Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    HYBRID EVOLUTIONARY AND ANNEALING ALGORITHMS FOR NONLINEAR DISCRETE CONSTRAINED OPTIMIZATION

    This paper presents a procedural framework that unifies various mechanisms to look for discrete-neighborhood saddle points in solving discrete constrained optimization problems (DCOPs). Our approach is based on the necessary and sufficient condition on local optimality in discrete space, which shows the one-to-one correspondence between the discrete-space constrained local minima of a problem and the saddle points of the corresponding Lagrangian function. To look for such saddle points, we study various mechanisms for performing ascents of the Lagrangian function in the original-variable subspace and descents in the Lagrange-multiplier subspace. Our results show that CSAEA, a combined constrained simulated annealing and evolutionary algorithm, performs well when using mutations and crossovers to generate trial points and accepting them based on the Metropolis probability. We apply iterative deepening to determine the optimal number of generations in CSAEA and show that its performance is robust with respect to changes in population size. To test the performance of the procedures developed, we apply them to solve some continuous and mixed-integer nonlinear programming (NLP) benchmarks and show that they obtain better results than those of existing algorithms.

  • articleNo Access

    EVOLUTIONARY MULTI-OBJECTIVE OPTIMISATION OF NEURAL NETWORKS FOR FACE DETECTION

    For face recognition from video streams speed and accuracy are vital aspects. The first decision whether a preprocessed image region represents a human face or not is often made by a feed-forward neural network (NN), e.g. in the Viisage-FaceFINDER® video surveillance system. We describe the optimisation of such a NN by a hybrid algorithm combining evolutionary multi-objective optimisation (EMO) and gradient-based learning. The evolved solutions perform considerably faster than an expert-designed architecture without loss of accuracy. We compare an EMO and a single objective approach, both with online search strategy adaptation. It turns out that EMO is preferable to the single objective approach in several respects.

  • articleNo Access

    RELIABLE COMMUNICATION NETWORK DESIGN WITH EVOLUTIONARY ALGORITHMS

    For the reliable communication network design (RCND) problem unreliable links are available, each bearing several options which have different levels of reliability and varying costs. The goal is to find the most cost-effective communication network design that satisfies a predefined overall reliability constraint. This paper presents two new evolutionary algorithm (EA) approaches to solving the RCND problem: LaBORNet and BaBORNet. LaBORNet uses an encoding that represents the network topology as well as the used link options while repairing infeasible solutions using an additional repair heuristic (CURE). BaBORNet encodes only the network topology and determines the link options by using the repair heuristic CURE as a local search method. The experimental results show that the new EA approaches using repair heuristics outperform existing EA approaches from the literature using penalties for infeasible solutions. They also find better solutions for existing problems from the literature, as well as for new and larger test problems.

  • articleNo Access

    GENETIC ALGORITHMS WITH DYNAMIC MUTATION RATES AND THEIR INDUSTRIAL APPLICATIONS

    This paper presents a method on how to estimate main effects of gene representation. This estimate can be used not only to understand the domination of genes in the representation but also to design the mutation rate in genetic algorithms (GAs). A new approach of dynamic mutation rate is proposed by integrating the information of the main effects into the genes. By introducing the proposed method in GAs, both solution quality and solution stability can be improved in solving a set of parametrical test functions. The algorithm was applied to two illustrative applications to evaluate the performance of the proposed method, where the first application is on solving uncapacitated facility location problems and the next is on optimal power flow problems, which are employed. Results indicate that the proposed method yields significantly better results than the existing methods.

  • articleNo Access

    COMBINING GENETIC PROGRAMMING AND MODEL-DRIVEN DEVELOPMENT

    Genetic programming (GP) is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In most cases it is a hardwired module of a design framework assisting the engineer in optimizing specific aspects in system development. In this article, we show how the utility of GP can be increased remarkably by isolating it as a component and integrating it into the model-driven software development process. Our GP framework produces XMI-encoded UML models that can easily be loaded into widely available modeling tools, which in turn offer code generation as well as additional analysis and test capabilities. We use the evolution of a distributed election algorithm as an example to illustrate how GP can be combined with model-driven development (MDD).

  • articleNo Access

    FUZZY OPERATOR TREES FOR MODELING RATING FUNCTIONS

    We introduce a new method for modeling rating (utility) functions which employs techniques from fuzzy set theory. The main idea is to build a hierarchical model, called a fuzzy operator tree (FOT), by recursively decomposing a rating criterion into sub-criteria, and to combine the evaluations of these sub-criteria by means of suitable aggregation operators. Apart from the model conception itself, we propose an evolutionary method for model calibration that fits the parameters of an FOT to exemplary ratings. The possibility to adapt an FOT to a given set of data makes the approach also interesting from a machine learning point of view. The performance of the approach is evaluated by means of a suitable experimental study.

  • articleNo Access

    KNOWLEDGE-BASED METHODS FOR OPTIMUM APPROXIMATION OF GEOMETRIC DILUTION OF PRECISION

    Global Positioning System (GPS) satellites signal processing to obtain all in view satellite measurements and to use them to find a solution and to do integrity monitoring forms a major component of the load on the receiver's processing element. If processing capability is limited there is restriction on the number of measurements which can be obtained and processed. Alternatively, the number of measurements can be restricted and the resulting saving in load on the processor can be used to offer more spare processing time which can be used for other user specific requirements. Thus if m visible satellites can provide measurements only n measurements can be used (n < m). The arrangement and the number of GPS satellites influence measurement accuracy. Dilution of Precision (DOP) is an index evaluating the arrangement of satellites. Geometric DOP (GDOP) is, in effect, the amplification factor of pseudo-range measurement errors into user errors due to the effect of satellite geometry. The GDOP approximation is an essential feature in determining the performance of a positioning system. In this paper, knowledge-based methods such as neural networks and evolutionary adaptive filters are presented for optimum approximation of GDOP. Without matrix inversion required, the knowledge-based approaches are capable of evaluating all subsets of satellites and hence reduce the computational burden. This would enable the use of a high-integrity navigation solution without the delay required for many matrix inversions. Models validity is verified with test data. The results are highly effective techniques for GDOP approximation.

  • articleNo Access

    A CLUSTERING-BASED NICHING FRAMEWORK FOR THE APPROXIMATION OF EQUIVALENT PARETO-SUBSETS

    In many optimization problems in practice, multiple objectives have to be optimized at the same time. Some multi-objective problems are characterized by multiple connected Pareto-sets at different parts in decision space — also called equivalent Pareto-subsets. We assume that the practitioner wants to approximate all Pareto-subsets to be able to choose among various solutions with different characteristics. In this work, we propose a clustering-based niching framework for multi-objective population-based approaches that allows to approximate equivalent Pareto-subsets. Iteratively, the clustering process assigns the population to niches, and the multi-objective optimization process concentrates on each niche independently. Two exemplary hybridizations, rake selection and DBSCAN, as well as SMS-EMOA and kernel density clustering demonstrate that the niching framework allows enough diversity to detect and approximate equivalent Pareto-subsets.

  • articleNo Access

    EVOLUTIONARY TUNING OF MODULAR FUZZY CONTROLLER FOR TWO-WHEELED WHEELCHAIR

    In this work, an optimization technique is adopted to manipulate the input and output scaling factors of a modular fuzzy logic controller (MFC) for lifting and stabilizing the front wheels of a wheelchair in two-wheeled mode. A virtual wheelchair (WC) model is developed within Visual Nastran (VN) software environment where the model is further linked with Matlab/Simulink for control purposes. The lifting of the chair is done by transforming the first link (Link1), attached to the front wheels (casters) to the upright position while maintaining stability of the second link (Link2) where the payload is attached. General rules of thumb allow heuristic tuning (trial and error) of the parameters but such heuristic method does not guarantee that the system tuned with current data set will represent future system states. A global optimization mechanism such as genetic algorithm is necessary to improve the system performance. Due to its significant advantages over other searching methods, a genetic algorithm approach is used to optimize the scaling factors of the MFC and results show that the optimized parameters give better system performance for such a complex, highly nonlinear two-wheeled wheelchair system.

  • articleNo Access

    A GENETIC PROGRAMMING-BASED LEARNING ALGORITHMS FOR PRUNING COST-SENSITIVE CLASSIFIERS

    In this paper, we introduce a new hybrid learning algorithm, called DTGP, to construct cost-sensitive classifiers. This algorithm uses a decision tree as its basic classifier and the constructed decision tree will be pruned by a genetic programming algorithm using a fitness function that is sensitive to misclassification costs. The proposed learning algorithm has been examined through six cost-sensitive problems. The experimental results show that the proposed learning algorithm outperforms in comparison to some other known learning algorithms like C4.5 or naïve Bayesian.

  • articleNo Access

    An Experimental Analysis of a New Interval-Based Mutation Operator

    In this paper, we present a novel Interval-Based Mutation (IBMU) operator. The proposed mutation operator is performing coarse-grained search at initial stage in order to speed up convergence toward more promising regions of the search landscape. Then, more fine-grained search is performed in order to guide the solutions towards the Pareto front. Computational experiments indicate that the proposed mutation operator performs better than conventional approaches for solving several well-known benchmarking problems.

  • articleNo Access

    Survey of Uses of Evolutionary Computation Algorithms and Swarm Intelligence for Network Intrusion Detection

    Many infrastructures, such as those of finance and banking, transportation, military and telecommunications, are highly dependent on the Internet. However, as the Internet’s underlying structural protocols and governance can be disturbed by intruders, for its smooth operation, it is important to minimize such disturbances. Of the available techniques for achieving this, computational intelligence methodologies, such as evolutionary algorithms and swarm intelligence approaches, are popular and have been successfully applied to detect intrusions. In this paper, we present an overview of these techniques and related literature on intrusion detection, analyze their research contributions, compare their approaches and discuss new research directions which will provide useful insights for intrusion detection researchers and practitioners.

  • articleNo Access

    A Novel Approach for Optimization in Dynamic Environments Based on Modified Artificial Fish Swarm Algorithm

    Swarm intelligence algorithms are amongst the most efficient approaches toward solving optimization problems. Up to now, most of swarm intelligence approaches have been proposed for optimization in static environments. However, numerous real-world problems are dynamic which could not be solved using static approaches. In this paper, a novel approach based on artificial fish swarm algorithm (AFSA) has been proposed for optimization in dynamic environments in which changes in the problem space occur in discrete intervals. The proposed algorithm can quickly find the peaks in the problem space and track them after an environment change. In this algorithm, artificial fish swarms are responsible for finding and tracking peaks and several behaviors and mechanisms are employed to cope with the dynamic environment. Extensive experiments show that the proposed algorithm significantly outperforms previous algorithms in most of tested dynamic environments modeled by moving peaks benchmark.

  • articleNo Access

    Efficient Computation Offloading in Mobile Cloud Computing with Nature-Inspired Algorithms

    The ubiquitous presence of smart phones and other hand-held computing devices has resulted in a growing feasibility to utilize them as computing resources. However, these mobile devices are constrained in battery and may not possess adequate capability for computationally intensive tasks. Cloud computing allows mobile devices to address their inherent challenges by making it possible to offload computation, completely or partially, to powerful cloud servers. This enables mobile devices to act as compute resources; though, it also results in cost of using cloud servers as well as communication cost involved in offloading. The paper models the computation offloading problem as an optimization problem and makes use of nature-inspired algorithms for deciding whether a task should be executed locally on a mobile device or offloaded to the cloud. The study was performed over four algorithms, namely Genetic Algorithm (GA), Differential Evolution (DE), Particle Swarm Optimization (PSO) and Shuffled Frog Leaping Algorithm (SFLA). Experimental analysis revealed that these algorithms outperform exhaustive search technique by providing a near optimal solution in a reasonable time even for large workflows. Results also establish that GA outperforms DE, PSO and SFLA by around 45%, 65% and 42%, respectively by reducing an application’s overall execution cost.

  • articleNo Access

    Optimizing Nonlinear Parameters of Sugeno Type Fuzzy Rules using GWO for Data Classification

    In this paper, a Sugeno type fuzzy system based on the fuzzy clustering has been developed for a variety of datasets. The number of rules for each dataset is based on the optimum number of clusters in that dataset. Rule sets provide the knowledge base for the classification of data. Each rule set is fine-tuned using the GWO with the intention to improve the classification. The approach is compared with the work of previous researchers on similar data sets using a variety of techniques, including nature-inspired algorithms such as genetic algorithms and Swarm based algorithms. Statistical Analysis of the performance of GWO shows that it is better than five other algorithms 95% of the time.

  • articleNo Access

    A MULTI-OBJECTIVE RISK-BASED FRAMEWORK FOR MISSION CAPABILITY PLANNING

    In this paper, we propose a risk-based framework for military capability planning. Within this framework, metaheuristic techniques such as Evolutionary Algorithms are used to deal with multi-objectivity of a class of NP-hard resource investment problems, called The Mission Capability Planning Problem, under the presence of risk factors. This problem inherently has at least two conflicting objectives: minimizing the cost of investment in the resources as well as the makespan of the plans. The framework allows the addition of a risk-based objective to the problem in order to support risk assessment during the planning process. In other words, with this framework, a mechanism of progressive risk assessment is introduced to capability planning.

    We analyze the performance of the proposed framework under both scenarios: with and without risk. In the case of no risk, the purpose is to study several optimization-related aspects of the framework such as convergence, trade-off analysis, and its sensitivity to the algorithm parameters; while the second case is to demonstrate the ability of the framework in supporting risk assessment and also robustness analysis.

  • articleNo Access

    Editorial — Recent Progress in Intelligent and Evolutionary Algorithms and their Applications

    This is a topical issue on the 16th Asia–Pacific Symposium on Intelligent and Evolutionary Systems (IES) which was held in Kyoto from December 12–14, 2012. This special issue contains six articles related to evolutionary algorithms that are designed to solve optimization problems, network concepts, mathematical methods and their real world applications.

  • articleNo Access

    Cultural Algorithms as a Framework for the Design of Trustable Evolutionary Algorithms

    One of the major challenges facing Artificial Intelligence in the future is the design of trustworthy algorithms. The development of trustworthy algorithms will be a key challenge in Artificial Intelligence for years to come. Cultural Algorithms (CAs) are viewed as one framework that can be employed to produce a trustable evolutionary algorithm. They contain features to support both sustainable and explainable computation that satisfy requirements for trustworthy algorithms proposed by Cox [Nine experts on the single biggest obstacle facing AI and algorithms in the next five years, Emerging Tech Brew, January 22, 2021]. Here, two different configurations of CAs are described and compared in terms of their ability to support sustainable solutions over the complete range of dynamic environments, from static to linear to nonlinear and finally chaotic. The Wisdom of the Crowds method was selected for the one configuration since it has been observed to work in both simple and complex environments and requires little long-term memory. The Common Value Auction (CVA) configuration was selected to represent those mechanisms that were more data centric and required more long-term memory content.

    Both approaches were found to provide sustainable performance across all the dynamic environments tested from static to chaotic. Based upon the information collected in the Belief Space, they produced this behavior in different ways. First, the topologies that they employed differed in terms of the “in degree” for different complexities. The CVA approach tended to favor reduced “indegree/outdegree”, while the WM exhibited a higher indegree/outdegree in the best topology for a given environment. These differences reflected the fact the CVA had more information available for the agents about the network in the Belief Space, whereas the agents in the WM had access to less available knowledge. It therefore needed to spread the knowledge that it currently had more widely throughout the population.

  • articleOpen Access

    Adaptive Workflow Scheduling Using Evolutionary Approach in Cloud Computing

    Cloud services are used to achieve diverse computing needs such as cost, security, scalability, and availability. Acceleration evolution in the distributed and cloud domains is common for large and dynamic workflows deployment. Resources and task mapping depend on the user’s objectives such as reduction in cost or execution completion within the stipulated time in consideration with certain quality of services. Multiple virtual machine instances can be launched by defining different configurations such as operating system, server types, and applications. Though workflow scheduling is an NP-Hard problem, variety of decision-making techniques are available for optimum resource allocation. In this research paper, different algorithms are studied and compared with evolutionary approaches. Workflow scheduling using genetic algorithm is implemented and discussed. This paper aims to design a decision-making technique to optimize resources of cloud. It is an adaptive scheduling to maximize profit by reducing execution time. The approach implemented is useful to cloud service providers to maximize profit and resource efficiency in their services.

  • articleOpen Access

    Digital Image Evolution of Artwork Without Human Evaluation Using the Example of the Evolving Mona Lisa Problem

    Whether for optimizing the speed of microprocessors or for sequence analysis in molecular biology — evolutionary algorithms are used in astoundingly many fields. Also, the art was influenced by evolutionary algorithms — with principles of natural evolution works of art that can be created or imitated, whereby initially generated art is put through an iterated process of selection and modification. This paper covers an application in which given images are emulated evolutionary using a finite number of semi-transparent overlapping polygons, which also became known under the name “Evolution of Mona Lisa”. In this context, different approaches to solve the problem are tested and presented here. In particular, we want to investigate whether Hill Climbing Algorithm in combination with Delaunay Triangulation and Canny Edge Detector that extracts the initial population directly from the original image performs better than the conventional Hill Climbing and Genetic Algorithm, where the initial population is generated randomly.