scispace - formally typeset
Open Access

Application areas of AIS: the past, present and future.

Emma Hart, +1 more
Reads0
Chats0
TLDR
In this paper, the authors take a step back and reflect on the contributions that the Artificial Immune Systems (AIS) has brought to the application areas to which it has been applied, and suggest a set of problem features that they believe will allow the true potential of the immunological system to be exploited in computational systems.
Abstract
After a decade of research into the area of artificial immune systems, it is worthwhile to take a step back and reflect on the contributions that the paradigm has brought to the application areas to which it has been applied. Undeniably, there have been a lot of successful stories—however, if the field is to advance in the future and really carve out its own distinctive niche, then it is necessary to be able to illustrate that there are clear benefits to be obtained by applying this paradigm rather than others. This paper attempts to take stock of the application areas that have been tackled in the past, and ask the difficult question ‘‘was it worth it ?’’. We then attempt to suggest a set of problem features that we believe will allow the true potential of the immunological system to be exploited in computational systems, and define a unique niche for AIS

read more

Citations
More filters
Dissertation

Artificial immune system for static and dynamic production scheduling problems

TL;DR: The findings showed that the hybrid method was proven to give better performance compared to single method in producing optimized solution and reduced solution generating time.
Proceedings ArticleDOI

Association based immune network for multimodal function optimization

TL;DR: The experiments on 10 benchmark functions show that the new algorithm is capable of improving the search performance significantly in global convergence, convergence speed, computational cost, search ability, solution quality and algorithm stability.
Proceedings ArticleDOI

An improved V-detector algorithm of identifying boundary self

TL;DR: The experiment results showed that the new algorithm covers the holes existed in boundary between self region and non-self region more effectively than traditional negative selection algorithm does.
Proceedings ArticleDOI

A Clustering Model Inspired by Humoral Immunity

TL;DR: Inspired by the relationship of B-cells and antibodies, an effective immune model is presented and the validity of the model is proved through an experiment of motor fault data clustering.
References
More filters
Journal ArticleDOI

No free lunch theorems for optimization

TL;DR: A framework is developed to explore the connection between effective optimization algorithms and the problems they are solving and a number of "no free lunch" (NFL) theorems are presented which establish that for any algorithm, any elevated performance over one class of problems is offset by performance over another class.

Williamson, estimating the support of a high-dimensional distribution

TL;DR: The algorithm is a natural extension of the support vector algorithm to the case of unlabeled data by carrying out sequential optimization over pairs of input patterns and providing a theoretical analysis of the statistical performance of the algorithm.
Journal ArticleDOI

Evolutionary programming made faster

TL;DR: A "fast EP" (FEP) is proposed which uses a Cauchy instead of Gaussian mutation as the primary search operator and is proposed and tested empirically, showing that IFEP performs better than or as well as the better of FEP and CEP for most benchmark problems tested.
Journal ArticleDOI

OR-Library: Distributing Test Problems by Electronic Mail

TL;DR: A system (OR-Library) that distributes test problems by electronic mail (e-mail) that has available test problems drawn from a number of different areas of operational research.
Proceedings ArticleDOI

Self-nonself discrimination in a computer

TL;DR: A method for change detection which is based on the generation of T cells in the immune system is described, which reveals computational costs of the system and preliminary experiments illustrate how the method might be applied to the problem of computer viruses.