2,776 research outputs found
Learning Opposites with Evolving Rules
The idea of opposition-based learning was introduced 10 years ago. Since then
a noteworthy group of researchers has used some notions of oppositeness to
improve existing optimization and learning algorithms. Among others,
evolutionary algorithms, reinforcement agents, and neural networks have been
reportedly extended into their opposition-based version to become faster and/or
more accurate. However, most works still use a simple notion of opposites,
namely linear (or type- I) opposition, that for each assigns its
opposite as . This, of course, is a very naive estimate of
the actual or true (non-linear) opposite , which has been
called type-II opposite in literature. In absence of any knowledge about a
function that we need to approximate, there seems to be no
alternative to the naivety of type-I opposition if one intents to utilize
oppositional concepts. But the question is if we can receive some level of
accuracy increase and time savings by using the naive opposite estimate
according to all reports in literature, what would we be able to
gain, in terms of even higher accuracies and more reduction in computational
complexity, if we would generate and employ true opposites? This work
introduces an approach to approximate type-II opposites using evolving fuzzy
rules when we first perform opposition mining. We show with multiple examples
that learning true opposites is possible when we mine the opposites from the
training data to subsequently approximate .Comment: Accepted for publication in The 2015 IEEE International Conference on
Fuzzy Systems (FUZZ-IEEE 2015), August 2-5, 2015, Istanbul, Turke
Support Vector Machine Based on Adaptive Acceleration Particle Swarm Optimization
Existing face recognition methods utilize particle swarm optimizer (PSO) and opposition based particle swarm optimizer (OPSO) to optimize the parameters of SVM. However, the utilization of random values in the velocity calculation decreases the performance of these techniques; that is, during the velocity computation, we normally use random values for the acceleration coefficients and this creates randomness in the solution. To address this problem, an adaptive acceleration particle swarm optimization (AAPSO) technique is proposed. To evaluate our proposed method, we employ both face and iris recognition based on AAPSO with SVM (AAPSO-SVM). In the face and iris recognition systems, performance is evaluated using two human face databases, YALE and CASIA, and the UBiris dataset. In this method, we initially perform feature extraction and then recognition on the extracted features. In the recognition process, the extracted features are used for SVM training and testing. During the training and testing, the SVM parameters are optimized with the AAPSO technique, and in AAPSO, the acceleration coefficients are computed using the particle fitness values. The parameters in SVM, which are optimized by AAPSO, perform efficiently for both face and iris recognition. A comparative analysis between our proposed AAPSO-SVM and the PSO-SVM technique is presented
Nature as a Network of Morphological Infocomputational Processes for Cognitive Agents
This paper presents a view of nature as a network of infocomputational agents organized in a dynamical hierarchy of levels. It provides a framework for unification of currently disparate understandings of natural, formal, technical, behavioral and social phenomena based on information as a structure, differences in one system that cause the differences in another system, and computation as its dynamics, i.e. physical process of morphological change in the informational structure. We address some of the frequent misunderstandings regarding the natural/morphological computational models and their relationships to physical systems, especially cognitive systems such as living beings. Natural morphological infocomputation as a conceptual framework necessitates generalization of models of computation beyond the traditional Turing machine model presenting symbol manipulation, and requires agent-based concurrent resource-sensitive models of computation in order to be able to cover the whole range of phenomena from physics to cognition. The central role of agency, particularly material vs. cognitive agency is highlighted
An Improved Water Strider Algorithm for Optimal Design of Skeletal Structures
Water Strider Algorithm (WSA) is a new metaheuristic method that is inspired by the life cycle of water striders. This study attempts to enhance the performance of the WSA in order to improve solution accuracy, reliability, and convergence speed. The new method, called improved water strider algorithm (IWSA), is tested in benchmark mathematical functions and some structural optimization problems. In the proposed algorithm, the standard WSA is augmented by utilizing an opposition-based learning method for the initial population as well as a mutation technique borrowed from the genetic algorithm. By employing Generalized Space Transformation Search (GSTS) as an opposition-based learning method, more promising regions of the search space are explored; therefore, the precision of the results is enhanced. By adding a mutation to the WSA, the method is helped to escape from local optimums which is essential for engineering design problems as well as complex mathematical optimization problems. First, the viability of IWSA is demonstrated by optimizing benchmark mathematical functions, and then it is applied to three skeletal structures to investigate its efficiency in structural design problems. IWSA is compared to the standard WSA and some other state-of-the-art metaheuristic algorithms. The results show the competence and robustness of the IWSA as an optimization algorithm in mathematical functions as well as in the field of structural optimization
Symmetry Induction in Computational Intelligence
Symmetry has been a very useful tool to researchers in various scientific fields. At its most basic,
symmetry refers to the invariance of an object to some transformation, or set of transformations.
Usually one searches for, and uses information concerning an existing symmetry within given data,
structure or concept to somehow improve algorithm performance or compress the search space.
This thesis examines the effects of imposing or inducing symmetry on a search space. That is, the
question being asked is whether only existing symmetries can be useful, or whether changing
reference to an intuition-based definition of symmetry over the evaluation function can also be of
use. Within the context of optimization, symmetry induction as defined in this thesis will have the
effect of equating the evaluation of a set of given objects.
Group theory is employed to explore possible symmetrical structures inherent in a search space.
Additionally, conditions when the search space can have a symmetry induced on it are examined. The
idea of a neighborhood structure then leads to the idea of opposition-based computing which aims
to induce a symmetry of the evaluation function. In this context, the search space can be seen as
having a symmetry imposed on it. To be useful, it is shown that an opposite map must be defined
such that it equates elements of the search space which have a relatively large difference in their
respective evaluations. Using this idea a general framework for employing opposition-based ideas
is proposed. To show the efficacy of these ideas, the framework is applied to popular computational
intelligence algorithms within the areas of Monte Carlo optimization, estimation of distribution and
neural network learning.
The first example application focuses on simulated annealing, a popular Monte Carlo optimization
algorithm. At a given iteration, symmetry is induced on the system by considering opposite
neighbors. Using this technique, a temporary symmetry over the neighborhood region is induced.
This simple algorithm is benchmarked using common real optimization problems and compared against
traditional simulated annealing as well as a randomized version. The results highlight improvements
in accuracy, reliability and convergence rate. An application to image thresholding further
confirms the results.
Another example application, population-based incremental learning, is rooted in estimation of
distribution algorithms. A major problem with these techniques is a rapid loss of diversity within
the samples after a relatively low number of iterations. The opposite sample is introduced as a
remedy to this problem. After proving an increased diversity, a new probability update procedure is
designed. This opposition-based version of the algorithm is benchmarked using common binary
optimization problems which have characteristics of deceptivity and attractive basins
characteristic of difficult real world problems. Experiments reveal improvements in diversity,
accuracy, reliability and convergence rate over the traditional approach. Ten instances of the
traveling salesman problem and six image thresholding problems are used to further highlight the
improvements.
Finally, gradient-based learning for feedforward neural networks is improved using opposition-based
ideas. The opposite transfer function is presented as a simple adaptive neuron which easily allows
for efficiently jumping in weight space. It is shown that each possible opposite network represents
a unique input-output mapping, each having an associated effect on the numerical conditioning of
the network. Experiments confirm the potential of opposite networks during pre- and early training
stages. A heuristic for efficiently selecting one opposite network per epoch is presented.
Benchmarking focuses on common classification problems and reveals improvements in accuracy,
reliability, convergence rate and generalization ability over common backpropagation variants. To
further show the potential, the heuristic is applied to resilient propagation where similar
improvements are also found
Quantization for Secret Key Generation in Underwater Acoustic Channels
openSecuring wireless communications in harsh environments, such as underwater networks, via traditional cryptographic approaches is unfeasible. For example, public key encryption would require a public key infrastructure and a key management infrastructure. A viable solution is instead physical layer security, allowing two devices to obtain a symmetric cryptographic key from the randomness provided by the underlying communication channel, which varies in time, frequency, and space, in general. The probability of having both parties generating the same key and its number of bits greatly depend on how sampled observations are quantized. In this thesis, novel data-driven quantization techniques, which make use of specific channel features computed from impulse responses collected from real experiments, are investigated. In particular, we propose a new machine learning algorithm that quantizes an input vector into an initial key, as close as possible to a series of independent and uniformly distributed symbols and matches at beast the corresponding initial key of the corresponding receiver, to guarantee a high key agreement probability and to avoid an eavesdropper to infer future values exploiting the correlation between consecutive symbols. We also propose an adversarial neural network architecture, where legitimate parties feature a neural quantizer to produce the initial key, whereas the eavesdropper tries to reconstruct the key agreed by the first two
- …