Evolutionary Immune Inspired Solutions (AIS) For Data Analysis
Evolutionary Immune Inspired Solutions (AIS) For Data Analysis
PG Student, Department of Computer Sc.& Engineering, International Institute of Information Technology (IIIT),Bhubaneswar,Odisha-751003
ABSTRACT
Immunity- based techniques are gaining popularity in wide area of applications , and emerging as a new branch of Artificial Intelligence (AI). The paper surveys the major works in the field of data analysis during the last few years, in particular, reviewed the works of existing methods and the new initiatives.
Keywords: Artificial immune system (AIS), Clonal Selection, Negative Selection, Motif Tracking Algorithm (MTA). 1. INTRODUCTION The artificial immune system (AIS) implements a learning technique inspired by the human immune system which is a remarkable natural defence mechanism that learns about foreign substances. However, the immune system has not attracted the same kind of interest from the computing field as the neural operation of the brain or the evolutionary forces used in learning classifier systems. In this paper, we describe an artificial immune system which borrows much of its operation from theories of the natural immune system to provide a distinguished solution for data analysis. The remainder of the paper is organized in the following manner: Section 2 introduces to Artificial immune system(AIS) while Section 3 describes some of the principles of artificial immune system. Section 4 considers how the AIS can be applied to analysis of sequences and finding unknown MOTIFS in DNA sequences 2. AN INTRODUCTION TO ARTIFICIAL IMMUNE SYSTEM (AIS) The standard approaches to computational problem-solving tasks such as pattern recognition and information search have considerably diversified. The variety of fields to which this analysis is relevant has also widely expanded. The significant increase of computational power, along with our understanding of problem solving paradigms. As a result computer scientists are no longer restricted by traditional approaches to the development of solution strategies for the problems. These individuals now look to alternative sources of inspiration for their work, enabling new and varied solutions to be created that play a valuable role in the problem solving process. Inspiration for many of the recent techniques applied to computational problem solving has developed from an increased understanding of the workings of nature itself and in particular biological systems. Many of the biological systems in nature exhibit desirable properties such as robustness, adaptively and flexibility that would prove extremely advantageous if they could be extracted and adopted into a computational solution. Inspiration from the workings of the brain and the nervous system led to the development of neural networks. These used machine based learning to recognize and classify previously unseen information in a fast and flexible manner. The behavior and interaction of large groups of ants and bees led to the development of swarm systems. Mechanisms involved in the genetic recombination of DNA inspired the mutation and crossover operators used in genetic algorithms. Awareness of the composition and manipulation of DNA also influenced the development of genetic programming techniques [1]. Now a days the natural immune system has become a focus of inspiration for computer scientists, though it exhibits a wealth of properties that are desirable from a computational perspective. Such properties include robustness, adaptability, diversity, scalability, and multiple interactions on a variety of time scales [2]. Computer scientists and engineers aim to adopt these properties in their systems in order to improve on their current solutions or enable them to solve ever more complex problems. An algorithm that follows the properties of biological immune behavior is called as Artificial Immune System(AIS). Timmis and de Castro provide a comprehensive definition of AISs as adaptive systems, inspired by theoretical immunology and observed immune function, principle and models, which are applied to problem solving [3]. Work on AISs began in the mid to late 1980s with the development of the theoretical immune network models of Farmer [4], Perelson [5] and later by Chowdury [6]. A number of AIS models exist, and they are used in pattern recognition, fault
Page 292
Web Site: www.ijaiem.org Email: [email protected], [email protected] Volume 2, Issue 4, April 2013 ISSN 2319 - 4847
detection, computer security, and a variety of other applications researchers are exploring in the field of science and engineering.
Page 293
Web Site: www.ijaiem.org Email: [email protected], [email protected] Volume 2, Issue 4, April 2013 ISSN 2319 - 4847
3.2 NEGATIVE SELECTION APPROACH negative selection algorithm Forrest et al. [12], is one of the computational models of self/nonself discrimination, first designed as a change detection method. It is one of the earliest AIS algorithms that were applied in various real-world applications. Since it was first conceived, it has attracted many AIS researchers and practitioners and has gone through some phenomenal evolution In spite of evolution and diversification of this method.
Page 294
Web Site: www.ijaiem.org Email: [email protected], [email protected] Volume 2, Issue 4, April 2013 ISSN 2319 - 4847
The inspiration from immune networks, clonal selection, negative selection and danger theory have led to a wealth of AIS algorithms to tackle a diverse range of problems. In their review Timmis and Hart [11] list the following as known applications for AIS algorithms: clustering, classification, anomaly detection, computer security, optimization, scheduling, learning, bio-informatics, image processing, robotic control and navigation, adaptive control systems, virus detection, web mining and pattern matching. The attraction of the immune system and the diversity of the applications to which AISs have been applied indicate that immune inspired solutions offer a wealth of opportunity for computer scientists and engineers. Studying the theories associated with the development of naive immune cells through to the evolution of immunological memory gave valuable insight into the way the immune system learns to recognize and remember information presented to it. Theories regarding immune memory development and maintenance were of prime importance during this research. Without adequate memory the information gained during the learning process is wasted. By doing investigation and extracting the principles from immune memory theory we were able to develop three AIS algorithms that were capable of addressing our data analysis application.
Page 295
Web Site: www.ijaiem.org Email: [email protected], [email protected] Volume 2, Issue 4, April 2013 ISSN 2319 - 4847
Considerable research has already been performed on identifying known patterns in time series [14]. In contrast little research has been performed on looking for unknown motifs in time series. This provides an ideal opportunity for an AIS driven approach to tackle the problem of motif detection, as a distinguishing feature of the MTA is its ability to identify variable length unknown patterns that repeat in a time series using an evolutionary system. In many data sets there is no prior knowledge of what patterns exist so traditional detection techniques are unsuitable. In this paper we test the generic properties of the MTA by applying it to motif identification in two industrial data sets to asses its ability to find variable length unknown motifs. MTA Pseudo Code Initiate MTA (s, r, a) Convert Time series T to symbolic representation Generate Symbol Matrix S Initialise Tracker population to size a While ( Tracker population > 0 ) { Generate motif candidate matrix M from S Match trackers to motif candidates Eliminate unmatched trackers Examine T to confirm genuine motif status Eliminate unsuccessful trackers Store motifs found Proliferate matched trackers Mutate matched trackers } Memory motif streamlining
5. CONCLUSION
Often, many AIS solutions incorporate significant complexity in their approach in order to mimic the biological system. In doing so, it is hoped that some of the desirable properties of the immune system are carried over into the computational solution. Motif and patterns are key tools for use in data analysis.By extracting motifs that exist in data we understand the nature and characteristic of data.The motif provides an obvious mechanism to cluster,classify and summerise data, placing great value on these patterns While most research has focused on the search for known motifs, little research has been performed looking for variable length unknown motifs in time series.
References
[1] W. Banzhaf, P. Nordin, R. E. Keller, and F. D. Francone. Genetic Pro- gramming, An Introduction: on the Automatic Evolution of Computer Programs and its Applications. Morgan Kaufman, 1998R. Caves, Multinational Enterprise and Economic Analysis, Cambridge University Press, Cambridge, 1982. (book style) [2] D. R. Flower and J. Timmis. In Silico Immunology. Springer, 2007. [3] H. L. N. de Castro and J. Timmis. Artificial Immune Systems: A New Com- putational Intelligence Approach. Springer, 2002. [4] J. D. Farmer, N. H. Packard, and A. S. Perelson. The Immune System, Adaptation and Machine Learning. Physica D, 22:187204, 1986. [5] A. S. Perelson. Immune Network Theory. Immunological Review, 110: 536, 1989. [6] D. Chowdury. Immune Network: An Example of Complex Adaptive Sys- tems, 1999. In Artificial Immune Systems and Their Applications, D. Dasgupta (Ed.) pp. 89-104, Springer [7] F. M. Burnet. The Clonal Selection Theory of Acquired Immunity. Cam- bridge University Press, 1959. [8] L. N. de Castro and F. J. Von Zuben. The Clonal Selection Algorithm with Engineering Applications. In Workshop on Artificial Immune Systems and Their Applications GECCO, Las Vegas, USA, pages 3637, 2000. [9] . P. Matzinger. Tolerance, Danger and the Extended Family. Annual Re- views in Immunology, 12:9911045, 1994. [10] J. Greensmith, U. Aickelin, and S. Cayzer. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In ICARIS-05, LNCS 3627, pages 153167, 2005. [11] . E. Hart and J. Timmis. Application Areas of AIS: The Past, the Present and the Future. In ICARIS-05, LNCS 3627, pages 483497, 2005.
Page 296
Web Site: www.ijaiem.org Email: [email protected], [email protected] Volume 2, Issue 4, April 2013 ISSN 2319 - 4847
[12] . S. Forrest, A.S. Perelson, L. Allen, and R. Cherukuri, Self-Nonself Discrimination in a Computer, In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA: IEEE Computer Society Press, 1994. [13] William Wilson and Phil Birkin and Uwe Aickelin" Motif Detection Inspired by Immune Memory" School of Computer Science, University of Nottingham, UK,2010. [14] J. Lin, E. Keogh, S. Lonardi, and P. Patel. Finding motifs in time series. In the2nd workshop on temporal data mining, at the 8th ACM SIGKDD internationalconference on knowledge discovery and data mining, July, 2002. AUTHOR Bhawani Sankar Biswal has received his B.E degree in Computer Sc.&Engineering from Biju patnaik university of technology,Odisha, in 2006.He is was serving as a lecturer at Nigam Institute of Engineering & Technology(NIET) for a period of two yearsHe is currently pursuing his Master of Engineering in Computer Sc.&Engineering International Institute of Information Technology(IIIT),Bhubaneswar,Odisha. His areas of interest in research are Bioinformatics, Algorithms,Wireless Communication & Wireless Networks. Dr.Anjali Mohapatra has received her Ph,D & M.Tech degree in Computer Sc.&Engineering from Utkal University,Bhubaneswar,Odisha,.She is currently working as an Asst,Professer in the deptt. of CSE in International Institute of Information Technology(IIIT),Bhubaneswar,Odisha. Her areas of interest in research are Bioinformatics, Algorithms, Data Minning etc.
Page 297