resource: Evolutionary computing, A.E.Eiben


Outline

  1. What is Evolution Strategies
  2. Introductory Example
  3. Representation
  4. Mutation

1. What is Evolution Strategies (ES)

Evolution strategies(ES) is another member of the evolutionary algorithm family.

ES technical summary tableau

2. Introductory Example

2.1 Task

  minimimise an n-dimensional function: Rn -> R

2.2 Original algorithm

 “two-membered ES” using

  • Vectors from Rn directly as chromosomes
  • Population size 1
  • Only mutation creating one child
  • Greedy selection

2.3 pseudocde

outline of simple two-membered evolution strategy

------------------------------------------------------------

Set t = 0

Create initial point xt = 〈 x1t ,…,xnt

REPEAT UNTIL (TERMIN.COND satisfied) DO

  Draw zi from a normal distr. for all i = 1,…,n

  yit = xit + zi

  IF f(xt) < f(yt) THEN xt+1 = xt

  ELSE xt+1 = yt

  Set t = t+1

OD

------------------------------------------------------------

2.4 Explanation

As is shown on the pseudocode above, given a current solution xt in the form of a vector of length n, a new candidate xt+1 is created by adding a random number zfor i ∈ {1,...,n} to each of the n components.

The random number Zi:

A Gaussian, or normal, distribution is used with zero mean and standard deviation σ for drawing the random numbers --> Zi

The distribution:

  • This distribution is symmetric about zero
  • has the feature that the probability of drawing a random number with any given magnitude is a rapidly decreasing function of the standard deviation σ. (more information about Gaussian distribution)

The standard deviation σ:

Thus the σ value is a parameter of the algorithm that determines the extent to which given values xi are perturbed by the mutation operator.

For this reason σ is often called the mutation step size. Theoretical studies motivated an on-line adjustment of step sizes by the famous 1/5 success rule.

1/5 success rule:

This rule states that the ratio of successful mutaions (those in which the child is fitter than the parent) to all mutations should be 1/5.

  • If the ratio is greater than 1/5, the step size should be increased to make a wider search of the space.
  • If the ratio is less than 1/5 then it should be decreased to concentrate the search more around the current solution.

The rule is executed at periodic intervals.

For instance, after k(50 or 100) iterations each σ is reset by

  • σ = σ / c    if ps > 1/5
  • σ = σ • c    if ps < 1/5
  • σ = σ         if ps = 1/5

Where ps is the relative frequency of successful mutations measured over a number of trials, and the parameter c is in the range [0.817,1]

As is apparent, using this mechanism the step sizes change based on feedback from the search process.

ps = (successful mutations)/k

2.5 Conclusion

This example illuminiates some essential characteristics of evolution strategies:

  1. Evolution strategies are typically used for continuous parameter optimisation.
  2. There is a strong emphasis on mutation for creating offspring.
  3. Mutation is implemented by adding some random noise drawn from a Gaussian distribution.
  4. Mutation parameters are changed during a run of the algorithm

3. Representation

Chromosomes consist of three parts:

  • Object variables: x1,…,xn
  • Strategy parameters: 
    • Mutation step sizes: σ1,…,σnσ
    • Rotation angles: α1,…, αnα

Full size: 〈 x1,…,xn, σ1,…,σn1,…, αk 〉,where k = n(n-1)/2 (no. of i,j pairs) ---This is the general form of individuals in ES

Strategy parameters can be divided into two sets:

  • σ valuess
  • α values

The σ values represent the mutation step sizes, and their number nσ is usually either 1 or n. For any easonable self-adaptation mechanism at least one σ must be present.

The α values, which represent interactions between the step sizes used for different variables, are not always used. In the most general case their number nα = ( n - nα/2 )( nα - 1 ).

Putting this all together, we obtain:

〈 x1,…,xn, σ1,…,σnσ ,α1,…, αnα 〉

4. Mutation

4.1 Main mechanism

Changing value by adding random noise drawn from normal distribution

The mutation operator in ES is based on a normal (Gaussian) distribution requiring two parameters: the mean ξ and the standard deviation σ.

Mutations then are realised by adding some Δxi to each xi, where the Δxi values are randomly drawn using the given Gaussian N(ξ,σ), with the corresponding probability density function.

xi' = xi + N(0,σ)

xi' can be seen as a new xi.

N(0,σ) here denotes a random number drawn from a Gaussian distribution with zero mean and standard deviation σ.

4.2 Key ideas

  • σ is part of the chromosome 〈 x1,…,xn, σ 〉
  • σ is also mutated into σ ’ (see later how)
  • Self-adaption

4.3 A simplest case

In the simplest case we would have one step size that applied to all the components xi and candidate solutions of the form <x1, ..., xn, σ>.

Mutations are then realised by replacing <x1, ..., xn, σ> by <x1', ..., xn', σ'>,

where σ' is the mutated value of σ and xi' = xi + N(0,σ)

4.4 Mutate the value of σ

The mutation step sizes(σ) are not set by the user; rather the σ is coevolving with the solutions.

In order to achieve this behaviour:

  1. modify the value of σ first
  2. mutate the xi values with the new σ value.

The rationale behind this is that a new individual <x', σ'> is effectively evaluated twice:

  1. Primarily, it is evaluated directly  for its viability during survivor selection based on f(x').
  2. Second, it is evaluated for its ability to create good offspring.

This happens indirectly: a given step size (σ) evaluates favourably if the offspring generated by using it prove viable (in the first sense).

To sum up, an individual <x', σ'> represents both a good x' that survived selection and a good σ' that proved successful in generating this good x' from x.

4.5 Uncorrelated Mutation with One Step Size(σ)

In the case of uncorrelated mutation with one step size, the same distribution is used to mutate each xi, therefore we only have one strategy parameter σ in each individual.

This σ is mutated each time step by multiplying it by a term eΓ, with Γ a random variable drawn each time from a normal distribution with mean 0 and standard deviation τ.

Since N(0,τ) = τ•N(0,1), the mutation mechanism is thus specified by the following formulas:

  • σ' = σ•eτ•N(0,1)
  • xi' = xi + σ'•Ni(0,1)

Furthermore, since standard deviations very close to zero are unwanted(they will have on average a negligible effect), the following boundary rule is used to force step sizes to be no smaller than a threshold:

  • σ ’ < ε0 ⇒ σ ’ = ε0

Tips:

  • N(0,1) denotes a draw from the standard normal distribution
  • Ni(0,1) denotes a separate draw from the standard normal distribution for each variable i.

The proportionality constant τ is an external parameter to be set by the user.

It is usually inversely proportional to the square root of the problem size:

  • τ ∝ 1/ n½

The parameter τ can be interpreted as a kind of learning rate, as in neural networks.

In the Fig below, the effects of mutation are shown in two dimensions. That is, we have an objective function IR2 -> IR, and individuals are of the form <x,y,σ>. Since there is only one σ, the mutation step size is the same in each direction (x and y), and the points in the search space where the offspring can be placed with a given probability form a circle around the individual to be mutated.

Mutation with n=2, nσ = 1, nα = 0. Part of a fitness landscape with a conical shape is shown. The black dot indicates an individual. Points where the offspring can be placed with a given probability form a circle. The probability of moving along the y-axis(little effect on fitness) is the same as that of moving along the x-axis(large effect on fitness)

4.6 Uncorrelated Mutation with n Step Sizes

4.7 Correlated Mutations

Evolutionary Computing: 5. Evolutionary Strategies(1)的更多相关文章

  1. Evolutionary Computing: 5. Evolutionary Strategies(2)

    Resource: Introduction to Evolutionary Computing, A.E.Eliben Outline recombination parent selection ...

  2. Evolutionary Computing: 4. Review

    Resource:<Introduction to Evolutionary Computing> 1. What is an evolutionary algorithm? There ...

  3. Evolutionary Computing: 1. Introduction

    Outline 什么是进化算法 能够解决什么样的问题 进化算法的重要组成部分 八皇后问题(实例) 1. 什么是进化算法 遗传算法(GA)是模拟生物进化过程的计算模型,是自然遗传学与计算机科学相互结合的 ...

  4. Evolutionary Computing: [reading notes]On the Life-Long Learning Capabilities of a NELLI*: A Hyper-Heuristic Optimisation System

    resource: On the Life-Long Learning Capabilities of a NELLI*: A Hyper-Heuristic Optimisation System ...

  5. Evolutionary Computing: Assignments

    Assignment 1: TSP Travel Salesman Problem Assignment 2: TTP Travel Thief Problem The goal is to find ...

  6. Evolutionary Computing: multi-objective optimisation

    1. What is multi-objective optimisation [wikipedia]: Multi-objective optimization (also known as mul ...

  7. Evolutionary Computing: 3. Genetic Algorithm(2)

    承接上一章,接着写Genetic Algorithm. 本章主要写排列表达(permutation representations) 开始先引一个具体的例子来进行表述 Outline 问题描述 排列表 ...

  8. Evolutionary Computing: 2. Genetic Algorithm(1)

    本篇博文讲述基因算法(Genetic Algorithm),基因算法是最著名的进化算法. 内容依然来自博主的听课记录和教授的PPT. Outline 简单基因算法 个体表达 变异 重组 选择重组还是变 ...

  9. 不就ideas嘛,谁没有!

    20160214 survey of current RDF triple storage systems survey of semantic web stack inference mechani ...

随机推荐

  1. Java多线程学习(二)

    一.定义产生返回值的任务 在上一篇文的介绍中,我们知道了定义任务通常的方法是定义一个实现Runnable接口的类,这个类被我们成为任务.然而也很容易注意到,任务的最重要的一个方法就是run( )方法, ...

  2. python学习笔记系列----(七)类

    7.1 python类和相关术语的简介 Python 通过最小的新语法和语义在语言中实现了类. 它是 C++ 或者 Modula-3 语言中类机制的混合.类的大多数重要特性都被完整的保留下来:类继承机 ...

  3. 【实践】用js 实现 jq 的removeClass 方法

    HTML 代码 <!DOCTYPE html> <html lang="en"> <head> <meta charset="U ...

  4. ORA-1034 ORACLE not available (转)

    http://blog.csdn.net/onlyone_htliu/article/details/6075150 前言 每一个DBA在进行数据库管理的过程中不可避免的要遇到形形色色的错误(ORA- ...

  5. 161230、利用代理中间件实现大规模Redis集群

    前面在<大规模互联网应用Redis架构要点>和<Redis官方集群方案 Redis Cluster>两篇文章中分别介绍了多Redis服务器集群的两种方式,它们是基于客户端sha ...

  6. Centos7上启动vpn客户端失败问题处理

    在某台云主机上(Centos7)搭建vpn客户端,发现一直启动失败,检查了下日志,报错如下: Sat Jan :: WARNING: Your certificate is not yet valid ...

  7. Android4.0 添加一个新的Android 键值

    这里添加新的键值,不是毫无凭据凭空创造的一个键值,而是根据kernel中检测到的按键值,然后转化为Android所需要的数值: 以添加一个Linux键值为217,把它映射为android的键值Brow ...

  8. Xamarin.Forms listview中的button按钮,实现带着参数返回上一级页面

    今天在做列表显示的时候遇到一个问题,就是在ListView中如何才能让一个button的按钮工作并且包含参数呢? 其实有点类似于rep里的控件无法起获取一样.在Xamarin中,当你button绑定事 ...

  9. [程序设计语言]-[核心概念]-02:名字、作用域和约束(Bindings)

    本系列导航 本系列其他文章目录请戳这里. 1.名字.约束时间(Binding Time) 在本篇博文开始前先介绍两个约定:第一个是“对象”,除非在介绍面向对象语言时,本系列中出现的对象均是指任何可以有 ...

  10. Hibernate的关联映射

    单向N-1关联 <many-to-one> 单向N-1关系,比如多个人对应同一个住址,只需要从人实体端找到对应的住址实体,无须关系某个地址的全部住户.程序在N的一端增加一个属性,该属性引用 ...