Welcome to Journal of Beijing Institute of Technology
Volume 23Issue 3
.
Turn off MathJax
Article Contents
FANG Xian-jin, WANG Li. Theoretical investigation on the dendritic cells algorithm[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(3): 401-406.
Citation: FANG Xian-jin, WANG Li. Theoretical investigation on the dendritic cells algorithm[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2014, 23(3): 401-406.

Theoretical investigation on the dendritic cells algorithm

  • Received Date:2013-03-18
  • The aims of this paper are to helpunderstand the dendritic cells algorithm (DCA) and reduce the potential incorrect applications and implementations, to clearly present the formal description of the dendritic cells algorithm, and to theoretically deduce the algorithm's runtime complexity and detection performance. The entire dendritic cells population of the algorithm is specified using quantitative measures at the functional level.Basic set theory and computational functions, such as addition, multiplication and recursion, are used for clarity and definition, and theoretical analysis is implemented via introduction of three runtime variables in terms of three phases of the algorithm. Consequently, the data structures, procedural operations and pseudocode description of the dendritic cells algorithm are given. The standard DCA achieves a lower bound of Ω( n) runtime complexity and an upper bound of O( n 2) runtime complexity under the worst case. In addition, the algorithm's runtime complexity can be improved to O(max( nN, nδ)) by utilizing segmentation approach, where nis the number of input instances, Nis the population size and δis the size of each segment.
  • loading
  • [1]
    Greensmith J. The dendritic cell algorithm. Nottingham: School of Computer Science. University of Nottingham, 2007.
    [2]
    Lutz M B, Schuler G. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?[J] Trends Immunol, 2002. 23(9): 445-449.
    [3]
    Al-Hammadi Y, Aickelin U, Greensmith J. DCA for bot detection [C]//Proceedings of the IEEE World Congress on Computational Intelligence (WCCI 2008). Berlin Heidelberg: Springer-Verlag, 2008: 1807-1816.
    [4]
    Greensmith J, Aickelin U. Dendritic cells for SYN scan detection [C]//Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2007). London, UK: ACM Press, 2007: 49-56.
    [5]
    Fu Jun, Liang Yiwen, Tan Chengyu, et al. Detecting software keyloggers with dendritic cell algorithm [C]//Proc of 2010 International Conference on Communications and Mobile Computing. NewYork: IEEE Computer Society Press, 2010: 111-115.
    [6]
    Al-Hammadi Y A A. Behavioural correlation for malicious bot detection[D]. Nottingham: The University of Nottingham, 2010.
    [7]
    Stibor T, Oates R, Kendall G, et al. Geometrical insights into the dendritic cell algorithm [C]//Proc of the Genetic and Evolutionary Computation Conference (GECCO), 2009: 1275-1282.
    [8]
    Oates R. The suitability of the dendritic cell algorithm for robotic security applications[D]. Nottingham: School of Computer Science, University of Nottingham, 2010.
    [9]
    Gu Feng, Greensmith J, Aickelin U. Exploration of the dendritic cell algorithm with the duration calculus [C]//Proceedings of the 8th International Conference on Artificial Immune Systems (ICARIS 2009). Springer, Berlin, 2009: 54-66.
    [10]
    Timmis J, Home A, Stibor T, et al. Theoretical advance in artificial immune systems[J]. Theoretical Computer Science, 2008, 403: 11-32.
    [11]
    Elberfeld M, Textor J. Negative selection algorithms on strings with efficient training and linear-time classification[J]. Theoretical Computer Sicence, 2011, 412(6): 534-542.
    [12]
    Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to algorithms[M]. Third Edition (Hardcover) ed. The MIT Electrical Engineering and Computer Sicence Series. The MIT Press, 2009.
    [13]
    Gu Feng, Greensmith J, Oates R, et al. PCA 4 DCA: the application of principal component analysis to the dendritic cell algorithm [C]//Proceedings of the 9th Annual Workshop on Computational Intelligence (UKCI), 2009.
    [14]
    Mokhtar M, Bi R, Timmis J, et al. A modified dendritic cell algorithm for on-line error detection in robotic systems [C]//Proceedings of the 11th IEEE Congress on Evolutionary Computation(CEC), 2009: 2055-2062.
    [15]
    Gu Feng, Greensmith J, Aickelin U. The dendritic cell algorithm for intrusion detection[J]. Bio-Inspired Communications and Networking, IGI Global, 2011: 84-102.
    [16]
    Gu Feng, Greensmith J, Aickelin U. Integrating real-time analysis with the dendritic cell algorithm through segmentation [C]//Proceedings of the Genetic and Evolutionary Computation Conference(GECCO), 2009: 1203-1210.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (964) PDF downloads(462) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map