moji5
27th July 2010, 09:00 PM
The Application of a Dendritic Cell Algorithm to a Robotic Classifier
Robert Oates (http://arxiv.org/find/cs/1/au:+Oates_R/0/1/0/all/0/1), Julie Greensmith (http://arxiv.org/find/cs/1/au:+Greensmith_J/0/1/0/all/0/1), Uwe Aickelin (http://arxiv.org/find/cs/1/au:+Aickelin_U/0/1/0/all/0/1), Jonathan M. Garibaldi (http://arxiv.org/find/cs/1/au:+Garibaldi_J/0/1/0/all/0/1), Graham Kendall (http://arxiv.org/find/cs/1/au:+Kendall_G/0/1/0/all/0/1)
(Submitted on 29 Apr 2010)
The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an investigation is performed into the effects of varying the migration threshold median for the cell population. The algorithm performs well on a classification task with very little tuning. Ways of extending the implementation to allow it to be used as a classifier within the field of robotic security are suggested.
Download:
PDF only (http://arxiv.org/pdf/1004.5222v1)
Robert Oates (http://arxiv.org/find/cs/1/au:+Oates_R/0/1/0/all/0/1), Julie Greensmith (http://arxiv.org/find/cs/1/au:+Greensmith_J/0/1/0/all/0/1), Uwe Aickelin (http://arxiv.org/find/cs/1/au:+Aickelin_U/0/1/0/all/0/1), Jonathan M. Garibaldi (http://arxiv.org/find/cs/1/au:+Garibaldi_J/0/1/0/all/0/1), Graham Kendall (http://arxiv.org/find/cs/1/au:+Kendall_G/0/1/0/all/0/1)
(Submitted on 29 Apr 2010)
The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an investigation is performed into the effects of varying the migration threshold median for the cell population. The algorithm performs well on a classification task with very little tuning. Ways of extending the implementation to allow it to be used as a classifier within the field of robotic security are suggested.
Download:
PDF only (http://arxiv.org/pdf/1004.5222v1)