Skip to main content

What Have Gene Libraries Done for AIS?

  • Conference paper
Artificial Immune Systems (ICARIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3627))

Included in the following conference series:

Abstract

Artificial Immune Systems (AIS) have been shown to be useful, practical and realisable approaches to real-world problems. Most AIS implementations are based around a canonical algorithm such as clonotypic learning, which we may think of as individual, lifetime learning. Yet a species also learns. Gene libraries are often thought of as a biological mechanism for generating combinatorial diversity of antibodies. However, they also bias the antibody creation process, so that they can be viewed as a way of guiding the lifetime learning mechanisms. Over time, the gene libraries in a species will evolve to an appropriate bias for the expected environment (based on species memory). Thus gene libraries are a form of meta-learning which could be useful for AIS. Yet they are hardly ever used. In this paper we consider some of the possible benefits and implications of incorporating the evolution of gene libraries into AIS practice. We examine some of the issues that must be considered if the implementation is to be successful and beneficial.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
eBook
USD 39.99
Price excludes VAT (USA)
Softcover Book
USD 54.99
Price excludes VAT (USA)

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anchor, K.P., Zydallis, J.B., Gunsch, G.H., Lamont, G.B.: Extending the Computer Defense Immune System: Network Intrusion Detection with a Multiobjective Evolutionary Programming Approach. In: Timmis, J., Bentley, P.J. (eds.) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) Canterbury, UK, pp. 12–21 (2002)

    Google Scholar 

  2. Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: Timmis, J., Bentley, P.J. (eds.) 1st International Conference on Artificial Immune Systems, September 2002, pp. 89–98. University of Kent at Canterbury (2002)

    Google Scholar 

  3. Blake, C.L., Merz, C.J.: UCI Repository of machine learning databases. University of California, Department of Information and Computer Science, Irvine (1998), http://www.ics.uci.edu/~mlearn/MLRepository.html (accessed April 25, 2005)

    Google Scholar 

  4. Burnet, F.M.: The clonal selection theory of immunity. Vanderbilt University Press, Nashville (1959)

    Google Scholar 

  5. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Approach. Springer, London (2002)

    MATH  Google Scholar 

  6. D’haeseleer, P., Forrest, S., Helman, P.: An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. In: Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy (1996)

    Google Scholar 

  7. Forrest, S., Javornik, B., Smith, R.E., Perelson, A.S.: Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation 1(3), 191–211 (1993)

    Article  Google Scholar 

  8. Forrest, S., Perelson, A.S., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 202–212. IEEE Computer Society Press, Los Alamitos (1994)

    Google Scholar 

  9. Freitas, A., Timmis, J.: Revisiting the Foundations of Artificial Immune Systems: A Problem Oriented Perspective. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 229–241. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Gathercole, C., Ross, P.: Dynamic Training Subset Selection for Supervised Learning in Genetic Programming. In: Davidor, Y., Männer, R., Schwefel, H.-P. (eds.) PPSN 1994. LNCS, vol. 866, pp. 312–321. Springer, Heidelberg (1994)

    Google Scholar 

  11. Goldsby, R.A., Kindt, T.J., Osborne, B.A., Kuby, J.: Immunology, 5th edn. W.H. Freeman, New York (2003)

    Google Scholar 

  12. González, F., Dasgupta, D.: Combining Negative Selection and Classification Techniques for Anomaly Detection. In: Proceedings of the Congress on Evolutionary Computation, Honolulu, Hawaii, May 2002, pp. 705–710 (2002)

    Google Scholar 

  13. Hart, E., Ross, P.: An Immune System Approach to Scheduling in Changing Environments. In: Banzhaf, W., Daida, J., Eiben, A.E., Garzon, M.H., Honavar, V., Jakiela, M., Smith, R.E. (eds.) Proceedings of Genetic and Evolutionary Computation Conference (GECCO), July 13-17, pp. 1559–1566. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  14. Hart, E., Ross, P.: The Evolution and Analysis of a Potential Antibody Library for Job-Shop Scheduling. In: Corne, D., Dorigo, M., Glover, F. (eds.) New Ideas in Optimisation, pp. 185–202. McGraw-Hill, London (1999)

    Google Scholar 

  15. Hightower, R., Forrest, S., Perelson, A.S.: The evolution of emergent organization in immune system gene libraries. In: Eshelman, L.J. (ed.) Proceedings of the Sixth International Conference on Genetic Algorithms, Los Altos, CA, pp. 344–350. Morgan-Kauffman, San Francisco (1995)

    Google Scholar 

  16. Janeway, C.A., Travers, P., Walport, M., Shlomchik, M.: Immunobiology: The immune systems in health and disease, 5th edn. Garland Publishing, New York (2001)

    Google Scholar 

  17. Kim, J., Bentley, P.: The Human Immune System and Network Intrusion Detection. In: 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany, September 13-19 (1999)

    Google Scholar 

  18. Kim, J., Bentley, P.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany, September 13-19 (1999)

    Google Scholar 

  19. Kim, J., Bentley, P.J.: Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Detection. In: Genetic and Evolutionary Computation Conference 2001 (GECCO 2001), San Francisco, July 7-11, pp. 1330–1337 (2001)

    Google Scholar 

  20. Kim, J., Bentley, P.J.: A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm. In: Proceedings of the First International Conference on Artificial Immune Systems (ICARIS) Canterbury, September 9-11, pp. 175–182 (2002)

    Google Scholar 

  21. Oprea, M., Forrest, S.: Simulated evolution of antibody libraries under pathogen selection. In: Proceedings of the 1998 IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA (1998)

    Google Scholar 

  22. Perelson, A.S., Hightower, R., Forrest, S.: Evolution and somatic learning in V-region genes. Research in Immunology 147, 202–208 (1996)

    Article  Google Scholar 

  23. Singh, S.: Anomaly detection using negative selection based on the r-contiguous matching rule. In: Timmis, J., Bentley, P.J. (eds.) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) Canterbury, UK, pp. 99–106 (2002)

    Google Scholar 

  24. Spears, W.: (contact) Repository of Test Problem Generators, Available at http://evonet.lri.fr/evoweb/resources/software/record.php?id=393 (accessed April 22, 2005)

  25. Wierzchoń, S.T.: Generating Optimal Repertoire of Antibody Strings in an Artificial Immune System. In: Klopotek, M., Michalewicz, M., Wierzchon, S.T. (eds.) Intelligent Information Systems. Advances in Soft Computing Series, pp. 119–133. Physica-Verlag/Springer, Heidelberg (2000)

    Google Scholar 

  26. Wierzchoń, S.: Deriving a concise description of non-self patterns in an artificial immune system. In: New Learning Paradigms in Soft Computing, pp. 438–458. Physica-Verlag, Heidelberg (2002)

    Google Scholar 

  27. Coello Coello, C.A., Rivera, D.C., Cortés, N.C.: Use of an Artificial Immune System for Job Shop Scheduling. In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 1–10. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  28. Bakács, T., Szabados, T., Varga, L., Tusnády, G.: Axioms of mathematical immunology. Studia Scientiarum Mathematicarum Hungarica 38, 13–43 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  29. Esponda, F., Forrest, S., Helman, P.: A formal framework for positive and negative detection schemes. IEEE Transactions on Systems, Man and Cybernetics Part B 34, 357–373 (2004)

    Article  Google Scholar 

  30. Stibor, T., Bayarou, K., Eckert, C.: An investigation of R-chunk detector generation on higher alphabets. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 26–30. Springer, Heidelberg (2004)

    Google Scholar 

  31. Secker, A., Freitas, A., Timmis, J.: AISEC: An Artificial Immune System for E-mail Classification. In: Proc. Congress on Evolutionary Computation, pp. 131–139. IEEE, Los Alamitos (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cayzer, S., Smith, J., Marshall, J.A.R., Kovacs, T. (2005). What Have Gene Libraries Done for AIS?. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds) Artificial Immune Systems. ICARIS 2005. Lecture Notes in Computer Science, vol 3627. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11536444_7

Download citation

  • DOI: https://doi.org/10.1007/11536444_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28175-7

  • Online ISBN: 978-3-540-31875-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics