Abstract
Artificial Immune Systems (AIS) are a type of intelligent algorithm inspired by the principles and processes of the human immune system. Despite the successful implementation of different AIS, the validity of the paradigm “self non self” have lifted many questions. The Danger theory was an alternative to this paradigm. If we involve its principles, the AIS are being applied as a classifier. However, image classification offers new prospects and challenges to data mining and knowledge extraction. It is an important tool and a descriptive task seeking to identify homogeneous groups of objects based on the values of their attributes. In this paper, we describe our initial framework in which the danger theory was apprehended by the Dendritic cells algorithm is applied to vegetal image classification. The approach classifies pixel in vegetal or soil class. Experimental results are very encouraging and show the feasibility and effectiveness of the proposed approach.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Dasgupta, D. (ed.): Artificial Immune Systems and their applications. Springer, Heidelberg (1999)
De Castro, L., Timmis, J. (eds.): Artificial Immune Systems: A New Computational Approach. Springer, London (September 2002)
Hart, E., Timmis, J.: Application Areas of AIS: The Past, The Present and The Future. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 483–497. Springer, Heidelberg (2005)
Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Aickelin, U., Cayzer, S.: The danger theory and its application to artificial immune systems. In: The 1st International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, pp. 141–148 (2002),
Greensmith, J.: The Dendritic Cell Algorith. PhD thesis, School of Computer Science. University of Nottingham (2007)
Mitra Tinkuacharya, S. (ed.): Data Mining, Multimedia, Soft. Computing and Bioinformatics. John Wiley & Sons, Hoboken (2003)
Lu, D., Weng, Q.: A survey of image classification methods and techniques for improving classification performance. International Journal of Remote Sensing 28(5) (March 10,2007)
Berkhin, P.: Survey of clustering data mining techniques. Technical Report, Accrue Software, San Jose, California (2002)
Foucher, P., Revollon, P., Vigouroux, B.: Segmentation d’images en couleurs par réseau de neurones: Application au domaine végétal, Actes du Congrées francophone de Vision par Ordinateur (ORASIS), Cahors, France, pp. 309– 317 (2001)
Clement, A., Vigouroux, B.: Unsupervised segmentation of scenes containing vegetation (Forsythia) and soil by hierarchical analysis of bi-dimensional histograms. Pattern Recognition Letters 24, 1951–1957 (2003)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005)
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., Kendall, G.: The Application of a Dendritic Cell Algorithm to a Robotic Classifier. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol. 4163, pp. 204–215. Springer, Heidelberg (2006)
Greensmith, J., Twycross, J., Aickelin, U.: Dendritic Cells for Anomaly Detection. In: IEEE World Congress on Computational Intelligence, Vancouver, Canada, pp. 664–671 (2006)
Greensmith, J., Aickelin, U., Twycross, J.: Articulation and clarification of the dendritic cell algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol. 4163, pp. 404–417. Springer, Heidelberg (2006)
Aickelin, U., Greensmith, J., Twycross, J.: Immune System Approaches to Intrusion Detection – A Review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316–329. Springer, Heidelberg (2004)
Greensmith, J., Twycross, J., Aickelin, U.: Dendritic cells for anomaly detection. In: IEEE Congress on Evolutionary Computation (2006)
Greensmith, J., Aickelin, U., Feyereisl, J.: The DCA-SOMe comparison: A comparative study between two biologically-inspired algorithms. Evolutionary Intelligence: Special Issue on Artificial Immune Systems (2008) (accepted for publication)
Hoffman, K. et al.: Danger theory and collaborative filtering in MANETs. Springer, Heidelberg (2008)
Greensmith, J., Aickelin, U., Tedesco, G.: Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Journal Information Fusion 11(1) (January 2010)
Greensmith, J., Aickelin, U.: The deterministic dendritic cell algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol. 5132, pp. 291–302. Springer, Heidelberg (2008)
Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural Features for Image Classification. IEEE Transactions on Systems, Man, and Cybernetics 3, 610–621 (1973)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bendiab, E., Kholladi, M.K. (2011). The Danger Theory Applied To Vegetal Image Pattern Classification. In: Liò, P., Nicosia, G., Stibor, T. (eds) Artificial Immune Systems. ICARIS 2011. Lecture Notes in Computer Science, vol 6825. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22371-6_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-22371-6_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22370-9
Online ISBN: 978-3-642-22371-6
eBook Packages: Computer ScienceComputer Science (R0)