Some history x Developed from the field of theoretical immunology in the mid 1980s Suggested we might look at the Is *- Bersini first use of immune algos to solve problems x Forrest et al -Computer Security mid 1990s x Hunt et al, mid 1990s- machine learning
Some History Developed from the field of theoretical immunology in the mid 1980’s. Suggested we ‘might look’ at the IS 1990 – Bersini first use of immune algos to solve problems Forrest et al – Computer Security mid 1990’s Hunt et al, mid 1990’s – Machine learning
Scope faIS ---1-1--1--4--4--4---- a Fault and anomaly detection x Data Mining(machine learning, Pattern recognition ※ Agent based systems 煤 Scheduling 兴 Autonomous control 紫 Optimisation xK Robotics xk Security of information systems
Scope of AIS Fault and anomaly detection Data Mining (machine learning, Pattern recognition) Agent based systems Scheduling Autonomous control Optimisation Robotics Security of information systems
Part I- Basic Immunology
Part I – Basic Immunology
Role of the Immune system x Protect our bodies from infection x Primary immune response e Launch a response to invading pathogens xk Secondary immune response Remember past encounters Faster response the second time around
Role of the Immune System Protect our bodies from infection Primary immune response Launch a response to invading pathogens Secondary immune response Remember past encounters Faster response the second time around
How does it work? --→--4--4--1--1-1--1-1--1---4 MHC protein Antigen APC Peptide ) T-cell B-cell CV) (v) Activated T-cell °。° ynphokines o Activated B-cell (plasma ce) c多 区
How does it work?