Comprehensive Taxonomies of Nature- and Bio-Inspired Optimization: Inspiration Versus Algorithmic Behavior, Critical Analysis Recommendations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Evolutionary Data Mining Approach to Creating Digital Logic
EVOLUTIONARY DATA MINING APPROACH TO CREATING DIGITAL LOGIC James F. Smith III, ThanhVu H. Nguyen Code 5741, Naval Research Laboratory, Washington, DC, 20375-5320, USA Keywords: Optimization problems in signal processing, signal reconstruction, system identification, time series and system modeling. Abstract: A data mining based procedure for automated reverse engineering has been developed. The data mining algorithm for reverse engineering uses a genetic program (GP) as a data mining function. A genetic program is an algorithm based on the theory of evolution that automatically evolves populations of computer programs or mathematical expressions, eventually selecting one that is optimal in the sense it maximizes a measure of effectiveness, referred to as a fitness function. The system to be reverse engineered is typically a sensor. Design documents for the sensor are not available and conditions prevent the sensor from being taken apart. The sensor is used to create a database of input signals and output measurements. Rules about the likely design properties of the sensor are collected from experts. The rules are used to create a fitness function for the genetic program. Genetic program based data mining is then conducted. This procedure incorporates not only the experts’ rules into the fitness function, but also the information in the database. The information extracted through this process is the internal design specifications of the sensor. Significant mathematical formalism and experimental results related to GP based data mining for reverse engineering will be provided. 1 INTRODUCTION The rules are used to create a fitness function for the genetic program. Genetic program based data An engineer must design a signal that will yield a mining is then conducted (Bigus 1996, Smith 2003a, particular type of output from a sensor device (SD). -
Herd Behavior and the Quality of Opinions
Journal of Socio-Economics 32 (2003) 661–673 Herd behavior and the quality of opinions Shinji Teraji Department of Economics, Yamaguchi University, 1677-1 Yoshida, Yamaguchi 753-8514, Japan Accepted 14 October 2003 Abstract This paper analyzes a decentralized decision model by adding some inertia in the social leaning process. Before making a decision, an agent can observe the group opinion in a society. Social learning can result in a variety of equilibrium behavioral patterns. For insufficient ranges of quality (precision) of opinions, the chosen stationary state is unique and globally accessible, in which all agents adopt the superior action. Sufficient quality of opinions gives rise to multiple stationary states. One of them will be characterized by inefficient herding. The confidence in the majority opinion then has serious welfare consequences. © 2003 Elsevier Inc. All rights reserved. JEL classification: D83 Keywords: Herd behavior; Social learning; Opinions; Equilibrium selection 1. Introduction Missing information is ubiquitous in our society. Product alternatives at the store, in catalogs, and on the Internet are seldom fully described, and detailed specifications are often hidden in manuals that are not easily accessible. In fact, which product a person decides to buy will depend on the experience of other purchasers. Learning from others is a central feature of most cognitive and choice activities, through which a group of interacting agents deals with environmental uncertainty. The effect of observing the consumption of others is described as the socialization effect. The pieces of information are processed by agents to update their assessments. Here people may change their preferences as a result of E-mail address: [email protected] (S. -
A Behavioural and Neuroeconomic Analysis of Individual Differences
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Apollo Herding in Financial Behaviour: A Behavioural and Neuroeconomic Analysis of Individual Differences M. Baddeley, C. Burke, W. Schultz and P. Tobler May 2012 CWPE 1225 1 HERDING IN FINANCIAL BEHAVIOR: A BEHAVIOURAL AND NEUROECONOMIC ANALYSIS OF INDIVIDUAL DIFFERENCES1,2 ABSTRACT Experimental analyses have identified significant tendencies for individuals to follow herd decisions, a finding which has been explained using Bayesian principles. This paper outlines the results from a herding task designed to extend these analyses using evidence from a functional magnetic resonance imaging (fMRI) study. Empirically, we estimate logistic functions using panel estimation techniques to quantify the impact of herd decisions on individuals' financial decisions. We confirm that there are statistically significant propensities to herd and that social information about others' decisions has an impact on individuals' decisions. We extend these findings by identifying associations between herding propensities and individual characteristics including gender, age and various personality traits. In addition fMRI evidence shows that individual differences correlate strongly with activations in the amygdala – an area of the brain commonly associated with social decision-making. Individual differences also correlate strongly with amygdala activations during herding decisions. These findings are used to construct a two stage least squares model of financial herding which confirms that individual differences and neural responses play a role in modulating the propensity to herd. Keywords: herding; social influence; individual differences; neuroeconomics; fMRI; amygdala JEL codes: D03, D53, D70, D83, D87, G11 1. Introduction Herding occurs when individuals‘ private information is overwhelmed by the influence of public information about the decisions of a herd or group. -
Herd Behavior by Commonlit Staff 2014
Name: Class: Herd Behavior By CommonLit Staff 2014 “Herd behavior” is a term used to describe the tendency of individuals to think and act as a group. As you read, take notes on the causes of herd behavior. Background [1] The term “herd behavior” comes from the behavior of animals in herds, particularly when they are in a dangerous situation such as escaping a predator. All of the animals band closely together in a group and, in panic mode, move together as a unit. It is very unusual for a member of the herd to stray from the movement of the unit. The term also applies to human behavior, and it usually describes large numbers of people acting the same way at the same time. It often has a "Herd of Goats" by Unknown is in the public domain. connotation1 of irrationality, as people’s actions are driven by emotion rather than by thinking through a situation. Human herd behavior can be observed at large-scale demonstrations, riots, strikes, religious gatherings, sports events, and outbreaks of mob violence. When herd behavior sets in, an individual person’s judgment and opinion- forming process shut down as he or she automatically follows the group’s movement and behavior. Examples of Herd Behavior Herd behavior in humans is frequently observed at times of danger and panic; for example, a fire in a building often causes herd behavior, with people often suspending their individual reasoning and fleeing together in a pack. People in a crisis that requires escape will attempt to move faster than normal, copy the actions of others, interact physically with each other, and ignore alternative strategies in favor of following the mass escape trend. -
Changing People's Preferences by the State and the Law
CHANGING PEOPLE'S PREFERENCES BY THE STATE AND THE LAW Ariel Porat* In standard economic models, two basic assumptions are made: the first, that actors are rational and, the second, that actors' preferences are a given and exogenously determined. Behavioral economics—followed by behavioral law and economics—has questioned the first assumption. This article challenges the second one, arguing that in many instances, social welfare should be enhanced not by maximizing satisfaction of existing preferences but by changing the preferences themselves. The article identifies seven categories of cases where the traditional objections to intentional preferences change by the state and the law lose force and argues that in these cases, such a change warrants serious consideration. The article then proposes four different modes of intervention in people's preferences, varying in intensity, on the one hand, and the identity of their addressees, on the other, and explains the relative advantages and disadvantages of each form of intervention. * Alain Poher Professor of Law at Tel Aviv University, Fischel-Neil Distinguished Visiting Professor of Law at the University of Chicago Law School, Visiting Professor of Law at Stanford Law School (Fall 2016) and Visiting Professor of Law at Berkeley Law School (Spring 2017). For their very helpful comments, I thank Ronen Avraham, Oren Bar-Gill, Yitzhak Benbaji, Hanoch Dagan, Yuval Feldman, Talia Fisher, Haim Ganz, Jacob Goldin, Sharon Hannes, David Heyd, Amir Khoury, Roy Kreitner, Tami Kricheli-Katz, Shai Lavi, Daphna Lewinsohn- Zamir, Nira Liberman, Amir Licht, Haggai Porat, Eric Posner, Ariel Rubinstein, Uzi Segal, and the participants in workshops at the Interdisciplinary Center in Herzliya and the Tel Aviv University Faculty of Law. -
A Genetic Algorithm Solution Approach Introd
A new optimization model for market basket analysis with allocation considerations: A genetic algorithm solution approach Majeed HEYDARI University of Zanjan, Zanjan, Iran [email protected] Amir YOUSEFLI Imam Khomeini International University, Qazvin, Iran [email protected] Abstract. Nowadays market basket analysis is one of the interested research areas of the data mining that has received more attention by researchers. But, most of the related research focused on the traditional and heuristic algorithms with limited factors that are not the only influential factors of the basket market analysis. In this paper to efficient modeling and analysis of the market basket data, the optimization model is proposed with considering allocation parameter as one of the important and effectual factors of the selling rate. The genetic algorithm approach is applied to solve the formulated non-linear binary programming problem and a numerical example is used to illustrate the presented model. The provided results reveal that the obtained solutions seem to be more realistic and applicable. Keywords: market basket analysis, association rule, non-linear programming, genetic algorithm, optimization. Please cite the article as follows: Heydary, M. and Yousefli, A. (2017), “A new optimization model for market basket analysis with allocation considerations: A genetic algorithm solution approach”, Management & Marketing. Challenges for the Knowledge Society, Vol. 12, No. 1, pp. 1- 11. DOI: 10.1515/mmcks-2017-0001 Introduction Nowadays, data mining is widely used in several aspects of science such as manufacturing, marketing, CRM, retail trade etc. Data mining or knowledge discovery is a process for data analyzing to extract information from large databases. -
Conformity, Gender and the Sex Composition of the Group
Stockholm School of Economics Department of Economics Bachelor’s Thesis Spring 2010 Conformity, Gender and the Sex Composition of the Group Abstract In light of the current debate of the sex distribution in Swedish company boards we study how a proportional increase of women would affect conformity behavior. We compare conformity levels between men and women as well as conformity levels between same-sex and mixed-sex groups. The results suggest that same-sex groups conform significantly more than mixed-sex groups due to higher levels of normative social influence. No differences are found in the levels of informational or normative social influence between men and women. These finding possibly suggest lower levels of normative social influence in company boards with more equal sex distribution. Key Words: Conformity, Gender Differences, Group Composition Authors: Makan Amini* Fredrik Strömsten** Tutor: Tore Ellingsen Examiner: Örjan Sjöberg *E-mail: [email protected] **E-mail: [email protected] Acknowledgements We would like to thank our tutor Tore Ellingsen for his guidance and inspiration during the thesis work. We would also like to express our gratitude to Magnus Johannesson and Per-Henrik Hedberg who have devoted their time to support our work through very important and helpful comments. Finally we are impressed by the large number of students from the Stockholm School of Economics who participated in the experiments. This study would of course never have been possible without you. Table of Contents 1. Introduction............................................................................................................................................ -
A Public Transport Bus Assignment Problem: Parallel Metaheuristics Assessment
David Fernandes Semedo Licenciado em Engenharia Informática A Public Transport Bus Assignment Problem: Parallel Metaheuristics Assessment Dissertação para obtenção do Grau de Mestre em Engenharia Informática Orientador: Prof. Doutor Pedro Barahona, Prof. Catedrático, Universidade Nova de Lisboa Co-orientador: Prof. Doutor Pedro Medeiros, Prof. Associado, Universidade Nova de Lisboa Júri: Presidente: Prof. Doutor José Augusto Legatheaux Martins Arguente: Prof. Doutor Salvador Luís Bettencourt Pinto de Abreu Vogal: Prof. Doutor Pedro Manuel Corrêa Calvente de Barahona Setembro, 2015 A Public Transport Bus Assignment Problem: Parallel Metaheuristics Assess- ment Copyright c David Fernandes Semedo, Faculdade de Ciências e Tecnologia, Universidade Nova de Lisboa A Faculdade de Ciências e Tecnologia e a Universidade Nova de Lisboa têm o direito, perpétuo e sem limites geográficos, de arquivar e publicar esta dissertação através de exemplares impressos reproduzidos em papel ou de forma digital, ou por qualquer outro meio conhecido ou que venha a ser inventado, e de a divulgar através de repositórios científicos e de admitir a sua cópia e distribuição com objectivos educacionais ou de investigação, não comerciais, desde que seja dado crédito ao autor e editor. Aos meus pais. ACKNOWLEDGEMENTS This research was partly supported by project “RtP - Restrict to Plan”, funded by FEDER (Fundo Europeu de Desenvolvimento Regional), through programme COMPETE - POFC (Operacional Factores de Competitividade) with reference 34091. First and foremost, I would like to express my genuine gratitude to my advisor profes- sor Pedro Barahona for the continuous support of my thesis, for his guidance, patience and expertise. His general optimism, enthusiasm and availability to discuss and support new ideas helped and encouraged me to push my work always a little further. -
Optimization-Based Evolutionary Data Mining Techniques for Structural Health Monitoring
Journal of Civil Engineering and Construction 2020;9(1):14-23 https://doi.org/10.32732/jcec.2020.9.1.14 Optimization-Based Evolutionary Data Mining Techniques for Structural Health Monitoring Meisam Gordan, Zubaidah Binti Ismail, Hashim Abdul Razak, Khaled Ghaedi, Haider Hamad Ghayeb Department of Civil Engineering, University of Malaya, 50603, Kuala Lumpur, Malaysia E-mail: [email protected] Received: 27 July 2019; Accepted: 24 August 2019; Available online: 20 November 2019 Abstract: In recent years, data mining technology has been employed to solve various Structural Health Monitoring (SHM) problems as a comprehensive strategy because of its computational capability. Optimization is one the most important functions in Data mining. In an engineering optimization problem, it is not easy to find an exact solution. In this regard, evolutionary techniques have been applied as a part of procedure of achieving the exact solution. Therefore, various metaheuristic algorithms have been developed to solve a variety of engineering optimization problems in SHM. This study presents the most applicable as well as effective evolutionary techniques used in structural damage identification. To this end, a brief overview of metaheuristic techniques is discussed in this paper. Then the most applicable optimization-based algorithms in structural damage identification are presented, i.e. Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Imperialist Competitive Algorithm (ICA) and Ant Colony Optimization (ACO). Some related examples are also detailed in order to indicate the efficiency of these algorithms. Keywords: Structural damage detection; Data mining; Metaheuristic algorithms; Optimization. 1. Introduction In-service aerospace, mechanical, and civil structures are damage-prone during their service life. -
Collective Behaviour
COLLECTIVE BEHAVIOUR DEFINED COLLECTIVE BEHAVIOUR • The term "collective behavior" was first used by Robert E. Park, and employed definitively by Herbert Blumer, to refer to social processes and events which do not reflect existing social structure (laws, conventions, and institutions), but which emerge in a "spontaneous" way. Collective Behaviour defined • Collective behaviour is a meaning- creating social process in which new norms of behaviour that challenges conventional social action emerges. Examples of Collective Behaviour • Some examples of this type of behaviour include panics, crazes, hostile outbursts and social movements • Fads like hula hoop; crazes like Beatlemania; hostile outbursts like anti- war demonstrations; and Social Movements. • Some argue social movements are more sophisticated forms of collective behaviour SOCIAL MOVEMENTS • Social movements are a type of group action. They are large informal groupings of individuals and/or organizations focused on specific political or social issues, in other words, on carrying out, resisting or undoing a social change. CBs and SMs 19th C. ROOTS • Modern Western social movements became possible through education and the increased mobility of labour due to the industrialisation and urbanisation of 19th century societies Tilly’s DEFINITION SM • Charles Tilly defines social movements as a series of contentious performances, displays and campaigns by which ordinary people made collective claims on others [Tilly, 2004].]: Three major elements of SMs • For Tilly, social movements are a major vehicle for ordinary people's participation in public politics [Tilly, 2004:3]. • He argues that there are three major elements to a social movement [Tilly, 2004 THREE ELEMENTS OF SMs 1. Campaigns: a sustained, organized public effort making collective claims on target authorities; 2. -
Solving the Maximum Weight Independent Set Problem Application to Indirect Hex-Mesh Generation
Solving the Maximum Weight Independent Set Problem Application to Indirect Hex-Mesh Generation Dissertation presented by Kilian VERHETSEL for obtaining the Master’s degree in Computer Science and Engineering Supervisor(s) Jean-François REMACLE, Amaury JOHNEN Reader(s) Jeanne PELLERIN, Yves DEVILLE , Julien HENDRICKX Academic year 2016-2017 Acknowledgments I would like to thank my supervisor, Jean-François Remacle, for believing in me, my co-supervisor Amaury Johnen, for his encouragements during this project, as well as Jeanne Pellerin, for her patience and helpful advice. 3 4 Contents List of Notations 7 List of Figures 8 List of Tables 10 List of Algorithms 12 1 Introduction 17 1.1 Background on Indirect Mesh Generation . 17 1.2 Outline . 18 2 State of the Art 19 2.1 Exact Resolution . 19 2.1.1 Approaches Based on Graph Coloring . 19 2.1.2 Approaches Based on MaxSAT . 20 2.1.3 Approaches Based on Integer Programming . 21 2.1.4 Parallel Implementations . 21 2.2 Heuristic Approach . 22 3 Hybrid Approach to Combining Tetrahedra into Hexahedra 25 3.1 Computation of the Incompatibility Graph . 25 3.2 Exact Resolution for Small Graphs . 28 3.2.1 Complete Search . 28 3.2.2 Branch and Bound . 29 3.2.3 Upper Bounds Based on Clique Partitions . 31 3.2.4 Upper Bounds based on Linear Programming . 32 3.3 Construction of an Initial Solution . 35 3.3.1 Local Search Algorithms . 35 3.3.2 Local Search Formulation of the Maximum Weight Independent Set . 36 3.3.3 Strategies to Escape Local Optima . -
Cognicrypt: Supporting Developers in Using Cryptography
CogniCrypt: Supporting Developers in using Cryptography Stefan Krüger∗, Sarah Nadiy, Michael Reifz, Karim Aliy, Mira Meziniz, Eric Bodden∗, Florian Göpfertz, Felix Güntherz, Christian Weinertz, Daniel Demmlerz, Ram Kamathz ∗Paderborn University, {fistname.lastname}@uni-paderborn.de yUniversity of Alberta, {nadi, karim.ali}@ualberta.ca zTechnische Universität Darmstadt, {reif, mezini, guenther, weinert, demmler}@cs.tu-darmstadt.de, [email protected], [email protected] Abstract—Previous research suggests that developers often reside on the low level of cryptographic algorithms instead of struggle using low-level cryptographic APIs and, as a result, being more functionality-oriented APIs that provide convenient produce insecure code. When asked, developers desire, among methods such as encryptFile(). When it comes to tool other things, more tool support to help them use such APIs. In this paper, we present CogniCrypt, a tool that supports support, participants suggested tools like a CryptoDebugger, developers with the use of cryptographic APIs. CogniCrypt analysis tools that find misuses and provide code templates assists the developer in two ways. First, for a number of common or generate code for common functionality. These suggestions cryptographic tasks, CogniCrypt generates code that implements indicate that participants not only lack the domain knowledge, the respective task in a secure manner. Currently, CogniCrypt but also struggle with APIs themselves and how to use them. supports tasks such as data encryption, communication over secure channels, and long-term archiving. Second, CogniCrypt In this paper, we present CogniCrypt, an Eclipse plugin that continuously runs static analyses in the background to ensure enables easier use of cryptographic APIs. In previous work, a secure integration of the generated code into the developer’s we outlined an early vision for CogniCrypt [2].