This paper puts forward a novel artificial immune response algorithm for optimal approximation of linear systems. A quaternion model of artificial immune response is proposed for engineering computing. The model abstr...This paper puts forward a novel artificial immune response algorithm for optimal approximation of linear systems. A quaternion model of artificial immune response is proposed for engineering computing. The model abstracts four elements, namely, antigen, antibody, reaction rules among antibodies, and driving algorithm describing how the rules are applied to antibodies, to simulate the process of immune response. Some reaction rules including clonal selection rules, immunological memory rules and immune regulation rules are introduced. Using the theorem of Markov chain, it is proofed that the new model is convergent. The experimental study on the optimal approximation of a stable linear system and an unstable one show that the approximate models searched by the new model have better performance indices than those obtained by some existing algorithms including the differential evolution algorithm and the multi-agent genetic algorithm.展开更多
Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clona...Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clonal selection algorithm, to solve the multi-user detection problem in code-division multipleaccess communications system based on the maximum-likelihood decision rule. Through proportional cloning, hypermutation, clonal selection and clonal death, the new method performs a greedy search which reproduces individuals and selects their improved maturated progenies after the affinity maturation process. Theoretical analysis indicates that the clonal selection algorithm is suitable for solving the multi-user detection problem. Computer simulations show that the proposed approach outperforms some other approaches including two genetic algorithm-based detectors and the matched filters detector, and has the ability to find the most likely combinations.展开更多
An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to d...An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.展开更多
The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper, we introduce the motif tracking algorithm (MTA), a novel immune inspired (IS)...The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper, we introduce the motif tracking algorithm (MTA), a novel immune inspired (IS) pattern identification tool that is able to identify unknown motifs of a non specified length which repeat within time series data. The power of the algorithm comes from the fact that it uses a small number of parameters with minimal assumptions regarding the data being examined or the underlying motifs. Our interest lies in applying the algorithm to financial time series data to identify unknown patterns that exist. The algorithm is tested using three separate data sets. Particular suitability to financial data is shown by applying it to oil price data. In all cases, the algorithm identifies the presence of a motif population in a fast and efficient manner due to the utilization of an intuitive symbolic representation. The resulting population of motifs is shown to have considerable potential value for other applications such as forecasting and algorithm seeding.展开更多
Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone process.These systems are typically heterogeneous,i.e.,they consist of multiple components implem...Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone process.These systems are typically heterogeneous,i.e.,they consist of multiple components implemented with different languages and development tools.One of the main problems nowadays in CPPS implementation is enabling security mechanisms by design while reducing the complexity and increasing the system’s maintainability.Adopting the IEC 61499 standard is an excellent approach to tackle these challenges by enabling the design,deployment,and management of CPPS in a model-based engineering methodology.We propose a method for CPPS design based on the IEC 61499 standard.The method allows designers to embed a bio-inspired anomaly-based host intrusion detection system(A-HIDS)in Edge devices.This A-HIDS is based on the incremental Dendritic Cell Algorithm(iDCA)and can analyze OPC UA network data exchanged between the Edge devices and detect attacks that target the CPPS’Edge layer.This study’s findings have practical implications on the industrial security community by making novel contributions to the intrusion detection problem in CPPS considering immune-inspired solutions,and cost-effective security by design system implementation.According to the experimental data,the proposed solution can dramatically reduce design and code complexity while improving application maintainability and successfully detecting network attacks without negatively impacting the performance of the CPPS Edge devices.展开更多
The development of innovative, complex marine systems, such as autonomous ship concepts, has led to risk-based approaches indesign and operation that provide safety level quantification and continuous risk assessment....The development of innovative, complex marine systems, such as autonomous ship concepts, has led to risk-based approaches indesign and operation that provide safety level quantification and continuous risk assessment. The existing approaches to dynamicrisk assessmentmainly aim at updating accident probabilities for specific risk scenarios, based on knowledge of system operation andfailure, aswell as on past accident and failure information. However, for innovative marine systems that include complex interactions,our ability to identify anything that might go wrong is very limited, which may lead to unidentified risks, and failure data may not beavailable. This paper presents the foundations of a framework for dynamic risk assessment, which is equally applicable to mannedand autonomous ships and mainly relies on information about the safe operational envelope and real-time information regardingdeviations from safety. Inspiration is drawn from how the biological immune system identifies the risk of infection in a dynamicenvironment. The objective is to show the feasibility and benefits of our approach for quantifying the operational risk of marinesystems. This paper provides the conceptual basis for developing ship specific applications and describes a process for dynamic riskassessment that is methodologically based on artificial immune systems. To demonstrate the implementation of our framework, wedescribed, an illustrative example that involves a ship in a grounding scenario. The results show that the bio-inspired assessmentprocess and risk description can reflect the changes of the risk level of a marine system.展开更多
The main proposition of the current investigation is to develop a computational intelligence-based framework which can be used for the real-time estimation of optimum battery state-of-charge (SOC) trajectory in plug...The main proposition of the current investigation is to develop a computational intelligence-based framework which can be used for the real-time estimation of optimum battery state-of-charge (SOC) trajectory in plug-in hybrid electric vehicles (PHEVs). The estimated SOC trajectory can be then employed for an intelligent power management to significantly improve the fuel economy of the vehicle. The devised intelligent SOC trajectory builder takes advantage of the upcoming route information preview to achieve the lowest possible total cost of electricity and fossil fuel. To reduce the complexity of real-time optimization, the authors propose an immune system-based clustering approach which allows categoriz- ing the route information into a predefined number of segments. The intelligent real-time optimizer is also inspired on the basis of interactions in biological immune systems, and is called artificial immune algorithm (AIA). The objective function of the optimizer is derived from a computationally efficient artificial neural network (ANN) which is trained by a database obtained from a high-fidelity model of the vehicle built in the Autonomic software. The simulation results demonstrate that the integration of immune inspired clustering tool, AIA and ANN, will result in a powerful framework which can generate a near global optimum SOC trajectory for the baseline vehicle, that is, the Toyota Prius PHEV. The outcomes of the current investigation prove that by taking advantage of intelligent approaches, it is possible to design a computationally efficient and powerful SOC trajectory builder for the intelligent power management of PHEVs.展开更多
Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its f...Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its fitness values of current dominated individuals are assigned as the values of a custom distance measure, termed as Ab-Ab affinity, between the dominated individuals and one of the nondominated individuals found so far. According to the values of Ab-Ab affinity, all dominated individuals (antibodies) are divided into two kinds, subdominant antibodies and cryptic antibodies. Moreover, local search only applies to the subdominant antibodies, while the cryptic antibodies are redundant and have no function during local search, but they can become subdominant (active) antibodies during the subsequent evolution. Furthermore, a new immune operation, clonal proliferation is provided to enhance local search. Using the clonal proliferation operation, IDCMA reproduces individuals and selects their improved maturated progenies after local search, so single individuals can exploit their surrounding space effectively and the newcomers yield a broader exploration of the search space. The performance comparison of IDCMA with MISA, NSGA-Ⅱ, SPEA, PAES, NSGA, VEGA, NPGA, and HLGA in solving six well-known multiobjective function optimization problems and nine multiobjective 0/1 knapsack problems shows that IDCMA has a good performance in converging to approximate Pareto-optimal fronts with a good distribution.展开更多
基金supported by the National Natural Science Foundation of China(Grant Nos,60133010 and 60372045)the Graduate Innovation Fund of Xidian University(Grant No.05004),
文摘This paper puts forward a novel artificial immune response algorithm for optimal approximation of linear systems. A quaternion model of artificial immune response is proposed for engineering computing. The model abstracts four elements, namely, antigen, antibody, reaction rules among antibodies, and driving algorithm describing how the rules are applied to antibodies, to simulate the process of immune response. Some reaction rules including clonal selection rules, immunological memory rules and immune regulation rules are introduced. Using the theorem of Markov chain, it is proofed that the new model is convergent. The experimental study on the optimal approximation of a stable linear system and an unstable one show that the approximate models searched by the new model have better performance indices than those obtained by some existing algorithms including the differential evolution algorithm and the multi-agent genetic algorithm.
基金Supported by the National Natural Science Foundation of China (Grant Nos. 60703107, 60703108)the National High-Tech Research & Develop-ment Program of China (Grant No. 2009AA12Z210)+1 种基金the Program for New Century Excellent Talents in University (Grant No. NCET-08-0811)the Program for Cheung Kong Scholars and Innovative Research Team in University (Grant No. IRT-06-45)
文摘Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clonal selection algorithm, to solve the multi-user detection problem in code-division multipleaccess communications system based on the maximum-likelihood decision rule. Through proportional cloning, hypermutation, clonal selection and clonal death, the new method performs a greedy search which reproduces individuals and selects their improved maturated progenies after the affinity maturation process. Theoretical analysis indicates that the clonal selection algorithm is suitable for solving the multi-user detection problem. Computer simulations show that the proposed approach outperforms some other approaches including two genetic algorithm-based detectors and the matched filters detector, and has the ability to find the most likely combinations.
文摘An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.
文摘The search for patterns or motifs in data represents a problem area of key interest to finance and economic researchers. In this paper, we introduce the motif tracking algorithm (MTA), a novel immune inspired (IS) pattern identification tool that is able to identify unknown motifs of a non specified length which repeat within time series data. The power of the algorithm comes from the fact that it uses a small number of parameters with minimal assumptions regarding the data being examined or the underlying motifs. Our interest lies in applying the algorithm to financial time series data to identify unknown patterns that exist. The algorithm is tested using three separate data sets. Particular suitability to financial data is shown by applying it to oil price data. In all cases, the algorithm identifies the presence of a motif population in a fast and efficient manner due to the utilization of an intuitive symbolic representation. The resulting population of motifs is shown to have considerable potential value for other applications such as forecasting and algorithm seeding.
文摘Designing and developing distributed cyber-physical production systems(CPPS)is a time-consuming,complex,and error-prone process.These systems are typically heterogeneous,i.e.,they consist of multiple components implemented with different languages and development tools.One of the main problems nowadays in CPPS implementation is enabling security mechanisms by design while reducing the complexity and increasing the system’s maintainability.Adopting the IEC 61499 standard is an excellent approach to tackle these challenges by enabling the design,deployment,and management of CPPS in a model-based engineering methodology.We propose a method for CPPS design based on the IEC 61499 standard.The method allows designers to embed a bio-inspired anomaly-based host intrusion detection system(A-HIDS)in Edge devices.This A-HIDS is based on the incremental Dendritic Cell Algorithm(iDCA)and can analyze OPC UA network data exchanged between the Edge devices and detect attacks that target the CPPS’Edge layer.This study’s findings have practical implications on the industrial security community by making novel contributions to the intrusion detection problem in CPPS considering immune-inspired solutions,and cost-effective security by design system implementation.According to the experimental data,the proposed solution can dramatically reduce design and code complexity while improving application maintainability and successfully detecting network attacks without negatively impacting the performance of the CPPS Edge devices.
文摘The development of innovative, complex marine systems, such as autonomous ship concepts, has led to risk-based approaches indesign and operation that provide safety level quantification and continuous risk assessment. The existing approaches to dynamicrisk assessmentmainly aim at updating accident probabilities for specific risk scenarios, based on knowledge of system operation andfailure, aswell as on past accident and failure information. However, for innovative marine systems that include complex interactions,our ability to identify anything that might go wrong is very limited, which may lead to unidentified risks, and failure data may not beavailable. This paper presents the foundations of a framework for dynamic risk assessment, which is equally applicable to mannedand autonomous ships and mainly relies on information about the safe operational envelope and real-time information regardingdeviations from safety. Inspiration is drawn from how the biological immune system identifies the risk of infection in a dynamicenvironment. The objective is to show the feasibility and benefits of our approach for quantifying the operational risk of marinesystems. This paper provides the conceptual basis for developing ship specific applications and describes a process for dynamic riskassessment that is methodologically based on artificial immune systems. To demonstrate the implementation of our framework, wedescribed, an illustrative example that involves a ship in a grounding scenario. The results show that the bio-inspired assessmentprocess and risk description can reflect the changes of the risk level of a marine system.
文摘The main proposition of the current investigation is to develop a computational intelligence-based framework which can be used for the real-time estimation of optimum battery state-of-charge (SOC) trajectory in plug-in hybrid electric vehicles (PHEVs). The estimated SOC trajectory can be then employed for an intelligent power management to significantly improve the fuel economy of the vehicle. The devised intelligent SOC trajectory builder takes advantage of the upcoming route information preview to achieve the lowest possible total cost of electricity and fossil fuel. To reduce the complexity of real-time optimization, the authors propose an immune system-based clustering approach which allows categoriz- ing the route information into a predefined number of segments. The intelligent real-time optimizer is also inspired on the basis of interactions in biological immune systems, and is called artificial immune algorithm (AIA). The objective function of the optimizer is derived from a computationally efficient artificial neural network (ANN) which is trained by a database obtained from a high-fidelity model of the vehicle built in the Autonomic software. The simulation results demonstrate that the integration of immune inspired clustering tool, AIA and ANN, will result in a powerful framework which can generate a near global optimum SOC trajectory for the baseline vehicle, that is, the Toyota Prius PHEV. The outcomes of the current investigation prove that by taking advantage of intelligent approaches, it is possible to design a computationally efficient and powerful SOC trajectory builder for the intelligent power management of PHEVs.
基金the National Natural Science Foundation of China(Grant Nos.60703107 and 60703108)the National High Technology Research and Development Program(863 Program) of China(Grant No.2006AA01Z107)+1 种基金the National Basic Research Program(973 Program) of China(Grant No.2006CB705700)the Program for Cheung Kong Scholars and Innovative Research Team in University(Grant No.IRT0645)
文摘Based on the mechanisms of immunodominance and clonal selection theory, we propose a new multiobjective optimization algorithm, immune dominance clonal multiobjective algorithm (IDCMA). IDCMA is unique in that its fitness values of current dominated individuals are assigned as the values of a custom distance measure, termed as Ab-Ab affinity, between the dominated individuals and one of the nondominated individuals found so far. According to the values of Ab-Ab affinity, all dominated individuals (antibodies) are divided into two kinds, subdominant antibodies and cryptic antibodies. Moreover, local search only applies to the subdominant antibodies, while the cryptic antibodies are redundant and have no function during local search, but they can become subdominant (active) antibodies during the subsequent evolution. Furthermore, a new immune operation, clonal proliferation is provided to enhance local search. Using the clonal proliferation operation, IDCMA reproduces individuals and selects their improved maturated progenies after local search, so single individuals can exploit their surrounding space effectively and the newcomers yield a broader exploration of the search space. The performance comparison of IDCMA with MISA, NSGA-Ⅱ, SPEA, PAES, NSGA, VEGA, NPGA, and HLGA in solving six well-known multiobjective function optimization problems and nine multiobjective 0/1 knapsack problems shows that IDCMA has a good performance in converging to approximate Pareto-optimal fronts with a good distribution.