| |||||||||||||||
AISs@CEC 2020 : The Special Session on Artificial Immune Systems at CEC-2020 | |||||||||||||||
Link: http://staff.ustc.edu.cn/~wjluo/ieee-cis-ais/cec2020/ais_cec2020.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Special Session on "Artificial Immune Systems" at the 2020 IEEE Congress on Evolutionary Computation
The biological immune system is a powerful defense system that protects an organism itself from diseases and danger. The biological immune system is a kind of complex, adaptive, dynamic and distributive system with abilities of learning, memory, self-organization, feature extraction and pattern recognition. The Artificial Immune System, also known as Immune Computation, is a relatively new branch in the computational intelligence community, which is inspired by the structure, functions, models and information processing mechanism of biological immune system. The Artificial Immune System is a fast developing research area. Nowadays, the scope of this research area ranges from modeling to simulation of the biological immune system, to the development of novel engineering solutions to complex problems. This special session aims to focus on the state-of-the-art research on immune-inspired algorithms and the new conceptual models for understanding the dynamics that underlie the immune system. This special session is supported by the IEEE CIS ECTC Task Force on Artificial Immune Systems. Topics of interest include, but are not limited to: • Computational & Mathematical modelling of the Immune System; • Novel immune algorithms and new immune operators; • Theoretical aspects of immune inspired algorithms; • Empirical investigations on immune inspired algorithms; • Benchmarking immune inspired algorithms against other techniques; • Hybridization of immune inspired algorithms with other techniques; • Systems & Synthetic Immunology; • Applications of immune inspired algorithms in real-world problems; • Distributed immune systems for big data. • Artificial immune systems for cyber security |
|