Immune system

View this topic in
An immune system is a system of biological structures and processes within an organism that protects against disease by identifying and killing pathogens and tumor cells. (Wikipedia.org)






Conferences related to Immune system

Back to Top

2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference will cover diverse topics ranging from biomedical engineering to healthcare technologies to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions and oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by IEEE Xplore and Medline/PubMed.

  • 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The conference program will consist of plenary lectures, symposia, workshops and invited sessions of the latest significant findings and developments in all the major fields of biomedical engineering. Submitted papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions, will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.

  • 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The Annual International Conference of the IEEE Engineering in Medicine and Biology Society covers a broad spectrum of topics from biomedical engineering and physics to medical and clinical applications. The conference program will consist of invited plenary lectures, symposia, workshops, invited sessions, oral and poster sessions of unsolicited contributions. All papers will be peer reviewed and accepted papers of up to 4 pages will appear in the Conference Proceedings and be indexed by PubMed and EI. Prop

  • 2012 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc.

  • 2010 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2009 31st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The annual conference of EMBS averages 2000 attendees from over 50 countries. The scope of the conference is general in nature to focus on the interdisciplinary fields of biomedical engineering. Themes included but not limited to are: Imaging, Biosignals, Biorobotics, Bioinstrumentation, Neural, Rehabilitation, Bioinformatics, Healthcare IT, Medical Devices, etc

  • 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

    The general theme of EMBC'08 is "Personalized Healthcare through Technology", covering a broad spectrum of topics from biomedical and clinical engineering and physics to medical and clinical applications. Transfer of research results from academia to industry will also be a focus of the conference.

  • 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

  • 2006 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)

  • 2005 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)


2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2008 IEEE International Conference on Systems, Man and Cybernetics - SMC


2013 IEEE International Conference on Mechatronics and Automation (ICMA)

The objective of ICMA 2013 is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of mechatronics, robotics, automation and sensors to disseminate their latest research results and exchange views on the future research directions.


IEEE SOUTHEASTCON 2013

Region 3 Meeting, Technical papers, student competitions.

  • SOUTHEASTCON 2012

    The annual IEEE SoutheastCon conferences promote all aspects of the theories and applications of the engineering disciplines. Sponsored by the IEEE Region 03, this event attracts researchers, professionals, and students from the Southeast region of the U.S and beyond. SoutheastCon 2012 will be held in Orlando, Florida.

  • SOUTHEASTCON 2011

    IEEE SoutheastCon2011 is the annual IEEE Region 3 technical, professional, and student conference, invites conference refereed and non-refereed technical paper presentations and tutorials that advance the work and careers of conference attendees in the areas of interest for the conference.

  • SOUTHEASTCON 2010

    SoutheastCon 2010 is the Region 3 event which includes a student conference, a technical conference, and the Region 3 business meeting.

  • SOUTHEASTCON 2009

    It is the annual IEEE Region 3 Technical, Professional, and Student Conference. As the premier conference for the IEEE Region 3, it brings together electrical, computer and other engineering and science professionals, faculty and students to share the latest information through technical sessions, tutorials and exhibits. The conference schedule includes: a technical program with seminars, tutorials, and workshops; exhibits; a student program with student competitions; and IEEE regional meetings.

  • SOUTHEASTCON 2008

    SoutheastCon is the Southeastern USA Region of the IEEE's premier conference. It contains three main sections: a technical program, student competitions and regional meetings. SouthEastCon features technical papers, tutorials and exhibits.

  • SOUTHEASTCON 2007

  • SOUTHEASTCON 2006

  • SOUTHEASTCON 2005


2012 10th World Congress on Intelligent Control and Automation (WCICA 2012)

A. Intelligent Control B. Control Theory and Control Engineering C. Complex Systems and Intelligent Robots D. Others


More Conferences

Periodicals related to Immune system

Back to Top

Electron Devices, IEEE Transactions on

Publishes original and significant contributions relating to the theory, design, performance and reliability of electron devices, including optoelectronics devices, nanoscale devices, solid-state devices, integrated electronic devices, energy sources, power devices, displays, sensors, electro-mechanical devices, quantum devices and electron tubes.


Geoscience and Remote Sensing, IEEE Transactions on

Theory, concepts, and techniques of science and engineering as applied to sensing the earth, oceans, atmosphere, and space; and the processing, interpretation, and dissemination of this information.


Industrial Electronics, IEEE Transactions on

Theory and applications of industrial electronics and control instrumentation science and engineering, including microprocessor control systems, high-power controls, process control, programmable controllers, numerical and program control systems, flow meters, and identification systems.


Neural Networks, IEEE Transactions on

Devoted to the science and technology of neural networks, which disclose significant technical knowledge, exploratory developments, and applications of neural networks from biology to software to hardware. Emphasis is on artificial neural networks.


Nuclear Science, IEEE Transactions on

All aspects of the theory and applications of nuclear science and engineering, including instrumentation for the detection and measurement of ionizing radiation; particle accelerators and their controls; nuclear medicine and its application; effects of radiation on materials, components, and systems; reactor instrumentation and controls; and measurement of radiation in space.



Most published Xplore authors for Immune system

Back to Top

Xplore Articles related to Immune system

Back to Top

Considering the Visual Element in Clinical Pediatric Data Management

Mark Ginsburg 2012 45th Hawaii International Conference on System Sciences, 2012

This paper overviews private pediatric practice clinical data management needs and discusses the basic visit types. It then models the patients' trajectory in the course of a visit as he or she sees the nurse for routine measurements then the doctor for age-based well visit interviews or ad-hoc sick visit consultations. For both the nurse and the doctor, we consider ...


Effect of various metal areas with the same shadow area on defibrillation electrode resistance

M. Bonner; R. Mehra Proceedings of 17th International Conference of the Engineering in Medicine and Biology Society, 1995

The objective of this paper is to determine if the electrode resistance for defibrillation electrodes with the same shadow area changes with the exposed metal area. To accomplish this the electrode resistance was compared for identical coil electrodes with and without insulation between the windings (backfill), and for solid cylinders of the same dimensions as the coil electrodes. The results ...


Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society [advertisement]

IEEE Transactions on Nuclear Science, 2008

Advertisement: Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society.


Notice of Retraction<BR>A new Variable Arguments PID controller based on improved Immune Algorithm

Haipeng Pan; Wanhui Wang; Liang Xiao 2011 Seventh International Conference on Natural Computation, 2011

Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper. The presenting author of this paper ...


Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society [advertisement]

IEEE Transactions on Nuclear Science, 2008

Advertisement: Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society.


More Xplore Articles

Educational Resources on Immune system

Back to Top

eLearning

Considering the Visual Element in Clinical Pediatric Data Management

Mark Ginsburg 2012 45th Hawaii International Conference on System Sciences, 2012

This paper overviews private pediatric practice clinical data management needs and discusses the basic visit types. It then models the patients' trajectory in the course of a visit as he or she sees the nurse for routine measurements then the doctor for age-based well visit interviews or ad-hoc sick visit consultations. For both the nurse and the doctor, we consider ...


Effect of various metal areas with the same shadow area on defibrillation electrode resistance

M. Bonner; R. Mehra Proceedings of 17th International Conference of the Engineering in Medicine and Biology Society, 1995

The objective of this paper is to determine if the electrode resistance for defibrillation electrodes with the same shadow area changes with the exposed metal area. To accomplish this the electrode resistance was compared for identical coil electrodes with and without insulation between the windings (backfill), and for solid cylinders of the same dimensions as the coil electrodes. The results ...


Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society [advertisement]

IEEE Transactions on Nuclear Science, 2008

Advertisement: Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society.


Notice of Retraction<BR>A new Variable Arguments PID controller based on improved Immune Algorithm

Haipeng Pan; Wanhui Wang; Liang Xiao 2011 Seventh International Conference on Natural Computation, 2011

Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper. The presenting author of this paper ...


Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society [advertisement]

IEEE Transactions on Nuclear Science, 2008

Advertisement: Affiliate Plan of the IEEE Nuclear and Plasma Sciences Society.


More eLearning Resources

IEEE.tv Videos

IMS 2012 Microapps - System Simulation Featuring Signal Processing Blocks
APEC Speaker Highlights - Doug Hopkins, University of Buffalo, Power Electronics/Smart-Grid
CES 2008: The first Works with iPhone Speaker and Dock
IMS 2012 Microapps - RF System Design: Moving Beyond a Linear Datasheet
FinSAL: A Novel FinFET Based Secure Adiabatic Logic for Energy-Efficient and DPA Resistant IoT Devices - Himanshu Thapliyal: 2016 International Conference on Rebooting Computing
Micro-Apps 2013: How to Make Your Designs More Robust
Brooklyn 5G Summit: Critical Modeling Aspects and Their Effect on System Design and Performance
Flood or Hurricane Protection?: The New Orleans Levee System and Hurricane Katrina
GEOSS for BIODIVERSITY -A demonstration of the GEOSS Common Infrastructure capabilities
IMS 2012 Microapps - Virtual Flight Testing of Radar System Performance Daren McClearnon, Agilent EEsof
CES 2008: Whirlpool Lets You Geek Out Your Refrigerator
CES 2008: Ford and Sirius Team Up for In-Car Navigation
IMPASS: Intelligent Mobility Platform with Active Spoke System
The DLR MiroSurge, a Robotic System for Surgery
Micro-Apps 2013: Class F Power Amplifier Design, Including System-to-Circuit-to-EM Simulation
Rollin' Justin -- Mobile Platform with Variable Base
Tapping the Computing Power of the Unconscious Brain
Robot Redux: Lego's Mindstorms NXT in action
Micro-Apps 2013: Precision RF/MW Cable and Antenna Test in the Field
ISEC 2013 Special Gordon Donaldson Session: Remembering Gordon Donaldson - 6 of 7 - A high sensitive magnetometer system for natural magnetic field measurements

IEEE-USA E-Books

  • Artificial Immune System

    Artificial immune system (AIS) is a computational intelligence system inspired by the working mechanism and principle of biological immune system (BIS). BIS makes use of innate immunity and adaptive immunity systems to generate accurate immune response against the invading antigens. The two systems mutually cooperate to resist the invasion of external antigens. The key to designing the AIS is to take full advantage of the immunology principles and to replicate the effectiveness and capability of the BIS in computer systems. Most of the AISs and malware detection methods have some deficiencies and shortcomings, which stimulates researchers to explore more efficient models and algorithms, including negative selection algorithm, clonal selection algorithm, immune network model, Danger theory, and immune concentration. At present, AIS has been widely used in many fields such as pattern recognition, function optimization, computer security, robot control, and data analysis.

  • Biologically Inspired Hardware

    This chapter contains sections titled: A Protein for Data Storage, Volumetric Memory Devices with Bacteriorhodopsin, Bacteriorhodopsin-Based Associative Holographic Memory, Bacteriorhodopsin and Optical Memory, Harnessing the Sun's Rays in Arizona, Biology on a Chip, Evolvable Hardware, Why Use EHW?, How EHW Works, Applications of EHW, Erratic Behavior, Embryonic Hardware, The Biowatch, An Immune System for Chips, Whither Computer Hardware?, Neurally Inspired Hardware

  • Malware Detection

    This chapter introduces the classic malware detection approaches and immune- based malware detection approaches. These classic malware detection approaches are static and dynamic techniques, and heuristics. Many researchers have proposed various kinds of heuristics to detect the malwares with some success. Artificial Immune System (AIS) is an immune-based malware detection approach that have been applied to many complex problem domains, such as fault and anomaly diagnosis, network intrusion detection, and virus detection. There are three typical algorithms in AIS: negative selection algorithm (NSA), clonal selection algorithm, and immune network model. Immune-based malware detection techniques have the ability to detect new variations and unknown malwares and paved a new way for anti-malware research. Aiming at building a light-weight, limited computer resources and early virus warning system, an immune-based virus detection system using affinity vectors (IVDS) was proposed. Finally, the chapter presents hierarchical artificial immune model for virus detection (HAIM).

  • Danger Feature-Based Negative Selection Algorithm

    This chapter presents a danger feature-based negative selection algorithm (DFNSA). In the DFNSA, the danger feature space is divided into four parts, and the information of danger features is reserved as much as possible, laying a good foundation for measuring the danger of a sample. A danger feature is a feature with dangerous properties, that is able to identify its corresponding dangerous operations. It is the basic element for an immune system to decide whether an immune response should be produced. In order to incorporate the DFNSA into the procedure of malware detection, a DFNSA-based malware detection (DFNSA-MD) model is proposed. The danger of a sample is measured precisely in this way and used to classify the sample. Comprehensive experimental results suggest that the DFNSA is able to reserve as much information about the danger features as possible, and the DFNSA-MD model is effective to detect unseen malware.

  • Immune Principle and Neural Networks-Based Malware Detection

    Detection of unknown malware is one of most important tasks in Computer Immune System (CIS) studies. By using nonself detection, diversity of anti-body (Ab) and artificial neural networks (ANN), this chapter proposes an NN-based malware detection algorithm. A number of experiments illustrate that this algorithm has high detection rate with a very low false positive rate. Aiming at automation detection malicious executables, the chapter proposes a novel malware detection algorithm (MDA) based on the immune principle and ANN. Extensive experiments show that the algorithm has a better detection performance than Schultz's method. The first goal is to verify the detection ability of the malware detection algorithm for malicious executables. The experimental results are all scaled with false positive rate (FPR) and detection rate (DR). The second goal is to calculate the probability of the reducing detection hole with the diversity of detectors.

  • Be a Leader Every Day

    Many professionals think that they can only be considered a leader if they are the president of a company or if they are responsible for overseeing a certain number of individuals. That is what is called a limiting belief??-??a belief that a person holds for no specific reason, which holds him back from reaching the maximum potential. In this chapter, the author provides positive ways to develop the leadership abilities that reside deep down inside of him/her, even if he or she has not recognized them yet. One very simple thing that can be done to help develop, as both a leader and a person, is to be positive. A positive person typically produces less cortisol, which is important to overall health, as cortisol suppresses the immune system. This alone is a good reason to become more positive. The chapter finally provides some strategies for remaining positive and opportunistic in the career.

  • Immune Concentration-Based Malware Detection Approaches

    This chapter applies the immune concentration-based malware detection approaches. The local concentration-based malware detection method connects a certain number of two element local concentration vectors as the feature vector. To achieve better detection performance, particle swarm optimization (PSO) is used to optimize the parameters of local concentration. Then the hybrid concentration-based feature extraction (HCFE) approach is presented by extracting the hybrid concentration (HC) of malware in both the global resolution and the local resolution. Self detector library are composed of detectors with maximum representative of benign files and nonself detector library are composed of those detectors with maximum representative of malware. Several robust optimization approaches can be employed to optimize the input vector, like PSO and genetic algorithm (GA). The hybrid concentration-based feature extraction approach extracts the hybrid concentration of a sample in both the global resolution and the local resolution.

  • Hierarchical Artificial Immune Model

    As viruses become more complex, current anti-virus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. This chapter proposes a hierarchical artificial immune model (HAIM) for virus detection to overcome three specific shortcomings in traditional artificial immune system (AIS) models: randomly generating the detectors leading to the bad efficiency; poor generalization and poor performance with a big dataset; and ignoring the relevance between different extracted signatures in one virus. The virus gene library generating module works on the training set consisting of legal and virus programs. The model can obtain the frequency information of deoxyribonucleotides (ODN) appearing in the legal and virus programs. Finally, classification decision is an overall behavior that greatly reduces the information loss. The model can effectively and efficiently recognize obfuscated virus, detect new variants of known virus and some unknown viruses.

  • Multiple-Point Bit Mutation Method of Detector Generation

    In self and nonself discrimination (SNSD) model, it is very important to generate a desirable detector set since it decides the performance and scale of the SNSD model based task. This chapter proposed a novel detector generating algorithm on the basis of the negative selection principle in natural immune systems. It utilizes random multiple-point mutation to look for nonself detectors in a large range of the space of detectors, such that one can obtain a required detector set in a reasonable computing time. The chapter describes the work procedure of the proposed detector generating algorithm. Then, it tests the algorithm on many datasets and compared it with the Exhaustive Detector Generating Algorithm (EDGA) in detail. The experimental results show that the proposed algorithm outperforms the EDGA in both detection performance and computational complexity. The major difference between growth algorithm and negative selection algorithm (NSA) is the generating method of candidate detectors.

  • Immune Cooperation Mechanism-Based Learning Framework

    Inspired from the immune cooperation (IC) mechanism in biological immune systems (BIS), this chapter presents an IC mechanism-based learning (ICL) framework. In this framework, a sample is expressed as an antigen-specific feature vector and an antigen-nonspecific feature vector, simulating the antigenic determinant and danger features in the BIS. The ICL framework simulates the BIS in the view of immune signals and takes full advantage of the cooperation effect of the immune signals, which improves the performance of the ICL framework. The ICL-MD model involves two modules, feature extraction and classification. In the malware detection problem, malware are taken as antigens, while benign programs are non-antigens. In order to ensure that the experimental results are reliable and the proposed ICL-MD model outperforms the GC-MD and LC-MD approaches statistically, an analysis of variance (ANOVA) was done followed by two t hypothesis tests (t-test). Comprehensive experimental results demonstrate that the ICL framework is an effective learning framework.



Standards related to Immune system

Back to Top

No standards are currently tagged "Immune system"


Jobs related to Immune system

Back to Top