Skip to main content
Top
Published in: Cluster Computing 3/2019

21-02-2018

The data clustering based dynamic risk identification of biological immune system: mechanism, method and simulation

Author: Yang Bo

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Under the new form of economic development in our country, with the growth of dynamic and the complexity of internal and external environment of enterprise, various kinds of uncertain events have emerged in an endless so that the risks faced by enterprises are increasing, how to effectively identify and control dynamic risks for managers are key elements for the sustainable development of enterprises. Biological immune system is a complex adaptive system, can quickly identify and resist the risk, draw lessons from this principle, the biological immune provides a new idea and method to identify dynamic risk effectively for the enterprise. Combing with the literatures, we found that there is a certain progress about the current research of enterprise dynamic risk identification under biological immune perspective, but there is not a set of relatively mature method system. Therefore, this article makes reference to the ideas of the biological immune, on the basis of immune identification mechanism, from two aspects of dynamic risk definition and ascension of identification accuracy to implement extensions of dynamic risk identification of biological immune mechanism, build a set of DRI biological immune system extension method contains dynamic memory automatic identification and variable fuzzy automatic identification system, and carry out the simulation experiment of multi-agent on Netlogo simulation platform to verify the effectiveness of this method. This study extend and expand the enterprise dynamic risk identification theory, enrich the literature of biological immune mechanism of enterprise dynamic risk identification, provide application guide on the problem of dynamic risk identification in other areas.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
2.
go back to reference Haynes, J., Hens, R.M.: Risk and Management of Insurance. Mac Graw-Hill, New York (1964) Haynes, J., Hens, R.M.: Risk and Management of Insurance. Mac Graw-Hill, New York (1964)
3.
go back to reference Haldane, A.G., May, R.M.: Systemic risk in banking ecosystems. Nature 469(7330), 351–355 (2011)CrossRef Haldane, A.G., May, R.M.: Systemic risk in banking ecosystems. Nature 469(7330), 351–355 (2011)CrossRef
4.
go back to reference Haynes, J.: A new pattern of risk management: the Hyogo framework for action and Italian practice. Socio-Econ. Plan. Sci. 42(2), 92–111 (1895) Haynes, J.: A new pattern of risk management: the Hyogo framework for action and Italian practice. Socio-Econ. Plan. Sci. 42(2), 92–111 (1895)
5.
go back to reference Meng, L., Wang, D.M.: Enterprise risk identification and response. Friends Acc. 19, 31–33 (2007) Meng, L., Wang, D.M.: Enterprise risk identification and response. Friends Acc. 19, 31–33 (2007)
6.
go back to reference Hou, D.L., Cai, S.Q.: Study on risk identification index construction of streaming media information service enterprises. Inf. Sci. 30(9), 1378–1380 (2012) Hou, D.L., Cai, S.Q.: Study on risk identification index construction of streaming media information service enterprises. Inf. Sci. 30(9), 1378–1380 (2012)
7.
go back to reference Song, Y., Yin, L.: Identification and three-dimensional analysis on the risk of emerging technology based on the process of dynamic evaluation. China Soft Sci. 10, 136–138 (2007) Song, Y., Yin, L.: Identification and three-dimensional analysis on the risk of emerging technology based on the process of dynamic evaluation. China Soft Sci. 10, 136–138 (2007)
8.
go back to reference Lin, Y.: Study of dynamic risk VaR measure capability based on hyperbolic memory HYGARCH model. Chin. J. Manage. Sci. 19(6), 16–23 (2011) Lin, Y.: Study of dynamic risk VaR measure capability based on hyperbolic memory HYGARCH model. Chin. J. Manage. Sci. 19(6), 16–23 (2011)
9.
go back to reference Huang, C.F.: Study on the dynamic risk of typhoon in Guangdong Province related to month and early warning. Syst. Eng. Theory Pract. 35(6), 1605–1616 (2015) Huang, C.F.: Study on the dynamic risk of typhoon in Guangdong Province related to month and early warning. Syst. Eng. Theory Pract. 35(6), 1605–1616 (2015)
10.
go back to reference Gong, Y.H., Xu, Y.: Dynamic risk evaluation of the chemical system based on dynamic fault tree. Saf. Environ. Eng. 22(2), 135–138 (2015) Gong, Y.H., Xu, Y.: Dynamic risk evaluation of the chemical system based on dynamic fault tree. Saf. Environ. Eng. 22(2), 135–138 (2015)
11.
go back to reference Haas, R.C.: Matching the uncertainty seismic data and logging data. Int. J. Prod. Res. 43(14), 189–216 (2009) Haas, R.C.: Matching the uncertainty seismic data and logging data. Int. J. Prod. Res. 43(14), 189–216 (2009)
12.
go back to reference Wang, J.W.: Network ability, tacit knowledge acquisition and new enterprise growth performance. Stud. Sci. Sci. (9), 1365–1373 (2011) Wang, J.W.: Network ability, tacit knowledge acquisition and new enterprise growth performance. Stud. Sci. Sci. (9), 1365–1373 (2011)
13.
go back to reference loannou, P.G., Likhitruangsilp, V.: Simulation of Multiple-drift trunnel construction with limited resources. In: Proceedings of 37th conference on Winter simulation loannou, P.G., Likhitruangsilp, V.: Simulation of Multiple-drift trunnel construction with limited resources. In: Proceedings of 37th conference on Winter simulation
14.
go back to reference Aickelin, U., Dasgupta, D., Gu, F.: Artificial Immune Systems. Search Methodologies, pp. 187–211. Springer, New York (2014) Aickelin, U., Dasgupta, D., Gu, F.: Artificial Immune Systems. Search Methodologies, pp. 187–211. Springer, New York (2014)
15.
go back to reference Xu, H., Ji, C.L.: Small and mid-sized enterprise risk response based on organizational perspective of immune mechanism. Manag World 2, 142–152 (2011) Xu, H., Ji, C.L.: Small and mid-sized enterprise risk response based on organizational perspective of immune mechanism. Manag World 2, 142–152 (2011)
16.
go back to reference Yang, Q., Liu, X.X.: Unconventional emergency risk identification model based on the immune system. J Manage. Sci. China 18(4), 49–61 (2015) Yang, Q., Liu, X.X.: Unconventional emergency risk identification model based on the immune system. J Manage. Sci. China 18(4), 49–61 (2015)
17.
go back to reference Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)CrossRef Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)CrossRef
18.
go back to reference Matzinger, P.: The danger model: a renewed sense of self. Science 296(12), 301–305 (2002)CrossRef Matzinger, P.: The danger model: a renewed sense of self. Science 296(12), 301–305 (2002)CrossRef
19.
go back to reference Forrest, S., Beauchemin, C.: Computer immunology. Immunol. Rev. 216(1), 176–197 (2007)CrossRef Forrest, S., Beauchemin, C.: Computer immunology. Immunol. Rev. 216(1), 176–197 (2007)CrossRef
20.
go back to reference Castro, L.N., Timmis, J.: Atificial immune system: a new computational intelligence approach. Springer Verlang, Berlin (2002)MATH Castro, L.N., Timmis, J.: Atificial immune system: a new computational intelligence approach. Springer Verlang, Berlin (2002)MATH
21.
go back to reference Landis, W.G.: Regional scale ecological risk assessment: using the relative risk model. CRC Press, Boca Raton (2005) Landis, W.G.: Regional scale ecological risk assessment: using the relative risk model. CRC Press, Boca Raton (2005)
22.
23.
go back to reference Tang, Christopher S.: Perspectives in supply chain risk management. Int. J. Prod. Econ. 103(2), 451–488 (2006)CrossRef Tang, Christopher S.: Perspectives in supply chain risk management. Int. J. Prod. Econ. 103(2), 451–488 (2006)CrossRef
24.
go back to reference Xiao, R.B.: Artificial immune system: principle, models, analysis and perspectives. Chin. J. Comput. 25(12), 1281–1293 (2002) Xiao, R.B.: Artificial immune system: principle, models, analysis and perspectives. Chin. J. Comput. 25(12), 1281–1293 (2002)
25.
go back to reference Jiang, Y.P.: Generation model of minimum detector based on immune identification. Comput. Eng. Design 35(5), 1598–1601 (2014) Jiang, Y.P.: Generation model of minimum detector based on immune identification. Comput. Eng. Design 35(5), 1598–1601 (2014)
26.
go back to reference Yang, Q., Ma, H.M., Yu, Y.L.: Multi-agent risk identifier model of emergency management system engineering based on immunology. Syst. Eng. Proc. 4, 385–392 (2012)CrossRef Yang, Q., Ma, H.M., Yu, Y.L.: Multi-agent risk identifier model of emergency management system engineering based on immunology. Syst. Eng. Proc. 4, 385–392 (2012)CrossRef
27.
go back to reference Ning, Z., Wang, Y.Q.: Identifying supply chain risk based on scenario analysis. Ind. Eng. Manage. 2, 89–91 (2007) Ning, Z., Wang, Y.Q.: Identifying supply chain risk based on scenario analysis. Ind. Eng. Manage. 2, 89–91 (2007)
28.
go back to reference Yang, C., Wang, S.C.: Based on dynamic naive bayesian network of enterprise technology innovation risk identification. J. Inf. 30(1), 85–86 (2011) Yang, C., Wang, S.C.: Based on dynamic naive bayesian network of enterprise technology innovation risk identification. J. Inf. 30(1), 85–86 (2011)
29.
go back to reference Zhong, Y.G.: Research of unconventional emergency management. Syst. Eng. Theory Pr. 32(5), 911–918 (2012) Zhong, Y.G.: Research of unconventional emergency management. Syst. Eng. Theory Pr. 32(5), 911–918 (2012)
Metadata
Title
The data clustering based dynamic risk identification of biological immune system: mechanism, method and simulation
Author
Yang Bo
Publication date
21-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1960-2

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner