DECO3R: a Differential Evolution-Based Algorithm for Generating Compact Fuzzy Rule-Based Classification Systems

DECO3R: a Differential Evolution-Based Algorithm for Generating Compact Fuzzy Rule-Based Classification Systems

Knowledge-Based Systems 105 (2016) 160–174 Contents lists available at ScienceDirect Knowle dge-Base d Systems journal homepage: www.elsevier.com/locate/knosys DECO 3 R: A Differential Evolution-based algorithm for generating compact Fuzzy Rule-based Classification Systems ∗ Nikolaos L. Tsakiridis a, John B. Theocharis a, , George C. Zalidis b a Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, 54124, Greece b Faculty of Agriculture, Aristotle University of Thessaloniki, Thessaloniki, 54124, Greece a r t i c l e i n f o a b s t r a c t Article history: In this paper a novel Genetic Fuzzy Rule-based Classification System, named DECO 3 R ( D ifferential Received 21 July 2015 E volution based Co operative and Co mpeting learning of Co mpact F R BCS), is proposed. DECO R follows 3 Revised 6 May 2016 the genetic cooperative - competitive learning (GCCL) approach and uses Differential Evolution as its Accepted 8 May 2016 learning algorithm. In this frame, every chromosome encodes a single fuzzy rule. The proposed AdaBoost- Available online 9 May 2016 based Fuzzy Token Competition (FTC) method is employed to deal with the cooperation - competition Keywords: problem, an integral part to all GCCL algorithms. DECO 3 R learns clear, precise and predictive rules where Fuzzy Rule-based Classification Systems the fuzzy sets in the premise part are consecutive. The experimental component analysis demonstrates (FRBCS) that DE as a learning algorithm outperforms a simple Genetic Algorithm. Additionally, the novel FTC Differential Evolution method exceeds the performance of other similar techniques. The experimental comparative analysis AdaBoost highlights the robust performance of DECO 3 R compared to other rule learning algorithms, both in terms Fuzzy Token Competition of accuracy and of structural complexity. Genetic Cooperative - Competitive Learning (GCCL) ©2016 Elsevier B.V. All rights reserved. Genetic Tuning 1. Introduction Following the taxonomy proposed in [5] , methods encoding a rule in a single chromosome fall within the following three sub- The most instrumental field regarding the applications of the categories (arranged in the order in which they were developed): Genetic Fuzzy Systems (GFSs) [1,2] is the development of Fuzzy Rule-based Systems (FRBSs) using Evolutionary Algorithms (EAs). 1. The Michigan approach [6] (also referred to as learning clas- FRBSs deal with linguistic IF-then type of rules, which are highly sifier systems), wherein the set of rules is formed through the intuitive and interpretable by human beings. FRBSs pertaining to sequential observation of the training patterns. After the forma- classification problems where non-fuzzy input vectors are to be as- tion, the rule base is tuned using an EA. UCS [7] is one of the signed to one of a given set of classes, are called Fuzzy Rule-based most prominent examples of this method. The issue with this Classification Systems (FRBCSs) [3] . The generation of FRBCSs for classical approach is that it does not resolve the cooperation - high dimensional datasets is challenging, considering the exponen- competition problem of the rules. tial increase of the possible fuzzy rules as the feature space in- 2. The Iterative Rule Learning (IRL) approach [8,9] where the creases. The incorporation of EAs (most typically of Genetic Algo- algorithm iteratively learns one rule per iteration, consequently rithms) in FRBSs enables the rule base to be formed in a construc- multiple runs are required in order to create a rule base. The tive and automatic way even for highly dimensional datasets, due IRL approach removes at each iteration the covered training to the their increased searching capabilities [4] . It further paved patterns to compel new rules to focus on the uncovered pat- the way to improved structural complexity of the rule bases, by terns. Thus, at each iteration a new population of chromosomes implementing feature selection schemes and thereby reducing the is formed which compete among themselves so that the best total number of features required. chromosome is inserted into the rule set. The patterns covered adequately by the best chromosome are removed from the training set. In this approach, a mechanism must ensure that rules extracted at later stages are not conflicting with previ- ously removed training patterns. It must be further noted that ∗ Corresponding author. Tel.: +302310996343. in classification problems, IRL learns one class label at a time. E-mail addresses: [email protected] (N.L. Tsakiridis), [email protected] The drawback is that the ordering of the learned rules is not (J.B. Theocharis), [email protected] (G.C. Zalidis). optimal as it relies on which class is learned first. Prominent http://dx.doi.org/10.1016/j.knosys.2016.05.013 0950-7051/© 2016 Elsevier B.V. All rights reserved. N.L. Tsakiridis et al. / Knowledge-Based Systems 105 (2016) 160–174 161 examples following the IRL approach are the MOGUL [10] , SLAVE [11] and FaIRLiC [12] algorithms. Difference 3. The Genetic Cooperative Competitive Learning (GCCL) approach Initialization based Crossover Selection [13,14] , in which the whole population encodes the rule base. Mutation In contrast to IRL, the rule base is not populated iteratively, but rather the whole population of chromosomes is the rule base. Fig. 1. The main stages of the DE algorithm. For classification problems, this allows the learning of all class labels simultaneously. Moreover, the cooperation - competition X2 problem must be solved internally at each generation when the x i r2,G fitness of each chromosome is calculated. Considering that the (x i − x i ) r2,G r3,G v whole set of rules is available, the rules can be re-ordered in a x i i,G r3,G F·(xri ,G − xri ,G) more optimal way as opposed to the IRL approach. A notable al- 2 3 x i gorithm following the GCCL approach is GP-COACH [15], which r1,G uses Genetic Programming as its Evolutionary Algorithm, and a X1 crisp Token Competition method to impel the rules to cooper- 2 ate and compete with each other. Various other methodologies Fig. 2. Mutation of a chromosome using DE in . follow this approach [16–18] . ∗ = , , . , T ( ) In this paper, we propose a novel GFRBCS, called DECO3 R, utiliz- x [x1 x2 xD ] that minimizes a fitness function f x with f: ∗ ing Differential Evolution (DE) [19,20] as its evolutionary learning ⊆ D → such that f ( x ) ≤ f ( x ) ∀ x ∈ . When no constraints algorithm and following the GCCL approach. The motivation be- exist, it follows that = D. The main stages of the DE algorithm hind the development of DECO3 R was to create a FRBCS which is are presented in Fig. 1. a) able to handle high and very high dimensional data, and b) pro- The algorithm uses a population of NP real-valued parameter vide both an accurate and a compact FRBCS. vectors (chromosomes) with a dimension of D (genes). The task is To this end, we elected to use DE as the EA in the FRBCS. DE to find the best solution within a G max generations. The i -th chro- is considered to be one of the most powerful optimization algo- mosome is encoded as follows: rithms for real-valued problems in current use [21] . DE exhibits , = , , , , , , , , , . , , , (1) fast convergence [22] , the space complexity is relatively low and xi G [x1 i G x2 i G x3 i G xD i G] has relatively few control parameters [19] . Additionally it is highly where G denotes the generation index. customizable, which allows it to be robust. It has recently been applied in the optimization of Neuro-Fuzzy Systems [23] , and for solving the joint replenishment problem [24,25] . Furthermore, DE 2.1. DE operators has been successfully applied in conjunction with other algorithms, such as the Artificial Bee Colony algorithm [26] , the Fruit Fly Opti- 2.1.1. Mutation mization Algorithm [27] , and TOPSIS and Tabu Search [28] . The novelty of the DE algorithm is that it uses the difference There are mainly two major novelties incorporated into between vectors in the mutation process. At each generation, NP mutated vectors (also called donor vectors and denoted by v) are DECO3 R: created, deriving from the current population. They are created by (1) The introduction of the DE algorithm as the EA in a FR- applying a difference vector to a base vector . In its simplest form, BCS. Customarily, FRBCSs use a Genetic Algorithm as the EA. the mutation is calculated as follows: three random and mutually The aforementioned assets of DE attest to its adoption as a i , i , i exclusive indices (r1 r2 r3 ) are selected, that are also different from learning algorithm for FRBCSs, and in particular when deal- the target vector index i = 1 , . , NP , in order to create NP mutated ing with high dimensional data. In Subsection 4.1 an ex- vectors. The mutation is calculated as follows: perimental analysis is performed which statistically demon- difference vector strates the superiority of DE over the conventional approach. = i + F · ( i − i ) (2) The novel Fuzzy Token Competition mechanism, which en- vi,G xr ,G xr ,G xr ,G (2) 1 2 3 forces the competition and cooperation among the rules. donor vector base vector It involves two discrete tasks: a) the ordering of the rules F, based on their individual fitness, calculated in the weighted The difference is scaled using the scalar value of usually falling F pattern space, using the principles of the AdaBoost approach within the [0.4, 1] range. Greater values of favor exploration of [29–31] and b) the discarding of the non significant rules. the space, since the perturbation applied is larger, while smaller ones favor exploitation, since the perturbation is smaller.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us