Using selfish gene theory to construct mutual information and entropy based clusters for bivariate optimizations

Abstract  This paper proposes a new approach named SGMIEC in the field of estimation of distribution algorithm (EDA). While the current
EDAs require much time in the statistical learning process as the relationships among the variables are t…

Abstract  This paper proposes a new approach named SGMIEC in the field of estimation of distribution algorithm (EDA). While the current
EDAs require much time in the statistical learning process as the relationships among the variables are too complicated, the
selfish gene theory (SG) is deployed in this approach and a mutual information and entropy based cluster (MIEC) model with
an incremental learning and resample scheme is also set to optimize the probability distribution of the virtual population.
Experimental results on several benchmark problems demonstrate that, compared with BMDA, COMIT and MIMIC, SGMIEC often performs
better in convergent reliability, convergent velocity and convergent process.

  • Content Type Journal Article
  • Pages 1-9
  • DOI 10.1007/s00500-010-0557-3
  • Authors
    • Feng Wang, Wuhan University State Key Laboratory of Software Engineering Wuhan China
    • Zhiyi Lin, Wuhan University State Key Laboratory of Software Engineering Wuhan China
    • Cheng Yang, Wuhan University State Key Laboratory of Software Engineering Wuhan China
    • Yuanxiang Li, Wuhan University State Key Laboratory of Software Engineering Wuhan China

Environment identification-based memory scheme for estimation of distribution algorithms in dynamic environments

Abstract  In estimation of distribution algorithms (EDAs), the joint probability distribution of high-performance solutions is presented
by a probability model. This means that the priority search areas of the solution space are characterize…

Abstract  In estimation of distribution algorithms (EDAs), the joint probability distribution of high-performance solutions is presented
by a probability model. This means that the priority search areas of the solution space are characterized by the probability
model. From this point of view, an environment identification-based memory management scheme (EI-MMS) is proposed to adapt
binary-coded EDAs to solve dynamic optimization problems (DOPs). Within this scheme, the probability models that characterize
the search space of the changing environment are stored and retrieved to adapt EDAs according to environmental changes. A
diversity loss correction scheme and a boundary correction scheme are combined to counteract the diversity loss during the
static evolutionary process of each environment. Experimental results show the validity of the EI-MMS and indicate that the
EI-MMS can be applied to any binary-coded EDAs. In comparison with three state-of-the-art algorithms, the univariate marginal
distribution algorithm (UMDA) using the EI-MMS performs better when solving three decomposable DOPs. In order to understand
the EI-MMS more deeply, the sensitivity analysis of parameters is also carried out in this paper.

  • Content Type Journal Article
  • Pages 1-16
  • DOI 10.1007/s00500-010-0547-5
  • Authors
    • Xingguang Peng, Northwestern Polytechnical University School of Electronics and Information Xi’an Shaanxi 710129 China
    • Xiaoguang Gao, Northwestern Polytechnical University School of Electronics and Information Xi’an Shaanxi 710129 China
    • Shengxiang Yang, University of Leicester Department of Computer Science University Road Leicester LE1 7RH UK

FOGA XI CFP

The 11th Foundations of Genetic Algorithms conference will be held on January 5-9, 2011 in Schwarzenberg, Austria. Submissions (10-12 pages) on the theoretical foundations of any type of evolutionary computation can be emailed to foga@fhv.at. The dea…

The 11th Foundations of Genetic Algorithms conference will be held on January 5-9, 2011 in Schwarzenberg, Austria. Submissions (10-12 pages) on the theoretical foundations of any type of evolutionary computation can be emailed to foga@fhv.at. The deadline for submissions is July 5, 2010. For more details see http://www.sigevo.org/foga-2011.

Evolutionary self-adaptation: a survey of operators and strategy parameters

Abstract  The success of evolutionary search depends on adequate parameter settings. Ill conditioned strategy parameters decrease the
success probabilities of genetic operators. Proper settings may change during the optimization process. The…

Abstract  

The success of evolutionary search depends on adequate parameter settings. Ill conditioned strategy parameters decrease the
success probabilities of genetic operators. Proper settings may change during the optimization process. The question arises
if adequate settings can be found automatically during the optimization process. Evolution strategies gave an answer to the
online parameter control problem decades ago: self-adaptation. Self-adaptation is the implicit search in the space of strategy
parameters. The self-adaptive control of mutation strengths in evolution strategies turned out to be exceptionally successful.
Nevertheless, for years self-adaptation has not achieved the attention it deserves. This paper is a survey of self-adaptive
parameter control in evolutionary computation. It classifies self-adaptation in the taxonomy of parameter setting techniques,
gives an overview of automatic online-controllable evolutionary operators and provides a coherent view on search techniques
in the space of strategy parameters. Beyer and Sendhoff’s covariance matrix self-adaptation evolution strategy is reviewed
as a successful example for self-adaptation and exemplarily tested for various concepts that are discussed.

  • Content Type Journal Article
  • DOI 10.1007/s12065-010-0035-y
  • Authors
    • Oliver Kramer, Technische Universität Dortmund Dortmund Germany

An ensemble-based evolutionary framework for coping with distributed intrusion detection

Abstract  A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity
is presented. The algorithm is based on genetic programming (GP) extended with the ensemble paradigm….

Abstract  

A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity
is presented. The algorithm is based on genetic programming (GP) extended with the ensemble paradigm. GP ensemble is particularly
suitable for distributed intrusion detection because it allows to build a network profile by combining different classifiers that together provide complementary information. The main novelty of the algorithm is
that data is distributed across multiple autonomous sites and the learner component acquires useful knowledge from this data
in a cooperative way. The network profile is then used to predict abnormal behavior. Experiments on the KDD Cup 1999 Data
show the capability of genetic programming in successfully dealing with the problem of intrusion detection on distributed
data.

  • Content Type Journal Article
  • Pages 131-146
  • DOI 10.1007/s10710-010-9101-6
  • Authors
    • Gianluigi Folino, Institute for High Performance Computing and Networking (ICAR) National Research Council (CNR) Via P. Bucci 41C 87036 Rende CS Italy
    • Clara Pizzuti, Institute for High Performance Computing and Networking (ICAR) National Research Council (CNR) Via P. Bucci 41C 87036 Rende CS Italy
    • Giandomenico Spezzano, Institute for High Performance Computing and Networking (ICAR) National Research Council (CNR) Via P. Bucci 41C 87036 Rende CS Italy

Solution of fuzzy polynomial equations by modified Adomian decomposition method

Abstract  In this paper, we present some efficient numerical algorithm for solving fuzzy polynomial equations based on Newton’s method.
The modified Adomian decomposition method is applied to construct the numerical algorithms. Some numeri…

Abstract  In this paper, we present some efficient numerical algorithm for solving fuzzy polynomial equations based on Newton’s method.
The modified Adomian decomposition method is applied to construct the numerical algorithms. Some numerical illustrations are
given to show the efficiency of algorithms.

  • Content Type Journal Article
  • Pages 1-6
  • DOI 10.1007/s00500-010-0546-6
  • Authors
    • M. Otadi, Islamic Azad University Department of Mathematics Firuozkooh Branch Firuozkooh Iran
    • M. Mosleh, Islamic Azad University Department of Mathematics Firuozkooh Branch Firuozkooh Iran

Extremal states on bounded residuated -monoids with general comparability

Abstract  Bounded residuated lattice ordered monoids (

Rl
-monoids) are a common generalization of pseudo-

BL
-algebras and Heyting algebras, i.e. algebras of the non-commutative basic fuzzy logic (and consequently of the basic fuzzy
logic…

Abstract  Bounded residuated lattice ordered monoids (

Rl

-monoids) are a common generalization of pseudo-

BL

-algebras and Heyting algebras, i.e. algebras of the non-commutative basic fuzzy logic (and consequently of the basic fuzzy
logic, the Łukasiewicz logic and the non-commutative Łukasiewicz logic) and the intuitionistic logic, respectively. We investigate
bounded

Rl

-monoids satisfying the general comparability condition in connection with their states (analogues of probability measures).
It is shown that if an extremal state on Boolean elements fulfils a simple condition, then it can be uniquely extended to
an extremal state on the

Rl

-monoid, and that if every extremal state satisfies this condition, then the

Rl

-monoid is a pseudo-

BL

-algebra.

  • Content Type Journal Article
  • Pages 1-5
  • DOI 10.1007/s00500-010-0545-7
  • Authors
    • Jiří Rachůnek, Palacký University Department of Algebra and Geometry, Faculty of Sciences Tomkova 40 779 00 Olomouc Czech Republic
    • Dana Šalounová, VŠB-Technical University Ostrava Sokolská 33 701 21 Ostrava Czech Republic

Evolving robust GP solutions for hedge fund stock selection in emerging markets

Abstract  Stock selection for hedge fund portfolios is a challenging problem for Genetic Programming (GP) because the markets (the environment
in which the GP solution must survive) are dynamic, unpredictable and unforgiving. How can GP be i…

Abstract  Stock selection for hedge fund portfolios is a challenging problem for Genetic Programming (GP) because the markets (the environment
in which the GP solution must survive) are dynamic, unpredictable and unforgiving. How can GP be improved so that solutions
are produced that are robust to non-trivial changes in the environment? We explore two new approaches. The first approach uses subsets of extreme environments
during training and the second approach uses a voting committee of GP individuals with differing phenotypic behaviour.

  • Content Type Journal Article
  • Pages 1-14
  • DOI 10.1007/s00500-009-0511-4
  • Authors
    • Wei Yan, University College London Department of Computer Science Gower Street London WC1E 6BT UK
    • Christopher D. Clack, University College London Financial Computing, Department of Computer Science Gower Street London WC1E 6BT UK

GPEM 11(1) now available online

The first issue of volume 11 of Genetic Programming and Evolvable Machines is now available online, with the following articles:”Editorial Introduction” and “Acknowledgments” by Lee Spector”The influence of mutation on population dynamics in multiobjec…

The first issue of volume 11 of Genetic Programming and Evolvable Machines is now available online, with the following articles:

“Editorial Introduction” and “Acknowledgments” by Lee Spector
“The influence of mutation on population dynamics in multiobjective genetic programming”
by Khaled Badran & Peter I. Rockett
“Automated synthesis of resilient and tamper-evident analog circuits without a single point of failure”
by Vyung-Joong Kim, Adrian Wong & Hod Lipson
“GP challenge: evolving energy function for protein structure prediction” by Pawel Widera, Jonathan M. Garibaldi & Natalio Krasnogor
“The identification and exploitation of dormancy in genetic programming” by David Jackson
“Book Review: Michael Affenzeller, Stefan Wagner, Stephan Winkler and Andreas Beham: Genetic algorithms and genetic programming modern concepts and practical applications” by Gisele L. Pappa
“Book Review: Melanie Mitchell: Complexity a guided tour”
by Felix Streichert

Gene expression studies with DGL global optimization for the molecular classification of cancer

Abstract  This paper combines a powerful algorithm, called Dongguang Li (DGL) global optimization, with the methods of cancer diagnosis
through gene selection and microarray analysis. A generic approach to cancer classification based on gene…

Abstract  This paper combines a powerful algorithm, called Dongguang Li (DGL) global optimization, with the methods of cancer diagnosis
through gene selection and microarray analysis. A generic approach to cancer classification based on gene expression monitoring
by DNA microarrays is proposed and applied to two test cancer cases, colon and leukemia. The study attempts to analyze multiple
sets of genes simultaneously, for an overall global solution to the gene’s joint discriminative ability in assigning tumors
to known classes. With the workable concepts and methodologies described here an accurate classification of the type and seriousness
of cancer can be made. Using the orthogonal arrays for sampling and a search space reduction process, a computer program has
been written that can operate on a personal laptop computer. Both the colon cancer and the leukemia microarray data can be
classified 100% correctly without previous knowledge of their classes. The classification processes are automated after the
gene expression data being inputted. Instead of examining a single gene at a time, the DGL method can find the global optimum
solutions and construct a multi-subsets pyramidal hierarchy class predictor containing up to 23 gene subsets based on a given
microarray gene expression data collection within a period of several hours. An automatically derived class predictor makes
the reliable cancer classification and accurate tumor diagnosis in clinical practice possible.

  • Content Type Journal Article
  • Pages 1-19
  • DOI 10.1007/s00500-010-0542-x
  • Authors
    • Dongguang Li, Edith Cowan University School of Computer and Security Science 2 Bradford Street Mount Lawley WA 6050 Australia