On Emulating Real-World Distributed Intelligence Using Mobile Agent Based Localized Idiotypic Networks
Researchers have used Idiotypic Networks in a myriad of applications ranging from function optimization to pattern recognition, learning and even robotics and control. Most of the reported works that have used the Idiotypic network have been simulations wherein not all entities perform in a true distributed, parallel and asynchronous manner. The concentration of an antibody within the network is always assumed to be single valued, which is easily available as a global parameter in such simulated systems. This paper describes a novel architecture and dynamics to emulate an Idiotypic network wherein antibodies within a real physical network interact at antigen-affected nodes, sense their respective global populations stigmergically and form Localized Idiotypic Networks that eventually control their respective global populations across the network. Typhon, a mobile agent platform, running at the various nodes forming the physical network, was used for the emulation. While the mobile agents acted as antibody carriers and ensured their mobility, the nodes forming the physical network formed the antigenic sites. Results, portrayed herein, show the selective rise in global populations of the set of antibodies that are more effective in neutralizing a range of antigens across the network.
KeywordsIdiotypic networks Emulation Distributed Intelligence Mobile agents Typhon
Unable to display preview. Download preview PDF.
- 1.Jerne, N.K.: Towards the network theory of the immune system. Ann. Immunol.(Inst. Pasteur) 125, 373–389 (1974)Google Scholar
- 7.Greensmith, J., Whitbrook, A., Aickelin, U.: Artificial immune systems. In: Handbook of Metaheuristics, pp. 421–448. Springer (2010)Google Scholar
- 8.White, J.E.: Mobile agents. In: Software agents, pp. 437–472. MIT press (1997)Google Scholar
- 9.Outtagarts, A.: Mobile Agent-based Applications: a Survey. International Journal of Computer Science and Network Security 9, 331–339 (2009)Google Scholar
- 10.Dasgupta, D.: Immunity-based intrusion detection system: a general framework. In: Proc. of the 22nd NISSC, vol. 1, pp. 147–160 (1999)Google Scholar
- 12.De Castro, L.N., Timmis, J.: Artificial immune systems: a novel approach to pattern recognition (2002)Google Scholar
- 17.Godfrey, W.W., Nair, S.B.: A Mobile Agent Cloning Controller for Servicing Networked Robots. In: International Conference on Future Information Technology IPCSIT, vol. 13, pp. 81–85. IACSIT Press (2011)Google Scholar