Theoretical Formulation and Analysis of the Deterministic Dendritic Cell Algorithm

As one of the emerging algorithms in the field of artificial immune systems (AIS), the dendritic cell algorithm (DCA) has been successfully applied to a number of challenging real-world problems. However, one criticism is the lack of a formal definition, which could result in ambiguity for understanding the algorithm. Moreover, previous investigations have mainly focused on its empirical aspects. Therefore, it is necessary to provide a formal definition of the algorithm, as well as to perform runtime analyses to reveal its theoretical aspects. In this paper, we define the deterministic version of the DCA, named the dDCA, using set theory and mathematical functions. Runtime analyses of the standard algorithm and the one with additional segmentation are performed. Our analysis suggests that the standard dDCA has a runtime complexity of O(n(2)) for the worst-case scenario, where n is the number of input data instances. The introduction of segmentation changes the algorithm's worst case runtime complexity to O(max(nN,nz)), for DC population size N with size of each segment z. Finally, two runtime variables of the algorithm are formulated based on the input data, to understand its runtime behaviour as guidelines for further development.

[1]  Julie Greensmith,et al.  Exploration of the Dendritic Cell Algorithm Using the Duration Calculus , 2009, ICARIS.

[2]  Graham Kendall,et al.  Geometrical insights into the dendritic cell algorithm , 2009, GECCO '09.

[3]  Julie Greensmith,et al.  Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows , 2008, ICARIS.

[4]  Christine Zarges,et al.  On the utility of the population size for inversely fitness proportional mutation rates , 2009, FOGA '09.

[5]  Julie Greensmith,et al.  Dendritic cells for SYN scan detection , 2007, GECCO '07.

[6]  Julie Greensmith,et al.  The dendritic cell algorithm , 2007 .

[7]  Thomas Jansen,et al.  Analyzing different variants of immune inspired somatic contiguous hypermutations , 2011, Theor. Comput. Sci..

[8]  David G. Stork,et al.  Pattern classification, 2nd Edition , 2000 .

[9]  Gu Ji-yan,et al.  The Dendritic Cell Algorithm , 2011 .

[10]  David G. Stork,et al.  Pattern Classification , 1973 .

[11]  Julie Greensmith,et al.  The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.

[12]  Julie Greensmith,et al.  The Application of a Dendritic Cell Algorithm to a Robotic Classifier , 2007, ICARIS.

[13]  Michael Elberfeld,et al.  Negative selection algorithms on strings with efficient training and linear-time classification , 2011, Theor. Comput. Sci..

[14]  Jonathan Timmis,et al.  Application areas of AIS: The past, the present and the future , 2008, Appl. Soft Comput..

[15]  Robert F. Oates The suitability of the dendritic cell algorithm for robotic security applications , 2010 .

[16]  Julie Greensmith,et al.  Integrating real-time analysis with the dendritic cell algorithm through segmentation , 2009, GECCO.

[17]  Christine Zarges,et al.  Rigorous Runtime Analysis of Inversely Fitness Proportional Mutation Rates , 2008, PPSN.

[18]  Julie Greensmith,et al.  DCA for bot detection , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).

[19]  Graham Kendall,et al.  Frequency analysis for dendritic cell population tuning , 2008, Evol. Intell..

[20]  Jonathan Timmis,et al.  Artificial immune systems - a new computational intelligence paradigm , 2002 .

[21]  Christopher J. C. Burges,et al.  A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.

[22]  T. Banerjee Exploring Multivariate Data With the Forward Search , 2006 .

[23]  Ben C. Moszkowski,et al.  A Temporal Logic for Multilevel Reasoning about Hardware , 1985, Computer.

[24]  Gerold Schuler,et al.  Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity? , 2002, Trends in immunology.

[25]  Graham Kendall,et al.  Classifying in the Presence of Uncertainty: A DCA Perspective , 2010, ICARIS.

[26]  Julie Greensmith,et al.  The DCA: SOMe comparison , 2008, Evol. Intell..

[27]  Frank Waters,et al.  The B Book , 1971 .

[28]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[29]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[30]  Michel Mauny,et al.  The functional approach to programming , 1998 .

[31]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[32]  Jonathan Timmis,et al.  Theoretical advances in artificial immune systems , 2008, Theor. Comput. Sci..

[33]  Jonathan Timmis,et al.  Application Areas of AIS: The Past, The Present and The Future , 2005, ICARIS.

[34]  Jonathan Timmis,et al.  A modified Dendritic Cell Algorithm for on-line error detection in robotic systems , 2009, 2009 IEEE Congress on Evolutionary Computation.

[35]  Julie Greensmith,et al.  PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm , 2010, ArXiv.