SlideShare une entreprise Scribd logo
1  sur  50
Introduction to Artificial Immune Systems (AIS) BIC 2005:  International Symposium on Bio-Inspired Computing Johor, MY, 5-7 September 2005 Dr. Leandro Nunes de Castro [email_address] Catholic University of Santos - UniSantos/Brazil
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline
Part I Brief Introduction to the Immune System
Brief Introduction to the Immune System: Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Immune System (I) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],The Immune System (II)
[object Object],The Immune System (III)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (IV)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (V)
[object Object],The Immune System (VI)
[object Object],The Immune System (VII)
The Immune System (VIII) after Nosssal, 1993 ,[object Object]
[object Object],The Immune System (IX) after Oprea & Forrest, 1998
[object Object],The Immune System (X)
[object Object],The Immune System (XI)
[object Object],[object Object],[object Object],The Immune System (XII)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (XIII)
[object Object],The Immune System (XIV)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (XV)
[object Object],The Immune System (XVI) after Jerne, 1974
The Immune System (XVII) ,[object Object],after Matzinger, 1994
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System — Summary —
Part II Artificial Immune Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems: Outline
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (I)
[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (II)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (III)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (IV)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (V)
The Early Events
Part III A Framework to Engineer AIS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Framework for AIS (I)
[object Object],[object Object],A Framework for AIS (II) after Perelson, 1989
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Framework for AIS (III)
A Framework for AIS (IV) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],A Framework for AIS (V) Hamming  r -contiguous bit  Affinity measure  distance    rule   of Hunt Flipping one string
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Framework for AIS (VI)
[object Object],A Framework for AIS (VII) after Perelson et al., 1996
[object Object],[object Object],A Framework for AIS (VIII) Censoring Monitoring phase   phase after Forrest et al., 1994
[object Object],A Framework for AIS (IX) after  de Castro & Von Zuben, 2001a
[object Object],[object Object],[object Object],A Framework for AIS (X)
[object Object],A Framework for AIS (XI) after de Castro & Von Zuben, 2001a after Kepler & Perelson, 1993
[object Object],A Framework for AIS (XII)
[object Object],A Framework for AIS (XIII)
Part IV Discussion and Main Trends
Discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Main Trends
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],References (I)
References (II) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[email_address] Thank You! Questions?  Comments?

Contenu connexe

Tendances

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentInfocyte
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networksantoniomorancardenas
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit iArthyR3
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptkarthikaparthasarath
 
Hebbian Learning
Hebbian LearningHebbian Learning
Hebbian LearningESCOM
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 

Tendances (20)

Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
SHA-3
SHA-3SHA-3
SHA-3
 
Adaline and Madaline.ppt
Adaline and Madaline.pptAdaline and Madaline.ppt
Adaline and Madaline.ppt
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion Detection with Neural Networks
Intrusion Detection with Neural NetworksIntrusion Detection with Neural Networks
Intrusion Detection with Neural Networks
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Cs8792 cns - unit i
Cs8792   cns - unit iCs8792   cns - unit i
Cs8792 cns - unit i
 
Heuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.pptHeuristic Search Techniques Unit -II.ppt
Heuristic Search Techniques Unit -II.ppt
 
Hebbian Learning
Hebbian LearningHebbian Learning
Hebbian Learning
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 

En vedette

Negative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionNegative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionXavier Llorà
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?Leandro de Castro
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and ApplicationsLeandro de Castro
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attackUltraUploader
 
Using uml to model immune system
Using uml to model immune systemUsing uml to model immune system
Using uml to model immune systemAyi Purbasari
 
2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune SystemsLeandro de Castro
 
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os ClientesLeandro de Castro
 
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample ApplicationsLeandro de Castro
 
2002: Comparing Immune and Neural Networks
2002: Comparing Immune and Neural Networks2002: Comparing Immune and Neural Networks
2002: Comparing Immune and Neural NetworksLeandro de Castro
 
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...Leandro de Castro
 
2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)Leandro de Castro
 
2011: Empreendedorismo Digital - Como Dados Viram Negócios
2011: Empreendedorismo Digital - Como Dados Viram Negócios2011: Empreendedorismo Digital - Como Dados Viram Negócios
2011: Empreendedorismo Digital - Como Dados Viram NegóciosLeandro de Castro
 
2010: Computação Natural e Aplicações
2010: Computação Natural e Aplicações2010: Computação Natural e Aplicações
2010: Computação Natural e AplicaçõesLeandro de Castro
 
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
2008: Natural Computing: The Virtual Laboratory and Two Real-World ApplicationsLeandro de Castro
 
2005: Natural Computing - Concepts and Applications
2005: Natural Computing - Concepts and Applications2005: Natural Computing - Concepts and Applications
2005: Natural Computing - Concepts and ApplicationsLeandro de Castro
 
2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big DataLeandro de Castro
 
2016: Notas sobre Liderança
2016: Notas sobre Liderança2016: Notas sobre Liderança
2016: Notas sobre LiderançaLeandro de Castro
 
2012: The Grand Challenges in Natural Computing Research
2012: The Grand Challenges in Natural Computing Research2012: The Grand Challenges in Natural Computing Research
2012: The Grand Challenges in Natural Computing ResearchLeandro de Castro
 
2016: Applying AI Innovation in Business
2016: Applying AI Innovation in Business2016: Applying AI Innovation in Business
2016: Applying AI Innovation in BusinessLeandro de Castro
 

En vedette (20)

Negative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionNegative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly Detection
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
 
Using uml to model immune system
Using uml to model immune systemUsing uml to model immune system
Using uml to model immune system
 
2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems
 
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
 
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
 
2002: Comparing Immune and Neural Networks
2002: Comparing Immune and Neural Networks2002: Comparing Immune and Neural Networks
2002: Comparing Immune and Neural Networks
 
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
 
2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)
 
2011: TUILUX_FC
2011: TUILUX_FC2011: TUILUX_FC
2011: TUILUX_FC
 
2011: Empreendedorismo Digital - Como Dados Viram Negócios
2011: Empreendedorismo Digital - Como Dados Viram Negócios2011: Empreendedorismo Digital - Como Dados Viram Negócios
2011: Empreendedorismo Digital - Como Dados Viram Negócios
 
2010: Computação Natural e Aplicações
2010: Computação Natural e Aplicações2010: Computação Natural e Aplicações
2010: Computação Natural e Aplicações
 
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
 
2005: Natural Computing - Concepts and Applications
2005: Natural Computing - Concepts and Applications2005: Natural Computing - Concepts and Applications
2005: Natural Computing - Concepts and Applications
 
2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data
 
2016: Notas sobre Liderança
2016: Notas sobre Liderança2016: Notas sobre Liderança
2016: Notas sobre Liderança
 
2012: The Grand Challenges in Natural Computing Research
2012: The Grand Challenges in Natural Computing Research2012: The Grand Challenges in Natural Computing Research
2012: The Grand Challenges in Natural Computing Research
 
2016: Applying AI Innovation in Business
2016: Applying AI Innovation in Business2016: Applying AI Innovation in Business
2016: Applying AI Innovation in Business
 

Similaire à 2005: An Introduction to Artificial Immune Systems

Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a reviewijfcstjournal
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.pptAyushDey1
 
An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system forcsandit
 
Applications of immune system computing
Applications of immune system computingApplications of immune system computing
Applications of immune system computingUltraUploader
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Waqas Tariq
 
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASMicrosoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASbutest
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationUltraUploader
 
Presentation cybernetics immunology-ver1.0 (for-criticism) - copy
Presentation cybernetics immunology-ver1.0 (for-criticism) - copyPresentation cybernetics immunology-ver1.0 (for-criticism) - copy
Presentation cybernetics immunology-ver1.0 (for-criticism) - copyEmadFaragHABIB
 
Presentation cybernetics immunology-ver1.02 (for-criticism)
Presentation cybernetics immunology-ver1.02 (for-criticism)Presentation cybernetics immunology-ver1.02 (for-criticism)
Presentation cybernetics immunology-ver1.02 (for-criticism)EmadfHABIB2
 
Computer immunology
Computer immunologyComputer immunology
Computer immunologyRohan Ahmed
 
Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesFacultad de Informática UCM
 
CDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part bCDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part bMarco Antoniotti
 
Introduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsIntroduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsUniversity of Puerto Rico
 
Bioinformatics Lecture 1
Bioinformatics  Lecture 1Bioinformatics  Lecture 1
Bioinformatics Lecture 1Hamid Ur-Rahman
 
Bioinformatics lecture 1
Bioinformatics lecture 1Bioinformatics lecture 1
Bioinformatics lecture 1Hamid Ur-Rahman
 
Common languages in genomic epidemiology: from ontologies to algorithms
Common languages in genomic epidemiology: from ontologies to algorithmsCommon languages in genomic epidemiology: from ontologies to algorithms
Common languages in genomic epidemiology: from ontologies to algorithmsJoão André Carriço
 
New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...gerogepatton
 

Similaire à 2005: An Introduction to Artificial Immune Systems (20)

Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a review
 
50120130406047
5012013040604750120130406047
50120130406047
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.ppt
 
Ijmet 10 01_169
Ijmet 10 01_169Ijmet 10 01_169
Ijmet 10 01_169
 
B410054
B410054B410054
B410054
 
An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system for
 
Applications of immune system computing
Applications of immune system computingApplications of immune system computing
Applications of immune system computing
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
 
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASMicrosoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimization
 
Presentation cybernetics immunology-ver1.0 (for-criticism) - copy
Presentation cybernetics immunology-ver1.0 (for-criticism) - copyPresentation cybernetics immunology-ver1.0 (for-criticism) - copy
Presentation cybernetics immunology-ver1.0 (for-criticism) - copy
 
Presentation cybernetics immunology-ver1.02 (for-criticism)
Presentation cybernetics immunology-ver1.02 (for-criticism)Presentation cybernetics immunology-ver1.02 (for-criticism)
Presentation cybernetics immunology-ver1.02 (for-criticism)
 
Computer immunology
Computer immunologyComputer immunology
Computer immunology
 
Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devices
 
CDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part bCDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part b
 
Introduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsIntroduction To Information Systems And Informatics
Introduction To Information Systems And Informatics
 
Bioinformatics Lecture 1
Bioinformatics  Lecture 1Bioinformatics  Lecture 1
Bioinformatics Lecture 1
 
Bioinformatics lecture 1
Bioinformatics lecture 1Bioinformatics lecture 1
Bioinformatics lecture 1
 
Common languages in genomic epidemiology: from ontologies to algorithms
Common languages in genomic epidemiology: from ontologies to algorithmsCommon languages in genomic epidemiology: from ontologies to algorithms
Common languages in genomic epidemiology: from ontologies to algorithms
 
New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...
 

Plus de Leandro de Castro

2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural ComputingLeandro de Castro
 
2019: LCoN - Centro de Excelência em Inteligência Artificial
2019: LCoN - Centro de Excelência em Inteligência Artificial2019: LCoN - Centro de Excelência em Inteligência Artificial
2019: LCoN - Centro de Excelência em Inteligência ArtificialLeandro de Castro
 
2018: What did I learn about Innovation and Entrepreneurship in Israel
2018: What did I learn about Innovation and Entrepreneurship in Israel2018: What did I learn about Innovation and Entrepreneurship in Israel
2018: What did I learn about Innovation and Entrepreneurship in IsraelLeandro de Castro
 
2018 Academic Innovation Opportunities in Brazil
2018 Academic Innovation Opportunities in Brazil2018 Academic Innovation Opportunities in Brazil
2018 Academic Innovation Opportunities in BrazilLeandro de Castro
 
2017: Tópicos em Educação Financeira
2017: Tópicos em Educação Financeira2017: Tópicos em Educação Financeira
2017: Tópicos em Educação FinanceiraLeandro de Castro
 
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...Leandro de Castro
 
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...Leandro de Castro
 
2016: Fundamentos Matemáticos para Inteligência Artificial
2016: Fundamentos Matemáticos para Inteligência Artificial2016: Fundamentos Matemáticos para Inteligência Artificial
2016: Fundamentos Matemáticos para Inteligência ArtificialLeandro de Castro
 
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...Leandro de Castro
 
2015: Análise de Mercado e Plano de Marketing
2015: Análise de Mercado e Plano de Marketing2015: Análise de Mercado e Plano de Marketing
2015: Análise de Mercado e Plano de MarketingLeandro de Castro
 
2016 (Updated): Introdução à Mineração de Dados
2016 (Updated): Introdução à Mineração de Dados2016 (Updated): Introdução à Mineração de Dados
2016 (Updated): Introdução à Mineração de DadosLeandro de Castro
 
2016: Metodologia da Pesquisa em Computação
2016: Metodologia da Pesquisa em Computação2016: Metodologia da Pesquisa em Computação
2016: Metodologia da Pesquisa em ComputaçãoLeandro de Castro
 
2015: Fundamentos Teóricos da Computação
2015: Fundamentos Teóricos da Computação2015: Fundamentos Teóricos da Computação
2015: Fundamentos Teóricos da ComputaçãoLeandro de Castro
 
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerceLeandro de Castro
 
2012: Natural Computing - The Grand Challenges and Two Case Studies
2012: Natural Computing - The Grand Challenges and Two Case Studies2012: Natural Computing - The Grand Challenges and Two Case Studies
2012: Natural Computing - The Grand Challenges and Two Case StudiesLeandro de Castro
 
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
2010: Plano de Negócios e Incubação de Empresas de Base TecnológicaLeandro de Castro
 
2014: Introdução às Redes Neurais Artificiais
2014: Introdução às Redes Neurais Artificiais2014: Introdução às Redes Neurais Artificiais
2014: Introdução às Redes Neurais ArtificiaisLeandro de Castro
 
2013: Empreendedorismo: Slides do Curso
2013: Empreendedorismo: Slides do Curso2013: Empreendedorismo: Slides do Curso
2013: Empreendedorismo: Slides do CursoLeandro de Castro
 
2012: Computação Natural - Slides do Curso
2012: Computação Natural - Slides do Curso2012: Computação Natural - Slides do Curso
2012: Computação Natural - Slides do CursoLeandro de Castro
 

Plus de Leandro de Castro (20)

2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing
 
2019: Folder do LCoN
2019: Folder do LCoN2019: Folder do LCoN
2019: Folder do LCoN
 
2019: LCoN - Centro de Excelência em Inteligência Artificial
2019: LCoN - Centro de Excelência em Inteligência Artificial2019: LCoN - Centro de Excelência em Inteligência Artificial
2019: LCoN - Centro de Excelência em Inteligência Artificial
 
2018: What did I learn about Innovation and Entrepreneurship in Israel
2018: What did I learn about Innovation and Entrepreneurship in Israel2018: What did I learn about Innovation and Entrepreneurship in Israel
2018: What did I learn about Innovation and Entrepreneurship in Israel
 
2018 Academic Innovation Opportunities in Brazil
2018 Academic Innovation Opportunities in Brazil2018 Academic Innovation Opportunities in Brazil
2018 Academic Innovation Opportunities in Brazil
 
2017: Tópicos em Educação Financeira
2017: Tópicos em Educação Financeira2017: Tópicos em Educação Financeira
2017: Tópicos em Educação Financeira
 
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
 
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
 
2016: Fundamentos Matemáticos para Inteligência Artificial
2016: Fundamentos Matemáticos para Inteligência Artificial2016: Fundamentos Matemáticos para Inteligência Artificial
2016: Fundamentos Matemáticos para Inteligência Artificial
 
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
 
2015: Análise de Mercado e Plano de Marketing
2015: Análise de Mercado e Plano de Marketing2015: Análise de Mercado e Plano de Marketing
2015: Análise de Mercado e Plano de Marketing
 
2016 (Updated): Introdução à Mineração de Dados
2016 (Updated): Introdução à Mineração de Dados2016 (Updated): Introdução à Mineração de Dados
2016 (Updated): Introdução à Mineração de Dados
 
2016: Metodologia da Pesquisa em Computação
2016: Metodologia da Pesquisa em Computação2016: Metodologia da Pesquisa em Computação
2016: Metodologia da Pesquisa em Computação
 
2015: Fundamentos Teóricos da Computação
2015: Fundamentos Teóricos da Computação2015: Fundamentos Teóricos da Computação
2015: Fundamentos Teóricos da Computação
 
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
 
2012: Natural Computing - The Grand Challenges and Two Case Studies
2012: Natural Computing - The Grand Challenges and Two Case Studies2012: Natural Computing - The Grand Challenges and Two Case Studies
2012: Natural Computing - The Grand Challenges and Two Case Studies
 
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
 
2014: Introdução às Redes Neurais Artificiais
2014: Introdução às Redes Neurais Artificiais2014: Introdução às Redes Neurais Artificiais
2014: Introdução às Redes Neurais Artificiais
 
2013: Empreendedorismo: Slides do Curso
2013: Empreendedorismo: Slides do Curso2013: Empreendedorismo: Slides do Curso
2013: Empreendedorismo: Slides do Curso
 
2012: Computação Natural - Slides do Curso
2012: Computação Natural - Slides do Curso2012: Computação Natural - Slides do Curso
2012: Computação Natural - Slides do Curso
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

2005: An Introduction to Artificial Immune Systems