Project/Area Number |
10650431
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
Control engineering
|
Research Institution | Toyohashi University of Technology |
Principal Investigator |
ISHIDA Yoshiteru Toyohashi Univ. of Tech., Knowledge-based Information Eng., Professor, 工学部, 教授 (80159748)
|
Project Period (FY) |
1998 – 2001
|
Project Status |
Completed (Fiscal Year 2001)
|
Budget Amount *help |
¥3,000,000 (Direct Cost: ¥3,000,000)
Fiscal Year 2001: ¥600,000 (Direct Cost: ¥600,000)
Fiscal Year 2000: ¥600,000 (Direct Cost: ¥600,000)
Fiscal Year 1999: ¥900,000 (Direct Cost: ¥900,000)
Fiscal Year 1998: ¥900,000 (Direct Cost: ¥900,000)
|
Keywords | Immune System / Agent / Immunity-based System / Autonomous Decentralized System / Diversity / Computer Virus / Security / Complex Systems / 適応 / 学習 / 人工生命 / 遺伝アルゴリズム / ニューラルネット |
Research Abstract |
The immune system, viewed as a complex system, has autonomous and adaptive agents (corresponding to many types of the immune cell). The agent is the main primitive to implement "immunity-based systems" on a computer or on computer networks. The "immunity-based system" is an information-processing paradigm that collects processing principles, which are peculiar in the immune system. Among the principles, we focused on the followings: (1) Distributed and network-based processing by agents, (2) "Self-nonself discrimination" by the self (nonself) reference, (3) Adaptive strategy by diversity. The research results can be summarized by the following four items. 1. General Remarks (Part I of the report):A design paradigm to implement immunity-based system" as information-processing system is discussed. Models for simulating the immune system from the viewpoint of complex system are also discussed. 2. Applications 1 (Part II of the report): The design paradigm above is further clarified as a specification. Applications to sensor-based diagnosis, adaptive disturbance rejection, and credibility evaluation of information gathering agents are presented. 3. Applications 2 (Part III of the report): A prototype of an anti-virus system using a computer network against computer viruses is implemented. Simulations are conducted by viewing the spreading phenomena of computer viruses from the complex system view. Effective prevention against spreading is also considered. 4. Theoretical Considerations (Part IV of the report): Diversity; the strategy used by the immune system is discussed by focusing on the interaction between HIV and the immune system. A dynamical model for the interaction is analyzed by a diversity measure.
|