2020
DOI: 10.3390/computation8010005
|View full text |Cite
|
Sign up to set email alerts
|

An Evolutionary Computing Model for the Study of Within-Host Evolution

Abstract: Evolution of an individual within another individual is known as within-host dynamics (WHD). The most common modeling technique to study WHD involves ordinary differential equations (ODEs). In the field of biology, models of this kind assume, for example, that both the number of viruses and the number of mouse cells susceptible to being infected change according to their interaction as stated in the ODE model. However, viruses can undergo mutations and, consequently, evolve inside the mouse, whereas the mouse,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 38 publications
(52 reference statements)
0
3
0
Order By: Relevance
“…Granulocytes and macrophages play a major role in the innate immune system, by attacking all foreign substances and reacting directly and immediately without distinction. Conversely, lymphocytes play an important role in the adaptive immune system, reinforcing innate immunity by making antibodies that can effectively remove antigens by remembering those that first invaded and reacting specifically once they reinvade [35,36]. The commonly used definition of immunity refers to the adaptive immune system.…”
Section: Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Granulocytes and macrophages play a major role in the innate immune system, by attacking all foreign substances and reacting directly and immediately without distinction. Conversely, lymphocytes play an important role in the adaptive immune system, reinforcing innate immunity by making antibodies that can effectively remove antigens by remembering those that first invaded and reacting specifically once they reinvade [35,36]. The commonly used definition of immunity refers to the adaptive immune system.…”
Section: Algorithmmentioning
confidence: 99%
“…AISs are biologically inspired algorithms that use the principle of the aforementioned immune system. On the basis of their classification and reasoning abilities, AIS algorithms help solve pattern recognition, optimization, machine learning, and computer network security problems [36]. The system largely employs positive selection (PS) and negative selection (NS) algorithms and a clonal selection (CS) process, a process in which B lymphocytes create more effective antigens to remove antibodies.…”
Section: Algorithmmentioning
confidence: 99%
“…After a quite complex modeling phase, AIS have been successfully applied to various fields of digital knowledge, including optimization theory [29], data analysis [30], image recognition [31], and computer security [32]. More specifically, AIS-based proposals have arisen to solve cybersecurity challenges for anomaly detection, intrusion detection, malicious process detection, scan and flood detection, and fraud detection, among others [33], [34], [35], [36] others. Those proposals rely on the capabilities of four main bio-inspired techniques, namely, negative selection, clonal section, artificial immune networks, and Danger Theory [28], [37], [38].…”
Section: B Artificial Immune Systemsmentioning
confidence: 99%
“…Indeed, the GA has been proved successful in solving several optimization problems in different knowledge areas, including mathematics, informatics, etc. [6]. In this sense, the presented GA methodology performs a multi-objective optimization of the parameters, i.e., risk and execution time of the AIS-powered reaction.…”
Section: Introductionmentioning
confidence: 99%