint = 5 (10% of T ), and large (HTCSA-L) Nimprint = 10
193
(20% of T ). A probabilistic sample selection scheme was used in differential migration,
changing the configuration from 100% rejection if a cell was housed within its ‘home’ tissue
to a probabilistic 20% (80% chance of home cells not being migrated per migrating cell
selection).
Problems The same Infection Colour Space Problem and Tissue Exposure Regimes
were used as was defined for the RTCSA empirical study in Section 5.5.3.
Experiment The same experimental setup was used as was defined for the RTCSA
empirical study in Section 5.5.3.
Results
Table A.3 in Appendix A.1.2 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
ues. Box-and-whisker plots are provided in which the results for each algorithm are aggre-
gated across all TER for a each measure. Figure 5.24 shows HD, Figure 5.25 shows HE,
Figure 5.26 shows ATD, and Figure 5.27 shows ATE.
Figure 5.24: Box-and-whisker plot of Host Diversity (HD) across all TER for the HTCSA
study.
Analysis
This section analyses the summarised results in Table A.3 in the context of the expecta-
tions from Section 5.4.4 and their confirmation and other findings regarding MTCSA and
RTCSA from the empirical study in Section 5.5.3.
194
Figure 5.25: Box-and-whisker plot of Host Error (HE) across all TER for the HTCSA
study.
Figure 5.26: Box-and-whisker plot of Average Tissue Diversity (ATD) across all TER for
the HTCSA study.
195
Figure 5.27: Box-and-whisker plot of Average Tissue Error (ATE) across all TER for the
HTCSA study.
196
1. Homing reduces system error over recirculation on constrained (regular) exposure
regimes whilst remaining consistent with recirculation on irregular and system-wide
exposure regimes.
4. Improved organisation of homing does not effect average component error compared
with recirculation.
Information Exposure Trends Section 5.5.3 identified the two trends that (1) average
component measures of error and diversity are defined by the localisation (constrained) or
globalisation (system-wide) of the exposure (generally invariant to the information man-
agement scheme), and (2) that globalising management is suited to system-wide expo-
sure regimes (global-global) and localising management is suited to constrained exposure
regimes (local-local). This section considers the HTCSA in the context of these trends,
specifically the degree to which the trends hold or are influenced by preferential residence.
Table 5.12 summarises results for HTCAS-L across all the TER’s, providing a complement
to the same presentation for MTCSA and RTCSA-L in Table A.2.
a
False for PTER and RTER
b
False for STER and OTER
c
False for ATER and OTER
Table 5.12: Summary of results from an empirical study into the HTCSA comparing
TER’s with the HTCSA-L information management strategy.
The results show the same trend with HTCSA-L as was shown with recirculation with
a larger sample size in Table A.2 (RTCSA-LRG rather than RTCSA-SML that would be a
fair comparison with any assessed HTCSA). This confirmation supports the comparisons
of RTCSA, MTCSA, and HTCSA and outcomes in the previous section. Specifically
demonstrating that the influence of the TER’s on the system remained generally consistent
with RTCSA, and that the differences between RTCSA and HTCSA are as a result of the
HTCSA strategy.
197
Imprinting Size Trends This section considers the intermediate effects of varying the
number of cells imprinted with each exposure (Nimprint ), and thus the extent of each tissue
that is empowered to express a preference during migration. From a system perspective
some preferential residence was better than none, although the increases in Nimprint gen-
erally did not have a measurable effect. This result was generally demonstrated for both
Host Error and Diversity across all exposure regimes except PTER. The Point Exposure
Regime demonstrated a clear and steady increase in the organisation effect of preferential
residence with the increase in the number of cells imprinted per exposure. This suggest
that homing can counter the disruptive effects of recirculation, a behaviour that gracefully
increases with the number of imprinted cells per exposure. This effect is most pronounced
with PTER because it is the regime that is the most susceptible to the disruptive effects of
blind recirculation. From a component perspective a similar general result was observed
for average component diversity where preferential residence increased diversity with little
difference between the value of Nimprint , and only on the ATER and OTER regimes with
no significant effect on the other regimes. No consistent significant effect was observed for
average component error in varying Nimprint , including a value of zero (RTCSA-S). The
observations regarding the variation of the number of imprinted cells per exposure may
be generalised to the following trends:
1. Homing is generally better than no homing (recirculation) and the specific choice of
Nimprint is not critical.
Conclusions
This section summarises the findings of the empirical study into the Homing Tissue Clonal
Selection Algorithm, in terms of the primitives that were the focus of the study and the
expectations that motivated the study.
1. Homing
(a) The preferential residence (homing) effect realised in the imprinting and differ-
ential migration mechanisms provides a strategy that can exploit the dissemi-
nation of information by recirculation whilst countering the effect by localising
used information.
198
(b) Cell localisation (20% of a repertoire) is insufficient to counter all of the dis-
ruptive effects of continuous recirculation.
(c) Localising used information allows progeny of such information to freely (blindly)
recirculate.
This final point provides a suggestion as to the basis of the mechanism in the homing
approach, and a basis for increasing the probability of migration for cells without a pref-
erence. The second important finding for the homing approach (besides it behaving as
intended) is that even with a large number of cells imprinted each exposure, it is unable
to completly counter the disruptive effects of continuous recirculation, rather it is limited
to complementing the process. Countering the disruptive effects would likely require the
imprinting of some or all of the progeny of exposures, which is expected to impact the
dissemination properties of recirculation. This theme of allowing sufficient specialisation
under regular exposure regimes whilst also disseminating acquired information is further
explored via a Tissue Inflammation metaphor in the next section.
199
example mature T-cells as opposed to antibodies), thus the response is both smaller and
more directed. One may generalise two response strategies as follows:
• Undirected Response: Flood the system with effectors that will generally address the
specific site of invasion and any other sites where the pathogen may have spread, or
penetrated on multiple fronts (recirculation method).
• Directed Response: Produce a smaller set of effectors that home into the specific
site of infection, and have a low chance of addressing additional sites of infection
(homing method).
Both the undirected recirculation model and the directed homing model allocate (re-
cruit) resources to the requirements of a specific antigenic exposure. Further, both strate-
gies address the needs of the distributed information environment (resident receptors and
inbound pathogen information). These two approaches may be considered to describe
Distributed Recruitment Strategies. The undirected approach is a flooding strategy that
does not use any structural information other than the generation of a response in the
vicinity of the pathogens first detection. The directed approach is a homing strategy in
which structural information is used directly to get the resources to where they are re-
quired. Recruitment may be phrased as resource allocation with the desire of maximising
payoff. Thus, Distributed Recruitment may be defined as a strategy in which informa-
tion dispersed across a spatial structure is sought (for example selected) and employed
for a specific task (antigen neutralisation). The two proposed models both relate to the
changing of lymphocyte trafficking behaviour, treating the lymphocyte (a space in the
repertoire) as a limited resource.
200
be treated as a resource whose allocation is adapted by the system based on an exposure
(needs) basis. Adaptation of lymphocyte capacity allows not only increases when required,
but also decreases when it is not needed. The following lists some additional mechanisms
that may complement a local increase of the carrying capacity of a tissue:
201
Algorithm 5.13: TissueInteractions for Inflammation Tissue Clonal Selection.
Input: H, Ncells
1 foreach Ti ∈ H do
2 if Ti .Ncells > Ncells then
3 Ti .Ncells ← Ti .Ncells − 1;
4 end
5 end
The aim of this empirical study was to investigate the Inflammation Tissue Clonal Selec-
tion Algorithm (ITCSA) as an intermediate information strategy between disseminating
RTCSA and localising MTCSA. Toward this end, the study had the following goals:
Method
Algorithms The study considers three algorithms, the Minimal Tissue Clonal Selection
Algorithm, and the Recirculation Tissue Clonal Selection Algorithm, and the Inflammation
Tissue Clonal Selection Algorithm. The MTCSA and RTCSA algorithm was configured as
was defined for the RTCSA Empirical Study in Section 5.5.3 with Ntissues = 10, Ncells =
50, Nselection = 1, Nclones = 5 for MTCSA and RTCSA, and Nmigration = 5 (10% of
each T ) fixed for the RTCSA, referred to as RTCSA-S (small migration). The ITCSA
is a specialisation of the TCSA that increases the carrying capacity of tissues exposed to
infections to Nmaxcells defined in Algorithm 5.12, and progressively decreases the tissue to
Ncells each epoch defined in Algorithm 5.13. Two variants of ITCSA were investigated, one
based on the MTCSA with no T -T interaction referred to as ITCA-N (no migration), and
one based on RTCSA with recirculation (Nmigration = 5) referred to as ITCSA-S (small
migration). Both ITCSA used the same carrying capacity increase of Nmaxcells = 60 (20%
increase over Ncells = 50).
Problems The same Infection Colour Space Problem and Tissue Exposure Regimes
were used as was defined for the RTCSA empirical study in Section 5.5.3.
Experiment The same experimental setup was used as was defined for the RTCSA
empirical study in Section 5.5.3.
Results
Table A.4 in Appendix A.1.3 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
202
ues. Box-and-whisker plots are provided in which the results for each algorithm are aggre-
gated across all TER for a each measure. Figure 5.28 shows HD, Figure 5.29 shows HE,
Figure 5.30 shows ATD, and Figure 5.31 shows ATE.
Figure 5.28: Box-and-whisker plot of Host Diversity (HD) across all TER for the ITCSA
study.
Analysis
This section analyses the summarised results in Table A.4 in the context of the aims
outlined for this empirical study.
Localisation Trends This section considers the localisation effects of increasing car-
rying capacity in ITCSA with out recirculation as compared to MTCSA. From a system
perspective, ITCSA-N resulted in large increases in diversity compared to MTCSA, an
effect expected by a strong localising method (Section 5.4.4). Unexpected was the con-
current large increases in host error across all exposure regimes. This suggests that the
additional resources were exploited by specialising the system, although at the cost of re-
sources that were required for improving the response. From a component level, ITCSA-N
resulted in a general decrease in the average tissue diversity, and a general increase in the
average tissue error. This increased tissue internal homogeneity is expected given that
increased capacity is exploited by local clonal progeny, although the impaired average
tissue capability across the TER’s correlates with the systems increase in response error.
This suggests that an artefact of the mechanism may be responsible for disrupting the
acquisition of information. The observations may be generalised into the following trends:
203
Figure 5.29: Box-and-whisker plot of Host Error (HE) across all TER for the ITCSA
study.
Figure 5.30: Box-and-whisker plot of Average Tissue Diversity (ATD) across all TER for
the ITCSA study.
204
Figure 5.31: Box-and-whisker plot of Average Tissue Error (ATE) across all TER for the
ITCSA study.
205
size does decrease the disruption of recirculation, rather the inflammation provided an
effect that increased error on ATER and STER. In the case of PTER and RTER system
error was reduced over recirculation suggesting that the variable repertoire sizes across
the host and the inflammation mechanisms method for exploiting the extra size (with
progeny of selected cells) can only be exploited under these circumstances. Interestingly
inflammation provided some increase and decrease in average per-component error that
did not align with the regular and irregular system-wide exposure correlation, and in
particular improved average component capability for both the archetype regular and
irregular exposure regimes (ATER and RTER). These observations are reduced to the
following general trends:
Conclusions
This section summarises the findings of the empirical study into the Inflammation Tissue
Clonal Selection Algorithm, in terms of the primitives that were the focus of the study
and the expectations that motivated the study.
1. Inflammation
(a) Inflammation promotes localisation that is apparent with and without recircu-
lation, although it generally disrupts system capability (error).
(b) The increase in carrying capacity mechanisms is only effectively exploited as a
counter measure to the disruptive effects of recirculation under exposure regimes
that promote disparity in the resulting effect (non-uniform tissue exposure).
The results suggest at the potential of the emergent effect although raise questions
regarding the specifics of the chosen mechanism. Specifically, the method by which in-
creased carrying capacity is exploited (what cells fill the space), and the method by which
carrying capacity is decreased (what cells are selected and deleted from the repertoire). It
is likely that viable cell lineages are stopped under random cell deletion resulting in the
general increase in system error rather than an expected neutrality and potential decreases
provided by increase specialisation. An alternative mechanism may be increased progeny
tournaments for progeny during integration into the repertoire after creation, providing a
natural mechanism for competition for increasingly limited resources. There is much room
for elaboration on the primitive realisation of the inflammation effect, not limited to the
discussed manipulation of the recirculation effect (increased tissue inflow and decreased
206
tissue outflow), as well as the clear integration of preferential residence retain specialised
resources at the point of use (homing).
General Principles
1. Natural organisation based on exposure: Given sufficient time and resources, infor-
mation is naturally organised in a fixed structured system based on regularity and
consistency of its exposure. For example, system-wide exposure naturally promotes
system-wide anticipation and point-wise exposure promotes point-wise anticipation.
2. Problem is in the exposure regime: Resources are not always sufficient, therefore
information management strategies promote more efficient and effective organisation
of information in the face of unknown regularities and irregularities in information
exposure and anticipation.
207
of information and efficient intra-host application of acquired information to fight
infections.
Specific Findings
5.8.3 Integration
The Cellular Clonal Selection Paradigm defined and investigated in Chapter 4 was con-
cerned with the adaptation as a method for information acquisition, and the how that
method is influenced by degenerate information and inter-cell interactions. The Tissue
Clonal Selection Paradigm defined and investigated in this chapter took information ac-
quisition via adaptation for granted, using it as a primitive component in a Tissue Clonal
Selection Algorithm raising the level of abstraction regarding information acquisition and
adaptation from cells to tissues. The interest in this chapter was how different decen-
tralised information management strategies effected the organisation acquisition and use
of information under different information exposure regimes. The abstract tissue paradigm
is grounded in Chapter 8 in the context of two general problem domains, highlighting the
potential benefits the tissue algorithms provide over the cellular clonal selection algo-
rithms. The subsumption theme of raising the level of abstraction in information pro-
cessing is continued in Chapter 6 in which a Tissue Clonal Selection Algorithm is made a
primitive component in a broader Host Clonal Selection Paradigm that is concerned with
information management strategies in a population of hosts.
208
Chapter 6
209
phocytes within one host holistically providing a defence to the organism, to populations
of these systems holistically providing a defence to a population (or a species). This sec-
tion considers populations of immune systems, specifically with regard to evolutionary
concerns and natural and artificial immunisation, and ways in which these systems may
interact. This general review is multi-disciplinary crossing such fields of study as popula-
tion and evolutionary ecology, microbiology, epidemiology, and immunology. The intent
of this section is to highlight some systems and processes that underlie the interactions
between holistic immune systems to provide the basis for the inspiration of distributed
computational Artificial Immune System models.
6.2.1 Immunisation
Generally, immunisation implies that a host has been exposed to an antigen (immuno-
gen) inducing an immune response that has educated the system with respect to more
effectively and efficiently detecting and neutralising the antigen in the future. When a
pathogen enters the host and elicits a response (and the host survives), the host gains
a level of immunity to the pathogen. This process can be induced artificially through
inoculation (controlled exposure to the pathogen), and is the basis of vaccination. Inter-
estingly, immunity is not limited to this reactive method, and evolution has designed a
temporary and passive form of immunity that is employed by mothers to protect children
from pathogen before and after birth. This section reviews the various natural and ar-
tificial forms of acquiring immunity in terms of those mechanisms that elicit an immune
response, and those that do not. Table 6.1 provides a summary of examples.
Natural Artificial
Active Infection Vaccination, Inoculation
Passive Maternal Immunity Injection of antibodies
A developmental oddity of the acquired immune system is that the mass of the system
is at its peak in early childhood, and decreases with time until early adulthood [289]. This
raises questions as to the usefulness of decreasing the resources of the defence system with
age. An intuitive consideration would suggest that the size of the system would increase
with the increase of acquired knowledge over the lifetime of the host. An answer to this
question provides insight into acquired immunity as a strategy. Children are more vul-
nerable to infection than adults (children under the age of 5 suffer 8 to 24 times more
infection than other age groups). Each pathogen encountered by an infant is novel and
must be responded to anew. As a strategy, acquired immunity learns the hosts’ pathogenic
environment early and quickly. It provides an attempt to increase the hosts’ early and
prolonged survival within its environment. During the early stages of life the system max-
imises diversity, maximises cell proliferation potential, and maximises the rate of memory
cell creation. Cell numbers peak in the first six months of life then steadily decline. Fur-
ther, the developing infant immune system is buffered to the antigenic environment by the
210
temporally inherited maternal immunity (natural passive) gained by the mother over her
lifetime. This form of immunity is discussed in the following section.
Passive Immunity
Passive immunity is the transfer of active humoral immunity in the form of ready-made
antibodies to a host organism. Antibodies are relatively short-lived molecules that have no
reproductive capability, thus the defensive capability provided by them is fast, effective,
and temporary. A common form of natural passive immunity is maternal immunity (for
review see [42, 136, 196, 54]). Antibodies are provided by the mother to the foetus across
the placenta and in breast-fed milk after birth (mucosal immunity). Vaccination of the
mother during pregnancy may directly benefit the child as the antibodies produced by
the mother will be passed to the foetus [172]. During breastfeeding, lymphocytes in the
mother move to lymph nodes near the breast and release large amounts of antibodies into
the breast milk. The antibodies enter the gut of the infant and provide protection against
bacteria [363], and assists in oral tolerance (avoiding allergic reactions to food). The
antibodies provide an initial and powerful boost in defence to the infant, which endures
for a prolonged period after breastfeeding ceases. Breastfeeding stimulates the developing
immune system, improving later response to vaccination, although initially suppresses the
effector response of the infant immune system causing the failure of effective (artificial)
vaccination during this period. It decreases infant mortality rate and provides benefits for
the metabolism and disease resistance later in life [308].
Passive immunity may be provided artificially through the transfer of blood or serum,
and is applied when there is insufficient time for the host to develop an immune response.
Some examples include viral and bacterial infections and poisons such as snake bites
[245]. Cell-mediated immunity may also be transferred in this manner (effector systems
for detecting and neutralising infected cells rather than foreign molecules) and is called
adoptive immunisation. This is the transfer of recirculating lymphocytes rather than
antibodies, although is difficult as such cells may be identified as foreign and attacked by
the host immune system, thus the process is rarely used in humans. Monoclonal antibodies
(mAb) are an artificial passive immunity where large quantities of identical antibodies are
synthesised from identical cloned lymphocytes [407]. Unlike polyclonal antibodies that
vary in their specificity for an antigen, monoclonal antibodies all have the same specificity,
and thus may provide a strong and directed defence. In theory it is possible to synthesise
antibodies to recognise any substance. They are primarily used in biomedical research
for detection and purification tasks, in the diagnosis of disease, and in the treatment of
infections and cancer as delivery mechanisms [414]. The process for producing monoclonal
antibodies was first described in 1975 [260], and later refined for human use [336].
Active Immunity
Active immunity involves the stimulation of the system by an antigen and the develop-
ment of an immune response. Natural active immunity is the normal functioning of the
acquired immune system for neutralising pathogens. Artificial active immunity involves
211
intentionally inducing the immune response by introducing an immunogen in a vaccine.
A vaccine is typically administered before the patient contracts the disease, although it
may be administered after, assuming the immune response to the immunogen is faster
than the response to the infection. There are many different types of vaccines including
inactivated (dead) pathogens, live attenuated (low virulence) pathogens, toxoids (inactive
toxic compounds from pathogens), and subunit or pieces of pathogens. Vaccination does
not prevent the host from contracting the disease, rather like natural active immunity it
provides an improved response to the disease making it harder for it to spread throughout
the population. Vaccination is one of the greatest achievements in medicine and pub-
lic health [344]. The ethics of compulsory vaccination are still debated throughout the
world, although the benefits of immunity to disease and disease eradication are generally
considered to outweigh the costs of a minority of recipients contracting the disease the
vaccine was designed to prevent. An aspect of population vaccination is an effect called
herd immunity [140, 23, 22]. This is where the majority of the population (perhaps more
than 90%) is vaccinated for a disease, which provides protective coverage for the entire
population. An impact of this interesting effect is that vaccination schemes may not be
concerned with immunising the remainder of the un-vaccinated population, rather the
immunisation of enough of the population to reduce the chance (to a desired level) of a
member of the population contracting the disease.
6.2.2 Evolution
The acquired immune system of mammals (such as humans, mice, rats, and cattle) is the
most studied immune system. A consideration of the system in the context of the ‘tree of
life’ reveals that this it belongs to a very small minority of taxa: the jawed vertebrates,
raising the question as to why this system evolved when all other plants and animals
survive without it. Evolution has designed a complex, specialised, and multi-layered de-
fence in the immune system [105], although the system is not perfect: “. . . vertebrates are
exquisitely adapted [. . . ] but not perfectly; autoimmunity and cancers present the costs
and failures of immunity” [337] (page 33). The very fact that mammals are vulnerable
to disease highlights that the immune system is a sub-optimal adaptation [303]. Interest-
ingly, some suggest the acquired immune system may be an evolutionary misstep given
all the positive and negative feedback signals (checks and balances) needed to regulate an
immune response [204]. This section provides a brief review of the innate and acquired
immune systems from an evolutionary perspective.
The innate immune system is a collection of defence mechanisms, tissues, and specialised
processes that defend the host from its pathogenic environment. The innate defence is
inherited and defined in the genome, thus the specificity for the pathogens it may detect
is ‘hard-wired’ throughout the hosts lifetime. The trade-off for this rigidity is that the
defence it provides is fast, practically instantaneous. In the acquired immune system,
evolution has designed a somatic learning system that may recognise any biochemical
212
molecule, although this tool of defence may also destroy the host which it is intended
to protect. Acquired immunity is a personalised defence, learned within the context of
the hosts’ specific pathogenic environment. It is slow acting, requiring an aggregation of
antigen encounters generally over about a week before it is ready to fight the pathogen (fast
compared to the innate system which specialised over generational time). As a strategy,
the system is anticipatory, assuming that future pathogenic encounters will be the same
or similar to past pathogenic encounters. Table 6.2 contrasts some of the properties of the
acquired and innate immune systems.
Table 6.2: Summary of the differences between the innate and acquired immune systems,
taken from [257] (page 565).
6.2.3 Summary
The evolution of immunity is the interaction of immune systems both with their environ-
ment, which may be adversarial in the case of parasites, and with each other in terms
of reproduction and natural selection. Sexual recombination of the genetics of immu-
nity provides interactions of immune systems in terms of new arrangements of existent
traits. The pressure of natural selection results in the implicit competition between het-
erogeneous populations of immune systems in a spatial-temporal pathogenic environment.
Immunisation provides a second example of the interaction between immune systems.
Evolution designed the mammalian acquired immune system to be augmented in infancy
by the lifetime immunological knowledge of the maternal immune system in a temporary
213
Lamarckian-style inheritance. This natural passive immunity provides a robust replace-
ment defence for the developing system. Additionally this process may be reproduced
artificially later in life by the removal of antibodies from one host and then injected into
another to provide a short-lasting immediate defence to a pathogen.
Effector Sharing
Immunity is acquired and refined over the lifetime of the host given antigen exposures
and resultant clonal selection and affinity maturation. The effectors produced in this
process (antibodies, memory and recirculating lymphocytes) may be shared with other
immune systems. In this context effector is a generalised term that refers to some discrete
information acquired by an immune system such as the product of a clonal selection and
expansion event. This section describes two mechanisms for sharing effectors between
systems in what is referred to as passive immunity: Vertical Sharing and Horizontal
Sharing.
Vertical Sharing Vertical sharing is inspired by natural passive immunity such as the
sharing of antibodies between mother and foetus across the placenta (maternal immunity),
214
and to the infant after birth through breastfeeding (mucosal immunity). Vertical sharing
of immune effectors is a mechanism of inheriting acquired immunity between generations.
A sample of the effectors are removed from a parent system and inserted into a child
system. The shared effectors, such as all cellular components have a finite lifetime and
may perish before being employed by the receiving system. A natural version of this
mechanism is a parent-child relationship, but this is not a requirement. The mechanism
does require (1) a generational population structure, (2) the selection of a donor from the
previous generation, (3) the selection of a receiver from the next generation, and (4) a
sampling method for the donor (effector selection mechanism).
Evolved Immunity
Another way of sharing immunity is through genetic evolution involving (1) the assignment
of immune system fitness, (2) selection of parent immune systems, (3) the recombination of
parent genetic material to create children, and (4) the mutation of child genetic material.
Those immune systems that demonstrate their relative utility (relative to other immune
systems with the same generational population) may proliferate, and those that do not
demonstrate utility, perish. The evolution of immune systems requires that the expressed
phenotype (thing being evolved such as immune effectors or response strategy) be tran-
scribed from a genome (representation) on which the evolutionary processes of selection,
recombination, and mutation may operate. It requires a generational mechanism for im-
plicitly sharing effectors (seed and process for creating effectors) rather than explicitly as
in the case of vertical and horizontal effector sharing. Two evolved immunity mechanisms
are presented as follows: (1) Evolution of an Innate Immunity, and (2) Evolution of an
Acquired Immunity.
215
Acquired Immunity The acquired immune system, although is a somatic learning
system rapidly adapting to the hosts pathogenic environment, may also acquire more
generalised species level traits via evolution. Evolution may be used to evolve the acquired
immune system by biasing the creation of naı̈ve lymphocytes to specific sub-areas of the
shape-space. This bias may accelerate the acquisition of immunity by individuals, requiring
less work by the somatic learning system.
Section 5.3.2 extended the Antigenic Exposure Paradigm of Section 4.2.2 to include the
notion of multiple points of exposure on a Tissue Clonal Selection Algorithm (each reper-
toire). The attributes of discrete exposure were bundled into a concept called the Tissue
Exposure Pattern. This concept was specialised to incorporate spatial and temporal regu-
larities of exposure location and duration in order to assess the information acquisition and
dissemination properties of tissue models called an Antigenic Infection. The aggregation
of multiple antigenic infections on a tissue was referred to as situating the tissue model
(host) in an Antigenic Habitat. Like Tissue Clonal Selection Algorithms, Host Algorithms
also provide multiple points of exposure in an antigenic environment and therefore have
similar concerns. Figure 6.1 provides a conceptualisation of a spatial population of discrete
hosts, each situated in their own antigenic habitat.
Figure 6.1: Host Clonal Selection Model and the situated spatial properties that affect
antigenic exposure, where the arrows represent interaction between the discrete compo-
nents (hosts) in the system.
There are two distinct and important differences between the Tissue and Host paradigms
with regard to antigenic exposures: (1) exposures of antigen to hosts may be both con-
trolled (elicited by other hosts) and uncontrolled (environmental) whereas tissue models
have no control over such exposures, and (2) the level of abstraction regarding exposures
is raised from that of an habitat of infections for a single host, to multiple and potentially
different (asymmetric) habitats across multiple hosts called an Antigenic Environment.
216
Controlled and Uncontrolled Exposures
The acquired immune system learns through exposure, detection, and response to antigens,
thus the antigenic environment defines what is learned and when. The immunity that a
system receives through recognising and responding to antigens is called active immunity
and may be induced naturally (uncontrolled) and artificially (controlled).
Controlled Exposure Control over antigen exposure provides control over immunity
of individual systems and virtual immunity over the entire population through effects like
‘herd immunity’. Artificial exposure of systems to antigen provides control of (1) which
systems are exposed to (2) what antigen (3) when. A vaccination exposure strategy may
involve administering a vaccine to a large number of systems quickly. An inoculation
strategy may involve exposing a select few systems to the antigen in a short amount of
time. Control of exposures may also extend to preventative steps such as environment
sterilisation or individual system isolation from the antigenic environment.
The Tissue Exposure Regime of the Tissue Paradigm may be extended to a Host Exposure
Regime (HER) that defines which hosts are exposed to antigen and when they are exposed.
This means that the system is less concerned with how well a given host can specialise a
response and internally disseminate acquired information, and more concerned with how
that information is acquired and disseminated between hosts in the population. Unlike
tissues, hosts are not restricted to fixed network topologies like the ring network structure
of the Lymphocyte Recirculation Algorithm, therefore asymmetries in the Host Exposure
Regime and the host interaction patterns define the capability and speed of information
dissemination throughout the population. Given the shift in focus from the internal pro-
cess of information acquisition within a host to the internal information acquisition of a
population of hosts, the antigenic environment may be conceptualised as a Pathogenic
Environment consisting primarily of exogenous antigen. This does not mean hosts may
not respond and communicate information regarding endogenous antigen, rather it sug-
gests that the focus of the Host Paradigm is hosts and their relationships with external
antigen that may come the environment and other hosts. In addition to the Host Expo-
sure Regime, the rise in the level of abstraction in the Host Paradigm facilitates broader
217
concepts regarding antigen as self-contained entities, in particular (1) the co-evolution of
pathogen with a population of hosts, and (2) the contraction of a pathogen by a host and
transmission to neighbouring hosts.
Evolvable Pathogen A pathogen may explicitly evolve or co-evolve with the population
of immune systems. Evolution may refine the strategy of the pathogen affecting configu-
ration such as virulence and transmissibility. An individual acquired immune system may
be open to multiple infections by the same pathogen during its lifetime if the rate of evo-
lution is sufficiently rapid. Such a pathogen may require tracking and ultimately evolving
countermeasures by the host population, perhaps facilitating a host-parasite interaction.
Transmittable Pathogen After exposure to a host, a pathogen may jump from host-to-
host using a number of mechanisms (vectors). Further, transmissibility may be influenced
by any number of epidemic-based host models such as density-dependence, spatial models,
and genetic-similarity models.
An acquired immune system does not exist in isolation, rather it is a collection of organs
and tissues that collectively represent an integrated part of a host organism, which in turn
belongs to a population of such organisms. One may consider the hosts of a population
interacting with each other, more specifically interacting with regard to their immune sys-
tems. The class of model in which a population of clonal selection-based immune systems
interact with each other is referred to as a Population Host Model. The focus of this model
is the host as the unit of adaptation, each with a distinct starting point, and likely distinct
antigenic environment including interactions with the environment and other hosts. This
diversity provides robustness in the population with regard to information acquisition and
dissemination, abstracting concerns of population survivability in an unknown environ-
ment. A population of non-interacting hosts facilitate the development of multiple varied
perspectives of an antigenic environment that remain isolated. Integration of this informa-
tion without host interaction mechanisms would require augmentation from a higher level
of abstraction (the population level). The isolated perspectives property of the population
model is made more apparent in an asymmetrical pathogenic environment. In such an
environment, not only does the heterogeneous population acquire information in different
218
ways and rates, but the information content of the environment to which they are exposed
also varies. Therefore, although the population may collectively represent a map of the
environment, there is no way for individual systems to share acquired information. This
concern is further highlighted if we consider that the asymmetrical pathogenic exposure
regimes for the systems in the population vary over time. In this case, the information
acquired by one system is directly useful to other systems, although cannot be exploited.
A population of non-interacting hosts provides a foundation on which to incorporate intra-
population (inter-host) interactions. Intra-population re-transmission of captured antigen,
and intra-population effector sharing provide two examples that motivate the investigation
of decentralised intra-population interactions.
Generational Model
Host organisms in a population reproduce such that a generational structure may be de-
fined between hosts where progenitor-hosts produce progeny-hosts. In this mechanism,
the population of immune systems (the present generation) are responsible for creating a
new set of immune systems (the next generation), which replace members of the present
generation. This principle defines the Generational Host Model that provides an extension
to the proposed Host Population Model. Hosts may use an asexual reproduction mecha-
nism where one host contributes a variation of itself to the next generation. Alternatively,
hosts may collaborate in their contributions to successive generations (sexual reproduc-
tion). Further, the contributions of various hosts to successive generations may not be
homogeneous, such that more successful hosts (by some measure of success) may contribute
more than less successful hosts. The principle components of the generational approach
are (1) the reproductive scheme, and (2) the mechanism that triggers the generational
change.
• Generational Trigger : The condition, that once satisfied requires the application of
the reproductive scheme to the present generation to create the next generation of
immune systems. An example is a time trigger in which immune systems are given
a representative exposure to the pathogenic environment.
To be clear, the host generational approach is the same in principle to classical gener-
ational clonal selection algorithms in that one generation represents one iteration of the
systems execution. The important difference is that one generation of the host generation
system involves multiple generations of the classical clonal selection algorithm (cellular)
within each host (hosts’ tissues).
The premise of the generational mechanism is that a given instance of a host immune
system may acquire different information in the same antigenic environment over successive
219
trials (generations). A generational model that does not allow one generation of hosts to
convey information to progeny, rather it provides a clean slate for each system to repeat a
trial. Ultimately such a simplified generational model ‘resets’ each host to initial conditions
at the beginning of each new generation. The restart principle gives a population of
immune systems, each with their unique and ongoing perspective of the environment,
successive chances of learning a perspective of the environment. The inability of the
systems to share acquired information between generations, means that each generation
must re-learn (start from scratch) those things learned in the previous generation. If a
generational-accumulative model is desired, it must be implemented as a mechanism at a
higher scale than the generational model. Such a mechanism is responsible for explicitly
integrating information across generations. The hope of the generational model is that each
fresh-start and subsequent run (trial with the environment) results in a varied perspective
and thus varied acquired information perhaps at the individual system-level, and more
importantly at the population-level. The concern of a non-interacting generational model
is that operating with a fresh-start is likely too computationally intensive (inefficient) with
regard to the information acquired and explicit integrated. More importantly, there is little
guarantee that the ‘varied perspective’ principle will hold for a given environment. The
model may be extended by proposing two different vertical sharing mechanisms by which
populations can share information between generations of the a algorithm: explicitly by
the inter-generational sharing of effectors, and implicitly by the evolution of characteristics
that influence the response to antigenic exposures. The intent of sharing information
between generations is that subsequent generations can learn from the success and failures
of the previous generation, and the generations that came before it. Such mechanisms
allow the generational-population (species) to implicitly integrate information about the
environment over generational time (rather than explicitly by an external mechanism).
Further, such mechanisms do not restrict subsequent generations to the limitations of the
past, rather integrating generational knowledge into the ‘fresh-start’ systems facilitating
the desired trait of the non-interacting generational model of acquiring a varied perspective
(if such a variation in possible).
220
and generational population structure. These interactions, in addition to implicit host
interactions in an evolutionary process, motivate the realisation of distributed informa-
tion management strategies in the host clonal selection paradigm. This section provides
a realisation of the concerns of the abstract Host Clonal Selection Paradigm presented
in Section 6.3. This includes a general problem definition that captures the concerns for
investigating systems at the host-level of abstraction, as well as its specialisation in the
colour space domain. A general Host Clonal Selection Algorithm is proposed providing a
basis for population-based host architecture and as well as its extension, the generational
host architecture. Empirical measures are proposed for the investigation of developed
strategies, and general behaviour expectations are proposed motivating confirmatory re-
search.
The Habitat Antigenic Exposure Problem (HAEP) defined in Algorithm 6.1 provides a
general problem definition where a Population P is exposed to an Habitat B. A given Tis-
sue Clonal Selection Algorithm (TCSA) may be considered as a single H in a Population
of Hosts (P = {H1 , H2 , H3 , . . . Hn }). Likewise the Infection Antigenic Exposure Prob-
lem (IAEP) defined in Algorithm 5.1 may be considered a single H in an Environment of
Habitats (E = {B1 , B2 , B3 , . . . Bn }). The parameters of HAEP are the same as IAEP with
the addition of Nhabitats defining the number of B in E. The CreateEnvironment opera-
tion creates a new environment that may be exposed to a P via the Exposure operation
that returns a subset of the population Prs representing the populations ability address the
specific exposure requirements of the environment under the given Host Exposure Regime.
221
Habitat Colour Space Problem
The HAEP may be specialised as a habitat extension of the Infection Colour Space Problem
(ICSP) defined in Section 5.4.1 called the Habitat Colour Space Problem (HCSP). An
instance of the HCSP involves the exposure of a H to a set of Colour Space Pattern Sets
(CSPS) where the goal of the problem is to minimise the average error in the response
Prs . As was the case with IAEP, one may define a minimum configuration of HAEP and
thus HCSP that focuses the concerns on the highest level of abstraction in the problem
(an E of B). The focus is provided by marginalising the configuration at the lower levels.
A Minimal Habitat Antigenic Exposure Problem (MHAEP) is defined where Nhabitats
remains variable, although Ndeterminants , Nantigen , and Ninf ections are fixed at 1. Therefore,
in the case of HCSP, the number of B defines the number of Sets of CSP (I), each of
which is comprised of a single CSP (A) where all three components are treated a single
determinant (D).
Environment
Habitat Habitat ( )
Infection Infection
Antigen Antigen
Determinant Determinant
Figure 6.2: Elaboration on figure 5.18b to depict the Minimal Habitat Antigenic Exposure
Problem (MAHEP)
The HAEP may be specialised with a series of Host Exposure Regimes (HER) in the same
manner as the IAEP was specialised with a series of Tissue Exposure Regimes (TER)
in Section 5.4.1. This reuse is facilitated because both the Tissue and Host paradigms
are concerned with strategies for organisation information in the context of unknown
scopes and regularities of information exposure. As such, the series of five TER’s may
be modified for use with the Host Paradigm such that the algorithms remain the same
and the parameters are changed from H and B to P and E. The following Host specific
exposure regimes are defined as AHER, OHER, PHER, RHER, and SHER.
222
6.4.2 Host Clonal Selection
Population Host Clonal Selection Algorithm The Tissue Clonal Selection Algo-
rithm (TCSA) defined in Algorithm 5.7 describes the general interaction between a Habi-
tat B and a Host H. The host paradigm requires a rise in the level of abstraction from
a single H to a Population P of H (P = {H1 , H2 , H3 , . . . , Hn }) that responds to an En-
vironment E of Habitats B. The Host Clonal Selection Algorithm (HCSA) defined in
Algorithm 6.2 describes a general host algorithm that may be specialised based on the
concerns and constraints of the Tissue Paradigm, specifically the HostInteractions op-
eration that provides facility for specialising the interactions between hosts. The focus
of the HCSA is host interactions within a population, therefore to differentiate the ap-
proach from the generational extension (described next), the HCSA may be referred to
as a Population Host Clonal Selection Algorithm (PCSA) to clarify its relationship with
the generational extension. In the tradition of the CCSA and TCSA, one may define a
minimal implementation of HostInteractions in which there are no interactions between
hosts in the population. This Minimal Population Host Clonal Selection Algorithm (MP-
HCSA) provides a baseline for comparison with extensions of the PHCSA that facilitates
intra-population interactions. In addition to no host-interactions, the MP-HCSA codifies
the focus of the Host Paradigm on host interactions, taking intra-host concerns considered
in the Tissue Paradigm for granted. Specifically, each host in the MP-HCSA has a single
tissue (H = {T1 }), allowing each host to be treated as a generic information processing
component in the system.
223
CreateP opulation operation defines the mechanism for creating a new P from an existing
P that has interacted with the antigenic environment E. A minimal implementation of
the CreateP opulation can be defined in which the creation of the new population of hosts
is independent of the existing population (no interaction). This Minimal Generational
Host Clonal Selection Algorithm (MG-HCSA) provides a baseline for comparison with
extensions of the GHCSA that promotes intra-generational interactions.
System Measures
Population Error The Host Error (HE) defined in Equation 5.1 provides a generalised
measure of the error for a single Host Result Set of tissues Hrs against a given Habitat of
antigenic infection B. This measure may be calculate a Hrs for each H in a P to formulate
an Prs that may be averaged to define a Population error (PE) (see Equation 6.1). PE
provides an indication of instantaneous average error for each Hrs for a given Prs provided
224
by a HCSA in response to an Host Exposure Regime. PE is in the units of the E problem
space, for example Euclidean distance for a colour space specialisation.
n
1$
P opulationError(E, Prs ) = HostError(Bi , Hrs i ) (6.1)
n i=1
Population Diversity The Host Diversity (HD) measure defined in Equation 5.3 pro-
vides an instantaneous diversity a TCSA. The same approach used in HD for calculating
the diversity between repertoires of cells may be used at the population level if the tissues
of each host are compressed to a single repertoire. The measures assumes such a reduction
permitting the direct calculating of a Bit Frequency Histogram (defined in Algorithm 5.8)
for each H, permitting the comparison of Hosts using Bit Frequency Difference (defined
in Equation 5.2), and ultimately the calculation of diversity according to Equation 5.3.
For consistency in the measures used in the host paradigm, this measure is re-branded
Population Diversity (PD).
Component Measures
Average Host Diversity The Average Tissue Diversity (ATD) defined in Equation 5.4
provides an instantaneous measure of the diversity of the average T of a host measured
in bits. This measure may be averaged across all hosts in the population P to provide
a measure of the average host diversity as the average of the diversity of tissues (defined
in Equation 6.2). Alternatively, Average Host Diversity may be calculated as the Host
Diversity (defined in Equation 5.3) averaged for all hosts in the population. This measure
will provide more fidelity for population configuration in which hosts have more than a
single tissue.
n
1$
AverageHostDiversity(P ) = AverageT issueDiversity(Hi ) (6.2)
n i=1
Average Host Error In the same manner as the Average Tissue Error (ATE) in Equa-
tion 5.5, an average error may be defined that exploits the system-level error calculation
for each component of the system. Equation 6.3 defines the Average Host Error (AHE)
that calculates the Population Error (defined in Equation 6.1) for E against each host H
in P , that is averaged by the number of hosts in the population.
Hn En
1 $ 1 $
AverageHostError(E, P ) = HostError(Bj , )Hrs i ) (6.3)
Hn i=1 En j=1
225
primarily reason for this is the reuse of varied exposure regimes as a decoupling mechanism
between systems and environment for the spatial-temporal regularity or lack there of in
the interaction between the two.
Section 6.3.3 proposed a population and a generational host architectures providing two
different foundational organisations of hosts. This section considers the emergent effects of
these two organisations contrasting their mechanism and information management strate-
gies. Table 6.3 provides summary of the two models in these terms.
Table 6.3: Summary of the difference in mechanism and strategy between the complemen-
tary concerns of host algorithms under discrete exposures.
1. Population Strategies
2. Generation Strategies
(a) Minimal generational promotes multiple trials from multiple and potentially
variable perspectives on a problem.
226
(b) Intra-generational interaction promotes dissemination about acquired informa-
tion between trials.
In the tissue paradigm the urgency of acquisition and effective application were promoted
by the metaphor of injury by unattended infection, such urgency is not promoted in the
host paradigm. Instead, hosts unlike tissues are more expendable as long as some of
the hosts population acquire and employ an effective immunity, the ‘system’ (population)
will survive. This disposability of components is fostered more so in the generational
architecture as the mechanism for population assessment and turnover (new component
creation) are explicitly defined. An important consideration in the Host Paradigm is the
independence of perspective, in particular the capability of different hosts to respond in
varied ways to the same stimulus. This may be investigated by varying host configuration
and starting conditions within a population and exposing them to a symmetric antigenic
environment to assess emergent effects. Alternatively, the host exposure regimes provide
an opportunity for investigating the same effects using the opposite case of the same host
configuration exposed to regimes varying in regularity and scope of population exposure.
The integration of these two complementary cases represents the pinnacle host-model
complexity, where the variation of perspective promoted by the variability of exposure
regime provides an idealised and controlled model with strong similarity to model used in
the tissue paradigm. This reuse of exposure regimes in Tissue and Host Paradigms promote
similar expectations as to their general effects in terms of localisation and dissemination
across the components of the system although under different constraints. Specifically, a
population of host systems interact in different ways from that of the fixed intra-tissue
interaction.
Table 6.4 classifies the five Host Exposure Regimes in terms of their general attributes,
including information distribution, nature, and consistency. One may consider the distri-
bution of the exposure of distinct information to the components of the system with the
different host exposure regimes. Symmetrical exposure suggests that each component has
the opportunity of being exposed to any piece of information in the environment, whereas
asymmetrical constraints this expectation. The opportunity may be deterministic, such as
a certainty of being exposed to all or some of the information environment or probabilistic
in those regimes with a stochastic element. Scope provides a general notion as to how
much of the system has the opportunity for interacting with the antigenic environment
irrespective of the specific information it may be exposed to. The nature of the regime
defines the basis of the exposure mechanism which directly relates to the consistency of
the component-information match ups each each exposure event.
227
Regime Distribution Scope Nature Consistency
AHER Symmetrical System-Wide Deterministic Regular
OHER Symmetrical System-Wide Probabilistic Semi-Regular
PHER Symmetrical Constrained Deterministic Regular
RHER Asymmetrical System-Wide Probabilistic Irregular
SHER Asymmetrical System-Wide Deterministic Regular
The general observational trends for both management types are expected to hold for
hosts as they did for investigations into Tissue Paradigm. Specifically, an increase in the
population generalisation results in Average Host Error that approaches the Population
Error with decrease in system diversity as components are more similar, contrasted with
a relative decreased in system error with population specialisation resulting in an increase
in system diversity as component become more heterogeneous.
228
by exposing a system to harmless molecules with similar features to the antigen of inter-
est that elicits the same response. The artificial elicitation of immunity is the principle
behind vaccination’s against disease. In both the artificial and natural cases, eliciting an
immune response provides control over what information a host should acquire and when
it should be acquired, although this control may or may not reside with the host. This
control may be abstracted to the general sampling of antigen from the environment by a
host and future transmission to other hosts in the population. This sampling and trans-
mission provides a mechanism by which a given immune system may share information
about the antigenic environment with other immune systems in the population. Individ-
ual immune systems must collect and store samples of antigen to which they are exposed
for transmission to other systems in the population. This mechanism is referred to as
the Antigen Sampling Scheme. The sampled antigen must then be passed on to other
immune systems with which a given immune system interacts. This passing on is referred
to as the Antigen Transmission Scheme. The antigen sampling mechanism is dependent
on the antigenic environment, more explicitly the host antigenic exposure regime the sys-
tem is subjected to by the environment and other hosts (Antigenic Habitat). The antigen
transmission mechanism is dependent on the intra-population (inter-host) interactions fa-
cilitated by the population structure, host environment, and any interaction intentions of
the individual systems themselves.
The specialisation of the Population Host Clonal Selection Algorithm (defined in Al-
gorithm 6.2) with an antigen sampling and antigen transmission scheme is called the
Transmission Host Clonal Selection Algorithm (THCSA). Algorithm 6.4 defines a generic
antigen sampling scheme where all habitats exposed to a population are recorded by the
hosts for future transmission. The principle of the algorithm is for hosts in a population
to inform other hosts in the population in either a controlled or uncontrolled manner re-
garding antigen of interest, and to allow those hosts to elicit their own internal response.
The algorithm is reasonably general, such that it may be specialised in a number of dif-
ferent ways inspired by population-immune system interactions. Two specialisation of the
THCSA are defined: (1) uncontrolled transmission scheme inspired by pathogen dynamics,
and (2) a host controlled transmission scheme inspired by vaccination dynamics.
229
Pathogen Transmission Dynamics
• Sampling Scheme: Samples are collected when a host is exposed to pathogen from
the environment or another host. The longevity of the sample in storage is a property
of the infectiousness of the pathogen. A host may be a carrier for more than one
pathogen at a given time.
The pathogen dynamics inspired approach to the transmission algorithm is called the
Pathogen Transmission Host Clonal Selection Algorithm (PT-HCSA). The concerns of
pathogen infectiousness and host-carriers are simplified to the collection of all exposed
antigenic information (as per Algorithm 6.4), the random selection and transmission of
sampled antigen, and the clearing of sampled antigen for each population exposure (al-
gorithm epoch). Two variations of the PT-HCSA are proposed: (1) in which transmis-
sions occur between random pairings of infected hosts, and (2) where transmissions occur
between random neighbouring hosts in a one-dimensional fixed-spatial environment. Al-
gorithm 6.5 defines a specialisation of the HostInteractions for random pairing based
transmission.
Algorithm 6.5: Random Pairings for Pathogen Transmission Host Clonal Selection.
Input: P
1 foreach Hi ∈ P do
2 if Hi .exposures #=0 then
3 H& ← 0;
4 while H& ≡ Hi do
5 H& ← SelectRandomHost(P);
6 end
7 B& ← SelectRandomExposure(Hi .exposures);
8 Exposure(H&, B&);
9 end
10 end
230
Algorithm 6.6 defines a specialisation of the HostInteractions for the random spa-
tial pairings approach to pathogen transmission where hosts are arranged into a one-
dimensional ring structure that limits the random pairing of hosts. Those hosts with
sampled exposures transmit a single exposure to a randomly selected spatial neighbour.
Algorithm 6.6: Spatial Pairings for Pathogen Transmission Host Clonal Selection.
Input: P
1 foreach Hi ∈ P do
2 if Hi .exposures #= 0 then
3 H& ←0;
4 if RandomDouble() < 0.5 then
5 if Hi ≡ Hn then
6 H& ← H1 ;
7 else
8 H& ← Hi+1 ;
9 end
10 else
11 if Hi ≡ H0 then
12 H& ← Hn ;
13 else
14 H& ← Hi−1 ;
15 end
16 end
17 B& ← SelectRandomExposure(Hi .exposures);
18 Exposure(H&, B&);
19 end
20 end
231
nation and inoculation principle from immunology in which a small sample of pathogen is
given to a healthy system to illicit immunity to the pathogen. The scheme is simpler than
that of the pathogen dynamics scheme in that (1) the host has control over selecting which
pathogen to transmit, and (2) the host has control over selecting a ‘healthy’ system to
which to transmit a sampled pathogen. The operations for the vaccination specialisation
of the THCSA are defined as follows:
• Sampling Scheme: Samples are collected when a host is exposed to pathogen, al-
though the host has discriminatory control over which pathogen are collected and
stored and which are not. Further, the host may decide to discard stored pathogen
in the acquisition of additional information from the environment (such as exposure
frequency).
The host selection mechanism provides a powerful tool for the population of immune
systems to artificially manipulate the pathogenic exposure regime. This manipulation
will likely have the intention of improving ‘coverage’ by the population for the inocu-
lated pathogen. A host may decide to push the limits of the transmission scheme (mass
vaccinations) either under special circumstances (adaptive transmission), or all the time.
Vaccination of a large sample of the population may provide benefits to the entire popu-
lation given a ‘herd immunity’ effect.
232
6.5.2 Transmission Empirical Study
Aim
The aim of this empirical study was to investigate the Transmission Host Clonal Selection
Algorithm, specifically the pathogen and vaccination configurations in the context of their
information dissemination and localisation capabilities as compared to the Minimal Popu-
lation Host Clonal Selection Algorithm under a variety of host exposure regimes. Toward
this end, the study had the following goals:
1. Investigate the relative effects of the two defined host interaction methods for the
uncontrolled pathogen transmission scheme.
2. Investigate the relative effects of the controlled elicitation of immunity of the vacci-
nation transmission scheme under different vaccination sample sizes.
Method
Algorithms The study considered the Minimal Population Host Clonal Selection Al-
gorithm (MP-HCSA) and the Transmission Host Clonal Selection Algorithm (THCSA),
with two specialised configurations: the Pathogen Transmission Host Clonal Selection Al-
gorithm (PT-HCSA) and the Vaccination Transmission Host Clonal Selection Algorithm
(VT-HCSA). MP-HCSA is a specialisation of the HCSA defined in Algorithm 6.2, that
was configured with Nhosts = 10. Each H was configured with a single tissue (Ntissues = 1)
that was an instance of the Replacement Cellular Clonal Selection Algorithm (RCCSA) de-
fined in Algorithm 4.5, with the configuration Ncells = 50, Nselection = 1, and Nclones = 5.
The method for sampling all exposures in THCSA defined in Algorithm 6.4 was used
for both specialised transmission regimes. Two different pathogen transmission schemes
were investigated, the random pairings scheme defined in Algorithm 6.5 referred to as
(PT-HCSA-RP), and the random spatial parings defined in Algorithm 6.6 referred to as
(PT-HCSA-SP). The vaccination regime defined in Algorithm 6.7 was used with a small
vaccinated set (VT-HCSA-S) Nvaccinate = 1 (10% of the population) and a large vaccinated
set (VT-HCSA-L) Nvaccinate = 5 (50% of the population).
Problems The colour space specialisation of the Habitat Antigenic Exposure Paradigm
(HAEP) defined in Algorithm 6.1 was used called the Habitat Colour Space Problem
(HCSP). The minimal variation of HCSP was used with Nhabitats = 10, and Ndeterminants =
Nantigen = Ninf ections = 1. Each B was a Colour Space Pattern (CSP) was randomly
generated at the beginning of each run. The five different Host Exposure Regimes (HER)
defined in Section 6.4.1 were used for the HCSP. These included the AHER where the
number of H matched the number of B (one-to-one), SHER, RHER, PHER where Hpoint
was fixed at tissue 1, and OHER with duration = 15.
Experiment Each algorithm used the Maximum Epochs Stop Condition (MESC) de-
fined in Equation 4.8 with M axEpochs = 1000. The four host specific measures defined
233
in Section 6.4.3 were collected from the state of the system after the triggering of the stop
condition. These included the system measure PE and PD, and the host measures AHE
and AHD. Each algorithm and problem received a new and different random number seed
each run. Algorithm-Problem combinations were repeated 30 times.
Results
Table A.5 in Appendix A.2.1 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
ues. Box-and-whisker plots are provided in which the results for each algorithm are ag-
gregated across all HER for a each measure. Figure 6.3 shows PD, Figure 6.4 shows PE,
Figure 6.5 shows AHD, and Figure 6.6 shows AHE.
Figure 6.3: Box-and-whisker plot of Population Diversity (PD) across all HER for the
THCSA study.
Analysis
This section provides an analysis of the results from the empirical study into the THCSA
summarised in Table A.5. These analyses exploit the trends and expectations outlined in
Section 6.4.4, and in particular the attributes of host exposure regimes in Table 6.4.
Pathogen Transmission Trends This section considers the constrained (spatial) and
unconstrained random host pairing methods for the pathogen transmission scheme com-
pared to the MP-HCSA that does not facilitate inter-host communication. From a system
perspective the effect of pathogen transmission was restricted to those exposure regimes
with an asymmetric distribution of information to the hosts in the population. Pathogen
transmission resulted in an increase in population diversity and population error compared
234
Figure 6.4: Box-and-whisker plot of Population Error (PE) across all HER for the THCSA
study.
Figure 6.5: Box-and-whisker plot of Average Host Diversity (AHD) across all HER for the
THCSA study.
235
Figure 6.6: Box-and-whisker plot of Average Host Error (AHE) across all HER for the
THCSA study.
to MP-HCSA on AHER, OHER, and PHER, with no significant difference between the
three approaches at the system level on RHER and SHER. The random pairing method
resulted in a higher system diversity and system error (increased effect) compared to the
constrained spatial random pairing method. The same trend was observed at the com-
ponent level with regard to the symmetry in information distribution by the exposure
regimes. No significant difference was observed between the three approaches on RHER
and SHER with regard to AHD and on SHER with regard to AHE. A relatively large
decrease in component diversity and component error was observed with both pathogen
transmission schemes on AHER, OHER and PHER. As as was the case with the system
measures, the component measures observed an increase in effect with the unconstrained
random pairing method than the constrained random spatial pairing method. The ob-
servations regarding the two pathogen transmission schemes may be generalised to the
following trends:
2. Pathogen transmission increases system diversity and error, and decreases compo-
nent diversity and error on asymmetrical information exposure regimes.
3. The pathogen dissemination effect was more pronounced with random pairing com-
pared with spatial pairing.
Vaccination Size Trends This section considers the vaccination transmission scheme
compared to the MP-HCSA, and in particular the effect of varying the number of hosts
selected for vaccination per population exposure (Nvaccinate ). From a system perspective
236
the vaccination scheme demonstrated the same general trend as the pathogen scheme
with regard to the restriction of the dissemination effect to those exposure regimes with
an asymmetrical information distribution. Vaccination resulted in an increase in system
diversity compared to MP-HCSA, and generally no significant change to system error
other than a small increase in OHER. The large vaccination size demonstrated a larger
increase in system diversity over MP-HCSA than the smaller vaccination size. From a
component perspective vaccination demonstrated a general decrease in the Average Host
Diversity and Average Host Error on the asymmetric information distribution exposures.
This observed dissemination effect increased with the increase in the vaccination sample
size. This result relates to the herd immunity effect, as effective information dissemination
is required to facilitate majority coverage in the population under a probabilistic exposure
regime. A stronger connection to the herd immunity effect may be investigated in the
future by considering a probabilistic variation of PHER with spatial-temporal consistency
like the OHER where the dissemination effect for a one or a number of antigenic habitat’s
could be assessed under a variety of Nvaccinate values. The expectation is that the herd
immunity effect would be correlated with the improvements to the already measurable
dissemination effect (relative decreases in average component diversity and error). The
observations regarding the vaccination transmission scheme with varied vaccination sizes
may be generalised to the following trends:
2. The effects of dissemination on the average component is more pronounced with the
larger vaccination size (lower relative Average Host Diversity and Error).
Dissemination Trends Table A.6 in Appendix A.2 contains the results from the ran-
dom pairing pathogen transmission configuration and the vaccination transmission with
large Nvacinations . These two approaches demonstrated better information dissemination
for their respective approaches. This section compares these two different approaches
across the five exposure regimes in terms of information dissemination. From a system
perspective there was little significant difference in system diversity and error between
the pathogen and vaccination transmission schemes. The only observed significant differ-
ence at the system level was on the PHER with an asymmetric information distribution.
The average component perspective provided more insight into the observable differences
between the two transmission schemes. The pathogen scheme demonstrated a slightly
lower average host diversity on AHER, and a relatively slight increase on the PHER com-
pared the vaccination. The vaccination scheme demonstrated a lower average error on the
PHER, whereas the pathogen approach demonstrated a slight decrease in error over vac-
cination on AHER. This differentiation between the two methods suggests that pathogen
transmission provides some benefit on exposure regimes with asymmetric distribution and
a system-wide scope, where as vaccination is suited to the constrained scope exposure
with asymmetric distribution. This is an intuitive result as one-to-many dissemination is
237
preferred for constrained exposures, and one-to-one dissemination for system-wide expo-
sures. The observations made regarding pathogen and vaccination transmission may be
generalised to the following trends:
1. There was no significant difference between the pathogen transmission and the vac-
cination transmission approaches on exposure regimes with symmetric information
distribution.
Conclusions
This section summarises the findings of the empirical study into the Transmission Host
Clonal Selection Algorithm, in terms of the primitives that were the focus of the study
and the expectations that motivated the study.
1. Primitives
(a) Pathogen transmission with random pairing provides a viable metaphor for
information dissemination via elicitation of response.
(b) Vaccination transmission provides a viable metaphor for information dissemi-
nation via elicitation of response that improves with vaccination size.
2. Transmission
(a) There was generally little difference in the dissemination effect between PT-
HCSA-RP and VT-HCSA-L, except the pathogen approach demonstrated a
relatively slightly better effect on system-wide exposure as opposed the the
relatively slightly better effect observed with the vaccination approach on con-
strained exposure with asymmetrical information distribution.
(b) Exposure regimes with an asymmetric information distribution are required to
engender a varied perspective of the antigenic environment in hosts permitting
the observation of the dissemination effect.
This last point highlights the important finding from the results that confirmed a
base assumption of the empirical investigations into host-based system, which is that the
chosen minimal configuration does not result in significantly independent perspectives
on the same antigenic environment. This result was demonstrated in the results for the
symmetrical RHER and SHER regimes. Alternatively, this result may be interpreted as
the confirmation that an exposure regime with an asymmetric information distribution
is required to observe varied perspectives of the antigenic environment with the chosen
host configuration, allowing the dissemination effect to be observed and measured. The
configuration of transmission schemes were simplistic, providing much room for elaboration
238
and improvement. An important consideration to motivate further investigation is the use
of both pathogen and vaccination based transmission schemes in parallel providing the
benefits of varied cardinality-based dissemination (one-to-one, one-to-many) suitable for
an unknown exposure regime.
239
• Transmission Scheme: Requires the selection of sibling hosts within the systems
population of immune systems, and the injection (transmission) of sampled cells
to selected hosts. The principle concern in the selection of recipient hosts is that
the transmitted cells are likely to be useful. This likelihood may be increased by
selecting sibling immune systems in the population that are in turn likely to have
been subjected to different pathogen and/or at different frequencies (assuming an
asymmetric antigenic environment). Once selected, the transmitted cells must be
integrated into the recipient systems cellular repertoire.
The Population Host Clonal Selection Algorithm defined in Algorithm 6.2 may be
specialised with the the cell sampling and transmission of shared immunity, referred to as
the Shared Immunity Host Clonal Selection Algorithm (SI-HCSA). Algorithm 6.8 provides
a definition of the HostInteractions operation in which a number of hosts (Nsharers ) select
a given number of other hosts in the population (Nrecipients ) and share a fixed number
(Nsharedcells ) of randomly sampled cells. Transmitted cells are copied from the sharing
host and are integrated into the receiving hosts using an integration operation (Integrate),
and host selection both with regard to sharers and receivers is random (RandomHost).
This provides a simple realisation of the shared immunity algorithm without cell or host
selection bias.
The aim of this empirical study is to investigate the Shared Immunity Host Clonal Selection
Algorithm in the context of the information dissemination and localisation capabilities as
compared to the Minimal Population Host Clonal Selection Algorithm under a variety of
host exposure regimes. Toward this end, the study had the following goals:
1. Investigate the relative effects of of small and large sharer and recipient sizes under
shared immunity
240
2. Investigate the relationships between sharer and recipient sizes and information dis-
semination.
Method
Algorithms The study considered the Minimal Population Host Clonal Selection Algo-
rithm (MP-HCSA) and the Shared Immunity Host Clonal Selection Algorithm (SI-HCSA).
MP-HCSA is a specialisation of the HCSA defined in Algorithm 6.2, that was configured
with Nhosts = 10. Each H was configured with a single tissue (Ntissues = 1) that was
an instance of the RCCSA defined in Algorithm 4.5, with the configuration Ncells = 50,
Nselection = 1, and Nclones = 5. SI-HCSA was defined in Algorithm 6.8, where the in-
tegration operation (Integrate) was specialised to the Euclidean-based replacement as is
used in the RCCSA. The number of shared cells was fixed Nsharedcells = 5 and the number
of sharers and recipients were varied. A small number of sharers Nsharers = 1 (10% of
the population) and a large number of sharers Nsharers = 5 (50% of the population) were
assessed with a small number of recipients Nrecipients = 1 (10% of the population) and a
large number of recipients Nrecipients = 5 (50% of the population).
Problems The same Habitat Colour Space Problem and Host Exposure Regimes were
used as was defined for the THCSA empirical study in Section 6.5.2.
Experiment The same experimental setup was used as was defined for the THCSA
empirical study in Section 6.5.2.
Results
Table A.7 in Appendix A.2.2 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
ues. Box-and-whisker plots are provided in which the results for each algorithm are ag-
gregated across all HER for each measure. Figure 6.7 shows PD, Figure 6.8 shows PE,
Figure 6.9 shows AHD, and Figure 6.10 shows AHE.
Analysis
This section provides an analysis of the results from the empirical study into the SI-HCSA
summarised in Table A.7. These analyses exploit the trends and expectations outlined in
Section 6.4.4 regarding information dissemination between the hosts in the population.
Sharer Size Trends This section is concerned with the effect of the number of hosts
sharing acquired immunity in the population (Nsharers ), irrespective of the number of re-
cipients (Nrecipients ). As such, the observations are taken as the general trends in the small
and large number of sharer hosts. From a system perspective the Population Diversity
241
Figure 6.7: Box-and-whisker plot of Population Diversity (PD) across all HER for the
SI-HCSA study.
Figure 6.8: Box-and-whisker plot of Population Error (PE) across all HER for the SI-
HCSA study.
242
Figure 6.9: Box-and-whisker plot of Average Host Diversity (AHD) across all HER for the
SI-HCSA study.
Figure 6.10: Box-and-whisker plot of Average Host Error (AHE) across all HER for the
SI-HCSA study.
243
was generally lower with sharing compared to MP-HCSA across all exposure regimes. The
increase in sharer size generally resulted in a decrease in diversity. A similar relationship
was observed with system error, where sharing generally resulted in an increase in sys-
tem error compared to MP-HCSA, an effect that increased with the number of sharers
(increase in share size increased system error). From a component perspective shared im-
munity resulted in a general decrease in the Average Host Diversity than MP-HCSA. This
effect decreased with the increase in number of sharing hosts, such that a AHD approached
MP-HCSA on the AHER, OHER, and RHER domains. Interestingly, a similar effect was
observed with the Average Host Error that was generally lower than MP-HCSA, although
increased with the increase in the sharer size. This correlation in relationships at the
system and component level with share size demonstrates a disruptive and information
dissemination effect at the system and component level respectively that generally results
in increased disruption at both scales with the increase in the number of hosts sharing
immunity. The observations may be generalised to the following trends:
1. System
(a) Shared immunity results in a generally lower population diversity and generally
higher population error than MP-HCSA.
(b) Increase in sharing size results in increase in system level effects, specifically
decreases in system diversity and increases in system error.
2. Component
(a) Shared immunity results in a general increase in Average Host Diversity, and a
general decrease in Average Host Error compared to MP-HCSA.
(b) Increase in a decrease in component level effects with an increase a decrease in
Average Host Diversity, and a general increase in Average Host Error.
Recipient Size Trends This section considers the effects of varying the number of
recipient hosts (Nrecipients ) irrespective of the number of hosts sharing. As such, the
results are generalised across the configuration values for the number of sharers (Nsharers ).
From a system perspective Population Diversity and Error exhibited the same trends
both with regard to the comparison to MP-HCSA and with regard to the increase in
the number of recipients increasing the disruptive effect of sharing at the system level.
The same relationship was demonstrated at the component level with a general increase
in diversity and decrease in error compared to MP-HCSA, and the increased disruption
(decreased average diversity and increased average error) with the increased in the number
of recipients. These observation demonstrate an important symmetry in general behaviour
between the number of hosts sharing acquired immunity and the number of hosts receiving
acquired immunity. In particular increasing either results in a increase in the disruption
at the system level and disruption to the dissemination of information at the component
level. These observations may be summarised in the following generalised trends:
244
1. The system and component-level effects of recipient size mirror the effect trends of
number of sharing hosts.
(a) System diversity decrease and system error which increases with recipient size.
(b) Component diversity increases and component error decreases, an effect that
decreases with recipient size.
Sharer and Recipient Relationship Trends This section considers the trends in the
relationships between the number of hosts sharing and the number of hosts receiving shared
immunity, not considerating the comparison the MP-HCSA. From a system perspective
the highest population diversity was observed with a one-to-one relationship, whereas the
lowest population diversity was observed with a many-to-many configuration. Generally
there was no significant difference between one-to-many and many-to-one configurations
across the exposure regimes, with PHER as the exception. The same general trend was
observed with regard to population error, where the lowest error was achieved by one-
to-one and the largest system error was achieved by many-to-many. Interestingly, no
significant difference in system error was observed between SI-HCSA-SS and MP-HCSA
on all exposure regimes except RHER where one-to-one sharing resulted in a lower system
error. The component perspective demonstrated the same general trend where the highest
average component diversity and least average component error were observed with the
one-to-one configuration, and the most disruption in diversity and error caused by the
large scale sharing in the many-to-many configuration. Also consistent was the lack of
significant difference in effect between the one-to-many and many-to-one configurations.
The consistency of the dissemination effect in the relationship between both the number of
sharer and recipient hosts was confirmed both in the extreme cases with the least and most
disruption caused by the least and the most amount of sharing, and in the intermediate
cases confirming the symmetry in behaviour. These observations may be summarised in
the following generalised trends:
2. The least disruptive system effect was observed with one-to-one, whereas the largest
disruptive system effect was observed with many-to-many sharing.
3. The best dissemination effect at the component level was observed with one-to-one
sharing, whereas the worst disruptive effect at the component level was observed
with many-to-many sharing.
Conclusions
This section summarises the findings of the empirical study into the Shared Immunity
Host Clonal Selection Algorithm, in terms of the primitives that were the focus of the
study and the expectations that motivated the study.
1. Large scale sharing provides a disruptive effect at the system and component level.
245
2. Small scale sharing minimises the disruptive effect at the system level and maximise
the dissemination effect at the component level.
An interesting aspect of artificial passive immunity is the concern that such shared
information is initially useful although such utility is temporary. This property is expected
to vary with exposure regime and provides an important extension to the investigation
into the SI-HCSA.
• Sampling Scheme: The selection of mature acquired immune cells from host systems
to be removed and transmitted to host systems of the subsequent generation. The
selection scheme should draw a representative sample of the information acquired
by the system over the course of its lifetime (trial period).
The host transmission scheme requires the selection of hosts in the subsequent genera-
tion to receive the sampled cells. A natural implementation of this scheme is the selection
of progeny hosts. Specifically, the selection of hosts in the subsequent generation by hosts
in the present generation, to which they are responsible for instantiating. The parent-child
246
transmission scheme may result in the formation of independent generational host-lines
given the asexual basis of the approach. The concern of this effect is that if a given host
system is lost, then the information acquired by that hosts generational line is also lost.
This concern may be addressed by relaxing the parent-child transmission constraint, and
allowing parent-hosts to potentially transmit to any host in the child generation. A biolog-
ical basis for this configuration may be the use of manufactured formulae, or the use of a
wet-nurse. An example of a decoupled transmission scheme is random host selection, with
reselection. The reselection allows a given host in the child generation to potentially receive
acquired immune information from more than one parent host system. The transmission
of cells to non-child hosts provides redundancy between host lines, if there is a relationship
between parent-child that may affect host-loss (such as reproduction in a hazardous spa-
tial environment). A one-to-many transmission scheme between the generations will also
foster redundancy of acquired information between the generations. The concern in a host
system receiving acquired immune information from more than one host, is that the child
system may become overly biased by the previous generation. A parent-child (one-to-one)
transmission scheme limits the scope of received acquired immune information to a single
host of the previous generation’s perspective.
The Minimal Generational Host Clonal Selection Algorithm (MG-HCSA) of the genera-
tional algorithm defined in Algorithm 6.3 provides a basis for comparison with a maternal
immunity approach as it promotes independent generations. Algorithm 6.9 provides a
definition of the CreateP opulation operation for the MG-HCSA. Equation 6.4 provides a
generational change trigger based on a number of population exposures or epochs, where
a user specified parameter Ngenepochs defines the maximum number of epochs before a
generational change is triggered.
247
Algorithm 6.10: CreatePopulation for Maternal Immunity Clonal Selection.
Input: P, Nmaternalcells
Output: P &
1 P & ←0;
2 foreach Hi ∈ P do
3 T &i ← SelectRandomTissue(Hi , Nmaternalcells );
4 H&i ← CreateHost();
5 H&i .Integrate(T &i );
6 P & ← H&i ;
7 end
8 return P &;
The aim of this empirical study is to investigate the Maternal Immunity Host Clonal
Selection Algorithm in the context of the information dissemination and localisation capa-
bilities as compared to the Minimal Generational Host Clonal Selection Algorithm under
a variety of host exposure regimes. Toward this end, the study had the following goals:
1. Compare and contrast generational clonal selection with and without inter-generational
sharing.
2. Investigate the dissemination of information effect and its disruption by varying the
amount of inter-generational sharing.
Method
Algorithms The study considered the Minimal Generational Host Clonal Selection Al-
gorithm (MG-HCSA) and the Maternal Immunity Host Clonal Selection Algorithm (MI-
HCSA). MG-HCSA is a specialisation of the HCSA defined in Algorithm 6.3, that was
configured with Nhosts = 10. Each H was configured with a single tissue (Ntissues = 1)
that was an instance of the RCCSA defined in Algorithm 4.5, with the configuration
Ncells = 50, Nselection = 1, and Nclones = 5. The CreateP opulation operation for the
MG-HCSA was realised as the creation of a new population of hosts each generational
change as defined in Algorithm 6.9, and the epoch generational change condition defined
in Equation 6.4 with Ngenepochs = 100. The MI-HCSA with assessed with the parent-child
specialisation of the CreateP opulation operation defined in Algorithm 6.10. The number
of cells selected for inter-generational sharing was assessed with three different values as
follows: small Nmaternalcells = 5 (10% of the hosts repertoire), medium Nmaternalcells = 10
(20% of the hosts repertoire), and large Nmaternalcells = 25 (50% of the hosts repertoire).
Problems The same Habitat Colour Space Problem and Host Exposure Regimes were
used as was defined for the THCSA empirical study in Section 6.5.2.
248
Experiment The same experimental setup was used as was defined for the THCSA
empirical study in Section 6.5.2, except the maximum number of epochs of the EOSC
stop condition was decreased from 1000 to 999. This configuration change was made such
that the final measures recorded reflected the state of the system after 10 generations of
100 epochs before the last generational change (at the tenth generation).
Results
Table A.8 in Appendix A.2.3 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
ues. Box-and-whisker plots are provided in which the results for each algorithm are aggre-
gated across all HER for a each measure. Figure 6.11 shows PD, Figure 6.12 shows PE,
Figure 6.13 shows AHD, and Figure 6.14 shows AHE.
Figure 6.11: Box-and-whisker plot of Population Diversity (PD) across all HER for the
MI-HCSA study.
Analysis
This section provides an analysis of the results from the empirical study into the MI-HCSA
summarised in Table A.8. These analyses exploit the trends and expectations outlined in
Section 6.4.4 regarding information dissemination between the hosts in the population.
Generational Trends This section compares and contrasts the minimal generational
approach without sharing with the maternal immunity approach with inter-generational
sharing. MG-HCSA is compared against MI-HCSA-L as it is expected to exhibit the
largest effect of sharing and therefore difference to the minimal approach. From a system
perspective MI-HCSA resulted in a generally population diversity and lower system error
than MG-HCSA across all five of the exposure regimes. Interestingly this trend was not
249
Figure 6.12: Box-and-whisker plot of Population Error (PE) across all HER for the MI-
HCSA study.
Figure 6.13: Box-and-whisker plot of Average Host Diversity (AHD) across all HER for
the MI-HCSA study.
250
Figure 6.14: Box-and-whisker plot of Average Host Error (AHE) across all HER for the
MI-HCSA study.
observed on the symmetric exposure regime, where no significant difference was observed.
From a component perspective, maternal immunity generally achieved a lower Average
Host Diversity and lower Average Host Error than the minimal approach. This was gener-
ally observed across the five HER’s, except on SHER and PHER with regard to AHD and
AHE respectively. The results show a clear localisation effect with decreased error and in-
crease in diversity at the system level, with the interesting side effect of decreased average
error at the component level. The general lack of effect on the SHER suggests that the
inter-generational sharing does not provide any benefit under such a strongly specialising
exposure regime. The observations may be generalised to the following trends:
Maternal Immunity Size Trends This section considers the effect of varying the num-
ber of cells shared between the generations defined by different values for the Nmaternalcells
user parameter. From a system perspective the results demonstrated an increase in effect
with the number of transmitted maternal cells. Specifically, increase in Nmaternalcells re-
sulted in an a increase in system diversity and decrease in system error. The effect was
less pronounced with small sample sizes, typically with little significant difference between
MG-HCSA and MI-HCSA-S as well as between MI-HCSA-S and MI-HCSA-M. From a
component perspective the increase in the number of transmitted sampled cells resulted
in relative increase in the effect as measured by decreases in Average Host Diversity and
decreases in Average Host Error. The same general lack of significance was observed with
251
small, medium and empty sample sizes. The maternal cell size trend demonstrates that
parent-child generational sharing promotes a strong localisation effect that increases with
the amount of information communicated between the generations across the variety of
exposure regimes. Importantly the effect is not apparent (significant) until a sufficiently
large number of randomly selected cells are transmitted. The observations may be gener-
alised to the following trends:
2. The number of cells must be of a sufficient size (50%) for the effect to be consistently
significant across the exposure regimes.
Conclusions
This section summarises the findings of the empirical study into the Maternal Immunity
Host Clonal Selection Algorithm, in terms of the primitives that were the focus of the
study and the expectations that motivated the study.
1. Generational
2. Parent-Child Sharing
252
of the antigenic environment (effecting the specialisation of children under the exposure
regimes).
• Selective Scheme: A specialisation of the host selection scheme of the minimal gen-
erational algorithm that realises the principles of natural selection. A given hosts
contribution to the subsequent generation is differentiated based on assessed fitness
against an inherited trait that effects a hosts acquired immune system.
• Genetic Basis: A genetic code (genome) is used to define a trait of a hosts acquired
immune system. This genetic code provides the basis of natural selection (differenti-
ated reproductive success), and the medium for reproduction (genetic inheritance).
The reproductive scheme provides the mechanism for inheritance of the genetic basis
of an acquired immune system trait. Reproduction provides a duplication of the parents
genetic material which may be modified in minor ways by genetic mutation (likely a lower
rate of mutation than that of hypermutation in the immune response). This introduces
variations of the trait for natural selection to differentiate reproductive success. A property
of the host populations acquired immune system is defined by a parameter or set of
parameters, which is encoded in a genome. The genome is the basis for inheritance, and the
expressed trait is the basis for host selection. For example, an inheritance mechanism may
be defined that encodes information that defines the generation of naı̈ve immune cells in a
253
hosts acquired immune system. Unlike the maternal sharing scheme that directly reinforces
the receptor configurations that are useful, an evolutionary algorithm indirectly reinforces
receptor configurations in the generation of a hosts base repertoire, and ongoing naı̈ve cells.
This is a broader form of sharing that provides the flexibility for the selection mechanism
and scope of the genetic basis for the trait to define the regions of ‘receptor configuration
space’ that are beneficial for a hosts untested acquired immune system to sample. The
mechanism provides an interesting example that combines both genetic-based learning over
generational time and somatic-based learning over a hosts lifetime. Therefore, this class of
host algorithm facilitates learning at two scales, specifically learning at the host-lifetime
scale in somatic adaptations via clonal selection, and learning at the population-generation
scale in genetic adaptations via natural selection. Examples of other traits that may be
subjected to the pressures of evolution by natural selection include (1) the sensitivity of
matching in the clonal selection algorithm (2) and the organisation and connectivity of
tissue types in the lymphoid tissue algorithm. In addition to opening up parameterised
models in the framework to the process of evolution via natural selection (generational
learning), the minimal natural selection algorithm provides a connection of the host-level
of the acquired immune system framework with the field of genetic algorithms.
The Evolved Immunity Host Clonal Selection Algorithm (EI-HCSA) is defined as a spe-
cialisation of the Generational Host Clonal Selection Algorithm (defined in Algorithm 6.3)
that uses a genetic basis, host selection and host reproduction schemes as defined in the
CreateP opulation operation in Algorithm 6.11. The Pmutation parameter defines the prob-
ability of mutating a component in the hosts genetic representation during reproduction,
254
and Pcrossover defines the probability of creating two new host from a cross of two parental
hosts genetic basis. The reproduction scheme is a rudimentary realisation of the classical
genetic algorithm (discussed in Section 3.4.1) for a hosts initial repertoire.
The aim of this empirical study is to investigate the Evolved Immunity Host Clonal Selec-
tion Algorithm in the context of the information dissemination and localisation capabilities
as compared to the Minimal Generational Host Clonal Selection Algorithm under a variety
of host exposure regimes. Toward this end, the study had the following goals:
1. Compare and contrasted generational clonal selection with and without an inherited
initial repertoire.
Method
Algorithms The study considered the Minimal Generational Host Clonal Selection Al-
gorithm (MG-HCSA) and the Evolved Immunity Host Clonal Selection Algorithm (EI-
HCSA). MG-HCSA is a specialisation of the HCSA defined in Algorithm 6.3, that was
configured with Nhosts = 10. Each H was configured with a single tissue (Ntissues = 1)
that was an instance of the RCCSA defined in Algorithm 4.5, with the configuration
Ncells = 50, Nselection = 1, and Nclones = 5. The CreateP opulation operation for the
MG-HCSA was realised as the creation of a new population of hosts each generational
change as defined in Algorithm 6.9, and the epoch generational change condition defined
in Equation 6.4 with Ngenepochs = 100. The MI-HCSA with assessed with the evolutionary
specialisation of the CreateP opulation operation defined in Algorithm 6.11. Host fitness
was assigned using the AHE measure. The probability of crossover was fixed at 0.90
(90%) per host-pair creation. The mutation duration host creation was 1
192 bits which is
one mutation cell or 50 mutations per population creation ( 9600
50
bits).
Problems The same Habitat Colour Space Problem and Host Exposure Regimes were
used as was defined for the THCSA Empirical Study in Section 6.5.2.
Experiment The same experimental setup was used as was defined for the MI-HCSA
empirical study in Section 6.7.2, expect the maximum number of epochs on the EOSC
stop condition was increased from 999 to 9999. This configuration change was made such
that the final measures recorded reflected the state of the system after 100 generations of
100 epochs before the last generational change at one hundredth generation.
255
Results
Table A.9 in Appendix A.2.4 provides a summary of results for each algorithm-problem
combination including the mean (x̄) and standard deviation (σ) of collected measure val-
ues. Box-and-whisker plots are provided in which the results for each algorithm are aggre-
gated across all HER for a each measure. Figure 6.15 shows PD, Figure 6.16 shows PE,
Figure 6.17 shows AHD, and Figure 6.18 shows AHE.
Figure 6.15: Box-and-whisker plot of Population Diversity (PD) across all HER for the
EI-HCSA study.
Figure 6.16: Box-and-whisker plot of Population Error (PE) across all HER for the EI-
HCSA study.
Analysis
This section provides an analysis of the results from the empirical study into the MI-HCSA
summarised in Table A.9. These analyses exploit the trends and expectations outlined in
Section 6.4.4 regarding information dissemination between the hosts in the population.
256
Figure 6.17: Box-and-whisker plot of Average Host Diversity (AHD) across all HER for
the EI-HCSA study.
Figure 6.18: Box-and-whisker plot of Average Host Error (AHE) across all HER for the
EI-HCSA study.
257
Generational Trends This section compares and contrasts the evolved immunity algo-
rithm against the minimal generational approach. From a system perspective the evolved
immunity algorithm generally exhibited a decrease in population diversity compared to the
minimal generational algorithm, although the trend was not significant on the symmetric
exposure regime. A difference in population error between the approaches was only sig-
nificant on OHER and RHER, where a decrease and increase were observed respectively.
From a component perspective there was practically no significant difference between EI-
HCSA and MG-HCSA with regard to Average Host Diversity and Error, other than a
small increase in diversity in the evolved approach on AHER. The results demonstrate
little significant difference between the two approaches other than a general decrease in
population diversity and some changes to system error. The change in population diver-
sity provides confirmation that the evolutionary mechanisms were providing a convergence
effect, resulting in increased homogeneity between the hosts in the population.
1. Generally there is little difference between inherited immunity and independent gen-
erations for the chosen configuration.
Conclusions
Two considerations that may have resulted in the lack of significance between the two
approaches include (1) the amount of evolution permitted given the complexity of the
problem, and (2) the noisiness of the fitness function. In the first case the configuration
permitted 100 evolutionary generations each with 100 epochs providing a testing ground for
the host genetic basis. Given that this genetic basis consisted of 9600 bits, it is more than
likely that an increase in the number of generations (such as a factor of 10 or 100) would
result in a significantly increased evolutionary effect toward a homogeneous host genetic
footprint. In the second case, the objective function used (genetic system competence via
host error) may have proven too noisy given the reduced amount of interaction with the
problem (100 environment exposures). In addition, such an objective, although desirable
may have been convoluted by the asymmetry of information exposure by some of the
exposure regimes providing a potentially second level of noise. This may be tested by
again increasing the number of generations and/or the number of epochs per generation,
as well as testing on simpler symmetrical and deterministic exposure regimes.
The proposed inherited immunity approach aligned with the general progression in
complexity with the proposed host clonal selection algorithms, although in the context of
the potential of combining abstractions of evolution and the acquired immune system was
very simplistic. The principle of combining the approaches begs for elaborated investiga-
tion.
258
6.9 Chapter Summary
6.9.1 Paradigm Review
The Host Clonal Selection Paradigm (HCSP) was defined as the investigation of the Tissue
and Cellular Clonal Selection Paradigms as constrained by (1) multiple holistic immune
systems called Hosts and their interactions, and (2) the concerns of regimes of discrete
host exposures of information from an antigenic environment called Host Exposure Regimes
(HER). The paradigm exploits the metaphor of a collective of holistic acquired immune
systems called a Population and the turn-over of populations called Generations. Intra-
population communication is mediated by the hosts themselves as well as by pathogen
that may spread through host-to-host contact. Intra-generational communication is me-
diated by parent-progeny relationships both explicitly and implicitly via an evolutionary
process. The principle information processing interest of the paradigm as gleamed from
the metaphor are the information management strategies that may be employed to address
the known and unknown regularities and irregularities in an antigenic Environment of in-
formation called an Habitat Antigenic Exposure Problem (HAEP). The concern of such
strategies is the effective intra-population and intra-generational dissemination of informa-
tion between spatially isolated hosts and temporally isolated populations toward improved
host-wise and population-wise capabilities whilst maintaining the intrinsic localisation of
the adaptive units independence.
General Principles
Specific Findings
259
2. Shared Immunity: Shared immunity via effector transmission results in a disruptive
effect at the system and component level with large numbers of shared effectors,
which is minimised with small scale intra-population sharing maximises the dissem-
ination effect at the component level.
6.9.3 Integration
The Tissue Clonal Selection Paradigm in Chapter 5 took the Cellular Paradigm from
Chapter 4 for granted, using it as a principle component in the Tissue Clonal Selection
Algorithm, focusing on how different decentralised information management strategies
effected the organisation acquisition and use of information under different information
exposure regimes. In the same manner the Host Paradigm in this chapter took the Tissue
Paradigm for granted, subsuming the scope of inter-tissue interaction concerns and using
the system in its entirety as a principle component (Host) in a the Host Clonal Selection Al-
gorithm. The population provided the first abstraction of multiple hosts, concerned with
decentralised information dissemination strategies, whereas the generational-population
abstraction subsumed the concerns of a given population, highlighting the related but
different concerns of inter-generational decentralised information dissemination strategies.
These two abstractions represent the pinnacle in the exploration of the clonal selection
paradigm presented in this work. The following chapter considers the aggregation of all
three paradigms (cellular, tissue, and host) in a unifying framework that provides both
explanatory power for presented algorithms, as well as predictive power in highlighting
unrealised algorithms and other facets of the considered abstractions. The abstract host
paradigm is grounded in Chapter 8 in the context of two general problem domains, high-
lighting the potential benefits the tissue algorithms provide over the cellular clonal selection
algorithms.
260
Chapter 7
Hierarchical Frameworks
261
facilitates (1) inter-paradigm contrast and comparison, and (2) analysis and reasoning on
the framework providing both explanatory and predictive capabilities regarding abstrac-
tions of the clonal selection theory. The focus of the framework is on the systems side of
the system-environment relationship, and as such the concerns of the antigenic exposure
paradigm may be compressed to a generic cross-paradigm antigen exposure problem (see
Figure 7.1). This simplification of the environment directs focus on the elaboration, and
inter-relationships on the systems.
Clonal Selection
Host
Cellular
Figure 7.1: Depiction of the focus on systems and the compression of the environment in
the Hierarchical Clonal Selection Framework (HCSF).
7.2.2 Comparison
This section directly compares the three paradigms beyond the obvious and superficial
concerns of the perspectives and the algorithms within. Toward this end, the adaptive
systems formalism from Section 3.5.1 is used as a basis to motivate the comparison. This
formalism was selected because it explicitly provides a tool for considering the similarities
and differences between adaptive systems (paradigms), and importantly between strategies
(algorithms within a paradigm). The primary objects of the adaptive systems formalism
provide a conventional perspective on the components of an adaptive system (see Ta-
ble 3.5). From this high-level perspective the subtleties of the three paradigms are lost
and one may consider the generalities of the clonal selection adaptive strategy, specifi-
cally: the antigenic environment (e), the clonal selection strategy in cells (s), and the
affinity of cells to antigen (U ). This consideration compresses the hierarchy to the essen-
tial concerns of the adaptive strategy (for example see Figure 7.2). This is an important
perspective, as (1) it highlights the important primitives required in all so-called ‘Clonal
Selection Algorithms’, (2) provides a context for comparing the general approach to other
adaptive strategies such as genetic adaptive plans (the basis of genetic algorithms), and
(3) provides a context for relating and integrating the general approach to other Artificial
Immune System approaches (for example clonal selection as a sub-strategy in Negative
Selection and Immune Network algorithms).
The secondary objects promote the consideration of the subtler details of an adaptive
system, providing the detail of the formalism (see Table 3.6). Table 7.1 provides an inter-
pretation of the three paradigms in the context of the secondary objects of the formalism
262
Clonal Selection Antigenic Exposure
Figure 7.2: Depiction of the compression of both the system and the environment when
the HCSF is compressed to the primary objects of the adaptive system formalism.
Table 7.1: Mapping of the cellular, tissue, and host clonal selection perspectives onto the
secondary objects of the adaptive systems formalism.
The naming convention adopted for the three tiers highlights the structures or units
under adaptation within each tier. This naming convention is mirrored in the areas of
the environment to which each structure is adapting. The consideration of the adaptive
structures highlights the already apparent subsumption of cellular concerns by the tis-
sue tier, and the tissue concerns by the host concerns. Although discussed throughout the
investigation of the paradigms, the implications of this point are less intuitive. The consid-
eration of a tissue as a structure under adaptation requires a consideration of a repertoire
of cells in its entirety as a unified structure. Adaptation of a tissue structure (T → T &)
may be considered to occur in response each infection exposure (aggregation of antigenic
exposures). This transition is less concise when one considers continuous movement of
cells via recirculation as a second transformation operator. In this context, the ‘struc-
tures’ of a single Host (tissue system) are considered in a constant state of constrained
change that is distinctly different from the adaptation of tissues provided by infection
exposure. Likewise, a similar state exists at the Host-level with the adaptive transition of
hosts (H → H&), the sharing of acquired information between adaptive units. One may
generalise this transition to say that adaptation of structures occurs with each change
at the finest level. This suggests new tissue and host structures are created with each
shared piece of information and each clonal response to antigenic exposures. The scope
(level of abstraction) of each perspective provides a frame of reference in which to choose
when to aggregate such fine-grained changes and delineate or not (continuous) structure
263
transitions. An elaboration of the concerns of each tier may consider the subsumption
of degenerate cells subsumed by the cellular tier, and the population subsumed by the
generational variation of the host tier. Although the investigation of these concerns was
tied to the cellular and host paradigms respectively, further elaboration of the sub-cellular
and generational clonal selection algorithms may result in new perspectives with as much
potential as the canonical three presented in this work (this consideration is elaborated in
Section 7.4.2).
The comparison of strategies within each perspective (X) is interesting as both the
tissue and host tiers are concerned with the effective acquisition of information in the
context of spatial and temporal anticipation of need. This assessment is based on historic
spatial-temporal selection ultimately of cells in infection and habitat exposures across the
distributed components of each class of system (I). Importantly, this information and
assessment motivate the strategies in each of these tier to (1) localise acquired knowledge
for specialised spatial-temporal anticipation, (2) dissemination acquired knowledge for
generalised system-level anticipation. Such organisation of information is directly reflected
across the aggregation of the units of adaptation at each tier and thus may be considered
a secondary memory (M ). The spatial concerns of these two tiers is compressed in the
cellular tier to that of the historic and thus anticipated temporal-properties of exposures.
As with the other tiers, the aggregation of the structures under adaptation facilitate an
additional super-structure (repertoire) in which the organisation, in this case proportional
resource allocation under varied constraints, differentiate the strategies within the tier.
Component Cardinality
The hierarchical relationship between the tiers results in the adaptive units at one tier
being comprised of an aggregation of the adaptive units from the previous tier. This
section considers the cardinality in terms of 1 and many (N ), and the bracketing of these
components within specific algorithms. Table 7.2 summarises the principle algorithms from
across the three tiers and their component cardinality in the full context of the previously
defined Cells (C), Tissues (T ), Hosts (H), and Populations (P ). An additional component
is defined below the cellular level called a sub-cellular component (c) that is used to
differentiate a degenerate component in the context of degenerate cellular algorithms.
The table reveals much about (1) the specific component cardinality selected for the
investigated classes of algorithms, and more importantly (2) suggests at the possibility
264
Paradigm Algorithm c C T H P
Cellular DCCSA N 1 1 1 1
CCSA N N 1 1 1
MCCSA 1 1 1 1 1
∗CCSA 1 N 1 1 1
Tissue TCSA N N N 1 1
∗TCSA 1 N N 1 1
Host PHCSA N N N N 1
∗PHCSA 1 N 1 N 1
GHCSA N N N N N
∗GHCSA 1 N 1 N N
Table 7.2: Summary of the component cardinality across the principle abstract and realised
clonal selection algorithms, where ∗ represents a wild-card for descendant algorithms of a
given base algorithm.
space of viable permutations of component cardinality across the hierarchical clonal se-
lection framework. From a cellular perspective the Table clearly shows the trade-off in
cardinality of the simplified minimal algorithm as a realisation of a (1+1) MHCA compared
to degenerate and cellular algorithms. The explicit aggregation of degenerate components
c into holistic cells for assessment is distinct compared to the less restricted CCSA, and the
bracketed range of assessed cellular algorithms in Chapter 4. Strictly, the c was bracketed
at c = 3 for the three colour components for investigated cellular algorithms and cellular
primitives in later tiers. The table records this as c = 1 as there was no choice for selecting
among the three c for each cell, the ordering (selection or aggregation) was specifically
defined and fixed, therefore treating all three components as a single component. The
investigation of tissue and host algorithms clearly show this same choice in bracketing,
enforcing the aggregation and thus holistic adaptation of colour space patterns. The algo-
rithms of the host tier also show an important bracketing of the tissue-level components.
This choice of bracketing was made explicit to remove the spatial acquisition and anticipa-
tion of information effects that are the concern of the tissue paradigm, and compress them
to the simpler terms of the cellular paradigm. This is reflected in the cardinality table,
clearly showing each host in the population of investigated host algorithms as a single
tissue repertoire of cells. An artefact of this choice in bracketing is that the investigation
of host algorithms did not reveal any information on the compounded concurrent effects of
spatial acquisition and anticipation of information in a population and within individual
hosts.
This last point highlights the reason for bracketing as a tool for investigating adap-
tive systems, specifically to bound the complexity of an adaptive model to the areas of
interest for an investigation. From this perspective, one may consider the cardinality of
all algorithms irrespective of their categorising scope and consider the investigation clonal
selection over the last three chapters as the relaxation of cardinality from the sub-cellular
to the population level. This is evident if one considers the shift in the N (the shift in fo-
cus) from the left to the right of adaptive structures as the list is traversed top-to-bottom
in Table 7.2. The power of bracketing the cardinality of the system is apparent when
265
one considers the alternative of investigating clonal selection at the three selected levels of
abstraction from the perspective of a population or generational host clonal selection algo-
rithm (see Figure 7.3). Such unbounded cardinality would likely make assessing principle
behaviours difficult given the confounded effects of the delegation of responsibility through
the hierarchy. This final point suggests at the focus of the Hierarchical Clonal Selection
Framework, which is: the investigation and predictable application of an integrated hier-
archical system motivated by the emergent effects of a bottom-up clonal selection adaptive
strategy.
Population of Hosts
Tissue of Cells
Host of Tissues
10010101010
Cell of bits
Component Interaction
266
Paradigm Algorithm c C T H P
Cellular DCCSA yes no no no no
CCSA yes yes no no no
MCCSA no no
∗CCSA no yes
Tissue TCSA yes yes yes no no
MTCSA yes no
∗TCSA yes yes
Host PHCSA yes yes yes yes no
MP-HCSA yes no no
∗PHCSA yes no yes
GHCSA yes yes yes yes yes
MG-HCSA yes no no no
∗GHCSA yes no no yes
Table 7.3: Summary of the component interaction across the abstract and realised clonal
selection algorithms, where ∗ represents a wild-card for descendant algorithms of a given
base algorithm.
fact that both the clonal selection theory and the inspired computational principles are
defined in a cellular context. The implications of this fact reinforces the ‘perspectives on
the clonal selection adaptive strategy’ consideration of the three investigated paradigms
in this work. The interactions between structures was defined in Section 7.2.2 as the oper-
ators providing the defining characteristic between strategies within each paradigm. This
is highlighted in the naming convention adopted where the Minimum of each algorithm
class is defined with no interaction between the structures under adaptation, providing a
baseline for comparison of the effects of such interactions.
7.2.4 Summary
The integration and analysis of the three clonal selection paradigms with a compressed
antigenic exposure paradigm in the HCSF provided a context for both (1) retrospectively
explaining generalised design and methodology principles for clonal selection algorithms,
and (2) promoting consideration of permutations of cardinality and interaction that al-
though are predicted by the framework were not investigated in this work. This section
reviews the explanatory and predictive power of the ‘system biased’ Hierarchical Clonal
Selection Framework, as follows:
1. Explanatory Power
(a) Cellular Basis: Irrespective of the specific perspective taken (level of abstrac-
tion), the clonal selection theory and computational principles is a bottom-up
pattern recognition-based adaptive strategy involving cells (receptors or detec-
tors) and antigen (complementary structures).
(b) Bracketing: The forward and backward bracketing of the cardinality in the
context of a hierarchical complex adaptive system has been demonstrated to
provide a powerful tool for investigating such a system.
267
(c) Naming Conventions: A perspective invariant naming convention promotes the
naming of the perspective for the structures under adaptation, and the design
of a minimal strategy of bracketed interactions between such structures as a
baseline for measure the effects of such interactions.
2. Predictive Power
268
Antigenic Exposure
Habitat
Antigen
Figure 7.4: Depiction of the focus on environment and the compression of the systems in
the Hierarchical Antigenic Exposure Framework (HAEF).
Component Cardinality
The bracketing of the cardinality of the information in the environment was configured
to match the scale of the units of adaptation in the adaptive systems. Unlike clonal se-
lection, the antigenic environment was not motivated in its interaction with the systems
(for example adversarial, dynamic, and/or adaptive). The neutrality of the environment
was intentional to focus attention on the emergent system behaviour under low-complexity
environment concerns. Table 7.4 summarises the cardinality of the abstract antigenic envi-
ronments and the realised colour space antigenic environments in terms of the previously
defined: determinants (D), antigen (A), infections (I), habitats (B) and environments
(E).
Paradigm Problem D A I B E
Cellular AEP N N 1 1 1
ACSP 1 N 1 1 1
DCSP N N 1 1 1
Tissue IAEP N N N 1 1
ICSP 1 1 N 1 1
Host HAEP N N N N 1
HCSP 1 1 1 N 1
Table 7.4: Summary of the component cardinality across the principle abstract and realised
antigenic exposure problems.
The table shows the potential of each abstract exposure problem and the strong brack-
eting of the colour space realisations for the structures under adaptation in the systems in
each tier of the hierarchy. The ACSP, ICSP, and HCSP all exploited the same bracketing
269
method, specifically the treating of each Colour Space Pattern (colour) as a trigger for
adaptation at the respective tier. For example, a set of antigen (ACSP) is equivalent to
a set of infections (ICSP) and a set of habitats (HCSP), in that they can all be reduced
to a set of Colour Space Patterns. This equivalence in problem was designed to min-
imise the complexity of the information to be acquired across the tiers to a level that was
easy to interpret, whilst introducing complexity the way in which the information was
exposed and expected through varied exposure regimes. This simplification of problem
motivated the corresponding cross-cutting cellular-based clonal selection concerns in the
systems by reducing all information to single antigen. One may consider the alternative
of such a minimisation in a less constrained colour space realisations of the the expo-
sure problems. For example, an infection of antigen may involve sets of antigen that are
similar (intra-infection), although distinctly different between the sets (inter-infection).
This could be realised through minor variations for intra-infection colour space patterns
(similar colour), and major variations for inter-infection Colour Space Pattern centroids
(inter-infection). This same example scales to the habitat level, with sets of sets of antigen,
where intra-habitat infections may be more similar than inter-habitat infections. These
examples highlight what the bracketed cardinality provided, specifically exemplar pat-
terns (set size of one with no variations) for each infection and habitat with promoted
inter-trigger dissimilarity (minimum hamming distance). This chosen level of cardinality
bracketing had the effect of removing the degeneracy, (specifically the redundancy of the
triggers of adaptation) requiring an immune response for each antigenic trigger in the
antigenic environments. The alternatives provide an opportunity for re-introducing such
degeneracy although at the cost of the specificity of a system in an environment (gener-
alised response against variations for each antigenic determinant at the lowest level).
Exposure Regimes
270
Paradigm Problem D A I B E
Cellular AEP N N 1 1 1
ACSP 1 N 1 1 1
DCSP N N 1 1 1
Tissue IAEP N N 1-N 1 1
ICSP 1 N 1-N 1 1
Host HAEP N N 1 1-N 1
HCSP 1 N 1 1-N 1
Table 7.5: Summary of the bracketing of spatial exposure across the abstract and realised
antigenic exposure problems.
always exposed. This has the effect of requiring a mechanism to constrain a polyclonal
activation (shown to be strong selection in Section 4.4.3). The reason for this design
decision was the relative small scale of a single repertoire of cells in the context of multiple
of such repertoires (tissues) and multiple such hosts of tissues. The same strong selection
was required at the determinant level, and given the antigen focus at all levels, this had the
effect of requiring explicit aggregation of response toward holistic solution to address the
resultant polyclonal response. This unbounded antigen-cell exposure and explicit strong
selection and aggregation is bracketed in the tissue and host levels in the introduction
of discrete Antigenic Exposure Regimes (AER) providing deterministic and probabilistic
patterns of interaction between the units and triggers of adaptation (referred to as 1 − N
in the table). This had the effect of requiring the systems under such regimes to manage
the spatial organisation (localisation and dissemination) of acquired information to best
address the patterned interaction. One may consider the alternatives of such bracketing
of spatial exposure, for example the spatial selection of cells in a repertoire considered
in spatial up-front selection in Section 4.5. The symmetrical exposure regime at the
tissue (STER) and at the host (SHER) levels provide a counter example of the effects
of simplifying exposure complexity to that of system-wide with respect to the points of
exposure of a system.
Paradigm Problem D A I B E
Cellular AEP N N 1 1 1
ACSP N N 1 1 1
DCSP N N 1 1 1
Tissue IAEP N N N 1 1
ICSP N N N 1 1
Host HAEP N N N N 1
HCSP N N N N 1
Table 7.6: Summary of the bracketing of temporal exposure across the principle abstract
and realised antigenic exposure problems.
271
the systems expectation of information on a timeline. Table 7.6 summarises the temporal
expectations of the abstract and realised exposure problems with regard to the triggers for
adaptation. The table clearly shows that the temporal expectations of exposure extended
backward through the hierarchy from the focus of each tier. This simple but important
perspective on the antigenic exposure paradigm highlights the motivating complexity for
the corresponding Hierarchical Clonal Selection Framework, specifically the compounded
increase in temporal expectation of information. This table also highlights the need for
bracketing the information cardinality of antigenic environments across the hierarchy to
bound the complexity of the effects of the compounded temporal expectations.
7.3.3 Summary
The integration and analysis of the antigenic exposure paradigm across the three levels
of abstraction in the context of a compressed clonal selection system provided a context
for both (1) retrospectively explaining generalised design and methodology principles for
the of the problems that motivated the investigation of clonal selection algorithms, and
(2) promoted the consideration of permutations and relaxation of cardinality, spatial,
and temporal concerns of antigenic exposure. This section reviews the explanatory and
predictive power of the Hierarchical Antigenic Exposure Framework, as follows:
1. Explanatory Power
(a) Forced Response: The strong bracketing of the cardinality of antigen across the
hierarchy resulted in a forced response expectation from systems with regard to
the trigger for adaptation. Such forced response may be relaxed by loosening the
bracketed cardinality constraints at a given tier in the hierarchy, in particular
for the infection and habitat levels.
(b) Compounded Expectation: The focus of the investigation using the antigenic
exposure paradigm was on compounded expectation with varied spatial scope
of exposure at the tier of interest, and strong bracketing of the spatial scope at
tiers above and below the tier of interest.
2. Predictive Power
272
7.4 Integrated Hierarchical Framework
7.4.1 Frameworks
Given an assessment of integrated hierarchical clonal selection and antigenic exposure
frameworks, this section considers the aggregation of the two frameworks towards a unified
abstraction and framework for clonal selection in the context of an antigenic environment.
This is a natural integration as the abstract and realised problems and algorithms in both
sides of the integration were designed as a natural fit for each other. This integration is
referred to as the Integrated Hierarchical Clonal Selection Framework (IHCSA) to differ-
entiate it from the concerns of either independent framework, and to highlight the strong
bottom-up clonal selection focus. As such, the focus of the framework is the hierarchical
integration of the elaborated concerns of both the system and the environment, depicted
in Figure 7.5
Host Habitat
Tissue Infection
Cellular Antigen
Figure 7.5: Depiction of the focus on system and environment in the Integrated Hierar-
chical Clonal Selection Framework (IHCSF).
Integrated Cardinality
The focus of this subsection is the bracketing of the cardinality of both the system and
environment hierarchies as they pertain to the interaction between the hierarchies. Specif-
ically, the interaction of the triggers for adaptation with the structures under adaptation
at both the scope of their intended focus (for example cells and antigen in the cellular
level), and scopes above and below that focus.
Table 7.7 summarises the intended or so-called ideal integrated cardinality cases for
the environmental triggers and system units of adaptation. The table clearly shows the
273
c C T H P
D 1 N N N N
A 1 N N N
I 1 N N
B 1 N
E 1
Table 7.7: Summary of the suitability match between clonal selection and antigenic expo-
sure components
response suitability in terms of the one-to-one relationships (upper limit) and the general
capability in terms of the one-to-many relationship of system structures to environmental
triggers. It should be pointed out that the upper limit (one-to-one) of the suitability
between the frameworks was not investigated throughout this work as an initial assessment
may suggest. For example the cellular paradigm considered a ‘tissue of cells’ against an
‘infection of antigen’ rather than a cell against an antigen or the mismatch case of a
‘tissue of cells’ against a single antigen. Table 7.8 elaborates on the ideal cases, and
summarises the components of each hierarchy and indicates the scope of concerns of each
paradigm, and the cases that were embodied in algorithms that were investigated (bold).
Paradigms are marked with the first letter of the structures under adaptation, with the
division of Cellular into Degenerate (D) and Cellular (C), and Host into Host (H) and
Generational (G). Perspectives or tiers are defined by the interaction of the designated
triggers and structures for each paradigm, for example cells (C) and antigen (A) in the
cellular paradigm. The italicised cases demonstrate those cases that could be addressed
from tiers above and below a given tier.
c C T H P
1 N 1 N 1 N 1 N 1 N
D 1 D D
N D C C
A 1 D C C
N C T T
I 1 C T T
N T H H
B 1 T H H
N H G G
E 1 H G G
N G
Table 7.8: Summary of the component cardinality for both the clonal selection and anti-
genic exposure models.
An important point highlighted by this table are the overlapping concerns between the
paradigms. For example N cells may be regarded as a single tissue (minimal cardinality
tissue model), both of which can address N antigen or 1 infection (minimum cardinality
infection model). The designed subsumption inherent in both independent and the inte-
274
grated frameworks promote this maximum-minimum principle at the transitions between
tiers in the hierarchy. This principle allows similar concerns to be investigated from two
different perspectives. For example in the cellular-tissue case, one can investigate the
the systems composition and capability of a repertoire in response to a set of N antigen
with explicit aggregation of the best matching cells for each antigen from the cellular per-
spective, or the response capabilities of a tissue against a single antigen from the tissue
perspective. Both examples provide a different context (different level of abstraction with
regard to the acquired immune system) that may provide varied strategies for considering
the same problem. The table clearly shows such cases were investigated using the maxi-
mum of the previous tier rather than the minimum of the given tier. The highlighting of
investigated cases clearly shows the scope of future work with regard to integrated cardi-
nality cases. An interesting point is that the generational case did not follow the trend
and investigate multiple environments with multiple populations. Rather, the EI-HCSA
adapted multiple populations against a single antigenic environment (set of habitats). The
table also provides a clear indication of those cases delineated to specific scopes of interest
that were not investigated, and those cases that could not be investigated. For example,
the maximum trigger for a given tier (N ) with the minimum structures of adaptation (1)
is an infeasible combination defining the upper limit on cardinality complexity for each
system.
Figure 7.6 depicts the integrated cardinality bracketing in a hierarchical way to en-
force the subsumed responsibility across the tiers, providing a standard representation of
the frameworks and basis for extrapolating from the integrated relationships. The fig-
ure is information dense capturing intra- and inter-tier relationships for both the system
and environment frameworks, and clearly highlighting the important maximum-minimum
principle at tier-boundaries (diagonal lines). An interesting observation is that of the
relationship between the cells and antigen, showing that a cell and a receptor do not
differ in terms of their information content, and that a cells receptor is specialised for a
given determinant on an antigen (base principles of the clonal selection theory). This is
important given the compression of this relationship (bracketing) of one-antigen-to-one-
determinant (and thus one receptor or cell) throughout the majority of the investigations.
Only the DCCSA considered the relaxation of this bracketing, allowing cells (receptors)
to be selected for by the determinants of an antigen. This specialisation was classified
as apart of the cellular paradigm, although if such specialisations are elaborated and in-
vestigated (specifically the one-to-many relationship between an antigen and receptors as
in the DCCSA in Section 4.4.3), one may refer to this as the Receptor Clonal Selection
Paradigm (RCSP) to clearly distinguish it from the cellular paradigm. The figure also
suggests at tiers above and below the the host and tissue tiers respectively, outside of the
scope of what was investigated. These extrapolated additional tiers are considered in the
next section.
275
Clonal Selection Antigenic Exposure
Figure 7.6: Depiction of the integrated hierarchical clonal selection and hierarchical anti-
genic exposure frameworks, showing subsumed relationships and component cardinalities
across the investigated paradigms.
Additional Tiers
A point stressed in the integration of the three investigated clonal selection paradigms
in this Chapter has been that each represents a single perspective on the application of
clonal selection as an adaptive strategy. Explicitly selected in the standard form depiction
of the integration in Figure 7.6 was the capability for additional vertical tiers above and
below the host and cellular tiers respectively, as well as the potential for integration of
additional perspectives of a given tier. This section extrapolates examples of such addi-
tional perspectives on clonal selection and integrates them into the hierarchical framework
of such perspectives.
276
beyond the host level, it subsumes the concerns of the host level including the generational
turn-over, introducing inter-population interaction concerns such as those from population
genetics (such as migration), and epidemiology (such as the spread of disease).
Paratope Clonal Selection Given that the clonal selection theory describes the obser-
vations of immune cells, a level below the cellular level may not be a reasonable proposition.
One may consider the development of a single receptor of sub-structures for a single anti-
genic determinant of sub-structures as the maximum in complexity of this preceding tier.
The scale of the process is that of the tertiary confirmation of the immunoglobulin proteins
and related immunochemical forces of their interaction with complementary structures of
the determinants on macro-molecules and proteins, governed by the sequence amino acids
that make up both molecules. This tier is referred to as the Paratope Clonal Selection
Paradigm (ACSP) 1 and may be concerned with the specific chemical basis for immunoglob-
ulin synthesis in cells, the valance of immunoglobulin molecules, and the physical forces
that govern the molecular interactions and resultant affinity and avidity for determinants.
7.4.3 Summary
This final hierarchical integration represents the pinnacle of the abstractions presented.
The integration and analysis of the integration framework provided a context for both (1)
retrospectively explaining generalised design and methodology principles that motivated
the investigation of clonal selection algorithms, and (2) promoted the consideration of un-
realised permutations and relaxation of cardinality and additional tiers of the framework.
This section reviews the explanatory and predictive power of the Hierarchical Integrated
Clonal Selection Framework, as follows:
1. Explanatory Power
(a) Framework as a Map: The integrated framework facilitates the explicit spec-
ification of immunological and antigenic concerns in terms of their scope of
influence relative to each other.
(b) Maximum-Minimum: Tier transitions are defined by the maximum cardinality
complexity of one tier that is reduced to the minimum cardinality complexity of
the next tier. Such boundaries allow the same information content (problem) to
be addressed from the perspectives of the tiers above and below the boundary,
revealing insights and alternative solution strategies.
(c) Simplest Case: The investigations considered the average case of each paradigm,
specifically the many-to-many relationship between triggers for adaptation and
units of selection and adaptation.
2. Predictive Power
(a) Varied Interpretation: The backward competence of a paradigm with its sub-
sumed levels suggests at non-contigious interpreted cases of cardinality and
1
Paratope was chosen as the term for a sub-structure of a receptor molecule for lack of a better term.
277
interaction along both the system and environmental axis. The realisation
of such models facilitate the use of tier-specific mechanisms (algorithms) on
backwardly-compatible (subsumed) problem domains.
(b) Additional Tiers: The integration of the frameworks facilitated the elaboration
of the cellular and host tiers to include concerns beyond the scope of these two
limits of the framework.
(c) Additional Mapping: The extensibility of the framework suggests at the po-
tential for mapping all manner of immunological and antigenic concerns into
the appropriate scope of the framework and defining relationships in terms of
cardinality and interaction of structures and triggers. For example, the Nega-
tive Selection, Danger Theory, and Immune Network Artificial Immune System
paradigms.
In considering the applicability of the chosen hierarchy for clonal selection and the method-
ology for applying such a methodology, it is critical that the motivation and adopted
methodology be clearly elucidated. The general systems theoretic approach used involved
three important considerations (1) the distillation of the core computational principles
and strategy from the clonal selection theory, (2) the division of the clonal selection con-
cerns into that of system and environment, and (3) the reduction of the holistic acquired
immune system to that of the cellular concerns of the clonal selection theory. These steps
are summarised as follows:
1. Metaphor : Identify the relevant observations, theory, and abstractions of the selected
metaphor.
2. Strategy: Distil the metaphor to the core computational principles and information
processing strategy.
3. Partition: Divide the concerns from the principles and strategy into a framework of
systems and environments.
278
4. Reduction: Relate the components and their interactions at the lowest and highest
levels (within scope of the metaphor).
Relation to Methodologies
The adopted methodology is comprised of concerns of the three reviewed approaches for
investigating biologically inspired computation, immune information processing, and adap-
tive systems in Section 2.7. This section briefly highlights the selected aspects of the mo-
tivating methodologies and how they contributed to the integrated adopted methodology.
The general approach was a realisation of the five-step conceptual framework from
biologicall-inspired algorithms (2.7.1). Specifically (1) the selection of the immune sys-
tem as the motivating metaphor, (2) the review of immunochemistry and immunophys-
iology (probes) as a basis for information processing principles, (3) the investigation of
models as abstraction of the information processing properties from models, (4) the ap-
plication and verification of the computational models (considered next in Chapter 8),
and (5) resulting computational tools. The adopted methodology drew heavily from this
approach, in particular with regard to the general process for realising viable computa-
tional tools, and with regard to the strong focus on the transition from probes (metaphor )
to information processing models that were investigated (results of the reductions). The
immune information processing approach (Section 2.7.1) provided a specific context to
motivate the conceptual framework, in particular to focus on the information processing
concerns of immunology. Goldberg’s so-called small models methodology for adaptive sys-
tems (Section 2.7.3) provided a strong influence in the adopted methodology, specifically
focusing the modelling effort on the decomposition of general information processing to
separate sub-problems (reduction) and the ultimate re-integration (the IHCSF). Along
with the reductionist consideration, Goldberg’s methodology promoted a strong focus on
the bracketing of high-order phenomena which was realised in particular with regard to
the cardinality and interactions between structures. It is important to clarify that the
small models methodology anticipates system modelling is achieved through the use of
mathematical methods. The approach taken in this work involved the use of algorithmic
279
computational modelling and simulation. An additional alternative modelling approach
that could have been used is diagrammatic object and state modelling, such as the Unified
Modelling Language (UML).
Alternative Interpretations
The specific reduction was an clonal selection-specific interpretation of the immune sys-
tem based on the functional aggregation of cells at three intuitive levels of detail. This
suggests that alternative cellular-based reductions may be considered, as well as reduc-
tions not based on the units of selection and adaptation in the clonal selection theory. An
additional consideration for a reduction may include an antibody protein focus perhaps
including the concerns of other macromolecules that influence the behaviour of the im-
mune system such as cytokines and cellular receptors for such self-molecules. This would
provide a focus on the interaction of components for signalling rather than adaptation.
Alternatively, one may focus on the division of the immune system into adaptive and
innate, and focus on the structures and functions within each ‘sub-system’ promoting a
stronger consideration of the concerns of the innate immune system and its interrelated
processes with the acquired immune system. The viability of a given reduction may be
assessed based on the insights it provides regarding the computational principles under
consideration. As such, an alternative already considered is the ‘immune system ↔ cel-
lular ’ reduction common across paradigms in AIS, suggesting that the contributions of
the IHCSF may be the host and tissue considerations and the levels of comparison they
provide.
Negative Selection
The negative selection paradigm exploits the clonal selection process for adaptation-based
information acquisition although focus on the specific concerns of using pattern recogni-
tion to discriminate self from nonself and the preparation of such pattern detectors (see
Section 2.4.2). The first important consideration is that of negative selection as adap-
tive strategy (modelling in the complement space with centralised preparation and with
decentralised opportunistic specialisation using clonal selection). The strategy focus of
the paradigm highlights the constraints under which the strategy must operate (satis-
fice) within the immune system at varied levels of abstraction. Such consideration may
280
provide insight to advance the paradigm beyond the current highly-constrained cellular
perspective, and the limitations of such approach in practical application [374].
Table 7.9: Summary of the Negative Selection AIS paradigm mapped onto the three tiers
of the IHCSF.
Table 7.9 provides a summary of the mapping of the negative selection paradigm onto
the IHCSF. Given the close ties with clonal selection, the negative selection paradigm has
generally the same concerns. Specifically, effective adaptation in the cellular tier, and ef-
fective localisation and dissemination in the tissue and host tiers. Also consistent with the
clonal selection paradigm is the antigenic environment, where the information in the envi-
ronment encapsulates the scope of patterns that must be differentiated from self patterns.
The important differences between the paradigms is the strong focus on cellular prepara-
tion required in negative selection that may be achieved locally or globally. For example,
the corpus of self-patterns may be centrally managed at the cellular scope providing a
focus on effective non-self pattern generation, and the general application of such detec-
tors. At the tissue scope, the preparation of the detectors may be centralised in a thymus
model where a specific centrally connected tissue is designated the role of managing the
self-pattern corpus and detector generation, with system-wide decentralised application
and localised refinement of the recirculated detectors. Alternatively the management of
the corpus may decentralised and distributed throughout the tissues of the system for
localised (specialised) preparation and dissemination, likely a more scalable configuration,
particularly if the self corpus is accumulated in an opportunistic manner. These concerns
were considered by Hofmeyr in his dissertation (see Section 2.5.2) and provide a impor-
tant research agenda for negative selection at the tissue scope of the integrated hierarchy.
The host has similar concerns as that of the tissue, although with the important shift
in focus from a strongly integrated series of perspectives to strongly independent holistic
perspectives with weak integration. Pattern generation is centralised within each perspec-
tive although some control is provided over the exposure to information, the restarting of
perspectives with biasing, and the long-term adaptation of the structure and processes of
detector preparation and application.
Immune Network
The immune network paradigm is concerned with intra-receptor interactions with and
without the presence of antigen and was proposed to be a specialised case of clonal selec-
tion at the cellular level (Section 4.7). This paradigm was investigated (1) briefly, and (2)
only at the cellular level, suggesting an opportunity for further elaboration and integra-
tion with the scope of artificial immune network approaches. The information processing
281
strategy distilled form the theory was that of repertoire maintenance using intra-cellular
interactions. Such interactions form networks of cellular relationships which may be con-
sidered intra-repertoire higher order structures, that may be exploited for storing more
complex information.
Table 7.10: Summary of the Immune Network AIS paradigm mapped onto the three tiers
of the IHCSF.
Table 7.10 provides a summary of the mapping of the immune network strategy to the
three tiers of the IHCSF. The antigenic environment involves the scope of the standard
clonal selection antigenic environment at each tier in the framework, in addition to the
scope of intra-repertoire interactions that may result. As these relationships are scaled-up
from the cellular level, they may be considered to occur between tissues, and between
hosts, with the latter providing a truly abstract proposition for the theory. From the tis-
sue perspective, the localisation and dissemination of acquired information extends from
information about antigenic infections, to information about the relationships within each
tissue. The dissemination of cells involved in inter-cell relationships provides an opportu-
nity for the interaction and ultimate integration of localised relationships between tissues,
providing new contexts for response, and likely initially disrupting the maintenance of
localised relationships. The host perspective, in particular the generational specialisation
provides a context for considering the biasing (so-called ‘seeding’) of cellular relationships,
and ongoing refinement of these relationships over extended time periods across multiple
host-lineage in a population using the maternal immunity approach. The generational spe-
cialisation also provides an opportunity for adapting the processes and structures used in
the formation and maintenance of relationships, allowing potentially for the development
of new relationship types (structures).
Other
The generality of the reduction of functional immunology from the scope of a holistic
immune system to the theory-laden cellular level may provide a powerful abstraction
for many unrealised and/or budding Artificial Immune Systems. Examples may include,
danger theory, innate immunity, cytokine molecules, and the large number of cell types
and their interactions. The so-called power of the abstraction comes from (1) the context
it provides for framing the information processing qualities of an immunological structure
or process, (2) the strong focus on identifying and bracketing of complexity in resultant
models promoting clear schedule for experimentation and elaboration, and finally, (3) a
context for the integration of findings into a coherent model of the motivating paradigm.
282
7.5.3 Hierarchical Framework Methodology
This section considers the exploitation of the proposed methodology in different but related
biologically-inspired Computational Intelligence sub-fields. In considering this question,
a brief assessment of two general fields are considered, specifically (1) Evolutionary Com-
putation and (2) Connectionist Intelligence. The fields are considered in the context of
their metaphor, strategy, partitioning into system and environment, and reduction. Given
the enormity of the research into the selected Computational Intelligence sub-fields the
hierarchical phrasing of the three adaptive strategies is not likely to reveal any insights
into the respective paradigms, rather the expectation is that the reductionist methodology
may provide a framework for better integrating findings from existing approaches.
Evolutionary Computation
The metaphor for the well studied evolutionary computation field is neo-Darwinian evo-
lution, taking into account the genetic concerns of micro- and macroevolution. The dis-
tilled computational principles include selection and descent with modification typically
via the recombination and mutation of structures. The computational strategy may be
summarised as adaptation toward relative improvement under the constraints of an en-
vironment (see Section 3.4.1). The summation of the adaptive strategy highlighted the
intuitive separation of the population of structures under adaptation, and a environment
responsible for defining the scope of ‘fitness’, typically apportioned directly in terms of
quantitative scalar values that are interpreted by the adaptive strategy as the proportion-
ate allocation of available resources. Table 7.11 provides a summary of an interpreted
reduction of evolution from the species level to the DNA level, constraining both the gen-
eral adaptive strategy and fitness-assigning environment. The reduction is based on the
units of selection and adaptation using the same general approach as was adopted in the
reduction of clonal selection. The chosen units of selection include genomes, populations,
and species, which forms an Integrated Hierarchical Evolutionary Framework.
The genome level encompasses the scope of standard evolutionary approaches, and
is bounded to a single population of individuals each with a distinct genome. The en-
vironment at this level is concerned with the relative difference between members of the
population based on the information content of their genome. It is concerned with the
283
tools of DNA, information decomposition from holistic genome to functional gene, and
ultimately to the base pairs of the representation. This is an important consideration as it
provides a bracketing of information representation complexity, including but not limited
to the concerns of the scope of the information mapped and assessable in the phenotype,
intra-gene relationships (gene or allele linkage), and other representation complexities.
The mapping of genotype to phenotype provides another critical axis of complexity for
bracketing including concerns of development and time-scope of assessment. As such the
mapping may vary between direct assessment of genome, unicellular and multicellular or-
ganisms, to the full concerns of developmental biology and lifetime-based assessment of
the resulting organism. To summarise, the important axis for bracketing include: (1) in-
formation representation such as one-to-many relationships in base-pairs, genes, and the
number of and number of sets of chromosomes (ploidy); and (2) information mapping such
as the transformation and time-horizon on the assessment of the genotype and potentially
resulting organism.
The population level shifts the concerns from that of organisms in a population, to a
set of discrete populations in a species. The environment is scaled in turn, considering
the relative improvements of populations through the aggregation of the relative improve-
ments of the genomes in each population. The environment is generally the same for
all populations, limiting the divergence of populations into different species. This level is
reminiscent of hierarchical genetic algorithms (for example see [319, 119]) and parallel evo-
lutionary algorithms (for example [68]), with concerns of inter-population interaction in
the form of migrations. Examples of inter-population interactions provides an important
axis for complexity for bracketing beyond the cardinality of genomes in each repertoire.
This constraint is lifted in the species level that raises the concerns from that of popu-
lations in a species, to that of a species in an ecosystem. The environment provides a
variety of ecological niches that may be exploited and competed for by the species in the
ecosystem. This introduces the concerns of the divergence of species called speciation (for
example see speciation genetic algorithms [123]), and the invasion of sudden exploitation
of underexploited ecological niches adaptive radiations (for example see niching genetic
algorithms [279]). Both the interaction between species, and the cardinality of ecological
niches provide contexts of complexity that may be bracketed for investigation, with inter-
esting combinations such as species themselves representing a part of an ecological niche
in a predator-prey relationship.
The hierarchical framing and relationships between the concerns of evolution highlight
the specific bracketed configurations chosen and propagated for sub-fields of the paradigm.
For example in the case of niching genetic algorithms and speciation genetic algorithms
the effects are realised within a single population. This observation does not violate the
constraints of the proposed framework, rather suggests a cross-hierarchical bracketing
where the diversity concerns of multiple populations or multiple species are compressed to
that of genomes within a population. This form of bracketing is similar to that used in the
HAEF with antigen from the cellular to the host levels, although in this case is used on the
system side to bring features from the higher levels of abstraction down to the lowest level
284
of abstraction by compressing the cardinality of the units of adaptation and selection.
The compression of cardinality is the basis of population genetics that considers gene
frequencies, flows and drifts in populations and species of individuals. The contribution of
the framework is subtle, as it does not suggest perspectives of the strategy unconsidered
by the field. Rather, the contribution is that the focus of each tier provides a context for
bracketing the complexity of the strategy at different levels of abstraction. This focused
bracketing highlights the axis of complexity that may be bounded for investigation, and
more importantly it suggests at the effects of the constraint by considering the extremes
of the alternatives.
Connectionist Intelligence
The metaphor for the field of connectionist intelligence are brain cells called neurons that
ultimately provide the biological basis of human-level intelligence when arranged into
vast interconnected networks in the central nervous system. The distilled computational
principles include collections of neurons with synapses that connect the neurons into a
network structure, and the propagation of signals through the network. Propagation of
signals involves sensory (input) neurons which propagate received signals through the
network in parallel. Signal propagation is governed via the aggregation of inbound signals
to a given neuron in the network which may or may not activate and transfer (froward
propagate) the received signal. The computational strategy involves the adaptation of
the ways signals are propagated via adjusting the weights between the neurons. The
strategy is divided into the central nervous system of neurons and their interconnections
and the environment that provides the stimuli to which the system receives and adjusts
its behaviour. Table 7.12 provides a summary of an interpreted reduction of connectionist
intelligence from the holistic nervous system to the neuron level, constraining both the
general adaptive strategy and the sensory input environment. The reduction is based on
levels of abstraction regarding the aggregations of brain cells which provide interesting
constraints on the information processing that may occur including a network of cells
referred to as a neuronal group that responds to a habitat of stimulus, groups of networked
cells referred to as a host (nervous system), and finally a population of hosts with nervous
systems.
285
The cellular level is representative of the standard forms of Artificial Neural Networks
(ANN) (for example see [334]). The environment at this level involves a stream of input
patterns referred to as a stimulus (for example a series of multivariate vectors). Therefore,
the scope of supervised and unsupervised learning schedules for adapting weights, as well
as recurrent and forward propagating structures belong to the cellular level. Bracketing
involves bounds on the cardinality of the units of adaptation (neurons), and their interac-
tions (synapses). Much like the clonal selection of immune system cells, the information
content from the environment is exposure-based, although in this case governed by the
sensors that perceive and communicate the information to the neural network. In addi-
tion to the trigger-based adaptation of intra-network connections, recurrent connections
provide a source of self-stimulation within the structure, much like the immune network
paradigm.
The group level is concerned with multiple functional groups of neurons that collec-
tively may form a complete nervous system. As such, the functional units are exposed
to an array of stimuli called a habitat. This provides a scale above the standard neural
network models, and considers multiple network approaches. There has been much work
on such models in the field not limited to hierarchical neural networks [34], and modu-
lar and ensemble neural networks [224, 357], and may others. The rise in the level of
abstraction may also provide opportunities for exploiting varied neuronal cell and con-
nection types including relay, motor, and sensory cells as well as the variety of neural
receptors and transmitters. The axes of complexity that may be bracketed include the
number of functional groups of cells as well as the amount of interaction between the
groups. The host level is concerned with populations of interacting nervous systems that
respond to an environment of habitats of stimuli mediated by the each host’s perception.
The environment includes the stimuli that may be provided by other nervous systems as
well as self-generated stimuli, and some control over preferential sensing from the environ-
ment. The scope, sources, and spatial temporal properties are expected to provide the the
greatest source of complexity at this level, requiring careful bracketing of the environmen-
tal information, habitat-mediated perception of information, and the interaction control
exerted by nervous systems. The population perspective permits the consideration of a
generational population structure that may adapt the structure and processes that govern
the propagation and manipulation of signals in networks of neurons. This is related to the
field of evolutionary artificial neural networks (for example see [440]), that is concerned
with the application of evolutionary processes to the concerns of neural networks at the
neuron level such as the architecture, the connections weight, and the learning rules used
to adjust the connection weights.
Other
The methodology, specifically the division and reduction concerns result in a clear hier-
archical system-environment perspective of a biological inspired computation paradigm
provides common ground for comparing and contrasting such paradigms at multiple lev-
els of abstraction. From the perspective of clonal selection, a brief interpretation of the
286
related fields of evolutionary computation and connectionist intelligence provides a infor-
mation processing context (more than superficial similarity) for directly relating models
and algorithms at the same level of abstraction (for example the relationship of ensemble
neural networks (mixture of experts) and island population genetic algorithms with the
tissue clonal selection paradigm), for exploiting the findings of such related approaches,
and identification of relevant and important application problem domains.
A clear difficulty in this approach is the elucidation of a discrete environment that
has meaning at each level of abstraction. For the connectionist paradigm in particular,
such environments may be conceptually intuitive, although difficult to articulate concisely
resulting in arbitrary description. The pattern of this mapping of external concerns to
an environment follows a clear trend across clonal selection, evolution and connection-
ist paradigms, which is the bracketing of a general environmental concern at the highest
level (antigenic, ecological, and sensory environments) to the scale of a specific functional
group of interest in the system. The comparison may be strength through the phrasing
of additional Computational Intelligence paradigms with regard to the division and re-
duction aspects of the methodology. For example one may consider the following Swarm
Intelligence paradigms: Particle Swarm Optimisation with reduction based on hierarchical
groups of swarming units, and Ant Colony Optimisation based on hierarchical groups of
foraging units.
7.5.4 Summary
The section summarises the generalised principles deduced from the consideration of the
adopted methodology, the application of the resulting framework to the broader field of
Artificial Immune Systems, and the general applicability of the methodology to related
Computational Intelligence sub-fields.
1. Methodology
(a) Four Step Process: The four-step process (metaphor, strategy, division, reduc-
tion) provides a clonal-selection focused integration and augmentation to the
three reviewed standard methodologies (see Section 2.7), promoting the con-
cerns of abstraction, modularity, extensibility, bracketing, and ultimate reinte-
gration.
(b) Alternatives: The specifics of cell-based reduction of the immune system (the
cellular, tissue, and host tiers) is one interpretation of such an reduction that
was demonstrated to be useful for the investigation of clonal selection. Alter-
native reductions exist both with regard to the specific aggregations of cells,
and with regard to the use of alternative criterion from which provide a basis
for reduction.
2. Broader Applicability
(a) Beyond Cells: The framework with its basis in aggregation of cells, provides an
intuitive and modular perspective on the immune system providing a context
287
for considering the scaling concerns of an array of cellular and molecular-based
computational metaphors from immunology.
(b) Transferable Findings: Given the central role clonal selection plays with regard
to the negative selection and immune network paradigms, the findings from the
investigation clonal selection are expected to be generally transferable, specifi-
cally with regard to the localisation and dissemination concerns investigated at
the tissue and host scales.
3. General Applicability
288
on three important axes of complexity: the cardinality or amount of information, the spa-
tial and temporal patterns by which the information is exposed, and the propagation of
both of these concerns down through the hierarchy.
The Integrated Hierarchical Clonal Selection Framework was concerned with the inte-
gration and interaction between the hierarchical clonal selection and antigenic exposure
frameworks, with a full elaboration of the system and environmental concerns. Impor-
tantly, the framework highlighted the fact that the maximum in bracketable complexity
of a given tier represents the minimum in bracketable complexity for the following tier
in the hierarchy (the maximum-minimum principle). The non-contigious and strongly-
bracketed perspectives of the framework provide opportunities for further investigation,
as does the consideration of tiers above and beyond those considered in the framework
and the elaboration of those perspectives already considered. The adopted Methodology
provided a general cellular focused approach for the systematic distillation of an interest-
ing information processing metaphor, and controlled steps of elaboration, reduction, and
further elaboration. Broadly, the artefact of the applied methodology (the IHCSF) may
be a useful tool for elaborating existing AIS frameworks beyond the constraints of a cellu-
lar perspective. Generally, the application of the methodology to existing Computational
Intelligence sub-fields provides both a context for comparison with superficially similar
approaches toward integration (hybridisation) and racing.
7.6.2 Integration
The proposition and analysis of the hierarchical frameworks provided both insights into
the design decisions, boundaries of concern, and limitations of the investigated clonal
selection models and algorithms from across the three tiers. Further, the analysis also
provided motivation for the investigation of the myriad of variations facilitated by the
strongly applied complexity bracketing. The application of the adopted methodology and
framework to related Computational Intelligence fields suggested at the potential insights
that may be provided in assessing proposed approaches against state of the art. This
suggestion motivates the next chapter the focus of which is dominated by the applicability
of the clonal selection models and algorithms from across the three tiers in the specific
context of Function Optimisation and Function Approximation problem domains.
289
Chapter 8
290
proach. This section lists such features of the approaches from the Cellular, Tissue, and
Host Paradigms and projects their features onto general capability with regard to prob-
lem features to which the approaches may be suitable. These so-called general features
provide the foundation for further consideration of the application of the clonal selection
algorithms from across the hierarchical framework. System features are discussed in the
context of the general intention and observed behaviours. Paradigms are discussed in a
compressed form, not taking into consideration the subsumed properties of the hierarchical
framework.
• System Perspective: This requires a strong focus on the lower level functional ele-
ments and investigations that work toward correlating specific controlled organisa-
tions towards predictable emergent behaviours. An example is the central focus of
this work in Chapters 4 through 7.
• Problem Perspective: May require both a generalisation of the specific case to the
general problem case, as well as a functional or logical decomposition into constituent
parts.
Problem generalisation and functional decomposition are important and well used pat-
terns for problem solving in the broader fields of Artificial Intelligence and Machine Learn-
ing as the promotion of simplification and modularity can reduce the cost and complexity
of achieving solutions [342, 58].
291
Feature Overlap
Overlap in elicited features may be considered from three important perspectives: be-
tween systems, between problems, and between a system and a problem (depicted in Fig-
ure 8.1). Further, such overlap may be considered at different levels of detail with regard
to generalised problem solving strategies and problem definitions. These overlap cases are
considered as follows:
• System Overlap: Defines the suitability of comparing one system to another, referred
to as comparability. For example, systems may be considered for the same general
problems and compared in terms of theoretical or empirical capability, the results of
which may only be meaningful if the systems are significantly similar to each other
as assessed in terms of feature overlap.
• Problem Overlap: Defines the suitability of comparing one problem to another, re-
ferred to as transferability. From a systems focus for example, transferability refers
to the capability of a technique on a given problem to be transferred to another
problem, the result of which is only meaningful if there is a strong overlap between
the problems under consideration.
Suitability of Application
Strategy Problem
Comparability Transferability
Strategy Problem
Such mappings are expected to have noise given the subjective assessment and/or
complexity required in both the elicitation and consideration overlap of the of features,
292
the noisiest of which is expected to be the mapping between systems and problems. The
mapping of salient features of algorithms and problems was proposed as an important
reconciliation of the ‘no-free-lunch theorem’ by Wolpert and Macready [436], although the
important difference of this approach is that the system and algorithm are given prior
to the assessment. In [435], Wolpert and Macready specifically propose the elicitation
of the features from a problem first perspective, for which specialised algorithms can be
defined. Therefore, this methodology of suitability may be considered a generalisation
of this reconciliation suitable for the altered ‘Computational Intelligence’ (strategy first)
perspective on Artificial Intelligence.
The cellular algorithms are adaptive which is interpreted as their general capability of ob-
taining characteristics that improve the systems relative performance in an environment.
This adaptive behaviour is achieved through a selectionist process of iterative selection
and descent with modification. The discrete cell-based architecture is inherently par-
allel allowing for concurrent selection processes, and is robust providing redundancy of
information and flexibility in terms of resource allocation. The method of acquiring infor-
mation is called inductive learning (learning from example), where the approach uses the
implicit assumption that specific examples are representative of the broader information
content of the environment, specifically with regard to anticipated need. Generally, cel-
lular approaches maintain a population of samples that provide both a representation for
acquired information, and the basis for further induction. This method of simultaneously
improving information and optimising decisions is called the k-armed bandit (two-armed
and multi-armed bandit) problem from the field of statistical decision making [338] (for
a contemporary treatment see [39]). This class of problem has had a long tradition of
as a formalism for considering genetic algorithms and niching variants with regard to the
adaptive processes capability of the ‘automatic’ allocation of resources proportional to
expected payoff [173].
The acquired information is generally approximate, and is done so using a stochastic
method. The general method is called Monte Carlo in which randomness is exploited to
provide good average performance, quickly, and with a low chance of the worst case per-
formance. Such approaches are suited to problems with many coupled degrees of freedom,
for example large high-dimensional spaces. The selection method by which induction oc-
curs may be modelled as a series of parallel random walks that exploit gradients in the
underlying cost surface (directly, without derivatives), and as such is known as a Markov
chain Monte Carlo method [25, 76] (sampling from a target distribution function using a
293
Markov chain mechanism). This highlights that the robustness of the approach extends
to the induction process itself with regard to an improving approximation in the face of
potentially incomplete, incorrect and inconsistent sampled data. Finally, the induction
is performed in a piece-wise or online manner satisficing the concerns of real-time data,
with potentially dynamic changes that may be benign or adversarial with regard to the
internal model.
This section considers the scope of the inductive learning and resultant model in the
context of a given problem, and more specifically the information made available by the
problem. Three general classes of problem modelling are considered, as follows:
• Independent Models: The system models the entire scope of the problem irrespective
of any functional decompositions that may be available. This approach may be
referred to as holistic or naı̈ve models.
• Independent Sub-Models: The system models the problem in terms of clearly defined
sub-problems that are logically and/or functionally independent with regard to the
desired solution. This approach may be referred to as partitioned, symbolic, or
disjunctive models.
These three model types are used to assess both the Cellular Algorithms, as well as the
Tissue and Host Algorithms in the sections that follow. Figure 8.2 depicts the relationship
between the cellular algorithms and the three modelling types in the context of problem
instances that support such modelling. The figure clearly shows that cellular algorithms
model all three induction problems using a single repertoire of cells. The implication of
such an approach is that specific mechanisms may be required to facilitate the integration
of independent information in the case of sub-models, and inter-dependent information in
the case of partial models.
The three inductive modelling types may be related to the Antigen Colour Space Prob-
lems (ACSP) investigated in Chapter 4. The exposure of a single antigen (Nantigen = 1)
to the system may be considered an independent model, whereas the multiple antigen
(Nantigen = N ) and explicit aggregation of solutions may be considered the modelling
of multiple independent sub-problems. Importantly, given that the ACSP definition did
explicitly partition the antigenic set, although did not define the ordering of the exposure
of patterns to the system, the (Nantigen = N ) problem case may be considered a holistic
problem with unknown sub-problems and therefore given this unknown must be modelled
using partial-dependent sub-models (problem-side aggregation of responses). If the order-
ing of antigenic exposures was known to the system, then explicit sub-repertoires could be
294
Sub- Sub- Sub- Sub- Sub- Sub-
Problem Problem Problem Problem Problem Problem Problem
Figure 8.2: Depiction of the cellular algorithm approach to inductive learning with holistic,
sub-, and partial-models of a given problem.
defined and specialised for each pattern (system-side aggregation of responses). Finally,
the modelling of colour space patterns using colour components (in the case of DCCSA)
may be considered the modelling of the ACSP using independent cellular components
(one-cell equals one-component), although the modelling of sub-symbolic determinants
(such as partial strings) would have provided an example of dependent partial modelling
of single antigen.
Feature Summary
This section summarises the important descriptive features of Cellular Clonal Selection
Algorithms, and projects their features onto general features of problems to which this
class of algorithm may be suitable for application.
Salient System Features The following provides a list of the five features identified as
being distinctive in characterising the general class of Cellular Clonal Selection Algorithms.
• Inductive Learning: Information is acquired and generalised from discrete and spe-
cific examples provided by the problem.
• Stochastic Process: The interaction with the problem and the resultant adaptation
have an inherent element of randomness that promotes approximation of acquired
information, general robustness of the system to noise, and flexibility of the system
to unexpected events.
295
• Pattern Recognition: The acquisition of information and overt decision making are
coupled and triggered via a pattern recognition mechanism and response to infor-
mation from the problem.
• Online: Continuous decision making and improvement are desired given the variable
and potential dynamic or adversarial manner in which information is made available
to the system.
• Unknowns: Many of the parameters and/or constraints of the problem are known,
although important elements regarding the information content and/or ordering of
the exposure of information remain unknown to the system.
• Noise: The information signal may be disrupted, intermittent, and/or noisy requir-
ing a level of robustness of interpretation.
Tissue algorithms are explicitly decentralised, with each tissue providing an adaptive pro-
cess making local decisions and improvements, the effects of which are implicitly inte-
grated into holistic understanding of the information environment. The induction of the
information content and anticipated exposure is extended across each point of exposure
providing a spatial acquisition and anticipation, that trades-off concerns of localisation
and dissemination. The tissue architecture is pre-determined, with tightly coupled and
fixed neighbourhood relationships between tissues. Tissues themselves are not redundant,
nor flexible in their topology (additions, modifications, deletions), although each tissues
cellular information content is redundant, allowing general or specific loss of random sets
of cells. The information composition across tissues is generally heterogeneous given the
specialisation of each tissue (given an asymmetric information exposure pattern), although
296
the general capability at any tissue in the system is equivalent (heterogeneous composi-
tion, homogeneous capability). This equivalence in capability is provided by the continuous
dissemination (high frequency, generally low amplitude) of the underlying system informa-
tion, and the localised as well as opportunistic way in which such information is exploited.
The general method is called multisensor data fusion (information fusion or distributed
sensing) whereby the modularity of information acquisition is exploited and combined for
holistic application providing an improved model over that of a series of independent mod-
els [195]. The modularity may be imposed requiring explicit decomposition or partitioning
of an information environment using prior information. Alternatively, the modularity of
the information and its integration with the system may be an inherent feature of the
environment. In this latter case, the interaction with the environment governed by the
tissue exposure regime may or may not be known, making information acquisition and ap-
plication opportunistic. Integration is achieved by the continuous recirculation and mixing
of acquired information, suggesting that the application of the integrated information may
also be piece-wise or modular like the acquisition of the information (so-called piecewise
acquisition and application from the system perspective, or exposure and expectation from
the environment perspective).
The tissue algorithms may be considered in the context of the three generative inductive
models, specifically independent models and sub-models, and dependent partial models.
Figure 8.3 depicts the general relationship between the tissue algorithms and the three
modelling types in the context of problem instances that support such modelling. The
architecture of tissue algorithms forces an an explicit partitioning of a given problem
information space whether such partitioning exists or not. The partitioning of the Infection
Antigenic Exposure Problem (IAEP) via the Tissue Exposure Regimes provides a basis for
considering the suitability of the tissue model against each modelling type (Chapter 5). In
the case of a holistic modelling, one may consider a symmetric or point exposure regime in
which case the persistent unbiased recirculation generally provides a disruptive influence to
such modelling. Similarly, one may consider an asymmetric exposure regime representative
of an explicit decomposition of the problem, where persistent unbiased recirculation has
the same disruptive effects. Specifically, the results suggest, that although the tissue
algorithms can construct such inductive models (innate capability), tissue algorithms may
not be suitable for constructing holistic or sub-models unless there is an expectation that
dissemination will be beneficial, for example in the problem definition, or if the intra-
tissue CCSA is capable of exploiting such information1 . This finding is further supported
by analogous findings from related approaches in Section 8.3.2 and Section 8.4.2.
Importantly, the functional decomposition was not included in the IAEP definition,
therefore, the tissue algorithms may be considered to have constructed partial models for
the unknown sub-problems in the problem definition (TER’s). As such, the aggregation
1
This latter example was demonstrated to not be the case for in the use of RCCSA as an intra-tissue
algorithm.
297
Sub-
Problem Sub- Sub- Sub-
Problem Problem Problem
Sub- Sub-
Problem Problem Problem
Figure 8.3: Depiction of the tissue algorithm approach to inductive learning with holistic,
sub-, and partial-models of a given problem.
of results for a specific TCSA across the TER’s provides a general indication of algorithm
capability. The aggregation of results clearly highlight that MTCSA is more suitable for
per-exposure responses, and that the recirculation algorithms may be more suitable for
holistic solution aggregation at any given single tissue under an unknown exposure regime,
likely at any given time under such a regime. More specifically, this suggests the suitability
of recirculation tissue approaches are with the redundancy of acquired information to
data loss and impromptu localised solution aggregation. Beyond this general suitability,
the results also suggest the specific suitability of recirculation methods under a random
exposure regime compared to the non-recirculation approach. Although the exploratory
results from Chapter 5 are not conclusive, they suggest strong constraints on the suitability
of applicability of recirculation-based Tissue Clonal Selection Algorithms.
Feature Summary
This section summarise the important descriptive features of Tissue Clonal Selection Al-
gorithms, and projects the features onto general features of problems to which this class
of algorithm may be suitable for application.
Salient System Features The following provides a list of the five features identified as
being distinctive in characterising the general class of (recirculation-based) Tissue Clonal
Selection Algorithms.
• Tight Coupling: Sub-populations are organised in a spatial topology with fixed neigh-
bourhood relationships that generally communicate a low amplitude of information
with a high frequency.
298
• Data Fusion: Information acquired in localised regions of the structure is dissemi-
nated and made available across the system, providing an integrated although dis-
tributed holistic model.
• Hazardous Environment: Addressing the problem requires some level of system ro-
bustness with regard to the loss, corruption, or failure of general (random sample
from all tissues) or specifically-localised (content of random tissue or information in
transit) sub-sets of information acquired by the system.
Like tissue algorithms, host algorithms are comprised of a set of decentralised processes
making localised decisions, that in aggregation represent the systems information com-
position and general capability. Unlike the tissue paradigm, hosts are loosely coupled,
299
without fixed neighbourhood relationships. The localised adaptive processes are quasi-
independent and their interactions are impromptu, opportunistic, and generally peer-to-
peer. Their quasi-independence is reflected in their perspectives of the information en-
vironment, where interactions do not promote an integration of perspectives, rather are
low-bandwidth dissemination of information (low frequency, generally high amplitude of
cells) from which, in aggregation the population is expected to benefit. As such infor-
mation dissemination is selective and organised although impromptu given the generally
unstructured nature of the population of hosts. The general method is called mixture of
experts (ensemble methods) where systems exploit the modularity of the perspectives of
the information environment by specialising in separate although potentially overlapping
perspectives [310, 327]. As with the data fusion perspective of the tissue paradigm, the
modularity of the environment may be imposed through explicit decomposition or parti-
tioning, or may be an inherent feature of the environment. Each host generates a model of
its perspective of the information environment through the cellular and tissues process of
induction via adaptation. The generational host algorithms relate to the general method
called multiple restarts (iterative restarts or multiple runs) as this generative process is pe-
riodically reinitialised for a different although potentially biased set of starting conditions
that influence the inductive model generation process [225, 69].
The host algorithms may be considered in the context of the three generative inductive
models, specifically independent models and sub-models, and dependent partial models.
Figure 8.4 provides a depiction of general host algorithms with regard to the three in-
ductive model types. The figures show the explicit partitioning of the model, as was the
case with the tissue algorithms. Also as with the tissue algorithms, spatial exposures
regimes were the focus of the capabilities of the host algorithms embodied in the Habitat
Antigenic Exposure Problem (HAEP). Model generation can be considered with regard
to the population-based and generation-based approaches separately. In the case of a
holistic and sub-model generation the non-interaction MP-HCSA demonstrated its suit-
ability with regard to exposure-wise aggregation of results (system error), and its lack
of suitability for impromptu point-wise aggregation of results in the same manner as the
MTCSA. Interestingly, both the Random-Pairing Pathogen Transmission HCSA and the
Small Sample SI-HCAS demonstrated a trend of decreased point-wise aggregation error
and in the latter case system error. This highlights the suitability of population-based
HCSA with small unstructured dissemination of acquired information or triggers not only
for holistic (SHER) and sub-models (AHER), but also for partial models (across unknown
HER’s), in particular, SI-HCSA-SS was competitive with MP-HCSA under the AHER
and SHER exposure regimes.
The generational approach of host populations provides capability for restarting the
model generation process that may remove specific training biases by using varied starting
conditions. Further, the adaptation of the model generation process itself in the EI-HCSA
provides capability for tuning the process toward improved resultant models. Although
300
Problem Sub- Sub- Sub-
Problem Problem Problem
Sub- Sub- Sub-
Problem Problem Problem
Sub- Partial
Model
Model Model
Model Model Sub- Sub- Partial Partial
Model Model Model Model
Figure 8.4: Depiction of the host algorithm approach to inductive learning with holistic,
sub-, and partial-models of a given problem.
capable, neither approach was demonstrated suitable for such application from the results
of the limited exploratory experimentation, likely given the specifics of the configurations
used.
Feature Summary
This section summarise the important descriptive features of Host Clonal Selection Algo-
rithms, and projects their features onto general problem features to which this class of
algorithm may be suitable for application.
Salient System Features The following provides a list of the five features identified as
being distinctive in characterising the general class of Host Clonal Selection Algorithms.
• Distributed Model : The generation, storage and maintenance of the inductive model
is distributed across a set of discrete and communicating sub-systems, where the
acquisition of information and decision making is decentralised across the discrete
contacts with the problem promoting a natural mapping for partitioned or parti-
tionable problems.
• Loose Coupling: Sub-systems are not organised into any explicit spatial topology,
therefore neighbourhood interactions are impromptu, generally involving a small
number of sub-systems communicating a moderate amplitude of information with a
low frequency.
301
• Adaptation of Process: The evolutionary generational concerns of the model provide
an iterative adaptation mechanism for improving the model generation process with
regard to a specific problem ‘environment’.
• Discrete Partitions: The problem must facilitate discrete interaction with the sub-
systems, and likely be comprised of or partitioned into multiple sub- or partial
problems to which each sub-system may specialise.
302
8.3.1 Function Optimisation Overview
Problem Description
Optimisation (in the mathematical sense), is defined as the search for a combination of
parameters commonly referred to as decision variables (x = {x1 , x2 , x3 , . . . xn }) which
minimise or maximise some ordinal quantity (c) (typically a scalar called a score or cost)
assigned by an objective function or cost function (f ), under a set of constraints (g =
{g1 , g2 , g3 , . . . gn }). For example, a general minimisation case would be as follows: f (x&) ≤
f (x), ∀xi ∈ x. Constraints may provide boundaries on decision variables (for example in
a real-value hypercube 5n ), or may generally define regions of feasibility and infeasibility
in the decision variable space or cost space. In applied mathematics the field may be
referred to as Mathematical Programming. More generally the field may be referred to
as Global or Function Optimisation given the focus on the objective function (for more
general information on optimisation, see [222, 330, 53]).
Sub-Fields of Study
303
may require a viable or approximate solution in limited time or resources, motivating the
need for inductive model-generation based approaches.
Selected Examples
This section reviews a select set of approaches toward addressing optimisation problems
from the field of Artificial and Computational Intelligence to both provide general insight
into the state of the interaction between stochastic algorithms and the field of optimisation,
and to provide a context for relating the clonal selection algorithms to optimisation prob-
lems by analogy. This section draws heavily from the field of Evolutionary Computation,
Swarm Intelligence, and related Computational Intelligence sub-fields (see Section 3.4).
• Global and Local Optimisation: Global Optimisation refers to seeking a globally opti-
mal structure or approximation thereof, typically in an unconstrained n-dimensional
real valued space. Global is differentiated from Local Optimisation in that the latter
focuses on locating an optimal structure within a constrained region of the decision
variable search space, such as a single peak or valley (basin of attraction). In AI and
CI literature, global optimisation problems refers to the class of optimisation prob-
lems that generally cannot be addressed through more conventional approaches such
as gradient decent methods (that require derivatives), and pattern search (that can
get ‘stuck’ in local optima and/or may never converge) [329, 402]. Such problems are
typically addressed through a directed search strategy with stochastic elements, typ-
ically involving a population-based model in the case of global search (for example
a GA, see Section 3.4.1), and a mutation hill climbing-based model for local search
(see Section 3.4.2). The general strategy involves sampling broadly initially, and
converging on those areas of the search space that are most likely to payoff toward
the end of the search. It is common to apply a local search method to the solutions
of a global search procedure as an refinement strategy.
• Parallel Optimisation: A natural first step in addressing difficult (large and rugged
cost landscapes) is to exploit parallel and distributed hardware, to get an improved
result in the same amount of time, or the same result in less time, or both [85].
Towards unifying the myriad of approaches and hardware configurations, a general
consensus and taxonomy has been defined by the Parallel Evolutionary Algorithms
(PEA) and Parallel Metaheuristics fields that considers the ratio of communication
to computation called granularity [68, 13]. This taxonomy is presented concisely by
Alba and Tomassini as a plot or trade-off of three concerns: (1) the number of sub-
populations (models or parallel strategies working on the problem), (2) the coupling
between the sub-populations (frequency and amplitude of communication), and (3)
the size of the sub-populations (size or extent of the sub-models) [14]. Two important
and relevant findings from the narrower field of Parallel Evolutionary Algorithms
include (1) that tightly coupled (frequent migration) between coarse-grained models
typically results in worse performance than a non-distributed approach [15], and (2)
that loose coupling (infrequent migration) between coarse-grained models has been
304
consistently shown to provide a super-linear increase in performance [12, 35, 68].
• Cooperative Search: This is a more general approach that considers the use of multi-
ple models that work together to address a difficult optimisation problems. Durfee,
et al. consider so-called Cooperative Distributed Problem Solving (CDPS) in which
a network of loosely coupled solvers are employed to address complex distributed
problems. Specifically, such systems are desirable to match the processing capa-
bilities of the solver with regard to the attributes of the problem. For example,
a given problem may have spatially distributed, functionally distributed, or tempo-
rally distributed sub-problems to which a centralised and monolithic system may not
be suitable. Lesser considers CDPS and proposes such models perform distributed
search on dependent or independent and potentially overlapping sub-problems as
a motivating perspective for conducting research into Distributed Artificial Intelli-
gence (DAI)3 [271]. Lesser points out that in real world applications, it is hard to
get a optimal mapping between the allocated resources to the needs or availability
of information for a given problem, suggesting that such problems may be caused by
a mismatch in processing times and/or number of sub-problems, interdependencies
between sub-problems, and local experts whose expertise cannot be effectively com-
municated. For a more detail on the relationships between parallel and cooperative
search, El-Abd and Kamel provide a rigorous taxonomy [134].
• Hybrid Search: Hybrid Search is a perspective on optimisation that focuses on the use
of multiple and likely different approaches either sequentially (as in the canonical
global and local search case), or in parallel (such as in Cooperative Search). For
example in this latter case, it is common in the field of PEA to encourage different
levels of exploration and and exploitation across island populations by varying the
operators or operator configurations used [382, 3]. Talbi proposed a detailed 4-
level taxonomy of Hybrid Metaheuristics that encompassed concerns of parallel and
cooperating approaches [379]. The taxonomy encompasses parallel and cooperative
considerations for optimisation and focuses on the discriminating features in the
lowest level such as heterogeneity, and specialisation of approaches.
305
complexity in such problems is in locating structures that are feasible or violate the
least number of constraints, potentially optimising such feasibility [399, 263]. Search
Space Partitioning involves partitioning of the decision variable search space (for
example see Multispace Search by Gu, et al [131, 193, 192]). This is a critical con-
sideration given that for equal-sized dimensions bounds on parameters, the increase
in decision variables results in an exponential increase in the volume of the space to
search.
• Meta Optimisation: One may optimisation at a level above that considered in pre-
vious sections. Specifically, (1) the iterative generation of an inductive model called
multiple restart optimisation, and (2) the optimisation of the parameters of the
process that generates an inductive model of an optimisation problem. Multiple or
iterative restarts involves multiple independent algorithm executions from different
(random) starting conditions. It is generally considered as an method for achieving
an improved result in difficult optimisation problems in which a given strategy is
deceived by local or false optima [300, 225], typically requiring a restart schedule
[158]. A second and well studied form of meta optimisation involves the optimisa-
tion of the search process itself. Classical examples include the self-adaptation of
mutation parameters (step sizes) in the Evolutionary Strategy [333, 352] and Evolu-
tionary Programming [144, 143] approaches. Smith and Fogarty provided a review
of genetic algorithms with adaptive strategies providing a taxonomy in which the
meta-adaptations are applied at one of three levels: (1) the population (adapting the
overall sampling strategy), (2) the individual (adapting the creation of new samples
in the decision variable space), and (3) components (modifying component contri-
butions and/or individual step sizes as in ES and EP) [366].
306
misation. Applicability is considered in the context of the algorithm features reviewed in
Section 8.2 against the selected examples reviewed in the previous section.
Cellular Algorithms
Tissue Algorithms
307
Algorithm Nantigen Ncells Optimisation Strategy Inductive Model
MCCSA 1 1 Local Search Holistic
R/CCSA 1 N Global Search Holistic/Partial
R/CCSA N N Decomposition Search Sub/Partial
SCCSA 1 N Parallel Global Holistic/Partial
E/NCCSA 1 N Decomposition Search Partial
E/NCCSA N N Decomposition Search Sub/Partial
Table 8.1: Summary of the projected applicability of Cellular Clonal Selection Algorithms
to Function Optimisation Problems.
308
Algorithm Ninf ection Ntissues Optimisation Strategy Inductive Model
MTCSA 1 1 Global Search Holistic
MTCSA 1 N Parallel Global Holistic
MTCSA N N Parallel/Decomposition Sub
R/H/ITCSA 1 N Cooperative/Hybrid Holistic
R/H/ITCSA N N Cooperative/Decomposition Sub/Partial
Table 8.2: Summary of the projected applicability of Tissue Clonal Selection Algorithms
to Function Optimisation Problems.
Host Algorithms
309
Algorithm Nhabitats Nhosts Optimisation Strategy Inductive Model
MP-HCSA 1 1 Global Search Holistic
MP-HCSA 1 N Parallel Global Holistic
SI-HCSA 1 N Parallel/Cooperative/Hybrid Holistic
SI/THCSA N N Cooperative/Decomposition Sub/Partial
MG-HCSA 1/N 1 Sequential Iterative-Restarts Holistic
MG-HCSA 1 1/N Parallel Iterative-Restarts Holistic
MI-HCSA 1 1/N Multiple Restart/Meta Holistic
EI-HCSA 1 N Meta-Optimisation Holistic
Table 8.3: Summary of the projected applicability of Host Clonal Selection Algorithms to
Function Optimisation Problems.
egy, and a parallel restart strategy when configured with multiple hosts. The MI-HCSA
algorithm provides a restart strategy in which the initialisation of naı̈ve systems is bi-
ased with acquired information. This strategy may be effective in environments where
the availability is subject to frequent and unexpected change to seed new instances of
host processes (such as in the exploitation of idle computation time in a network envi-
ronment). Finally, the suggestion of optimising the initial conditions in the EI-HCSA
provides a link between the restart strategy in GHCSA and meta optimisation strategies
that optimise the processes that operate on a given problem instance. Importantly the
meta optimisation strategies (restarts and optimisation of process) apply not only to all
cellular and tissue approaches to which the hosts subsume, but also to the capabilities of
the population-based host algorithms. Table 8.3 summarises the applicability of HCSA to
function optimisation problems.
8.3.3 Summary
This section summarises the insight provided into the applicability of the clonal selection
algorithms from across the three paradigms generally with regard to Function Optimisa-
tion, and specifically with regard to some specialisations of the problem and techniques
for addressing the problem.
1. General Suitability
(a) Mapping: The mapping between the general clonal selection adaptive strategy
and function optimisation is natural for the specific case of blindly adapting a
clonal set for a single antigen.
(b) Systems: Beyond the adaptive cellular level, the tissue and host paradigms
provide a basis for decentralised and distributed optimisation, given a suitable
problem mapping.
(c) Environments: Global optimisation alone is insufficient to motivate application
to tissue and host paradigms, requiring functional and availability decomposi-
tions of a given optimisation problem to provide an effective mapping of the
problem to the antigenic exposure paradigm.
2. Algorithm Applicability
310
(a) Cellular : R/CCSA are suitable for local and global optimisation tasks, poten-
tially for functional decompositions of optimisation problems, and SCCSA is
suitable for parallisation.
(b) Tissue: MTCSA is suitable for parallel global optimisation, R/H/ITCSA are
suitable for cooperative hybrid and potentially functional decomposition, and
likely not suitable for cooperative global search.
(c) Host: MP-HCSA is suitable for parallel global search, SI-HCSA is suitable for
parallel global search and likely cooperative hybrid and functional decomposi-
tion, THCSA variants are suitable for functional decompositions and potentially
cooperative parallel optimisation. MG-HCSA is suitable for multiple restarts,
MI-HCSA may be suitable for biased multiple restarts, and EI-HCSA suggests
at meta optimisation with further extension.
311
Sub-Fields of Study
The function approximation formalism can be used to phrase some of the hardest prob-
lems faced by Computer Science, and Artificial Intelligence in particular such as natural
language processing and computer vision. The general process focuses on (1) the collec-
tion and preparation of the observations from the target function, (2) the selection and/or
preparation of a model of the target function, and (3) the application and ongoing refine-
ment of the prepared model. Some important problem-based sub-fields include: Feature
Selection where a feature is considered an aggregation of attributes, where only those fea-
tures that have meaning in the context of the target function are necessary to the modelling
process [262, 194], Classification where observations are inherently organised into labelled
groups (classes) and a supervised process models an underlying discrimination function
to classify unobserved samples, Clustering where observations may be organised into in-
herent groups based on common features although the groups are unlabelled requiring a
process to model an underlying discrimination function without corrective feedback, and
Curve or Surface Fitting where a model is prepared that provides a ‘best-fit’ (or regres-
sion) for a set of observations that may be used for interpolation over known observations
and extrapolation for observations outside what has been observed.
The field of Function Optimisation is related to Function Approximation, as many-sub-
problems of Function Approximation may be defined as optimisation problems. As such
many of the inductive modelling paradigms are differentiated based on the representation
used and/or the optimisation process used to minimise error or maximise effectiveness
on a given approximation problem. The difficulty of Function Approximation problems
centre around (1) the nature of the unknown relationships between attributes and features,
(2) the number (dimensionality) of of attributes and features, and (3) general concerns
of noise in such relationships and the dynamic availability of samples from the target
function. Additional difficulties include the incorporation of prior knowledge (such as
imbalance in samples, incomplete information and the variable reliability of data), and
problems of invariant features (such as transformation, translation, rotation, scaling and
skewing of features).
Selected Examples
This section reviews a select set of approaches toward addressing Function Approximation
problems from the field of Artificial and Computational Intelligence to both provide general
insight into the state of the interaction between stochastic algorithms and the field, and to
provide a context for relating the clonal selection algorithms to Function Approximation
problems by analogy. The review draws heavily from the fields of artificial neural networks,
specifically competitive learning, as well as related inductive machine learning fields such
as instance based learning.
312
features of interest using the natural representation of the observations in the prob-
lem space, typically an an unconstrained n-dimensional real valued space. The VQ
method provides the advantages of a non-parametric model of a target function (like
instance-based and lazy learning such as kNN, see Section 3.4) using a symbolic
representation that is meaningful in the domain (like tree-based approaches). The
promotion of compression addresses the storage and retrieval concerns of kNN, al-
though the selection of codebook vectors (the so-called quantisation problem) is a
hard problem that is known to be NP-complete [162]. More recently Kuncheva and
Bezdek have worked towards unifying quantisation methods in the application to
classification problems, referring to the approaches as Nearest Prototype Classifiers
(NPC) and proposing a generalised nearest prototype classifier [264, 265].
313
pared for each (commonly used on tree-based approaches) [209]. A related approach
involves a hierarchical partitioning of attributes space into sub-vectors (sub-spaces)
used to improve VQ-based compression [170]. Another important functional decom-
position involves the partitioning of the set of observations. The are many ways
in which observations may be divided, although common approaches include pre-
processing using clustering techniques to divide the set into natural groups, addi-
tional statistical approaches that partition based on central tendency and outliers,
and re-sampling methods that are required to reduce the volume of observations.
Cellular Algorithms
314
the target function (therefore there are always N ), the repertoire represents an approx-
imation of the target function adapted in the presence of the sample observations, and
affinity is calculated based on a distance metric between observations and exemplars. As
considered in the review of the state of clonal selection algorithm research (Section 3.3.2),
this was the perspective used in the development and application of AIRS to classification
where exemplars quantised observations. This mapping was also used in the application of
CLONALG to binary pattern recognition, and was the basis for the colour space problems
investigated across the three clonal selection paradigms in this work. As considered in
paradigms related to the field of clonal selection algorithms in Section 3.4, the algorithms
competition-based approach to preparing the exemplars in response to the sample obser-
vations is related to the field of competitive learning, whereas the interpretation of the
resulting exemplars is related to the field of instance-based learning, specifically k-Nearest
Neighbours (kNN).
The cellular clonal selection algorithms provide a series of global optimisers suitable for
vector quantisation, not unlike the use of EC, SA, and hill climbing for the same task. The
general nature of VQ makes the cellular algorithms suitable for classification (Nearest Pro-
totype Classifiers), clustering, and curve fitting. Given the competition-based interaction
between exemplars and the unknown context-based relationships that such competition
represents, it is reasonable to categorise the cellular clonal selection algorithms as the
induction of partial-models. Although it is important to point out that it is the degree to
which such relationships have meaning in the problem space that defines whether the ex-
emplars may be considered partial (strongly related) or sub (weakly or unrelated) models
of the broader function approximation problem. The iterative (per-exposure) competition
based learning and decision making suggest at the general suitability of the approach to
incremental and dynamic specialisations of the general problem. The spatial properties
of SCCSA show similarities with projection-based clustering methods such as SOM and
Neural Gas, although unlike those approaches SCCAS in its present form does not demon-
strate the preservation of topological features. As with function optimisation, the role of
ECCAS and NCCAS is not clear given the approaches immature although demonstrated
similarities with sub-symbolic feature-based approaches such as Learning Classifier Sys-
tem. The VQ approach to function approximation highlighted an important perspective on
negative selection algorithms and their relationship to clonal selection algorithms. Specif-
ically, that such approaches may be considered in the context of a function approximation
formalism (the standard domains of anomaly and change detection as discriminating func-
tions), where the sub-string approaches used (hamming distance, r-chunks, and others)
may be considered the simultaneous identification and extraction of features and instance-
based modelling of the underlying PDF. Table 8.4 summarises the suitability of the Clonal
Selection Algorithms for general variations of the Function Approximation formalism.
Tissue Algorithms
The mapping of tissue algorithms onto the Function Approximation formalism is as fol-
lows: tissues represent individual vector quantisation models each with a set of exemplars,
315
Algorithm Nantigen Ncells Approximation Strategy Inductive Model
R/CCSA N N Vector Quantisation Sub/Partial
SCCSA N N Vector Quantisation Partial
E/NCCSA N N Feature Extraction Partial
Table 8.4: Summary of the projected applicability of Cellular Clonal Selection Algorithms
to Function Approximation Problems.
Table 8.5: Summary of the projected applicability of Tissue Clonal Selection Algorithms
to Function Approximation Problems.
316
Host Algorithms
The functional mapping of host algorithms is as follows: hosts may be considered col-
lections of highly integrated vector quantisation models or large (bracketed) models, host
interaction may be considered the inter process, inter system, or inter-network communi-
cation involving either the sharing of model information or information to which models
are exposed, habitats represent different perspectives of the observations in terms of func-
tional or availability decompositions, where the host exposure regime defines the designed
or opportunistic mapping between such decompositions and the system.
The population of hosts provide the similar capabilities as the tissue algorithms, al-
though scaled up. In particular the MP-HCSA provides a broader interpretation of en-
semble methods considering the hierarchical formulation of such approaches. Importantly
the SI-HCSA provides a less rigid communication mechanism between VQ models, that
permits a more directed and/or rapid replication of acquired information more akin to
ARTIS in a broadcast environment, and peer-to-peer propagation. This is also related
to epidemic and gossip based replication of information in distributed databases which
host models could adopt toward predictable efficiency gains [127, 413]. The generational
algorithms exploit the restart property inherent in the global optimisation algorithm that
underlies the adaptive capability of the approach. As such MI-HCSA provides general bias
of ensembles and EI-HCSA provides general adaptation of the process within ensembles.
Table 8.6 provides a summary of the suitability of the Host Clonal Selection Algorithms
to Function Approximation.
Table 8.6: Summary of the projected applicability of Host Clonal Selection Algorithms to
Function Approximation Problems.
8.4.3 Summary
This section summarises the insights provided into the suitability of the applicability of
the clonal selection algorithms from across the three paradigms, generally with regard
to Function Approximation, and specifically with regard to some specialisations of the
problem and techniques for addressing the problem.
1. General Suitability
(a) Mapping: The mapping of clonal selection to vector quantisation based func-
tion approximation provides a natural fit, that may only be further improved
through the parallel task of feature selection.
317
(b) Systems: Clonal selection provides an optimisation process over the scope of
managed exemplars, that provides a natural parallel realisation of the mapping
between the process and function optimisation. As such, the system is always
comprised of > 1 cell.
(c) Environments: The set of observations from the target function and the iter-
ative exposure and adaptation or application in response to such observations
embodies the principles and provide a natural mapping for onto the antigenic
exposure paradigm.
2. Algorithm Applicability
318
problems that facilitate discrete interaction, that provide noisy although somewhat
regular signals with unknown levels of complexity likely in an online manner.
Problem Applicability Sections 8.3 and 8.4 considered the applicability of the clonal
selection algorithms in the context of the Function Optimisation and Function Approxi-
mation problem formalisms respectively, highlighting sub-problems to which specific algo-
rithms are suggested to be suited. The general mapping of the clonal selection paradigm
and applicability to the respective problems is summarised as follows:
8.5.2 Integration
This final chapter provides closure on the adaptive and distributed conceptual models
and clonal selection algorithms proposed and investigated in this work by grounding their
salient features to specific problem formalisms and sub-problems. Although the claims of
suitability and applicability are reasoned from the qualitative observations from previous
chapters, such claims require verification on specific standard benchmark and real-world
problem instances. This clear and important extension of this investigation is considered
in conjunction with further extensions, limitations, and criticisms in the following Chapter
that concludes this work.
319
Chapter 9
Conclusions
2. Identify limitations with and elaborate upon the base clonal selection
paradigm. The Clonal Selection Theory was considered in depth in Section 3.2 pro-
viding a context for effectively interpreting the motivations for the state of the art in
clonal selection algorithms. More importantly, the depth of immunological background
provided insight into the constraints that were imposed in realising the classical and state
of the art algorithms. The review of clonal selection algorithms in Section 3.3 highlighted
320
three main limitations, specifically: (1) Lack of explicit consideration of adaptive quali-
ties: Information processing inspired by structures and functions of the clonal selection
theory were traditional considered adaptive implicitly given the theories relationship with
evolutionary theory and resultant evolutionary algorithms. (2) Lack of positioning in the
broader field : Consideration of inspired algorithms was traditionally limited to related al-
gorithms in the field of Artificial Immune Systems with some consideration of the related
approaches in the field of Evolutionary Computation, broader consideration in computa-
tional and machine intelligence was rarely considered. (3) Lack of consideration beyond
the cellular : Clonal selection algorithms, as well as the majority of the broader Artificial
Immune System algorithms are concerned primarily with the structure and function of the
immune system at the cellular level, specifically given the cellular (lymphocyte immune
cell) and molecular (antibody protein) focus of the principle inspiring theories.
Each of these three limitations were address in turn, specifically: Section 3.4 consid-
ered clonal selection in the broader context of Computational and Machine Intelligence,
strengthening the relationship with Evolutionary Computation and Lazy Learning, and
highlighting the relationship with Hill Climbing algorithms and Competitive Learning.
Section 3.5 considered clonal selection as an adaptive strategy, phrasing the approach in
Holland’s adaptive systems formalism. Section 3.6 outlined an agenda for the investi-
gation and elaboration of the broader clonal selection paradigm, including: the Cellular
Clonal Selection perspective involving the investigation of the classical paradigm pursued
in Chapter 4, the new Tissue Clonal Selection perspective investigated in Chapter 5, and
the new Host Clonal Selection perspective investigated in Chapter 6.
321
host-specialisation, and the variation of disseminated giving hosts control over what in-
formation is disseminated, and when. Toward this end, investigation of host algorithms
also focused on the information acquisition and application capabilities under a range of
unknown distributed exposure scenarios.
5. Propose an integrated clonal selection framework that unites the base and
distributed variants. The clonal selection paradigm was partitioned in section Sec-
tion 3.6 into that of ‘systems’ and ‘environments’, where clonal selection governed immune
systems were mapped to ‘systems’, and the scope of antigen and pathogen were mapped to
‘environments’ (elaborated initially in Section 4.2.2). The clonal selection (systems) parti-
tion was reduced into the three distinct paradigms, each of which was investigated. Chap-
ter 7 considered the reconstruction of the three paradigms and the system-environment
partition into a hierarchical framework. A Hierarchical Clonal Selection Framework was
defined in Section 7.2 that aggregated the clonal selection algorithms from across the
three paradigms, highlighting the specific constraints imposed on the quintessential in-
formation processing procedure. A Hierarchical Antigenic Exposure Framework was de-
fined in Section 7.3 that aggregated the contrived antigenic environments from across the
three paradigms, highlighting the commonality of piece-wise information exposure, and
the common source of complexity in the cardinality and spatial temporal patterns of ex-
posure, which are compounded across the paradigms. The frameworks were combined
into an Integrated Hierarchical Clonal Selection Framework in Section 7.4, uniting the
system and environmental concerns, suggesting at additional perspectives, and account-
ing for the bracketing of complexity in each specific clonal selection paradigm. Finally,
322
the adopted partition-reduction methodology was reviewed and its application considered
in the broader context in the field of Artificial Immune Systems, and as a general tool for
investigating related Computational Intelligence fields of study (Section 7.5).
9.2 Contributions
This section reviews the contributions as standalone conceptual and computational arte-
facts. Artefacts are defined as discrete and differentiable objects produced and qualified
within this investigation that may drawn from and used beyond the work.
323
9.2.2 Conceptual Artefacts
A conceptual artefact contribution is a defined formalism that may be exploited beyond
this investigation for structuring practices, including methodologies and frameworks.
9.3 Limitations
Limitations are observed as decision points with alternative options, each of which repre-
sents a trade-off in terms of the contributions made from the investigation in the context
of the hypothesis and research goals. This section critically assesses the limitations of
this work, specifically in the context of design and methodological constraints imposed on
the investigation, as well as the alternatives, benefits, and restrictions they provide. The
limitations of three specific decision points are considered: (1) the method of biological
interpretation and transition to computational intelligence algorithm, (2) the focus in the
chosen method of algorithm development, and (3) the methodology adopted to verify and
demonstrate expected behaviours and capabilities of developed algorithms.
324
underlie the principles of much of the field (Section 3.2.2). This alternative reduces up-
front effort by exploiting interpretations made by theoretical immunologists and produces
specific rather than general approaches with a clear mathematical foundation. The strong
specialisation of such approaches likely limits the broader applicability of the approaches,
and the inspiring models are likely bounded by immunological dogma (for example self-
nonself discrimination) which may or may not be a useful perspective in computational
intelligence modelling and algorithm development. A specific and relevant example from
this work is the tissue paradigm which suggests at multiple tissues communicating in se-
ries (general), whereas the alternative may be to base the organisation of tissues on a
specific model of the lymphatic system [19], or a communication mechanism based on
mathematical models of lymphocyte trafficking [371, 370, 369]. The qualitative interpre-
tation approach taken in this work was chosen as it facilitates the conception of broader
fields of study (paradigms) which may be useful in and of themselves, and which may be
specialised at a later time with restrictive mathematical models.
325
9.3.3 Verification and Demonstration
The verification of the behaviours and capabilities of developed modes as achieved em-
pirically using experimentation with general algorithm instances on a generalised and
trivial pattern recognition problem domain. A problem with this approach of verifica-
tion and demonstration is that it is qualitative and inaccurate, specifically in the context
of Goldberg’s economy of modelling in Section 2.7.3. An alternative is to demonstrate
the capability and verify behaviour using mathematical modelling tools. Analytical tools
would provide generalised descriptions of relationships and behaviours that would be more
accurate although a more restricted interpretation of the motivating information process-
ing properties. An alternative to the development of costly mathematical models is the
approach outlined by Goldberg’s is to use a spectrum of modelling types in addition to em-
pirical assessment and statistical analysis, specifically facet-wise and dimensional models.
The qualitative empirical approach was chosen primarily given the speed both in imple-
mentation and in obtaining results. Empirical demonstration required implementation
providing a grounding of conceptual models to the specific concerns of a functioning infor-
mation processing system. The broader inaccuracy of qualitative observations was address
through the use of multiple problem scenarios providing calibration and cross-correlation
of behaviour, and through the use of statistical tools.
326
investigation would immediately provide new interpretations of clonal selection al-
gorithms from across the three paradigms, and reveal insights into the behaviour
and application of clonal selection algorithms covered by the framework.
3. Additional Mappings: The investigation of the clonal selection centric acquired im-
mune system models across the hierarchies biased by one or more of the related
computational paradigms (such as negative selection, immune network, or danger
theory) as remarked in the bracketing analysis (Section 7.4.3), and explicitly con-
sidered with regard to the integrated framework in Section 7.5.2. This investigation
would not only provide insights into the approaches covered by the framework, it
would explicitly merge related immunological computational paradigms immediately
providing a firm basis of models, architectures, and algorithms to be exploited by
the integrated paradigm.
2. Pathogen Models: The antigenic exposure paradigm was defined as an abstract prob-
lem for clonal selection systems encapsulating the properties of all self and foreign
327
antigen (defined in Section 4.2.2, elaborated in Sections 5.3.2 and 6.3.2, and inte-
grated in Section 7.3). As such, the paradigm received little elaboration beyond
definition providing a large opportunity for the investigation of pathogenic models.
Pathogen models may be elicited and investigated as either models for problems to
be solved by clonal selection systems, or as distinct computational models for prob-
lem solving in and of themselves. Three clear motivating metaphors for the latter
case are as follows: (1) Pathogen Evolution: Suggested in Section 6.3.2 as providing
a model for dynamic problems in which a system and problem co-adapt in response
to each other based on reviewed parasitism in Section 6.2.2, (2) Intra-Host Dynam-
ics: That describe the strategies and behaviours of a pathogen after it enters a host
organism including evasive and adaptive qualities [26, 161] (3) Intra-Population Dy-
namics: Also suggested in Section 6.3.2 and providing part of the motivation for
system-controlled transmission in the PT-HCSA (Section 6.5)2 .
1. Cellular Paradigm: Likely the most important of the three paradigms, the cellular
paradigm may be elaborated in three specific directions: (1) lymphocyte life cycle
and types, and (2) regulatory mechanisms. The model of lymphocytes as atomic
data points is a dramatic simplification of both the complexity of the life cycle of
immune cells, as well as the diverse variety of cells that are involved in the immune
response. The computational properties of cellular life cycles introduces task-division
and developmental mechanism (Section 5.2.2), whereas the exploitation of the di-
verse set of immune cell types further promotes task division and more importantly
interaction and collaboration between cells. The regulation of lymphocytes under
clonal selection in which the cellular repertoire is continually acquiring information
2
There is much work on epidemiology, specifically adaptive transmission [50], and adaptive virulence
[335], to motivate this paradigm.
328
and expanding, presents problems of cell population size regulation whilst maintain-
ing an effective immunological memory. More elaborate homoeostasis mechanisms
should be investigated toward providing improved flexibility in cellular algorithms, in
particular with regard to promoting decentralised rather than centralised resource
allocation in response to antigenic exposures within a given repertoire. Such ap-
proaches may be motivated by the variety of mathematical models that describe
lymphocyte homoeostasis [290, 87].
2. Tissue Paradigm: Two general areas for elaboration of the tissue paradigm include
(1) the investigation of the variety of lymphocyte trafficking behaviours and the de-
centralised receptor centric mechanisms that influence them (Section 5.2.2) and (2)
the tissues of the lymphatic system and the behavioural restrictions and antigenic-
interactions promoted by the different tissue structures and arrangements (reviewed
in Section 5.2.1, with models proposed in Section 5.3.3). A final additional motivat-
ing metaphor is the emerging field of Lymphocyte Population Biology, in which the
behaviours and interactions of immune cells are studied using the tools of population
genetics and ecology, driven more recently by Freitas Antonio and colleagues at the
Pasteur Institute in France [154, 165, 4]. This aggregated perspective of lympho-
cyte behaviours introduces interesting models of lymphocyte niche exploitation and
regulatory concerns of density dependent competition.
3. Host Paradigm: The two principle areas of the host paradigm present a large ca-
pacity for elaboration given the generality of base motivations, specifically (1) host
population immunisation (reviewed in Section 6.2.1), and (2) host immune system
evolution (reviewed in Section 6.2.2). Host vaccination provides a promising area
for elaboration, specificly the computational concerns of vaccine identification and
transmission regimes in the context of the benefits of population coverage called
‘herd immunity’. Such investigations are expected to provide models for informa-
tion dissemination in distributed databases such as database replication [127], and
peer-to-peer content dissemination networks [413] suggested in Section 8.4.2. The
evolution of the immune system is a broader motivating metaphor, although fur-
ther research may consider the following two promising cases: (1) the adaptation
of innate immunity where a selective process motivates the integration of lifetime
acquired traits into the genome (the intersection of lifetime and evolutionary learn-
ing considered in Section 6.3.1), and (2) the adaptation of the affinity maturation
process beyond the base repertoire where the mechanisms used in lifetime are also
evolved.
329
tion of information processing capabilities not limited to parameter studies, specialisation,
and additional empirical benchmarking. This section highlights specific cases of the sec-
ond class of fundamental research for specific algorithms across the three clonal selection
paradigms.
2. Tissue Algorithms: The tissue algorithms, specifically the use of recirculation and
mechanisms to impose localisation biases on recirculation (such as homing and in-
flammation) would benefit from analytical analysis. Specifically, (1) probabilistic
models of information availability across a given structure and how such models are
effected by localisation biases, and (2) probabilistic models of information dissemi-
nation based on varied exposure models. These models would motivate predictable
configurations (such as migration or imprinting rates) for eliciting well defined system
capability under different exposure scenarios supporting empirical findings. Further,
an investigation into the field of Spatial-Temporal Learning and the relationship
of Tissue (and Host) Algorithms would provide a deeper theoretical understanding
of the fundamental problem and recirculation-based strategy solution of systemic
immunity within a host [354].
330
the compounded complexity effect of the host level of algorithms that are both de-
pendent on predictable algorithms which they subsume, as well as the predictable
foundational behaviours (such as interaction) of the paradigm.
331
Appendix A
332
Problem System HD HE ATD ATE
TER TCSA x̄ σ x̄ σ x̄ σ x̄ σ
ATER MTCSA 1610.68 78.407 0.013 0.006 85.903 0.92 0.155 0.011
ATER RTCSA-SML 733.841 57.614 0.131 0.021 78.82 2.812 0.148 0.017
ATER RTCSA-MED 608.013 45.143 0.149 0.024 76.792 3.723 0.153 0.018
ATER RTCSA-LRG 562.136 54.663 0.152 0.025 76.969 4.213 0.152 0.017
Significant True Truea Trueb False
OTER MTCSA 1708.99 89.685 0.033 0.01 84.394 1.151 0.152 0.01
OTER RTCSA-SML 690.006 51.553 0.122 0.022 78.947 4.497 0.137 0.021
OTER RTCSA-MED 602.637 38.677 0.141 0.024 77.86 4.731 0.145 0.018
OTER RTCSA-LRG 561.076 47.781 0.15 0.021 78.593 4.583 0.145 0.02
Significant True Truec Trued Falsee
PTER MTCSA 876.922 40.518 0.093 0.026 92.366 0.442 0.158 0.01
PTER RTCSA-SML 690.785 22.011 0.148 0.019 93.192 0.182 0.172 0.018
PTER RTCSA-MED 635.74 21.472 0.162 0.024 93.515 0.129 0.173 0.018
PTER RTCSA-LRG 572.749 14.306 0.167 0.021 93.826 0.118 0.169 0.017
Significant True Truef True Trueg
RTER MTCSA 2313.88 100.596 0.121 0.021 74.7 1.777 0.123 0.01
RTER RTCSA-SML 602.977 71.514 0.11 0.018 76.113 4.058 0.11 0.016
RTER RTCSA-MED 561.37 55.816 0.109 0.015 76.277 4.166 0.115 0.017
RTER RTCSA-LRG 503.919 65.54 0.114 0.024 75.347 4.988 0.111 0.019
Significant True False Falseh Falsei
STER MTCSA 2142.95 160.562 0.026 0.009 76.972 2.421 0.093 0.017
STER RTCSA-SML 936.657 125.483 0.046 0.013 79.098 2.812 0.087 0.021
STER RTCSA-MED 672.651 72.745 0.065 0.019 76.659 3.648 0.098 0.024
STER RTCSA-LRG 579.055 62.934 0.07 0.019 76.445 3.952 0.094 0.023
Significant True Truej Truek Falsel
a
False for RTCSA-MED and RTCSA-LRG
b
False for RTCSA-MED and RTCSA-LRG
c
False for RTCSA-MED and RTCSA-LRG
d
False for RTCSA-SML and RTCSA-MED, False for RTCSA-SML and RTCSA-LRG, False for RTCSA-
MED and RTCSA-LRG
e
True for MTCSA and RTCSA-SML
f
False for RTCSA-MED and RTCSA-LRG
g
False for RTCSA-SML and RTCSA-MED, False for RTCSA-SML and RTCSA-LRG, False for RTCSA-
MED and RTCSA-LRG
h
True for MTCSA and RTCSA-SML, True for MTCSA and RTCSA-MED
i
True for MTCSA and RTCSA-SML, True for MTCSA and RTCSA-LRG
j
False for RTCSA-MED and RTCSA-LRG
k
False for MTCSA and RTCSA-MED, False for MTCSA and RTCSA-LRG, False for RTCSA-MED
and RTCSA-LRG
l
True for RTCSA-SML and RTCSA-MED
Table A.1: Summary of results from an empirical study into the RTCSA compared to the
MTCSA.
Table A.2 summarises the results of the RTCSA for the analysis of the approach in
Section 5.5.3.
333
System Problem HD HE ATD ATE
TCSA TER x̄ σ x̄ σ x̄ σ x̄ σ
MTCSA ATER 1610.68 78.407 0.013 0.006 85.903 0.92 0.155 0.011
MTCSA OTER 1708.99 89.685 0.033 0.01 84.394 1.151 0.152 0.01
MTCSA PTER 876.922 40.518 0.093 0.026 92.366 0.442 0.158 0.01
MTCSA RTER 2313.88 100.596 0.121 0.021 74.7 1.777 0.123 0.01
MTCSA STER 2142.95 160.562 0.026 0.009 76.972 2.421 0.093 0.017
Significant True True True Truea
RTCSA-LRG ATER 562.136 54.663 0.152 0.025 76.969 4.213 0.152 0.017
RTCSA-LRG OTER 561.076 47.781 0.15 0.021 78.593 4.583 0.145 0.02
RTCSA-LRG PTER 572.749 14.306 0.167 0.021 93.826 0.118 0.169 0.017
RTCSA-LRG RTER 503.919 65.54 0.114 0.024 75.347 4.988 0.111 0.019
RTCSA-LRG STER 579.055 62.934 0.07 0.019 76.445 3.952 0.094 0.023
Significant Falseb Truec Trued Truee
a
False for OTER and ATER, PTER and ATER
b
True for RTER and ATER, RTER and OTER, RTER and PTER, STER and RTER
c
False for ATER and OTER
d
False for ATER and OTER, RTER and ATER, STER and ATER, STER and OTER, STER and
RTER
e
False for OTER and ATER
Table A.2: Summary of results from an empirical study into the RTCSA comparing TER’s
with the MTCSA local and RTCSA-LRG global information management strategies.
334
Problem System HD HE ATD ATE
TER TCSA x̄ σ x̄ σ x̄ σ x̄ σ
ATER MTCSA 1610.68 78.407 0.013 0.006 85.903 0.92 0.155 0.011
ATER RTCSA-S 733.841 57.614 0.131 0.021 78.82 2.812 0.148 0.017
ATER HTCSA-S 747.071 52.578 0.099 0.019 81.631 3.123 0.142 0.016
ATER HTCSA-M 816.023 53.374 0.084 0.019 83.046 2.228 0.15 0.018
ATER HTCSA-L 816.023 53.374 0.084 0.019 83.046 2.228 0.15 0.018
Significant Truea Trueb Truec Falsed
OTER MTCSA 1708.99 89.685 0.033 0.01 84.394 1.151 0.152 0.01
OTER RTCSA-S 690.006 51.553 0.122 0.022 78.947 4.497 0.137 0.021
OTER HTCSA-S 737.646 81.211 0.099 0.02 79.893 3.451 0.136 0.018
OTER HTCSA-M 756.301 64.802 0.1 0.019 81.077 3.568 0.146 0.015
OTER HTCSA-L 756.301 64.802 0.1 0.019 81.077 3.568 0.146 0.015
Significant Truee Truef Trueg Falseh
PTER MTCSA 876.922 40.518 0.093 0.026 92.366 0.442 0.158 0.01
PTER RTCSA-S 690.785 22.011 0.148 0.019 93.192 0.182 0.172 0.018
PTER HTCSA-S 678.451 20.88 0.136 0.019 93.232 0.137 0.169 0.016
PTER HTCSA-M 685.395 27.472 0.145 0.017 93.206 0.161 0.17 0.018
PTER HTCSA-L 685.395 27.472 0.145 0.017 93.206 0.161 0.17 0.018
Significant True True Falsei Falsej
RTER MTCSA 2313.88 100.596 0.121 0.021 74.7 1.777 0.123 0.01
RTER RTCSA-S 602.977 71.514 0.11 0.018 76.113 4.058 0.11 0.016
RTER HTCSA-S 635.615 52.025 0.109 0.021 76.828 3.359 0.113 0.017
RTER HTCSA-M 673.063 58.672 0.114 0.022 75.595 3.745 0.114 0.018
RTER HTCSA-L 673.063 58.672 0.114 0.022 75.595 3.745 0.114 0.018
Significant Truek Falsel Falsem Falsen
STER MTCSA 2142.95 160.562 0.026 0.009 76.972 2.421 0.093 0.017
STER RTCSA-S 936.657 125.483 0.046 0.013 79.098 2.812 0.087 0.021
STER HTCSA-S 984.195 130.37 0.045 0.014 79.29 2.245 0.086 0.023
STER HTCSA-M 995.975 114.778 0.046 0.013 79.731 2.071 0.09 0.022
STER HTCSA-L 995.975 114.778 0.046 0.013 79.731 2.071 0.09 0.022
Significant Falseo Falsep Falseq False
a
False for RTCSA-S and HTCSA-S, HTCSA-M and HTCSA-L
b
False for HTCSA-M and HTCSA-L
c
False for HTCSA-S and HTCSA-M, HTCSA-S and HTCSA-L, HTCSA-M and HTCSA-L
d
True for MTCSA and HTCSA-S
e
False for HTCSA-S and HTCSA-M, HTCSA-S and HTCSA-L, HTCSA-M and HTCSA-L
f
False for HTCSA-S and HTCSA-M, HTCSA-S and HTCSA-L, HTCSA-M and HTCSA-L
g
False for RTCSA-S and HTCSA-S, HTCSA-S and HTCSA-M, HTCSA-S and HTCSA-L, HTCSA-M
and HTCSA-L
h
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, HTCSA-S and HTCSA-M, HTCSA-S and
HTCSA-L
i
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, MTCSA and HTCSA-M, MTCSA and
HTCSA-L
j
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, MTCSA and HTCSA-M, MTCSA and
HTCSA-L
k
False for RTCSA-S and HTCSA-S, HTCSA-M and HTCSA-L
l
True for MTCSA and HTCSA-S
m
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S
n
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, MTCSA and HTCSA-M, MTCSA and
HTCSA-L
o
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, MTCSA and HTCSA-M, MTCSA and
HTCSA-L
p
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, MTCSA and HTCSA-M, MTCSA and
HTCSA-L
q
True for MTCSA and RTCSA-S, MTCSA and HTCSA-S, MTCSA and HTCSA-M, MTCSA and
HTCSA-L
Table A.3: Summary of results from an empirical study into the HTCSA.
335
A.1.3 Inflammation Empirical Study
Table A.4 summarises the results from the empirical study in Section 5.7.3 investigating
the Inflammation Tissue Clonal Selection Algorithm (ITCSA). The non-parametric Mann-
Whitney U statistical test was calculated pair-wise for all algorithms on each TER group.
a
False for MTCSA and ITCSA-N
b
False for RTCSA-S and ITCSA-S
c
False for MTCSA and ITCSA-S
d
False for RTCSA-S and ITCSA-N
e
False for RTCSA-S and ITCSA-N, False for RTCSA-S and ITCSA-S, False for ITCSA-N and ITCSA-S
f
False for MTCSA and RTCSA-S
g
False for MTCSA and ITCSA-S
h
False for ITCSA-N and ITCSA-S
i
False for MTCSA and RTCSA-S
Table A.4: Summary of results from an empirical study into the ITCSA.
336
Whitney U statistical test was calculated pair-wise for all algorithms on each HER group.
a
False for PT-RP and VT-L
b
False for MHCSA and VT-S, PT-RP and VT-L, PT-SP and VT-S
c
False for PT-SP and VT-S
d
False for PT-RP and VT-L
e
True for MHCSA and PT-RP, MHCSA and PT-SP, MHCSA and VT-S
f
False for PT-RP and VT-L
g
False for PT-RP and VT-L, PT-SP and VT-S
h
False for PT-RP and VT-S
i
False for PT-RP and VT-S
j
False for PT-RP and PT-SP, PT-RP and VT-S, PT-SP and VT-S
k
True for PT-SP and VT-L, PT-SP and VT-S
l
True for MHCSA and PT-SP, PT-RP and VT-S, PT-SP and VT-S
Table A.5: Summary of results from an empirical study into the THCSA compared to
MP-HCSA.
Table A.6 summarises the pathogen transmission and vaccination transmission results
from an empirical study into the THCSA from Section 6.5.2.
337
Problem System PH PE AHD AHE
HER HCSA x̄ σ x̄ σ x̄ σ x̄ σ
AHER PT-RP 2257.49 92.704 0.028 0.01 75.558 1.552 0.116 0.011
AHER VT-L 2218.74 103.049 0.023 0.01 76.433 1.72 0.127 0.011
Significant False False True True
OHER PT-RP 2269.86 87.319 0.042 0.015 75.496 1.48 0.122 0.011
OHER VT-L 2254.70 88.167 0.037 0.013 75.797 1.508 0.126 0.012
Significant False False False False
PHER PT-RP 1716.58 88.816 0.102 0.03 84.24 1.175 0.147 0.01
PHER VT-L 2193.93 94.627 0.102 0.03 76.966 1.621 0.131 0.011
Significant True False True True
RHER PT-RP 2353.58 106.255 0.118 0.023 73.869 1.878 0.117 0.011
RHER VT-L 2369.23 118.525 0.123 0.022 73.59 2.095 0.118 0.012
Significant False False False False
SHER PT-RP 2150.92 187.501 0.029 0.009 76.78 2.886 0.093 0.019
SHER VT-L 2164.46 178.009 0.026 0.009 76.583 2.847 0.094 0.018
Significant False False False False
Table A.6: Summary of the pathogen transmission and vaccination transmission results
from an empirical study into the THCSA.
338
Problem System PH PE AHD AHE
HER HCSA x̄ σ x̄ σ x̄ σ x̄ σ
AHER MHCSA 1606.24 57.906 0.013 0.007 85.97 0.702 0.157 0.01
AHER SI-SS 1021.50 53.326 0.012 0.005 88.691 0.593 0.082 0.011
AHER SI-SL 660.944 45.926 0.03 0.01 88.719 0.893 0.086 0.011
AHER SI-LS 679.249 48.4 0.028 0.012 88.249 1.101 0.086 0.017
AHER SI-LL 418.271 35.337 0.076 0.013 84.116 2.518 0.104 0.012
Significant Truea Trueb Truec Trued
OHER MHCSA 1792.98 99.787 0.031 0.011 83.271 1.398 0.152 0.009
OHER SI-SS 944.546 65.987 0.027 0.01 88.584 0.739 0.093 0.013
OHER SI-SL 634.095 50.014 0.053 0.014 87.804 0.986 0.092 0.016
OHER SI-LS 611.977 43.081 0.041 0.014 87.712 1.252 0.086 0.013
OHER SI-LL 426.655 44.262 0.095 0.019 82.11 2.352 0.116 0.016
Significant Truee Truef Trueg Trueh
PHER MHCSA 894.093 40.821 0.102 0.03 92.315 0.493 0.159 0.009
PHER SI-SS 718.195 51.235 0.105 0.023 91.069 0.647 0.124 0.01
PHER SI-SL 500.736 34.383 0.112 0.016 88.74 1.034 0.131 0.014
PHER SI-LS 522.83 37.182 0.108 0.017 88.611 1.09 0.125 0.01
PHER SI-LL 402.229 39.746 0.118 0.015 82.375 2.624 0.131 0.012
Significant True Falsei Truej Truek
RHER MHCSA 2341.24 72.031 0.122 0.023 74.238 1.264 0.123 0.009
RHER SI-SS 792.363 65.438 0.094 0.014 84.998 1.899 0.094 0.012
RHER SI-SL 530.103 49.515 0.107 0.018 83.07 2.296 0.105 0.014
RHER SI-LS 556.441 57.438 0.106 0.016 83.359 2.092 0.105 0.012
RHER SI-LL 420.333 43.22 0.121 0.017 79.294 3.281 0.126 0.013
Significant Truel Truem Truen Trueo
SHER MHCSA 2144.72 172.247 0.028 0.012 76.929 2.717 0.094 0.019
SHER SI-SS 1393.50 158.49 0.027 0.01 83.148 1.765 0.072 0.019
SHER SI-SL 852.855 107.04 0.034 0.013 83.743 1.163 0.068 0.016
SHER SI-LS 911.251 119.976 0.033 0.012 84.085 1.771 0.07 0.018
SHER SI-LL 564.659 52.838 0.055 0.011 81.828 2.587 0.087 0.014
Significant Truep Trueq Truer Trues
a
False for SI-SL and SI-LS
b
False for MHCSA and SI-SS, SI-SL and SI-LS
c
False for SI-SS and SI-SL, SI-SS and SI-LS, SI-SL and SI-LS
d
False for SI-SS and SI-SL, SI-SS and SI-LS, SI-SL and SI-LS
e
False for SI-SL and SI-LS
f
False for MHCSA and SI-SS
g
False for SI-SL and SI-LS
h
False for SI-SS and SI-SL, SI-SS and SI-LS, SI-SL and SI-LS
i
True for MHCSA and SI-LL, SI-SS and SI-SL, SI-SS and SI-LL, SI-LS and SI-LL
j
False for SI-SL and SI-LS
k
False for SI-SS and SI-LS, SI-SL and SI-LL, SI-LS and SI-LL
l
False for SI-SL and SI-LS
m
False for MHCSA and SI-LL, SI-SL and SI-LS
n
False for SI-SL and SI-LS
o
False for MHCSA and SI-LL, SI-SL and SI-LS
p
False for SI-SL and SI-LS
q
False for MHCSA and SI-SS, MHCSA and SI-LS, SI-SS and SI-LS, SI-SL and SI-LS
r
False for SI-SS and SI-SL, SI-SS and SI-LL, SI-SL and SI-LS
s
False for MHCSA and SI-LL, SI-SS and SI-SL, SI-SS and SI-LS, SI-SL and SI-LS
Table A.7: Summary of results from an empirical study into the SI-HCSA compared to
MP-HCSA.
339
A.2.3 Maternal Immunity Empirical Study
Table A.8 summarises the results from the empirical study in Section 6.7.2 investigating
the Maternal Immunity Host Clonal Selection Algorithm (MI-HCSA). The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms on each HER
group.
a
False for MIHCSA-S and MIHCSA-M
b
False for MG-HCSA and MIHCSA-S, MG-HCSA and MIHCSA-M, MIHCSA-S and MIHCSA-M
c
False for MIHCSA-S and MIHCSA-M
d
True for MG-HCSA and MIHCSA-L
e
False for MG-HCSA and MIHCSA-S
f
False for MG-HCSA and MIHCSA-S
g
True for MIHCSA-S and MIHCSA-L
h
False for MG-HCSA and MIHCSA-S, MG-HCSA and MIHCSA-M, MIHCSA-S and MIHCSA-M
i
False for MG-HCSA and MIHCSA-S, MG-HCSA and MIHCSA-M, MIHCSA-S and MIHCSA-M
j
False for MG-HCSA and MIHCSA-S, MG-HCSA and MIHCSA-M, MIHCSA-S and MIHCSA-M
k
False for MG-HCSA and MIHCSA-S, MG-HCSA and MIHCSA-M, MIHCSA-S and MIHCSA-M
l
True for MG-HCSA and MIHCSA-L
m
False for MG-HCSA and MIHCSA-S, MG-HCSA and MIHCSA-M, MIHCSA-S and MIHCSA-M
n
True for MG-HCSA and MIHCSA-M
o
True for MG-HCSA and MIHCSA-L, MIHCSA-S and MIHCSA-L
Table A.8: Summary of results from an empirical study into the MI-HCSA.
340
A.2.4 Evolved Immunity Empirical Study
Table A.9 summarises the results from the empirical study in Section 6.8.2 investigating
the Evolved Immunity Host Clonal Selection Algorithm (EI-HCSA). The non-parametric
Mann-Whitney U statistical test was calculated pair-wise for all algorithms on each HER
group.
Table A.9: Summary of results from an empirical study into the EI-HCSA.
341
Appendix B
This appendix lists all works derived from this research project in the interest of full
disclosure.
B.2 Software
This section lists software created as a result of this research project. All experimentation
in this dissertation were achieved using the OAT platform with customised extensions.
342
on standard benchmark problem domains; including reference algorithm implemen-
tations (Java), graphing, visualisations and much more. Algorithms include Evo-
lutionary, Swarm, Immune System and others. Domains include Continuous Func-
tion, Travelling Salesman, Protein Folding and others. Download the software from:
http://optalgtoolkit.sourceforge.net.
2. J. Brownlee Clonal Selection Theory and CLONALG - The Clonal Selection Classification
Algorithm (CSCA) [Technical Report]. Victoria, Australia: Centre for Intelligent Systems
and Complex Processes (CISCP), Faculty of Information and Communication Technologies
(ICT), Swinburne University of Technology; 2005 Jan; Technical Report ID: 2-01.
7. J. Brownlee The Pole Balancing Problem - A Review of a Benchmark Control Theory Prob-
lem [Technical Report]. Victoria, Australia: Centre for Intelligent Systems and Complex
Processes (CISCP), Faculty of Information and Communication Technologies (ICT), Swin-
burne University of Technology; 2005 Jul; Technical Report ID: 7-01.
343
10. J. Brownlee Implementation Specification for IIDLE [Technical Report]. Victoria, Australia:
Centre for Intelligent Systems and Complex Processes (CISCP), Faculty of Information
and Communication Technologies (ICT), Swinburne University of Technology; 2005 Sep;
Technical Report ID: 10-01.
11. J. Brownlee Further Preliminary Experiments with IIDLE [Technical Report]. Victoria,
Australia: Centre for Intelligent Systems and Complex Processes (CISCP), Faculty of Infor-
mation and Communication Technologies (ICT), Swinburne University of Technology; 2005
Oct; Technical Report ID: 11-01.
3. J. Brownlee A Review of the Clonal Selection Theory of Acquired Immunity [Technical Re-
port]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Infor-
mation Technology Research (CITR), Faculty of Information and Communication Technolo-
gies (ICT), Swinburne University of Technology; 2007 Feb; Technical Report ID: 070223A.
4. J. Brownlee A Series of Adaptive Models Inspired by the Acquired Immune System [Tech-
nical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre
for Information Technology Research (CITR), Faculty of Information and Communication
Technologies (ICT), Swinburne University of Technology; 2007 Feb; Technical Report ID:
070227A.
344
8. J. Brownlee The Physiology of Lymphocyte Migration [Technical Report]. Victoria, Aus-
tralia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology
Research (CITR), Faculty of Information and Communication Technologies (ICT), Swin-
burne University of Technology; 2007 Mar; Technical Report ID: 070316A.
10. J. Brownlee An Adaptive Systems Formalism [Technical Report]. Victoria, Australia: Com-
plex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Mar; Technical Report ID: 070320A
11. J. Brownlee ‘Colour Space’: A Contrived Problem Domain for Investigating Adaptive Mod-
els [Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS),
Centre for Information Technology Research (CITR), Faculty of Information and Communi-
cation Technologies (ICT), Swinburne University of Technology; 2007 Mar; Technical Report
ID: 070322A.
12. J. Brownlee ‘Small Models’: A Methodology for Designing and Investigating Adaptive Sys-
tems [Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory
(CIS), Centre for Information Technology Research (CITR), Faculty of Information and
Communication Technologies (ICT), Swinburne University of Technology; 2007 Mar; Tech-
nical Report ID: 070326A.
13. J. Brownlee Autonomous Distributed Control in the Immune System Using Diffuse Feedback
[Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS),
Centre for Information Technology Research (CITR), Faculty of Information and Communi-
cation Technologies (ICT), Swinburne University of Technology; 2007 Mar; Technical Report
ID: 070329A.
14. J. Brownlee Artificial Immune System Thesis Bibliography [Technical Report]. Victoria,
Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Tech-
nology Research (CITR), Faculty of Information and Communication Technologies (ICT),
Swinburne University of Technology; 2007 Mar; Technical Report ID: 070330A.
15. J. Brownlee Experimental Scenarios in Colour Space [Technical Report]. Victoria, Australia:
Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Apr; Technical Report ID: 070402A
16. J. Brownlee Populations of Interacting Immune Systems: Evolution and Immunization [Tech-
nical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre
for Information Technology Research (CITR), Faculty of Information and Communication
Technologies (ICT), Swinburne University of Technology; 2007 Apr; Technical Report ID:
070410A.
17. J. Brownlee A Series of Multiple Immune System Adaptive Models Inspired by Evolution and
Immunization [Technical Report]. Victoria, Australia: Complex Intelligent Systems Labo-
ratory (CIS), Centre for Information Technology Research (CITR), Faculty of Information
and Communication Technologies (ICT), Swinburne University of Technology; 2007 Apr;
Technical Report ID: 070413A
18. J. Brownlee Realizing Elementary Clonal Selection Algorithms [Technical Report]. Victoria,
Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Tech-
nology Research (CITR), Faculty of Information and Communication Technologies (ICT),
Swinburne University of Technology; 2007 Apr; Technical Report: 070418A
345
19. J. Brownlee The ‘Pathogenic Exposure’ Paradigm [Technical Report]. Victoria, Australia:
Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Apr; Technical Report ID: 070422A
21. J. Brownlee Realizing Elementary Discrete Repertoire Clonal Selection Algorithms [Tech-
nical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre
for Information Technology Research (CITR), Faculty of Information and Communication
Technologies (ICT), Swinburne University of Technology; 2007 Apr; Technical Report ID:
070430A
22. J. Brownlee Cognition, Immunology, and the Cognitive Paradigm [Technical Report]. Victo-
ria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Tech-
nology Research (CITR), Faculty of Information and Communication Technologies (ICT),
Swinburne University of Technology; 2007 May; Technical Report: 070504A.
23. J. Brownlee Lazy and Competitive Learning [Technical Report]. Victoria, Australia: Com-
plex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 May; Technical Report: 070508A.
24. J. Brownlee Learning Classifier Systems [Technical Report]. Victoria, Australia: Complex
Intelligent Systems Laboratory (CIS), Centre for Information Technology Research (CITR),
Faculty of Information and Communication Technologies (ICT), Swinburne University of
Technology; 2007 May; Technical Report: 070514A.
25. J. Brownlee Towards Unification... [Technical Report]. Victoria, Australia: Complex In-
telligent Systems Laboratory (CIS), Centre for Information Technology Research (CITR),
Faculty of Information and Communication Technologies (ICT), Swinburne University of
Technology; 2007 May; Technical Report: 070516A
26. J. Brownlee A Clonal Selection Algorithm and Extensions [Technical Report]. Victoria, Aus-
tralia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology
Research (CITR), Faculty of Information and Communication Technologies (ICT), Swin-
burne University of Technology; 2007 May; Technical Report: 070521A.
27. J. Brownlee A T-Cell Mediated Clonal Selection Algorithm [Technical Report]. Victoria,
Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Tech-
nology Research (CITR), Faculty of Information and Communication Technologies (ICT),
Swinburne University of Technology; 2007 May; Technical Report: 070523A
29. J. Brownlee A Spatial Clonal Selection Algorithm [Technical Report]. Victoria, Australia:
Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 May; Technical Report: 070531A
30. J. Brownlee Optimizing and Matching Bitstrings [Technical Report]. Victoria, Australia:
Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Jun; Technical Report: 070604A.
346
31. J. Brownlee A Lymphocyte Homing Algorithm [Technical Report]. Victoria, Australia: Com-
plex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Jun; Technical Report: 070607A.
32. J. Brownlee A Lymphoid Tissue Model and Lymphocyte Recruitment Algorithms [Techni-
cal Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for
Information Technology Research (CITR), Faculty of Information and Communication Tech-
nologies (ICT), Swinburne University of Technology; 2007 Jun; Technical Report: 070609A.
33. J. Brownlee A Hierarchical Framework of the Acquired Immune System [Technical Report].
Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Informa-
tion Technology Research (CITR), Faculty of Information and Communication Technologies
(ICT), Swinburne University of Technology; 2007 Jun; Technical Report: 070613A.
34. J. Brownlee Darwinism and Selectionist Theories [Technical Report]. Victoria, Australia:
Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Jun; Technical Report: 070616A.
35. J. Brownlee Information Processing with a Lymphoid Tissue Architecture [Technical Report].
Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Informa-
tion Technology Research (CITR), Faculty of Information and Communication Technologies
(ICT), Swinburne University of Technology; 2007 Jun; Technical Report: 070619A.
36. J. Brownlee A Population-Based Clonal Selection Algorithm and Extensions [Technical Re-
port]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Infor-
mation Technology Research (CITR), Faculty of Information and Communication Technolo-
gies (ICT), Swinburne University of Technology; 2007 Jun; Technical Report: 070621A.
38. J. Brownlee Models, Algorithms, and the Hierarchal Acquired Immune System Framework
[Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS),
Centre for Information Technology Research (CITR), Faculty of Information and Communi-
cation Technologies (ICT), Swinburne University of Technology; 2007 Jun; Technical Report:
070625A.
39. J. Brownlee Integration of the Pathogenic Exposure Paradigm and the Hierarchical Immune
System Framework [Technical Report]. Victoria, Australia: Complex Intelligent Systems
Laboratory (CIS), Centre for Information Technology Research (CITR), Faculty of Infor-
mation and Communication Technologies (ICT), Swinburne University of Technology; 2007
Jun; Technical Report: 070626A.
40. J. Brownlee Towards General Information Processing Models of the Acquired Immune Sys-
tem [Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS),
Centre for Information Technology Research (CITR), Faculty of Information and Communi-
cation Technologies (ICT), Swinburne University of Technology; 2007 Jun; Technical Report:
070627A
347
42. J. Brownlee Convergence and Dominance in the Minimal Clonal Selection Algorithm [Techni-
cal Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for
Information Technology Research (CITR), Faculty of Information and Communication Tech-
nologies (ICT), Swinburne University of Technology; 2007 Jul; Technical Report: 070706A.
43. J. Brownlee Immunology as a Metaphor for Adaptive and Distributed Information Process-
ing [Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS),
Centre for Information Technology Research (CITR), Faculty of Information and Communi-
cation Technologies (ICT), Swinburne University of Technology; 2007 Jul; Technical Report:
070714A.
44. J. Brownlee Debrief of PhD Project Practices [Technical Report]. Victoria, Australia: Com-
plex Intelligent Systems Laboratory (CIS), Centre for Information Technology Research
(CITR), Faculty of Information and Communication Technologies (ICT), Swinburne Uni-
versity of Technology; 2007 Dec; Technical Report: 20071204-A.
45. J. Brownlee Unexplored Territory: Seeds for Future Research Investigations [Technical Re-
port]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Centre for Infor-
mation Technology Research (CITR), Faculty of Information and Communication Technolo-
gies (ICT), Swinburne University of Technology; 2007 Dec; Technical Report: 20071210-A.
46. J. Brownlee OAT HowTo: High-level Domain, Problem, and Algorithm Implementation
[Technical Report]. Victoria, Australia: Complex Intelligent Systems Laboratory (CIS),
Centre for Information Technology Research (CITR), Faculty of Information and Communi-
cation Technologies (ICT), Swinburne University of Technology; 2007 Dec; Technical Report:
20071218A.
47. J. Brownlee OAT: The Optimization Algorithm Toolkit [Technical Report]. Victoria, Aus-
tralia: Complex Intelligent Systems Laboratory (CIS), Centre for Information Technology
Research (CITR), Faculty of Information and Communication Technologies (ICT), Swin-
burne University of Technology; 2007 Dec; Technical Report: 20071220A.
48. J. Brownlee OAT: A Quick Start Guide [Technical Report]. Victoria, Australia: Complex
Intelligent Systems Laboratory (CIS), Centre for Information Technology Research (CITR),
Faculty of Information and Communication Technologies (ICT), Swinburne University of
Technology; 2007 Dec; Guide: 20071220A.
348
Bibliography
[2] S Aaronson. Np-complete problems and physical reality. ACM SIGACT News
(COLUMN: Complexity theory), 36(1):30–52–, 2005.
[4] F. Agens, M. M. Rosado, and A. A. Freitas. Peripheral b cell survival. Cell Mol Life
Sci, 57(8-9):1220–1228, Aug 2000.
[7] D. W. Aha. Feature weighting for lazy learning algorithms. In H. Motoda, editor,
Feature Extraction, Construction and Selection: A Data Mining Perspective, pages –
. Kluwer, Norwell MA, USA, 1998.
[13] E. Alba. Parallel Metaheuristics: A New Class of Algorithms. John Wiley, 2005.
[14] E. Alba and M. Tomassini. Parallelism and evolutionary algorithms. IEEE Trans-
actions on Evolutionary Computation, 6(5):443–462, 2002.
[15] E. Alba and J. M. Troya. Influence of the migration policy in parallel distributed gas
with structured and panmictic populations. Applied Intelligence, 12:163–181, 2000.
349
[16] M. M. Ali, C. Storey, and A. Trn. Application of stochastic global optimization
algorithms to practical problems. Journal of Optimization Theory and Applications,
95(3):545–563, 1997.
[22] R. M. Anderson. Modern vaccines: immunisation and herd immunity. The Lancet,
335(8690):641–646–, March 1990.
[23] R. M Anderson and R. M. May. Vaccination and herd immunity to infectious dis-
eases. Nature, 318:323–329–, November 1985.
[24] P. S. Andrews and J. Timmis. Inspiration for the next generation of artificial immune
systems. In Marcin L. Pilat, Peter J. Bentley, and Jonathan Timmis, editors, Lecture
Notes in Computer Science, pages 126–138–. Springer-Verlag, 2005.
[27] A.M. Anile, V. Cutello, G. Narzisi, G. Nicosia, and S. Spinella. Lipschitzian pat-
tern search and immunological algorithm with quasi-newton method for the protein
folding problem: An innovative multistage approach. In Lecture Notes in Computer
Science, pages 307–323–. Springer, 2006.
[28] W. Brian Arthur. Introduction: Process and emergence in the economy. In Steven
Durlauf and David A. Lane, editors, The Economy as an Evolving Complex System
II, volume Volume XXVII, pages 1–04–. Addison-Wesley Pub. Co, Reading, Mass,
USA, 1997.
350
[30] T. Bäck. Optimal mutation rates in genetic search. In Proceedings of the Fifth
International Conference on Genetic Algorithms, pages 2–9–. Morgan Kaufman, San
Mateo, CA, USA, 1993.
[33] R. Barr, B. Golden, J. Kelly, M. Rescende, and W. Stewart. Designing and reporting
on computational experiments with heuristic methods. Journal of Heuristics, 1:9–
32–, 1995.
[34] S. Behnke. Hierarchical Neural Networks for Image Interpretation. Springer, 2003.
[35] T. C. Belding. The distributed genetic algorithm revisited. In Proceedings of the 6th
International Conference on Genetic Algorithms, 1995.
[36] P. J. Bentley, J. Greensmith, and S. Ujjin. Two ways to grow tissue for artificial
immune systems. In Marcin L. Pilat, Peter J. Bentley, and Jonathan Timmis, edi-
tors, Lecture Notes in Computer Science, pages 139–. Springer, Berlin / Heidelberg,
Germany, 2005.
[37] C. Berek, A. Berger, and M. Apel. Maturation of the immune response in germinal
centers. Cell, 67(6):1121–1129–, 1991.
[38] C. Berek and M. Ziegner. The maturation of the immune response. Immunology
Today, 14(8):400–404–, 1993.
[40] H. Bersini and F. Varela. Hints for adaptive problem solving gleaned from immune
networks. In Lecture Notes In Computer Science, pages 343–354–. Springer-Verlag,
London, UK, 1990.
[44] M. Birattari and M. Dorigo. How to assess and report the performance of a stochastic
algorithm on a benchmark problem: Mean or best result on a number of runs?
Technical report, IRIDIA, Universit Libre de Bruxelles, Brussels, Belgium, 2005.
351
[46] C. M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press,
1995.
[47] A. Di Blas, A. Jagota, and R. Hughey. Optimizing neural networks on simd parallel
computers. Parallel Computing, 31:97–115, 2005.
[49] L. Boggess and J. S. Hamaker. The effect of irrelevant features on airs, an artificial
immune-based classifier. In Intelligent Engineering Systems through Artificial Neural
Networks (ANNIE), pages 219–224–, 2003.
[50] S. Bonhoeffer and M. A. Nowak. Intra-host versus inter-host selection: viral strate-
gies of immune function impairment. Proc Natl Acad Sci U S A, 91(17):8062–8066,
Aug 1994.
[51] L. Bottou and V. Vapnik. Local learning algorithms. Neural Computation, 4(6):888–
900–, November 1992.
[54] P. Brandtzaeg. Mucosal immunity: integration between mother and the breast-fed
infant. Vaccine, 21(24):3382–3388–, 2003.
[58] R. Brooks. A robust layered control system for a mobile robot. IEEE Journal Of
Robotics And Automation, 2(1):14–23, 1986.
[59] D. S. Broomhead and David Lowe. Radial basis functions, multi-variable functional
interpolation and adaptive networks. Technical report, Royal Signals and Radar
Establishment Malvern, England, 1988.
[62] P. Bull, A. Knowles, G. Tedesco, and A. Hone. Diophantine benchmarks for the
b-cell algorithm. In Proceedings 5th International Conference on Artificial Immune
Systems (ICARIS 2006), pages –, 2006.
352
[63] F. M. Burnet. A modification of jernes theory of antibody production using the
concept of clonal selection. Australian Journal of Science, 20,:67–69–, 1957.
[64] F. M. Burnet. The clonal selection theory of acquired immunity. Vanderbilt Univer-
sity Press, Nashville, Tennessee, U.S.A., 1959.
[65] F. M. Burnet. Clonal selection and after. Theoretical Immunology, pages 63–85–,
1978.
[68] E. Cant-Paz. Efficient and Accurate Parallel Genetic Algorithms. Kluwer Academic
Publishers (Springer), 2000.
[69] E. Cant-Paz and D. E. Goldberg. Are multiple runs of genetic algorithms better
than one? In Genetic and Evolutionary Computation, GECCO 2003, volume 2723
of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2003.
[70] J. Carneiro and J. Stewart. Rethinking ”shape space”: evidence from simulated
docking suggests that steric shape complementarity is not limiting for antibody-
antigen recognition and idiotypic interactions. Journal of theoretical biology,
169(4):391–402–, 1994.
[72] D. J. Cavicchio. Adaptive search using simulated evolution. PhD thesis, Computer
and Communication Sciences, University of Michigan, USA, 1970.
[74] K Chan, A Saltelli, and S Tarantola. Sensitivity analysis of model output: variance-
based methods make the difference. In Proceedings of the 29th conference on Winter
simulation (Winter Simulation Conference), pages 261–268–. ACM Press, New York,
NY, USA, 1997.
[75] M. Chiarandini, D. Basso, and T. Sttzle. Statistical methods for the comparison
of stochastic optimizers. In Michel Gendreau, Peter Greistorfer, Walter J. Gutjahr,
Richard F. Hartl, and Marc Reimann, editors, MIC2005: Proceedings of the 6th
Metaheuristics International Conference, pages 189–196–, 2005.
[76] E. Clark, A. Hone, and J. Timmis. A markov chain model of the b-cell algorithm. In
Lecture Notes in Computer Science, pages 318–330–. Springer, Berlin / Heidelberg,
2005.
353
[78] C. A. Coello Coello and N. C. Cortes. Hybridizing a genetic algorithm with an arti-
ficial immune system for global optimization. Engineering Optimization, 36(5):607–
634–, October 2004.
[81] I. R. Cohen. Tending Adam’s Garden: Evolving the Cognitive Immune Self. Aca-
demic Press, New York, 2001.
[83] N. C. Corts and C. A. Coello Coello. Multiobjective optimization using ideas from
the clonal selection principle. In Lecture Notes in Computer Science, pages 158–170–,
Berlin / Heidelberg, 2003. Springer.
[84] T. Cover and P. Hart. Nearest neighbor pattern classification. IEEE Transactions
on Information Theory, 13(1):21–27–, January 1967.
[86] E. Crist and A. I. Tauber. Selfhood, immunity, and the biological imagination:
The thought of frank macfarlane burnet. Biology and Philosophy, 15(4):509–533–,
September 2000.
[88] V. Cutello, D. Lee, S. Leone, G. Nicosia, and M. Pavone. Clonal selection algo-
rithm with dynamic population size for bimodal search spaces. In Lecture Notes in
Computer Science, pages 949–958–. Springer, 2006.
[89] V. Cutello, D. Lee, G. Nicosia, M. Pavone, and I. Prizzi. Aligning multiple protein
sequences by hybrid clonal selection algorithm with insert-remove-gaps and block-
shuffling operators. In Lecture Notes in Computer Science, pages 321–334–. Springer,
Berlin / Heidelberg, 2006.
[90] V. Cutello, G. Morelli, G. Nicosia, and M. Pavone. Immune algorithms with ag-
ing operators for the string folding problem and the protein folding problem. In
Jens Gottlieb, editor, Lecture Notes in Computer Science, pages 80–90–, Berlin /
Heidelberg, Germany, 2005. Springer.
354
[93] V. Cutello, G. Narzisi, G. Nicosia, and M. Pavone. An immunological algorithm for
global numerical optimization. In LNCS, pages 284–295–, 2005.
[96] V. Cutello and G. Nicosia. Multiple learning using immune algorithms. In Proceed-
ings of 4th International Conference on Recent Advances in Soft Computing, RASC
2002, pages 102–107–, 2002.
[97] V. Cutello and G. Nicosia. Chapter vi. the clonal selection principle for in silico
and in vivo computing. In Fernando J. Von Zuben, editor, Recent Developments
in Biologically Inspired Computing, pages 104–146–, Hershey, London, Melbourne,
Singapore, 2005. Idea Group Publishing.
[98] V. Cutello and G. Nicosia. A clonal selection algorithm for coloring, hitting set
and satisfiability problems. In Lecture Notes in Computer Science, pages 324–337–.
Springer, 2006.
[99] V. Cutello, G. Nicosia, and E. Pavia. A parallel immune algorithm for global op-
timization. In Series on Advances in Soft Computing, pages 467–475–. Springer-
Verlag, 2006.
[100] V. Cutello, G. Nicosia, and M. Pavone. A hybrid immune algorithm with information
gain for the graph coloring problem. In Lecture Notes in Computer Science, pages
171–182–, Berlin / Heidelberg, 2003. Springer.
[101] V Cutello, G. Nicosia, and M Pavone. Exploring the capability of immune algo-
rithms: A characterization of hypermutation operators. In Vincenzo Cutello, Pe-
ter J. Bentley, and Jon Timmis, editors, Lecture Notes in Computer Science, pages
263–276–, Berlin / Heidelberg, 2004. Springer.
[103] V. Cutello, G. Nicosia, M. Pavone, and G. Narzisi. Real coded clonal selection al-
gorithm for unconstrained global optimization using a hybrid inversely proportional
hypermutation operator. In ACM, volume 2, pages 950–954–. ACM Press, New
York, NY, USA, 2006.
[104] V. Cutello, G. Nicosia, M. Pavone, and J. Timmis. An immune algorithm for pro-
tein structure prediction on lattice models. IEEE Transactions on Evolutionary
Computation, pages –, 2006.
355
[106] D. Dasgupta. Chapter ten: Information processing in the immune system. In
M. Dorigo and F. Glover, editors, New Ideas in Optimization, pages 203–216.
McGraw-Hill, England, 1999.
[107] D. Dasgupta and H. Brian. Mobile security agents for network traffic analy-
sis. DARPA Information Survivability Conference and Exposition (DISCEX II’01),
2:1332–, 2001.
[108] L. N. de Castro and J. Timmis. An artificial immune network for multimodal func-
tion optimization. In Proceedings of the 2002 Congress on Evolutionary Computation
(CEC ’02), volume 1, pages 699–704–. IEEE Computer Society, USA, 2002.
[111] L. N. de Castro and J. Timmis. Artificial immune systems as a novel soft com-
puting paradigm. Soft Computing - A Fusion of Foundations, Methodologies and
Applications, 7(8):526–544–, August 2003.
[112] L. N. de Castro and F. J. Von Zuben. Artificial immune systems - part i: Basic
theory and applications. Technical report, Department of Computer Engineering
and Industrial Automation, School of Electrical and Computer Engineering, State
University of Campinas, Brazil, December 1999.
[113] L. N. de Castro and F. J. Von Zuben. Artificial immune systems: Part ii: A survey of
applications. Technical report, Department of Computer Engineering and Industrial
Automation, School of Electrical and Computer Engineering, State University of
Campinas, Brazil, February 2000.
[114] L. N. de Castro and F. J. Von Zuben. The clonal selection algorithm with engineering
applications. In David E. Goldberg, Erick Cant-Paz, Lee Spector, Ian C. Parmee,
and Hans-Georg Beyer, editors, Proceedings of the Genetic and Evolutionary Com-
putation Conference (GECCO ’00), Workshop on Artificial Immune Systems and
Their Applications, pages 36–37–. Morgan Kaufmann, 2000.
[115] L. N. de Castro and F. J. Von Zuben. An evolutionary immune network for data
clustering. In Proceedings Sixth Brazilian Symposium on Neural Networks, pages
84–89–. IEEE Computer Society, USA, 2000.
[116] L. N. de Castro and F. J. Von Zuben. Chapter xii: ainet: An artificial immune
network for data analysis. In R. A. Sarker and C. S. Newton, editors, Data Mining:
A Heuristic Approach, pages 231–259–. Idea Group Publishing, USA, 2001.
[117] L. N. de Castro and F. J. Von Zuben. Learning and optimization using the clonal
selection principle. IEEE Transactions on Evolutionary Computation, 6(3):239–251,
June 2002.
[118] L. N. de Castro and F. J. Von Zuben. Chapter 1: From biologically inspired comput-
ing to natural computing. In Fernando J. Von Zuben, editor, Recent developments
in biologically inspired computing, pages –. Idea Group, Hershey, PA, 2005.
356
[119] E. D. de Jong, D. Thierens, and R. A. Watson. Hierarchical genetic algorithms.
In Parallel Problem Solving from Nature - PPSN VIII, Lecture Notes in Computer
Science, pages 232–241. Springer, 2004.
[123] K. Deb. Chapter 14 - speciation methods. In David B Fogel and Zbigniew Michal-
wicz, editors, Evolutionary Computation 2 - Advanced Algorithms and Operations,
pages 93–100–. Institute of Physics (IOP) Publishing Ltd., UK, 2000.
[125] K. Deb and S. Agrawal. Understanding interactions among genetic algorithm param-
eters. In Colin R. Reeves, editor, Proceedings of the Fifth Workshop on Foundations
of Genetic Algorithms (FOGA), pages 265–286–. Morgan Kaufmann, 1999.
[126] K. Deb and David E. Goldberg. An investigation of niche and species formation in
genetic function optimization. In Proceedings of the Third International Conference
on Genetic Algorithms, pages 42–50–. Morgan Kaufmann, 1989.
[131] B. Du, B. Du, J. Gu, W. Wang, and D.H.K. Tsang. Multispace search for minimizing
the maximum nodal degree. In Jun Gu, editor, Proc. Sixth International Conference
on Computer Communications and Networks, pages 364–367, 1997.
357
[134] M. El-Abd and M. Kamel. A taxonomy of cooperative search algorithms. In Hybrid
Metaheuristics, 2005.
[138] J. D. Farmer, N. H. Packard, and Alan S. Perelson. The immune system, adaptation,
and machine learning. Physica D, 22:187–204–, 1986.
[140] P. E. M. Fine. Herd immunity: History, theory, practice. Oxford Journals, Epidemi-
ologic Reviews, 15(2):265–302–, 1993.
[143] D.B. Fogel, L.J. Fogel, and J.W. Atmar. Meta-evolutionary programming. In Con-
ference Record of the Twenty-Fifth Asilomar Conference on Signals, Systems and
Computers, pages 540–545, 4–6 Nov. 1991.
[146] N. Forbes. Imitation of life: how biology is inspiring computing. Mit Press, Cam-
bridge, Massachusetts, 2004.
[149] S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix
processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy,
pages 120–128–. IEEE Computer Society, 1996.
358
[151] S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri. Self-nonself discrimination in
a computer. In Proceedings of the 1992 IEEE Symposium on Security and Privacy,
pages 202–212–. IEEE Computer Society Press, Washington, DC, USA, 1994.
[152] T. Francis Jr. On the doctrine of original antigenic sin. Proceedings of the American
Philosophical Society, 104(6):572–578–, December 1960.
[154] A. A. Freitas and B. Rocha. Population biology of lymphocytes: the flight for
survival. Annu Rev Immunol, 18:83–111, 2000.
[155] A. A. Freitas and J. Timmis. Revisiting the foundations of artificial immune systems:
A problem-oriented perspective. In Peter Bentley and Emma Hart, editors, Lecture
Notes in Computer Science, pages 229–241–. Springer, Berlin, Heidelberg, 2003.
[157] T. Fukuda, K. Mori, and M. Tsukiyama. Immune networks using genetic algorithm
for adaptive production scheduling. 15th IFAC World Congress, 3:57–60–, 1993.
[162] M. Garey, D. Johnson, and H. Witsenhausen. The complexity of the generalized lloyd
- max problem (corresp.). IEEE Transactions on Information Theory, 28(2):255–
256, Mar 1982.
[166] M. Gell-Mann. Complex adaptive systems. In David Pines and David Meltzer,
editors, Complexity: metaphors, models, and reality, pages 17–45–. Addison-Wesley,
USA, 1994.
359
[167] A. J. T. George and D. Gray. Receptor editing during affinity maturation. Immunol-
ogy Today, 20(4):196–, April 1999.
[171] J. Ghosh. Multiclassifier systems: Back to the future. In Proceedings of the Third
International Workshop on Multiple Classifier Systems, 2002.
[174] D. E. Goldberg. From genetic and evolutionary optimization to the design of con-
ceptual machines. Evolutionary Optimization, 1(1):1–12–, 1999.
[176] D. E. Goldberg and J. R. Genetic algorithms with sharing for multimodal function
optimization. In Proceedings of the Second International Conference on Genetic
Algorithms on Genetic algorithms and their application, pages 41–49–. Lawrence
Erlbaum Associates, Inc., Mahwah, NJ, USA, 1987.
[177] D. Edward Goldberg. The Design of Innovation: Lessons from and for Competent
Genetic Algorithms. Kluwer Academic Publishers, USA, 2002.
[180] D. E. Goodman and L. C. Boggess. The role of hypothesis filtering in (airs), an artifi-
cial immune classifier. In Anna L. Buczak, Joydeep Ghosh, Mark J. Embrechts, and
Okan Ersoy, editors, Proceedings of the Artificial Neural Networks in Engineering
Conference, 2003., volume 13, pages 243–248–, New York, 2004. ASME Press.
360
[182] H. J. Gould, P. Takhar, H. E. Harries, S. R. Durham, and C. J. Corrigan. Germinal-
centre reactions in allergic inflammation. Trends in Immunology, 27(10):446–452–,
October 2006.
[183] J. L. Gowans. The recirculation of lymphocytes from blood to lymph in the rat.
American journal of physiologic imaging, 146(1):54–69–, 1959.
[184] J. L. Gowans and E. J. Knight. The route of re-circulation of lymphocytes in
the rat. Proceedings of the Royal Society of London. Series B, Biological Sciences,
159(975):257–282–, 1964.
[185] J. Greensmith. New Frontiers For An Artificial Immune System. PhD thesis, Uni-
versity of Leeds, UK, 2003.
[186] J. Greensmith and S. Cayzer. An artificial immune system approach to semantic
document classification. In Peter Bentley and Emma Hart, editors, Lecture Notes
in Computer Science, pages 136–146–. Springer, Berlin / Heidelberg, 2003.
[187] A. Grilo, A. Caetano, and A. Rosa. Immune system simulation through a complex
adaptive system model. In M. Koppen, S. Ovaska, T. Furuhashi, and F. Homann,
editors, Springer Engineering Series, Soft Computing in Industrial Applications -
Recent Advances, pages 681–704–. Springer, 2002.
[188] S. Grossberg. Neural expectation: cerebellar and retinal analogs of cells fired by
learnable or unlearned pattern classes. Biological Cybernetics, 10(1):49–57–, January
1972.
[189] S. Grossberg. Adaptive pattern classification and universal recoding: I. parallel de-
velopment and coding of neural feature detectors. Biological Cybernetics, 23(3):121–
134–, September 1976.
[190] S. Grossberg. Adaptive pattern classification and universal recoding: Ii. feedback,
expectation, olfaction, illusions. Biological Cybernetics, 23(4):187–202–, December
1976.
[191] S. Grossberg. Competitive learning: from interactive activation to adaptive reso-
nance. Cognitive Science, 11:23–63–, 1988.
[192] J. Gu. Multispace search: A new optimization approach. In Algorithms and Com-
putation, 1994.
[193] J. Gu. Multispace search for satisfiability and np-hard problems. In Satisfiability
Problem: Theory and Applications : DIMACS Workshop, 1997.
[194] I Guyon and A Elisseeff. An introduction to variable and feature selection. Journal
of Machine Learning Research, 3:1157–1182, 2003.
[195] D. L. Hall and S. A. H. McMullen. Mathematical Techniques in Multisensor Data
Fusion. Artech House, 2004.
[196] L. A. Hanson, M. Korotkova, and E. Telemo. Breast-feeding, infant formulas, and
the immune system. Annals of allergy, asthma & immunology : official publication
of the American College of Allergy, Asthma, & Immunology, 90(6 Suppl 3):59–63–,
2003.
[197] P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont. An artificial
immune system architecture for computer security applications. IEEE Transactions
on Evolutionary Computation, 6(3):252–280–, June 2002.
361
[198] W Harriman, H Volk, N Defranoux, and M Wabl. Immunoglobulin class switch
recombination. Annual Review of Immunology, 11:361–384–, April 1993.
[199] E. Hart and P. Ross. Clustering moving data with a modified immune algorithm.
In J. Gottlieb, P.L. Lanzi, R.E. Smith, S. Cagnoni, E. Hart, G.R. Raidl, and H. Ti-
jink, editors, Lecture Notes in Computer Science, pages 394–. Springer, Berlin /
Heidelberg, 2001.
[200] E. Hart and P. Ross. Exploiting the analogy between the immune system and sparse
distributed memories. Genetic Programming and Evolvable Machines, 4(4):333–358–
, December 2003.
[201] E. Hart and J. Timmis. Application areas of ais: The past, the present and the
future. In Marcin L. Pilat, Peter J. Bentley, and Jonathan Timmis, editors, Lecture
Notes in Computer Science, pages 483–. Springer, Berlin / Heidelberg, Germany,
2005.
[204] S. M. Hedrick. The acquired immune system: a vantage from beneath. Immunity,
21(5):607–615–, 2004.
[205] U. Hershberg, S. Solomon, and Irun R. Cohen. What is the basis of the immune
systems specificity? In The MIRIAM Project Series, pages 377–384–. ESCULAPIO
Pub. Co., Bologna, Italy, 2003.
[206] J. Hesser and R. Mnner. Towards an optimal mutation probability for genetic al-
gorithms. In Lecture Notes In Computer Science, pages 23–32–. Springer-Verlag,
London, UK, 1991.
[207] R. Hightower, S. Forrest, and A. S. Perelson. The baldwin effect in the immune
system: Learning by somatic hypermutation. In Adaptive Individuals in Evolving
Populations: Models and Algorithms, pages 159–167–. Addison Wesley, Reading,
MA. USA, 1995.
[209] T. K. Ho. The random subspace method for constructing decision forests. IEEE
Transactions on Pattern Analysis and Machine Intelligence, 20:832–844, 1998.
[210] G. W. Hoffmann. A neural network model based on the analogy with the immune
system. Journal of Theorectical Immunology, 122(1):33–67–, September 1986.
362
[212] S. A. Hofmeyr. An Immunological Model of Distributed Detection and its Application
to Computer Security. PhD thesis, Department of Computer Sciences, University of
New Mexico, USA, 1999.
[214] S. A. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evolu-
tionary Computation, 8(4):443–473–, December 2000.
[218] J. H. Holland. Hidden Order: How Adaptation Builds Complexity. Addison Wesley
Publishing Company, USA, 1995.
[219] A. Hone and J. Kelsey. Optima, extrema, and artificial immune systems. In Vincenzo
Cutello, Peter J. Bentley, and Jon Timmis, editors, Lecture Notes in Computer
Science, pages 80–90–. Springer, Berlin / Heidelberg, 2004.
[226] N. Intrator and S. Edelman. Competitive learning in biological and artificial neural
computation. Trends in Cognitive Sciences, 1(7):268–272–, October 1997.
[227] Y. Ishida. Fully distributed diagnosis by pdp learning algorithm: towards immune
network pdp model. In IJCNN International Joint Conference on Neural Networks,
volume 1, pages 777–782–. IEEE Computer Society, USA, 1990.
[228] Y. Ishida. Distributed and autonomous sensing based on the immune network.
Artificial Life and Robotics: Computer Science and Engineering, 2(1):1–7–, March
1998.
363
[229] Y. Ishida. Immunity-Based Systems - A Design Perspective. Springer-Verlag, Berlin,
Germany, 2004.
[230] A. Ishiguro, T. Kondo, Y. Watanabe, and Y. Uchikawa. Dynamic behavior arbitra-
tion of autonomous mobile robots using immune networks. In IEEE International
Conference on Evolutionary Computation, volume 2, pages 722–727–. IEEE Press,
USA, 1995.
[231] A. Ishiguro, Y. Watanabe, T. Kondo, Y. Shirai, and Y. Uchikawa. A robot with
a decentralized consensus-making mechanism based onthe immune system. In Pro-
ceedings. ISADS 97., Third International Symposium on Autonomous Decentralized
Systems, pages 231–237–. IEEE Press, USA, 1997.
[232] N. K. Jerne. The natural-selection theory of antibody formation. Proceedings of
the National Academy of Sciences of the United States of America, 41(11):849–857–,
1955.
[233] N. K. Jerne. Clonal selection in a lymphocyte network. In Cellular Selection and
Regulation in the Immune Response, volume 29 of Society of General Physiologists
Series, pages 39–48. Raven Press, 1974.
[234] N. K. Jerne. Towards a network theory of the immune system. Annales
d’immunologie (Annals of Immunology), Institut Pasteur (Paris, France), Societe
Francaise d’Immunologie, 125(C):373–389–, January 1974.
[235] N. K. Jerne. Idiotypic networks and other preconceived ideas. Immunological Re-
views, 79:5–24–, 1984.
[236] D. S Johnson. A theoreticians guide for experimental analysis of algorithms. In
D. S. Johnson and C. C. McGeoch, editors, Proceedings of the 5th and 6th DIMACS
Implementation Challenges, pages 215–250–. American Mathematical Society, 2002.
[237] J. Jost. External and internal complexity of complex adaptive systems. Theory in
biosciences, 123(1):69–88–, 2004.
[238] J. H. Jun, D. W. Lee, and K. B. Sim. Realization of cooperative strategies and swarm
behavior in distributed autonomous robotic systems using artificial immune system.
In Systems, Man, and Cybernetics, 1999. IEEE SMC ’99 Conference Proceedings.
1999 IEEE International Conference on, volume 6, pages 614–619vol.6, 12-15 Oct.
1999.
[239] H. Kargupta and P. Chan. Advances in Distributed and Parallel Knowledge Discov-
ery. AAAI Press/MIT Press, 2000.
[240] S. Kauffman. The Origins of Order: Self-Organization and Selection in Evolution.
Oxford University Press, New York, USA, 1993.
[241] S. Kauffman and S. Levin. Towards a general theory of adaptive walks on rugged
landscapes. Journal of Theoretical Biology, 128(1):11–45–, 1987.
[242] S. A. Kauffman and E. D. Weinberger. The nk model of rugged fitness landscapes
and its application to maturation of the immune response. Journal of theoretical
biology, 141(2):211–245–, 1989.
[243] S. A. Kauffman, E. D. Weinberger, and A. S. Perelson. Maturation of the immune
response via adaptive walks on affinity landscapes. In Theoretical Immunology I:
Santa Fe Institute Studies in the Sciences of Complexity, pages –. Addison Wesley,
USA, 1988.
364
[244] M. Kearns. Thoughts on hypothesis boosting. Unpublished manuscript, 1988.
[246] J. Kelsey and J. Timmis. Immune inspired somatic contiguous hypermutation for
function optimisation. In Lecture Notes in Computer Science, pages 207–218–.
Springer, Berlin / Heidelberg, 2003.
[247] J. Kelsey, J. Timmis, and A. Hone. Chasing chaos. In The 2003 Congress on
Evolutionary Computation, (CEC ’03), volume 1, pages 413–419–. IEEE Computer
Society, USA, 2003.
[248] J. O. Kephart. A biologically inspired immune system for computers. In Pattie Maes,
editor, Artificial Life IV, pages 130–139–. MIT Press, Cambridge, Massachusetts,
USA, 1994.
[251] J. Kim and P. Bentley. Immune memory and gene library evolution in the dynamic
clonal selection algorithm. Genetic Programming and Evolvable Machines, 5(4):361–
391–, December 2004.
[252] J. Kim and P. J. Bentley. Negative selection and niching by an artificial immune
system for network intrusion detection. In A late-breaking paper, Genetic and Evo-
lutionary Computation Conference (GECCO ’99), pages –, 1999.
[253] J. Kim and P. J. Bentley. Towards an artificial immune system for network intrusion
detection: an investigation of clonal selection with a negative selection operator. In
Proceedings of the 2001 Congress on Evolutionary Computation, volume 2, pages
1244–1252–, USA, 2001. IEEE Computer Society.
[254] J. Kim and P. J. Bentley. Towards an artificial immune system for network intrusion
detection: An investigation of dynamic clonal selection. In Congress on Evolutionary
Computation (CEC-2002), pages 1015–1020–, 2002.
[255] J. W. Kim. Integrating Artificial Immune Algorithms for Intrusion Detection. PhD
thesis, Department of Computer Science, University College London, UK, 2002.
[256] J. Klein and N. Nikolaidis. The descent of the antibody-based immune system by
gradual evolution. Proceedings of the National Academy of Sciences of the United
States of America, 102(1):169–174–, January 2005.
365
[259] T. P. Knight. MARIA: A Multilayered Unsupervised Machine Learning Algorithm
Based on the Vertebrate Immune System. PhD thesis, The University of Kent at
Canterbury, UK, 2005.
[260] G. Kohler and C. Milstein. Continuous cultures of fused cells secreting antibody of
predefined specificity. Nature, 256:495–497–, 1975.
[261] T. Kohonen. Self-Organizing Maps, volume Third. Springer-Verlag, Berlin Heidel-
berg, 2001.
[262] M. Kudo and J. Sklansky. Comparison of algorithms that select features for pattern
classifiers. Pattern Recognition, 33:25–41, 2000.
[263] V. Kumar. Algorithms for constraint-satisfaction problems : a survey. The AI
magazine (AI mag.), 13, 1992.
[264] L. Kuncheva and J. Bezdek. An integrated framework for generalized nearest proto-
type classifier design. Int. Journal of Uncertaintly, Fuzziness and Knowledge-Based
Systems, 6:437–457, 1998.
[265] L.I. Kuncheva and J.C. Bezdek. Nearest prototype classification: clustering, genetic
algorithms, or random search? IEEE Transactions on Systems, Man and Cybernet-
ics, Part C, 28(1):160–164, 1998.
[266] H. Y. K. Lau, V. W. K. Wong, and I. S. K. Lee. Immunity-based autonomous guided
vehicles control. Applied Soft Computing, pages –, 2005.
[267] H. Y.K. Lau and V. W.K. Wong. A strategic behavioral-based intelligent transport
system with artificial immune system. IEEE International Conference on Systems,
Man and Cybernetics, 4:3909–3914–, 2004.
[268] H. Y.K. Lau and V. W.K. Wong. An immunity-based distributed multiagent-control
framework. IEEE Transactions on Systems, Man and Cybernetics, Part A, 36(1):91–
108–, January 2006.
[269] J. Lederberg. Ontogeny of the clonal selection theory of antibody formation. re-
flections on darwin and ehrlich. Annals of the New York Academy of Sciences,
546:175–182–, 1988.
[270] D. W. Lee, H. B. Jun, and K. B. Sim. Artificial immune system for realization of
cooperative strategies and group behavior in collective autonomous mobile robots.
In Proceedings of the Forth International Symposium on Artificial Life and Robotics,
AAAI, pages 232–235–, 1999.
[271] V.R. Lesser. An Overview of DAI: Viewing Distributed AI as Distributed Search.
Journal of Japanese Society for Artificial Intelligence-Special Issue on Distributed
Artificial Intelligence, 5(4):392–400, January 1990.
[272] R. M. Lewis, V. T., and M. W. Trosset. Direct search methods: then and now.
Journal of Computational and Applied Mathematics, 124:191–207, 2000.
[273] Z. Li, C. J. Woo, M. D. Iglesias-Usse, D. Ronai, and M. D. Scharff. The generation of
antibody diversity through somatic hypermutation and class switch recombination.
Genes and Development, 18:1–11–, 2004.
[274] P. Liu, P. Liu, and D. W. Wang. Reduction optimization in heterogeneous clus-
ter environments. In Da-Wei Wang, editor, Proc. 14th International Parallel and
Distributed Processing Symposium IPDPS 2000, pages 477–482, 2000.
366
[275] Y. J. Liu and C. Arpin. Germinal center development. Immunological Reviews,
156(1):111126–, 1997.
[278] M. Magdon-ismail and A. F. Atiya. The early restart algorithm. Neural Computa-
tion, 12:1303–1312, 2000.
[282] T. Martinetz. Competitive hebbian learning rule forms perfectly topology preserving
maps. In Proceedings of the International Conference on Artificial Neural Networks
(ICANN93), pages 427–434–. Springer, Amsterdam, 1993.
[283] T. Martinetz and K. Schulten. A ”neural gas” network learns topologies. In Kai
Mkisara, Olli Simula, and Jari Kangas, editors, Artificial Neural Networks, pages
397–402–. Elsevier, North-Holland, Amsterdam, 1991.
[286] G. Marwah and L. Boggess. Artificial immune systems for classification: Some
issues. In First International Conference on Artificial Immune Systems, pages 149–
153–, 2002.
[287] P. Matzinger. Tolerance, danger, and the extended family. Annual Review of Im-
munology, 12:991–1045–, 1994.
[288] P. Matzinger. The danger model: A renewed sense of self. Science, 296(5566):301–
305–, 2002.
367
[292] M. E. Meyer-Hermann and P. K. Maini. Cutting edge: Back to ”one-way” germinal
centers. The Journal of Immunology, 174:2489–2493–, 2005.
[294] R. Michelan and F. J. Von Zuben. Decentralized control system for autonomous
navigation based on an evolved artificial immune network. In Proceedings of the
2002 Congress on Evolutionary Computation, (CEC ’02), volume 2, pages 1021–
1026–. IEEE Press, USA, 2002.
[295] F. Mizessyn and Yoshiteru Ishida. Immune networks for cement plants. In Proceed-
ings International Symposium on Autonomous Decentralized Systems, ISADS 93,
pages 282–288–. IEEE Computer Society, USA, 1993.
[296] P. H. Mohr, N. Ryan, and J. Timmis. Exploiting immunological properties for ubiq-
uitous computing systems. In Vincenzo Cutello, Peter J. Bentley, and Jon Timmis,
editors, Lecture Notes in Computer Science, pages 277–289–. Springer, Berlin / Hei-
delberg, Germany, 2004.
[297] K. Mori, M. Tsukiyama, and T. Fukuda. Immune algorithm with searching diversity
and its application to resource allocation problem. The Transactions of the Institute
of Electrical Engineers of Japan, 113-C(10):872–878–, 1993.
[298] H. Mühlenbein. How genetic algorithms really work: I. mutation and hillclimbing.
In Parallel Problem Solving from Nature 2, PPSN-II, pages 15–26–. Elsevier, 1992.
[303] R. M. Nesse. Maladaptation and natural selection. The Quarterly Review of Biology,
80:6270–, 2005.
[307] M. Nussenzweig. Immune receptor editing: revise and select. Cell, 95(7):875–878–,
1998.
368
[308] W. H. Oddy. Breastfeeding protects against illness and infection in infants and
children: a review of the evidence. Breastfeeding review : professional publication of
the Nursing Mothers’ Association of Australia, 9(2):11–18–, 2001.
[310] D. Opitz and R. Maclin. Popular ensemble methods: An empirical study. Journal
of Artificial Intelligence Research, 11:169–198, 1999.
[312] K.K. Parhi, K.K. Parhi, F.H. Wu, and K. Genesan. Sequential and parallel neural
network vector quantizers. IEEE Transactions on Computers, 43(1):104–109, 1994.
[314] William E. Paul. Immunology - Recognition and Response : Readings from Scientific
American magazine / edited by William E. Paul. Scientific American Inc., W. H.
Freeman and Company, USA, 1991.
[315] L. Pauling. A theory of the structure and process of formation of antibodies. Journal
of the American Chemical Society, 62:2643–2657–, 1940.
[318] E. S. Peer, A. P. Engelbrecht, and F. van den Bergh. Cirg@up optibench: a sta-
tistically sound framework for benchmarking optimisation algorithms. In The 2003
Congress on Evolutionary Computation, (CEC ’03), volume 4, pages 2386–2392–.
IEEE Press, USA, 2003.
[319] M. Pelikan and D. E. Goldberg. Hierarchical problem solving by the bayesian opti-
mization algorithm. IlliGAL Report No. 2000002, Illinois Genetic Algorithms Lab-
oratory, University of Illinois at Urbana-Champaign, Urbana, IL, 2000.
[323] C. C. Pettey. Diffusion (cellular) models. In David B Fogel and Zbigniew Michalwicz,
editors, Evolutionary Computation 2 - Advanced Algorithms and Operations, pages –.
Institute of Physics (IOP) Publishing Ltd., UK, 2000.
369
[325] D. M. Pierre, D. Goldman, Y. Bar-Yam, and A. S. Perelson. Somatic evolution in
the immune system: the need for germinal centers for efficient affinity maturation.
Journal of Theoretical Biology, 186(2):159–171–, 1997.
[327] R. Polikar. Ensemble based systems in decision making. IEEE Circuits and Systems
Magazine, 6(3):21–45, 2006.
[329] W. L. Price. A controlled random search procedure for global optimisation. The
Computer Journal, 20:367–370, 1977.
[334] R. D. Reed and R. J. Marks II. Neural Smithing - Supervised Learning in Feedforward
Artificial Neural Networks. MIT Press, USA, 1999.
[337] B. Rinkevich. Primitive immune systems: Are your ways my ways? Immunological
Reviews, 198(1):2535–, April 2004.
[338] H. Robbins. Some aspects of the sequential design of experiments. Bull. Amer.
Math. Soc., 58:527–535, 1952.
[340] I. M Rouzine, J. Wakeley, and J. M Coffin. The solitary wave of asexual evolution.
Proc Natl Acad Sci U S A, 100(2):587–592, Jan 2003.
370
[343] M. Salmi and S. Jalkanen. Lymphocyte homing to the gut: attraction, adhesion,
and commitment. Immunological Reviews, 206(1):100–113–, 2005.
[347] J. David Schaffer, Richard A. Caruana, Larry J. Eshelman, and Rajarshi Das. A
study of control parameters affecting online performance of genetic algorithms for
function optimization. In Proceedings of the third international conference on Ge-
netic algorithms, pages 51–60–. Morgan Kaufmann Publishers Inc., San Francisco,
CA, USA, 1989.
[352] H. P. Schwefel. Numerical optimization of computer models. John Wiley & Sons,
Inc., New York, NY, USA, 1981.
[356] M. Shannon and R. Mehr. Reconciling repertoire shift with affinity maturation: The
role of deleterious mutations. The Journal of Immunology, 162:3950–3956–, 1999.
[357] A. J. C. Sharkey. Combining Artificial Neural Nets: Ensemble and Modular Multi-
Net Systems. Springer, 1999.
371
[358] A. M. Silverstein. The clonal selection theory: what it really is and why modern
challenges are misplaced. Nature Immunology, 3:793–796–, 2002.
[359] S. P. N. Singh and S. M. Thayer. Immunology directed methods for distributed
robotics: A novel, immunity-based architecture for robust control & coordination.
In Proceedings of SPIE: Mobile Robots XVI, pages –, 2001.
[360] S. P. N. Singh and S. M. Thayer. Kilorobot search and rescue using an immunolog-
ically inspired approach. Distributed Autonomous Robotic Systems, 5:–, June 2002.
[361] S. P. N. Singh, S. M. Thayer, and W. P. Thayer. A foundation for kilorobotic
exploration. In Proceedings of the 2002 Congress on Evolutionary Computation,
CEC ’02., volume 2, pages 1033–1038–. IEEE Press, USA, 2002.
[362] D. Skillicorn. Strategies for parallel data mining. IEEE Concurrency, 7(4):26–35,
1999.
[363] H. B. Slade and S. A. Schwartz. Mucosal immunity: The immunology of breast milk.
Journal of Allergy and Clinical Immunology, 80(3, Part 1):348–358–, September
1987.
[364] A. Sloman. Must intelligent systems be scruffy? In G T McKee and G C Dean,
editors, Evolving Knowledge in Natural Science and Artificial Intelligence, pages –.
Pitman, London, 1990.
[365] D. J Smith, S. Forrest, and A. S. Perelson. Immunological memory is associative.
In ICMAS ‘96: Multiagent systems workshop on immunity-based systems, pages 62–
70–, United States, 1996.
[366] J. E. Smith and T. C. Fogarty. Operator and parameter adaptation in genetic algo-
rithms. Soft Computing - A Fusion of Foundations, Methodologies and Applications,
1:81–87, 1997.
[367] W. M. Spears. Crossover or mutation? In Proceedings of Foundations of Genetic
Algorithms Workshop, volume 2, pages 221–237–. Morgan Kaufmann, San Mateo,
CA, USA, 1992.
[368] W. M. Spears. The Role of Mutation and Recombination in Evolutionary Algorithms.
PhD thesis, George Mason University, Fairfax, Virginia, USA, 1998.
[369] W. Srikusalanukul, F. De Bruyne, and P. McCullagh. Modelling of peripheral lym-
phocyte migration: System identification approach. Immunology and Cell Biology,
78(3):288–, June 2000.
[370] D. J. Stekel. The simulation of density-dependent effects in the recirculation of t
lymphocytes. Scandinavian journal of immunology, 47(5):426–430, 1998.
[371] D. J. Stekel, C. E. Parker, and M. A. Nowak. A model of lymphocyte recirculation.
Immunology Today, 18(5):216–221, May 1997.
[372] S. Stepney, R. E. Smith, J. Timmis, and A. M. Tyrrell. Towards a conceptual
framework for artificial immune systems. In Vincenzo Cutello, Peter J. Bentley, and
Jon Timmis, editors, Lecture Notes in Computer Science (LNCS), pages 53–64–.
Springer-Verlag, Germany, 2004.
[373] S. Stepney, R. E. Smith, J. Timmis, A. M. Tyrrell, M. J. Neal, and Andrew N. W.
Hone. Conceptual frameworks for artificial immune systems. International Journal
of Unconventional Computing, 1(3):315–338–, July 2005.
372
[374] T. Stibor. On the Appropriateness of Negative Selection for Anomaly Detection
and Network Intrusion Detection. PhD thesis, Darmstadt University of Technology,
Germany, 2006.
[377] M. A. Swartz. The physiology of the lymphatic system. Advanced drug delivery
reviews, 50(1-2):3–20–, 2001.
[383] J. C. Tay and A. Jhavar. Cafiss: a complex adaptive framework for immune system
simulation. In Proceedings of the 2005 ACM symposium on Applied computing, pages
158–164–. ACM Press, New York, NY, USA, 2005.
[388] J. Timmis. Artificial immune systems - today and tomorrow. Natural Computing,
6(1):1–18–, March 2007.
[389] J. Timmis, M. Amos, W. Banzhaf, and A. Tyrrell. ”going back to our roots”: second
generation biocomputing. Technical Report arXiv:cs/0512071v1, arXiv, Dec 2005.
373
[390] J. Timmis, C. Edmonds, and J. Kelsey. Assessing the performance of two immune
inspired algorithms and a hybrid genetic algorithm for function optimisation. In
Proceedings of the Congress on Evolutionary Computation (CEC04), volume 1, pages
1044–1051–. IEEE Press, USA, 2004.
[391] J. Timmis and M. Neal. Investigating the evolution and stability of a resource limited
artificial immune system. In Workshop Program, pages 40–41–. AAAI Press, USA,
2000.
[392] J. Timmis, M. Neal, and J. Hunt. An artificial immune system for data analysis.
Biosystems, 55(1):143–150–, 2000.
[393] J. Timmis and M. J. Neal. A resource limited artificial immune system for data
analysis. Knowledge Based Systems Journal: Special Issue, 14(3-4):121–130–, 2001.
[395] N. Toma, S. Endo, K Yamada, and H. Miyagi. The immune distributed competitive
problem solver with majorhistocompatibility complex and immune network. In IEEE
International Conference on Systems, Man, and Cybernetics, volume 3, pages 1865–
1870–. IEEE Press, USA, 2000.
[400] J. Twycross and U. Aickelin. Towards a conceptual framework for innate immunity.
In LNCS, pages 112–125–. Springer, Germany, 2005.
[401] J. Twycross and U. Aickelin. Biological inspiration for artificial immune systems.
In Proceedings of the 6th International Conference on Artificial Immune Systems
(ICARIS-2007), pages –, 2007.
[402] A. Trn, M.M. Ali, and S. Viitanen. Stochastic global optimization: Problem classes
and solution techniques. Journal of Global Optimization, 14:437–447, 1999.
[403] F. J. Varela. A cognitive view of the immune system. World Futures, 42(1-2):31–40–,
1994.
374
[406] P. A. Vargas, L. N. de Castro, and F. J. Von Zuben. Mapping artificial immune
systems into learning classifier systems. In Lecture Notes in Computer Science, pages
163–186–. Springer, Berlin / Heidelberg, 2003.
[410] P. Vineis and M. Berwick. The population dynamics of cancer: a darwinian per-
spective. Int J Epidemiol, 35(5):1151–1159, Oct 2006.
[411] U. H. von Andrian and T. R. Mempel. Homing and cellular traffic in lymph nodes.
Nature reviews. Immunology, 3(11):867–878–, 2003.
[412] C. von der Malsburg. Self-organization of orientation sensitive cells in the striate
cortex. Biological Cybernetics, 14(2):85–100–, December 1973.
[413] S. Voulgaris, M. Jelasity, and M. van Steen. A robust and scalable peer-to-peer
gossiping protocol. In Agents and Peer-to-Peer Computing, 2005.
[416] R. Aaron Warnock, Sanaz Askari, Eugene C. Butcher, and Ulrich H. von Andrian.
Molecular mechanisms of lymphocyte homing to peripheral lymph nodes. Journal
of Experimental Medicine (JEM), 182(2):205–216–, 1998.
[418] A. Watkins and L. Boggess. A new classifier based on resource limited artificial
immune systems. In Part of the 2002 IEEE World Congress on Computational
Intelligence, pages 1546–1551–. IEEE, May 2002.
[419] A. Watkins and J. Timmis. Artificial immune recognition system (airs): Revisions
and refinements. In P.J. Bentley, editor, 1st International Conference on Artificial
Immune Systems (ICARIS2002), pages 173–181–. University of Kent at Canterbury
Printing Unit, UK, 2002.
375
[421] A. Watkins, J. Timmis, and L. Boggess. Artificial immune recognition system
(airs): An immune-inspired supervised learning algorithm. Genetic Programming
and Evolvable Machines, 5(3):291–317–, September 2004.
[422] A. B. Watkins. Airs: A resource limited artificial immune classifier. Master’s thesis,
Mississippi State University, USA, 2001.
[424] R. G. Weinand. Somatic mutation, affinity maturation and the antibody repertoire:
a computer model. Journal of Theoretical Biology, 143(3):343–382–, 1990.
[427] J. White and S. M. Garrett. Improved pattern recognition with artificial clonal
selection? In Lecture Notes in Computer Science, pages 181–193–. Springer-Verlag,
Berlin / Heidelberg, Germany, 2003.
[433] I. H. Witten and E. Frank. Data Mining: Practical machine learning tools with Java
implementations. Morgan Kaufmann, San Francisco, 2000.
[435] D. H. Wolpert and W. G. Macready. No free lunch theorems for search. Technical
report, Santa Fe Institute, Sante Fe, NM, USA, 1995.
[436] D. H. Wolpert and W. G. Macready. No free lunch theorems for optimization. IEEE
Transactions on Evolutionary Computation, 1(67):67–82–, 1997.
376
[437] S. Wright. The roles of mutation, inbreeding, crossbreeding, and selection in evolu-
tion. Proceedings of the Sixth International Congress on Genetics, pages 355–366–,
1932.
[438] L J Wysocki and M L Gefter. Gene conversion and the generation of antibody
diversity. Annual Review of Biochemistry, 58:July 1989–, July 1989.
[439] L. Xu, A. Krzyzak, and E. Oja. Rival penalized competitive learning for cluster-
ing analysis, rbfnet, and curve detection. IEEE Transactions on Neural Networks,
4(4):636–649–, July 1993.
[441] X. Yao, Y. Liu, and G. Lin. Evolutionary programming made faster. IEEE Trans-
actions on Evolutionary Computation, 3(2):82–102, July 1999.
[442] A. J. Young and J. Hay. Lymphocyte migration in the development and disease.
Seminars in Immunology, 11(2):71–, 1999.
[445] Y. Zhang and C. Hou. A clone selection algorithm with niching strategy inspiring by
biological immune principles for change detection. In IEEE International Symposium
on Intelligent Control, pages 1000–1005–. IEEE Press, USA, 2003.
377