Description

Clearly, nature has been very effective in creating organisms that are capable of protecting themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The powerful information-processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors that researchers are finding very useful for the development of computational models. While some of these models are designed to give us a better understanding of the immune system, other models are being developed to solve complex real-world problems such as anomaly detection, pattern recognition, data analysis (clustering), function optimization, and computer security.

Immunological Computation: Theory and Applications is devoted to discussing different immunological mechanisms and their relation to information processing and problem solving. This unique volume presents a compendium of up-to-date work related to immunity-based techniques. After presenting the general abstractions of immune elements and processes used in computational models, it then—



  • Reviews standard procedures, representations, and matching rules that are used in all immunological computation models




  • Covers the details of one of the earliest and most well-known immune algorithms, based on the negative selection (NS) process that occurs in the thymus




  • Examines promising immune models, including those based on danger theory, cytokine network models, and MHC-based models


The text goes further to describe a wide variety of applications, which include computer security, the detection and analysis of anomalies and faults, robotics, and data mining among others. To enhance understanding of this emerging field of study, each chapter includes a summary, review questions, and exercis

Immunological Computation: Theory and Applications

Product form

£140.00

Includes FREE delivery
Usually despatched within 4 days
Hardback by Dipankar Dasgupta , Fernando Nino

1 in stock

Short Description:

Clearly, nature has been very effective in creating organisms that are capable of protecting themselves against a wide variety of... Read more

    Publisher: Taylor & Francis Ltd
    Publication Date: 12/09/2008
    ISBN13: 9781420065459, 978-1420065459
    ISBN10: 1420065459

    Number of Pages: 296

    Non Fiction , Computing

    Description

    Clearly, nature has been very effective in creating organisms that are capable of protecting themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The powerful information-processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors that researchers are finding very useful for the development of computational models. While some of these models are designed to give us a better understanding of the immune system, other models are being developed to solve complex real-world problems such as anomaly detection, pattern recognition, data analysis (clustering), function optimization, and computer security.

    Immunological Computation: Theory and Applications is devoted to discussing different immunological mechanisms and their relation to information processing and problem solving. This unique volume presents a compendium of up-to-date work related to immunity-based techniques. After presenting the general abstractions of immune elements and processes used in computational models, it then—



    • Reviews standard procedures, representations, and matching rules that are used in all immunological computation models




    • Covers the details of one of the earliest and most well-known immune algorithms, based on the negative selection (NS) process that occurs in the thymus




    • Examines promising immune models, including those based on danger theory, cytokine network models, and MHC-based models


    The text goes further to describe a wide variety of applications, which include computer security, the detection and analysis of anomalies and faults, robotics, and data mining among others. To enhance understanding of this emerging field of study, each chapter includes a summary, review questions, and exercis

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2025 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account