Advertisement

Dendritic Cell Algorithm with Fuzzy Inference System for Input Signal Generation

  • Noe Elisa
  • Jie Li
  • Zheming Zuo
  • Longzhi Yang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 840)

Abstract

Dendritic cell algorithm (DCA) is a binary classification system developed by abstracting the biological danger theory and the functioning of human dendritic cells. The DCA takes three signals as inputs, including danger, safe and pathogenic associated molecular pattern (PAMP), which are generated in its pre-processing and initialization phase. In particular, after a feature selection process for a given training data set, each selected attribute is assigned to one of the three input signals. Then, these input signals are calculated as the aggregation of their associated features, usually implemented by a simple average function followed by a normalisation process. If a nonlinear relationship exists between a signal and its corresponding selected attributes, the resulting signal using the average function may negatively affect the classification results of the DCA. This work proposes an approach named TSK-DCA to address such limitation by aggregating the assigned features of a signal linearly or non-linearly depending on their inherit relationship using the TSK+ fuzzy inference system. The proposed approach was evaluated and validated using the popular KDD99 data set, and the experimental results indicate the superiority of the proposed approach compared to its conventional counterpart.

Keywords

Dendritic cell algorithm TSK+ fuzzy inference system Information aggregation Danger theory 

References

  1. 1.
    Aickelin, U., Cayzer, S.: The danger theory and its application to artificial immune systems. arXiv preprint arXiv:0801.3549 (2008)
  2. 2.
    Burnet, F.M.: Immunological recognition of self. Science 133(3449), 307–311 (1961)CrossRefGoogle Scholar
  3. 3.
    Matzinger, P.: The danger model: a renewed sense of self. Science 296(5566), 301–305 (2002)CrossRefGoogle Scholar
  4. 4.
    Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: ICARIS, vol. 3627, pp. 153–167. Springer (2005)Google Scholar
  5. 5.
    Li, J., Yang, L., Fu, X., Chao, F., Qu, Y.: Dynamic QoS solution for enterprise networks using TSK fuzzy interpolation. In: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–6, July 2017Google Scholar
  6. 6.
    Yang, L., Li, J., Fehringer, G., Barraclough, P., Sexton, G., Cao, Y.: Intrusion detection system by fuzzy interpolation. In: 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–6, July 2017Google Scholar
  7. 7.
    Kóczy, L.T., Hirota, K.: Interpolative reasoning with insufficient evidence in sparse fuzzy rule bases. Inf. Sci. 71(1), 169–201 (1993)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Kóczy, L.T., Hirota, K.: Approximate reasoning by linear rule interpolation and general approximation. Int. J. Approximate Reasoning 9(3), 197–225 (1993)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Huang, Z., Shen, Q.: Fuzzy interpolation and extrapolation: a practical approach. IEEE Trans. Fuzzy Syst. 16(1), 13–28 (2008)CrossRefGoogle Scholar
  10. 10.
    Yang, L., Shen, Q.: Adaptive fuzzy interpolation with prioritized component candidates. In: 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), pp. 428–435, June 2011Google Scholar
  11. 11.
    Yang, L., Shen, Q.: Closed form fuzzy interpolation. Fuzzy Sets Syst. 225, 1–22 (2013). Theme: Fuzzy SystemsMathSciNetCrossRefGoogle Scholar
  12. 12.
    Yang, L., Shen, Q.: Adaptive fuzzy interpolation with uncertain observations and rule base. In: 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), pp. 471–478 (2011)Google Scholar
  13. 13.
    Naik, N., Diao, R., Shen, Q.: Genetic algorithm-aided dynamic fuzzy rule interpolation. In: 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 2198–2205 (2014)Google Scholar
  14. 14.
    Yang, L., Chen, C., Jin, N., Fu, X., Shen, Q.: Closed form fuzzy interpolation with interval type-2 fuzzy sets. In: 2014 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 2184–2191 (2014)Google Scholar
  15. 15.
    Li, J., Yang, L., Shum, H.P.H., Sexton, G., Tan, Y.: Intelligent home heating controller using fuzzy rule interpolation. In: UK Workshop on Computational Intelligence (2015)Google Scholar
  16. 16.
    Yang, L., Chao, F., Shen, Q.: Generalised adaptive fuzzy rule interpolation. IEEE Trans. Fuzzy Syst. (2016).  https://doi.org/10.1109/TFUZZ.2016.2582526
  17. 17.
    Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. SMC-15(1), 116–132 (1985)Google Scholar
  18. 18.
    Li, J., Qu, Y., Shum, H.P.H., Yang, L.: TSK inference with sparse rule bases, pp. 107–123. Springer, Cham (2017)Google Scholar
  19. 19.
    Chelly, Z., Elouedi, Z.: A survey of the dendritic cell algorithm. Knowl. Inf. Syst. 48(3), 505–535 (2016)CrossRefGoogle Scholar
  20. 20.
    Kayacik, H.G., Zincir-Heywood, A.N, Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust (2005)Google Scholar
  21. 21.
    Li, J., Yang, L., Yanpeng, Q., Sexton, G.: An extended Takagi-Sugeno-Kang inference system (TSK+) with fuzzy interpolation and its rule base generation. Soft. Comput. 22(10), 3155–3170 (2018)CrossRefGoogle Scholar
  22. 22.
    Kumar, A., Agrawal, D.P., Joshi, S.D.: A GA-based method for constructing TSK fuzzy rules from numerical data. In: 2003 the 12th IEEE International Conference on Fuzzy Systems, FUZZ 2003, vol. 1, pp. 131–136, May 2003Google Scholar
  23. 23.
    Tan, Y., Li, J., Wonders, M., Chao, F., Shum, H.P.H., Yang, L.: Towards sparse rule base generation for fuzzy rule interpolation. In: 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 110–117, July 2016Google Scholar
  24. 24.
    KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html/. Accessed 16 Apr 2018
  25. 25.
    Gu, F., Greensmith, J., Aickelin, U.: Further exploration of the dendritic cell algorithm: antigen multiplier and time windows. In: International Conference on Artificial Immune Systems, pp. 142–153. Springer (2008)Google Scholar
  26. 26.
    Zuo, Z., Li, J., Anderson, P., Yang, L., Naik, N.: Grooming detection using fuzzy-rough feature selection and text classification. In: 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). IEEE (2018)Google Scholar
  27. 27.
    Chelly, Z., Elouedi, Z.: Hybridization schemes of the fuzzy dendritic cell immune binary classifier based on different fuzzy clustering techniques. New Gener. Comput. 33(1), 1–31 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Northumbria UniversityNewcastle upon TyneUK

Personalised recommendations