Pub Date : 2021-12-17DOI: 10.1007/s43674-021-00016-6
Jiankai Chen, Zhongyan Li, Xin Wang, Junhai Zhai
The existing monotonic decision tree algorithms are based on a linearly ordered constraint that certain attributes are monotonously consistent with the decision, which could be called monotonic attributes, whereas others, called non-monotonic attributes. In practice, monotonic and non-monotonic attributes coexist in most classification tasks, and some attribute values are even evaluated as interval numbers. In this paper, we proposed a fuzzy rank-inconsistent rate based on probability degree to judge the monotonicity of interval numbers. Furthermore, we devised a hybrid model composed of monotonic and non-monotonic attributes to construct a mixed monotone decision tree for interval-valued data. Experiments on artificial and real-world data sets show that the proposed hybrid model is effective.
{"title":"A hybrid monotone decision tree model for interval-valued attributes","authors":"Jiankai Chen, Zhongyan Li, Xin Wang, Junhai Zhai","doi":"10.1007/s43674-021-00016-6","DOIUrl":"10.1007/s43674-021-00016-6","url":null,"abstract":"<div><p>The existing monotonic decision tree algorithms are based on a linearly ordered constraint that certain attributes are monotonously consistent with the decision, which could be called monotonic attributes, whereas others, called non-monotonic attributes. In practice, monotonic and non-monotonic attributes coexist in most classification tasks, and some attribute values are even evaluated as interval numbers. In this paper, we proposed a fuzzy rank-inconsistent rate based on probability degree to judge the monotonicity of interval numbers. Furthermore, we devised a hybrid model composed of monotonic and non-monotonic attributes to construct a mixed monotone decision tree for interval-valued data. Experiments on artificial and real-world data sets show that the proposed hybrid model is effective.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-021-00016-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-17DOI: 10.1007/s43674-021-00022-8
Alaa El Khatib, Fakhri Karray
Continual learning models are known to suffer from catastrophic forgetting. Existing regularization methods to countering forgetting operate by penalizing large changes to learned parameters. A significant downside to these methods, however, is that, by effectively freezing model parameters, they gradually suspend the capacity of a model to learn new tasks. In this paper, we explore an alternative approach to the continual learning problem that aims to circumvent this downside. In particular, we ask the question: instead of forcing continual learning models to remember the past, can we modify the learning process from the start, such that the learned representations are less susceptible to forgetting? To this end, we explore multiple methods that could potentially encourage durable representations. We demonstrate empirically that the use of unsupervised auxiliary tasks achieves significant reduction in parameter re-optimization across tasks, and consequently reduces forgetting, without explicitly penalizing forgetting. Moreover, we propose a distance metric to track internal model dynamics across tasks, and use it to gain insight into the workings of our proposed approach, as well as other recently proposed methods.
{"title":"Toward durable representations for continual learning","authors":"Alaa El Khatib, Fakhri Karray","doi":"10.1007/s43674-021-00022-8","DOIUrl":"10.1007/s43674-021-00022-8","url":null,"abstract":"<div><p>Continual learning models are known to suffer from <i>catastrophic forgetting</i>. Existing regularization methods to countering forgetting operate by penalizing large changes to learned parameters. A significant downside to these methods, however, is that, by effectively freezing model parameters, they gradually suspend the capacity of a model to learn new tasks. In this paper, we explore an alternative approach to the continual learning problem that aims to circumvent this downside. In particular, we ask the question: instead of forcing continual learning models to remember the past, can we modify the learning process from the start, such that the learned representations are less susceptible to forgetting? To this end, we explore multiple methods that could potentially encourage durable representations. We demonstrate empirically that the use of unsupervised auxiliary tasks achieves significant reduction in parameter re-optimization across tasks, and consequently reduces forgetting, without explicitly penalizing forgetting. Moreover, we propose a distance metric to track internal model dynamics across tasks, and use it to gain insight into the workings of our proposed approach, as well as other recently proposed methods.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-021-00022-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-17DOI: 10.1007/s43674-021-00019-3
Yunhe Wei, Huifang Ma, Ruoyi Zhang
Social recommendation has become an important technique of various online commerce platforms, which aims to predict the user preference based on the social network and the interactive network. Social recommendation, which can naturally integrate social information and interactive structure, has been demonstrated to be powerful in solving data sparsity and cold-start problems. Although some of the existing methods have been proven effective, the following two insights are often neglected. First, except for the explicit connections, social information contains implicit connections, e.g., indirect social relations. Indirect social relations can effectively improve the quality of recommendation when users only have few direct social relations. Second, the strength of social influence between users is different. In other words, users have different degrees of trust in different friends. These insights motivate us to propose a novel social recommendation model SIER (short for Social Influence-based Effective Recommendation) in this paper, which incorporates interactive information and social information into personal latent factors learning for social influence-based recommendation. Specifically, user preferences are captured in behavior history and social relations, i.e., user latent factors are shared in interactive network and social network. In particular, we utilize an overlapping community detection method to sufficiently capture the implicit relations in the social network. Extensive experiments on two real-world datasets demonstrate the effectiveness of the proposed method.
社交推荐已经成为各种在线商务平台的一项重要技术,旨在基于社交网络和互动网络预测用户偏好。社会推荐可以自然地整合社会信息和互动结构,在解决数据稀疏和冷启动问题方面已经被证明是强大的。尽管现有的一些方法已被证明是有效的,但以下两个见解往往被忽视。首先,除了显性联系之外,社会信息还包含隐性联系,例如间接社会关系。当用户只有很少的直接社会关系时,间接社会关系可以有效地提高推荐质量。第二,用户之间的社会影响力不同。换句话说,用户对不同的朋友有不同程度的信任。这些见解促使我们在本文中提出了一个新的社会推荐模型SIER(social Influence based Effective recommendation的缩写),该模型将互动信息和社会信息纳入个人潜在因素学习中,用于基于社会影响的推荐。具体而言,用户偏好被捕获在行为历史和社会关系中,即用户潜在因素在互动网络和社交网络中共享。特别地,我们利用重叠社区检测方法来充分捕捉社交网络中的隐含关系。在两个真实世界数据集上进行的大量实验证明了该方法的有效性。
{"title":"Social influence-based personal latent factors learning for effective recommendation","authors":"Yunhe Wei, Huifang Ma, Ruoyi Zhang","doi":"10.1007/s43674-021-00019-3","DOIUrl":"10.1007/s43674-021-00019-3","url":null,"abstract":"<div><p>Social recommendation has become an important technique of various online commerce platforms, which aims to predict the user preference based on the social network and the interactive network. Social recommendation, which can naturally integrate social information and interactive structure, has been demonstrated to be powerful in solving data sparsity and cold-start problems. Although some of the existing methods have been proven effective, the following two insights are often neglected. First, except for the explicit connections, social information contains implicit connections, e.g., indirect social relations. Indirect social relations can effectively improve the quality of recommendation when users only have few direct social relations. Second, the strength of social influence between users is different. In other words, users have different degrees of trust in different friends. These insights motivate us to propose a novel social recommendation model SIER (short for Social Influence-based Effective Recommendation) in this paper, which incorporates interactive information and social information into personal latent factors learning for social influence-based recommendation. Specifically, user preferences are captured in behavior history and social relations, i.e., user latent factors are shared in interactive network and social network. In particular, we utilize an overlapping community detection method to sufficiently capture the implicit relations in the social network. Extensive experiments on two real-world datasets demonstrate the effectiveness of the proposed method.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-021-00019-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-17DOI: 10.1007/s43674-021-00015-7
Hufsa Khan, Han Liu, Chao Liu
In classification tasks, unlabeled data bring the uncertainty in the learning process, which may result in the degradation of the performance. In this paper, we propose a novel semi-supervised inception neural network ensemble-based architecture to achieve missing label imputation. The main idea of the proposed architecture is to use smaller ensembles within a larger ensemble to involve diverse ways of missing label imputation and internal transformation of feature representation, towards enhancing the prediction accuracy. Following the process of imputing the missing labels of unlabeled data, the human-labeled data and the data with imputed labels are used together as a training set for the credible classifiers learning. Meanwhile, we discuss how this proposed approach is more effective as compared to the traditional ensemble learning approaches. Our proposed approach is evaluated on different well-known benchmark data sets, and the experimental results show the effectiveness of the proposed method. In addition, the approach is validated by statistical analysis using Wilcoxon signed rank test and the results indicate statistical significance of the performance improvement in comparison with other methods.
{"title":"Missing label imputation through inception-based semi-supervised ensemble learning","authors":"Hufsa Khan, Han Liu, Chao Liu","doi":"10.1007/s43674-021-00015-7","DOIUrl":"10.1007/s43674-021-00015-7","url":null,"abstract":"<div><p>In classification tasks, unlabeled data bring the uncertainty in the learning process, which may result in the degradation of the performance. In this paper, we propose a novel semi-supervised inception neural network ensemble-based architecture to achieve missing label imputation. The main idea of the proposed architecture is to use smaller ensembles within a larger ensemble to involve diverse ways of missing label imputation and internal transformation of feature representation, towards enhancing the prediction accuracy. Following the process of imputing the missing labels of unlabeled data, the human-labeled data and the data with imputed labels are used together as a training set for the credible classifiers learning. Meanwhile, we discuss how this proposed approach is more effective as compared to the traditional ensemble learning approaches. Our proposed approach is evaluated on different well-known benchmark data sets, and the experimental results show the effectiveness of the proposed method. In addition, the approach is validated by statistical analysis using Wilcoxon signed rank test and the results indicate statistical significance of the performance improvement in comparison with other methods.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-021-00015-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Self-supervised learning based on mutual information makes good use of classification models and label information produced by clustering tasks to train networks parameters, and then updates the downstream clustering assignment with respect to maximizing mutual information between label information. This kind of methods have attracted more and more attention and obtained better progress, but there is still a larger improvement space compared with the methods of supervised learning, especially on the challenge image datasets. To this end, a self-supervised deep clustering method by maximizing mutual information is proposed (bi-MIM-SSC), where deep convolutional network is employed as a feature encoder. The first term is to maximize mutual information between output-feature pairs for importing more semantic meaning to the output features. The second term is to maximize mutual information between an input image and its feature generated by the encoder for keeping the useful information of an original image in latent space as possible. Furthermore, pre-training is carried out to further enhance the representation ability of the encoder, and the auxiliary over-clustering is added in clustering network. The performance of the proposed method bi-MIM-SSC is compared with other clustering methods on the CIFAR10, CIFAR100 and STL10 datasets. Experimental results demonstrate that the proposed bi-MIM-SSC method has better feature representation ability and provide better clustering results.
{"title":"Maximizing bi-mutual information of features for self-supervised deep clustering","authors":"Jiacheng Zhao, Junfen Chen, Xiangjie Meng, Junhai Zhai","doi":"10.1007/s43674-021-00012-w","DOIUrl":"10.1007/s43674-021-00012-w","url":null,"abstract":"<div><p>Self-supervised learning based on mutual information makes good use of classification models and label information produced by clustering tasks to train networks parameters, and then updates the downstream clustering assignment with respect to maximizing mutual information between label information. This kind of methods have attracted more and more attention and obtained better progress, but there is still a larger improvement space compared with the methods of supervised learning, especially on the challenge image datasets. To this end, a self-supervised deep clustering method by maximizing mutual information is proposed (bi-MIM-SSC), where deep convolutional network is employed as a feature encoder. The first term is to maximize mutual information between output-feature pairs for importing more semantic meaning to the output features. The second term is to maximize mutual information between an input image and its feature generated by the encoder for keeping the useful information of an original image in latent space as possible. Furthermore, pre-training is carried out to further enhance the representation ability of the encoder, and the auxiliary over-clustering is added in clustering network. The performance of the proposed method bi-MIM-SSC is compared with other clustering methods on the CIFAR10, CIFAR100 and STL10 datasets. Experimental results demonstrate that the proposed bi-MIM-SSC method has better feature representation ability and provide better clustering results.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50486324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-15DOI: 10.1007/s43674-021-00013-9
Hong-Jie Xing, Yu-Wen Bai
Extreme learning machine (ELM) possesses merits of rapid learning speed and good generalization ability. However, due to the random initialization of connection weights, the network outputs of ELM are usually unstable. Similar to ELM, one-class ELM (OCELM) also has the disadvantage of output instability. To enhance the stability and generalization performance of OCELM, a selective ensemble of OCELMs based on rotation transformation is proposed. First, principal component analysis (PCA)-based rotation transformation is utilized to construct different transformed training sets. Furthermore, several component OCELMs are trained independently on these training sets. Second, a dissimilarity measure based on angle cosine is used to evaluate the dissimilarity between each pair of OCELMs. The diversity of each component OCELM in the obtained ensemble can be further achieved. Thereafter, the component OCELMs with lower value of diversity are removed from the original ensemble. Finally, the voting strategy is utilized to determine that testing samples belong to the target class or the non-target class. Experimental results on 15 UCI benchmark data sets and one handwritten digit data set show that the proposed method is superior to its related approaches.
{"title":"Rotation transformation-based selective ensemble of one-class extreme learning machines","authors":"Hong-Jie Xing, Yu-Wen Bai","doi":"10.1007/s43674-021-00013-9","DOIUrl":"10.1007/s43674-021-00013-9","url":null,"abstract":"<div><p>Extreme learning machine (ELM) possesses merits of rapid learning speed and good generalization ability. However, due to the random initialization of connection weights, the network outputs of ELM are usually unstable. Similar to ELM, one-class ELM (OCELM) also has the disadvantage of output instability. To enhance the stability and generalization performance of OCELM, a selective ensemble of OCELMs based on rotation transformation is proposed. First, principal component analysis (PCA)-based rotation transformation is utilized to construct different transformed training sets. Furthermore, several component OCELMs are trained independently on these training sets. Second, a dissimilarity measure based on angle cosine is used to evaluate the dissimilarity between each pair of OCELMs. The diversity of each component OCELM in the obtained ensemble can be further achieved. Thereafter, the component OCELMs with lower value of diversity are removed from the original ensemble. Finally, the voting strategy is utilized to determine that testing samples belong to the target class or the non-target class. Experimental results on 15 UCI benchmark data sets and one handwritten digit data set show that the proposed method is superior to its related approaches.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50483069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-15DOI: 10.1007/s43674-021-00007-7
K. Gavaskar, U. S. Ragupathy, S. Elango, M. Ramyadevi, S. Preethi
Security and safety are a necessity for automated teller machines (ATM). The ATM security system is implemented using the Internet of things (IoT) and GPS (global positioning system). The main idea of this project is to develop an ATM surveillance and security system. In this project, when any physical attack against the ATM takes place, then information about the attack is sent using IoT and also alerts the surrounding area using a buzzer, at the same time the entire data from the sensors is sent to the developed mobile application and puts alert message to the bank officials. The officials who have control over the mobile application can control the Door through their mobile to lock from their location remotely. To prevent the escape of the thief chloroform connected to the controller through relay can also be sprayed inside the ATM by the officials remotely from their place using the mobile app. The Camera (ESP32) is used for live video coverage and to monitor the activity inside the ATM. The Camera will not only record the activity but also, transmit will live video taken inside the ATM and the ATM location as latitude and longitude are tracked using GPS. The system is connected to the Blynk mobile application. The sensor and GPS data are read by the microcontroller and these data are sent to the Blynk application. With the help of the Blynk application, the official who has access to it can control the relays and the respective devices connected to the relay to turn it ON or OFF. It can be used in many real-time applications such as banks, homes, and industries.
{"title":"A novel design and implementation of IoT based real-time ATM surveillance and security system","authors":"K. Gavaskar, U. S. Ragupathy, S. Elango, M. Ramyadevi, S. Preethi","doi":"10.1007/s43674-021-00007-7","DOIUrl":"10.1007/s43674-021-00007-7","url":null,"abstract":"<div><p>Security and safety are a necessity for automated teller machines (ATM). The ATM security system is implemented using the Internet of things (IoT) and GPS (global positioning system). The main idea of this project is to develop an ATM surveillance and security system. In this project, when any physical attack against the ATM takes place, then information about the attack is sent using IoT and also alerts the surrounding area using a buzzer, at the same time the entire data from the sensors is sent to the developed mobile application and puts alert message to the bank officials. The officials who have control over the mobile application can control the Door through their mobile to lock from their location remotely. To prevent the escape of the thief chloroform connected to the controller through relay can also be sprayed inside the ATM by the officials remotely from their place using the mobile app. The Camera (ESP32) is used for live video coverage and to monitor the activity inside the ATM. The Camera will not only record the activity but also, transmit will live video taken inside the ATM and the ATM location as latitude and longitude are tracked using GPS. The system is connected to the Blynk mobile application. The sensor and GPS data are read by the microcontroller and these data are sent to the Blynk application. With the help of the Blynk application, the official who has access to it can control the relays and the respective devices connected to the relay to turn it ON or OFF. It can be used in many real-time applications such as banks, homes, and industries.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50483797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wheat is the most important source of food on earth and vital for food safety. It contains 75–80% carbohydrates, 9–18% protein, fiber, many vitamins (especially B vitamins), calcium, iron, and many macronutrients and micronutrients. According to data from the International Grain Council (IGC), wheat has continued to be the most important food grain source for humans in the world. Therefore, determining wheat production behavior has a very important role in food security. In this study, we have modeled and forecasted the production of wheat for 6 years from 2020 to 2025 using ARIMA and Holt’s linear trend models in Afghanistan, Bangladesh, Bhutan, China, India, Nepal, and Pakistan, which are all countries in the South Asian region. Since there is an expectation of a decrease in wheat production in some of these countries, this study can provide these countries with the information they need to take appropriate decisions to prevent the occurrence of food problems in the future and to help deal with food security. Moreover, this projection helps with policy implications and planning.
{"title":"Modeling and forecasting of wheat of South Asian region countries and role in food security","authors":"Aynur Yonar, Harun Yonar, Pradeep Mishra, Binita Kumari, Mostafa Abotaleb, Amr Badr","doi":"10.1007/s43674-021-00027-3","DOIUrl":"10.1007/s43674-021-00027-3","url":null,"abstract":"<div><p>Wheat is the most important source of food on earth and vital for food safety. It contains 75–80% carbohydrates, 9–18% protein, fiber, many vitamins (especially B vitamins), calcium, iron, and many macronutrients and micronutrients. According to data from the International Grain Council (IGC), wheat has continued to be the most important food grain source for humans in the world. Therefore, determining wheat production behavior has a very important role in food security. In this study, we have modeled and forecasted the production of wheat for 6 years from 2020 to 2025 using ARIMA and Holt’s linear trend models in Afghanistan, Bangladesh, Bhutan, China, India, Nepal, and Pakistan, which are all countries in the South Asian region. Since there is an expectation of a decrease in wheat production in some of these countries, this study can provide these countries with the information they need to take appropriate decisions to prevent the occurrence of food problems in the future and to help deal with food security. Moreover, this projection helps with policy implications and planning.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"1 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50473165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-27DOI: 10.1007/s43674-021-00010-y
Ran Wang, Zichao Zhang, Wing W. Y. Ng, Wenhui Wu
Discounted 0-1 knapsack problem (D0-1KP) has been proved to be NP-hard, thus a lot of researches focus on designing non-deterministic algorithms to solve it. Group theory-based optimization algorithm (GTOA), as a recently proposed evolutionary algorithm (EA), can provide satisfactory results to D0-1KP. GTOA introduces important theories of algebra, i.e., group theory, to describe combinatorial optimization problems, and applies the classic operations in group theory to design operators for EA. In order to generate a better solution according to a set of existing solutions during each evolutionary iteration, an important operator called random linear combination operator (RLCO) is designed. However, the practical meaning of applying the operations in group theory is hard to explain, and the proposed RLCO is lack of interpretability, causing difficulties in analyzing and improving the algorithm. In this paper, to improve the interpretability and further enhance the performance, we propose a new operator named random xor operator (RXO), and interpret it from the view point of bitwise operation. By replacing RLCO with RXO, a new GTOA algorithm is realized for D0-1KP. Experimental results demonstrate that it can provide very competitive performance.
{"title":"An improved group theory-based optimization algorithm for discounted 0-1 knapsack problem","authors":"Ran Wang, Zichao Zhang, Wing W. Y. Ng, Wenhui Wu","doi":"10.1007/s43674-021-00010-y","DOIUrl":"10.1007/s43674-021-00010-y","url":null,"abstract":"<div><p>Discounted 0-1 knapsack problem (D0-1KP) has been proved to be NP-hard, thus a lot of researches focus on designing non-deterministic algorithms to solve it. Group theory-based optimization algorithm (GTOA), as a recently proposed evolutionary algorithm (EA), can provide satisfactory results to D0-1KP. GTOA introduces important theories of algebra, i.e., group theory, to describe combinatorial optimization problems, and applies the classic operations in group theory to design operators for EA. In order to generate a better solution according to a set of existing solutions during each evolutionary iteration, an important operator called random linear combination operator (RLCO) is designed. However, the practical meaning of applying the operations in group theory is hard to explain, and the proposed RLCO is lack of interpretability, causing difficulties in analyzing and improving the algorithm. In this paper, to improve the interpretability and further enhance the performance, we propose a new operator named random xor operator (RXO), and interpret it from the view point of bitwise operation. By replacing RLCO with RXO, a new GTOA algorithm is realized for D0-1KP. Experimental results demonstrate that it can provide very competitive performance.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"1 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43674-021-00010-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50519069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-11DOI: 10.1007/s43674-021-00009-5
Xinhong Meng, Fusheng Xu, Hailiang Ye, Feilong Cao
This paper proposes some distributed algorithms to solve the sparse factorization of a large-scale nonnegative matrix (SFNM). These distributed algorithms combine some merits of classical nonnegative matrix factorization (NMF) algorithms and distributed learning network. Our proposed algorithms utilize the whole nodes of network to solve a factorization problem of a nonnegative matrix; the fact is that per node copes with a part of the matrix, then uses the distributed average consensus (DAC) algorithm or regional nodes to communicate the parameters gained by each node to ensure them to be convergent or easy to calculation. Different from other existing distributed learning algorithms of NMF, which always need high-qualified hardware or complicated computing methods, our algorithms make a full use of the simplicity of traditional NMF algorithms and distributed thoughts. Some artificial datasets are used for testing these algorithms, and the experimental results with comparisons show that the proposed algorithms perform favorably in terms of accuracy and efficiency.
{"title":"The sparse factorization of nonnegative matrix in distributed network","authors":"Xinhong Meng, Fusheng Xu, Hailiang Ye, Feilong Cao","doi":"10.1007/s43674-021-00009-5","DOIUrl":"10.1007/s43674-021-00009-5","url":null,"abstract":"<div><p>This paper proposes some distributed algorithms to solve the sparse factorization of a large-scale nonnegative matrix (SFNM). These distributed algorithms combine some merits of classical nonnegative matrix factorization (NMF) algorithms and distributed learning network. Our proposed algorithms utilize the whole nodes of network to solve a factorization problem of a nonnegative matrix; the fact is that per node copes with a part of the matrix, then uses the distributed average consensus (DAC) algorithm or regional nodes to communicate the parameters gained by each node to ensure them to be convergent or easy to calculation. Different from other existing distributed learning algorithms of NMF, which always need high-qualified hardware or complicated computing methods, our algorithms make a full use of the simplicity of traditional NMF algorithms and distributed thoughts. Some artificial datasets are used for testing these algorithms, and the experimental results with comparisons show that the proposed algorithms perform favorably in terms of accuracy and efficiency.</p></div>","PeriodicalId":72089,"journal":{"name":"Advances in computational intelligence","volume":"1 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50473240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}