The document proposes using metaheuristic optimization techniques to tune the parameters of an interval type-2 fuzzy inference system (IT2FIS) for data mining applications. Specifically, it aims to 1) create diverse rules in the IT2FIS, 2) reduce the number of fuzzy rules, 3) determine appropriate shapes for type-2 fuzzy sets, and 4) analyze the performance of proposed IT2FIS optimization methods. The proposed framework uses genetic algorithms to tune the IT2FIS knowledge base and swarm intelligence methods to tune rule parameters. Experimental results on four datasets show that differential evolution generally provides the best performance, though no single algorithm works best on all datasets.
A fusion of soft expert set and matrix modelseSAT Journals
Abstract
The purpose of this paper is to define different types of matrices in the light of soft expert sets. We then propose a decision making
model based on soft expert set.
Keywords: Soft set, soft expert set, Soft Expert matrix.
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
This paper demonstrates analysis of well known block cipher CAST-128 and its modified version using avalanche criterion and other tests namely encryption quality, correlation coefficient, histogram analysis and key sensitivity
tests.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The Odd Generalized Exponential Log Logistic Distributioninventionjournals
We propose a new lifetime model, called the odd generalized exponential log logistic distribution (OGELLD).We obtain some of its mathematical properties. Some structural properties of the new distribution are studied. The maximum likelihood method is used for estimating the model parameters and the Fisher’s information matrix is derived. We illustrate the usefulness of the proposed model by applications to real lifetime data.
A fusion of soft expert set and matrix modelseSAT Journals
Abstract
The purpose of this paper is to define different types of matrices in the light of soft expert sets. We then propose a decision making
model based on soft expert set.
Keywords: Soft set, soft expert set, Soft Expert matrix.
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
This paper demonstrates analysis of well known block cipher CAST-128 and its modified version using avalanche criterion and other tests namely encryption quality, correlation coefficient, histogram analysis and key sensitivity
tests.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The Odd Generalized Exponential Log Logistic Distributioninventionjournals
We propose a new lifetime model, called the odd generalized exponential log logistic distribution (OGELLD).We obtain some of its mathematical properties. Some structural properties of the new distribution are studied. The maximum likelihood method is used for estimating the model parameters and the Fisher’s information matrix is derived. We illustrate the usefulness of the proposed model by applications to real lifetime data.
KDD Cup 2021で開催された時系列異常検知コンペ
Multi-dataset Time Series Anomaly Detection (https://compete.hexagon-ml.com/practice/competition/39/) に参加して
5位入賞した解法の紹介と上位解法の整理のための資料です.
9/24のKDD2021参加報告&論文読み会 (https://connpass.com/event/223966/) の発表資料です.
Multi objective optimization and Benchmark functions resultPiyush Agarwal
Implemented Strength Pareto Evolutionary Algorithm (SPEA 2) and Non Dominated Sorting Genetic Algorithm (NSGA II) in MATLAB, Guide Assistant Prof. Divy Kumar, MNNIT Allahabad.
The two algorithms are use to solve multiobjective functions. Tested the algorithms on all the benchmark functions.
Applied both the algorithms to solve Portfolio Optimization satisfying different types of constraints to derive the optimal portfolio.
Simultaneous State and Actuator Fault Estimation With Fuzzy Descriptor PMID a...Waqas Tariq
In this paper, Takagi-Sugeno (T-S) fuzzy descriptor proportional multiple-integral derivative (PMID) and Proportional-Derivative (PD) observer methods that can estimate the system states and actuator faults simultaneously are proposed. T-S fuzzy model is obtained by linearsing satellite/spacecraft attitude dynamics at suitable operating points. For fault estimation, actuator fault is introduced as state vector to develop augmented descriptor system and robust fuzzy PMID and PD observers are developed. Stability analysis is performed using Lyapunov direct method. The convergence conditions of state estimation error are formulated in the form of LMI (linear matrix inequality). Derivative gain, obtained using singular value decomposition of descriptor state matrix (E), gives more design degrees of freedom together with proportional and integral gains obtained from LMI. Simulation study is performed for our proposed methods.
Analysis of an Image Secret Sharing Scheme to Identify CheatersCSCJournals
Secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.¡¦s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period.
A hybrid bacterial foraging and modified particle swarm optimization for mode...IJECEIAES
This paper study the model reduction procedures used for the reduction of large-scale dynamic models into a smaller one through some sort of differential and algebraic equations. A confirmed relevance between these two models exists, and it shows same characteristics under study. These reduction procedures are generally utilized for mitigating computational complexity, facilitating system analysis, and thence reducing time and costs. This paper comes out with a study showing the impact of the consolidation between the Bacterial-Foraging (BF) and Modified particle swarm optimization (MPSO) for the reduced order model (ROM). The proposed hybrid algorithm (BF-MPSO) is comprehensively compared with the BF and MPSO algorithms; a comparison is also made with selected existing techniques.
KDD Cup 2021で開催された時系列異常検知コンペ
Multi-dataset Time Series Anomaly Detection (https://compete.hexagon-ml.com/practice/competition/39/) に参加して
5位入賞した解法の紹介と上位解法の整理のための資料です.
9/24のKDD2021参加報告&論文読み会 (https://connpass.com/event/223966/) の発表資料です.
Multi objective optimization and Benchmark functions resultPiyush Agarwal
Implemented Strength Pareto Evolutionary Algorithm (SPEA 2) and Non Dominated Sorting Genetic Algorithm (NSGA II) in MATLAB, Guide Assistant Prof. Divy Kumar, MNNIT Allahabad.
The two algorithms are use to solve multiobjective functions. Tested the algorithms on all the benchmark functions.
Applied both the algorithms to solve Portfolio Optimization satisfying different types of constraints to derive the optimal portfolio.
Simultaneous State and Actuator Fault Estimation With Fuzzy Descriptor PMID a...Waqas Tariq
In this paper, Takagi-Sugeno (T-S) fuzzy descriptor proportional multiple-integral derivative (PMID) and Proportional-Derivative (PD) observer methods that can estimate the system states and actuator faults simultaneously are proposed. T-S fuzzy model is obtained by linearsing satellite/spacecraft attitude dynamics at suitable operating points. For fault estimation, actuator fault is introduced as state vector to develop augmented descriptor system and robust fuzzy PMID and PD observers are developed. Stability analysis is performed using Lyapunov direct method. The convergence conditions of state estimation error are formulated in the form of LMI (linear matrix inequality). Derivative gain, obtained using singular value decomposition of descriptor state matrix (E), gives more design degrees of freedom together with proportional and integral gains obtained from LMI. Simulation study is performed for our proposed methods.
Analysis of an Image Secret Sharing Scheme to Identify CheatersCSCJournals
Secret image sharing mechanisms have been widely applied to the military, e-commerce, and communications fields. Zhao et al. introduced the concept of cheater detection into image sharing schemes recently. This functionality enables the image owner and authorized members to identify the cheater in reconstructing the secret image. Here, we provide an analysis of Zhao et al.¡¦s method: an authorized participant is able to restore the secret image by him/herself. This contradicts the requirement of secret image sharing schemes. The authorized participant utilizes an exhaustive search to achieve the attempt, though, simulation results show that it can be done within a reasonable time period.
A hybrid bacterial foraging and modified particle swarm optimization for mode...IJECEIAES
This paper study the model reduction procedures used for the reduction of large-scale dynamic models into a smaller one through some sort of differential and algebraic equations. A confirmed relevance between these two models exists, and it shows same characteristics under study. These reduction procedures are generally utilized for mitigating computational complexity, facilitating system analysis, and thence reducing time and costs. This paper comes out with a study showing the impact of the consolidation between the Bacterial-Foraging (BF) and Modified particle swarm optimization (MPSO) for the reduced order model (ROM). The proposed hybrid algorithm (BF-MPSO) is comprehensively compared with the BF and MPSO algorithms; a comparison is also made with selected existing techniques.
This paper presents a design and implementation of FPGA based Bose, Chaudhuri and Hocquenghem (BCH) codes for wireless communication applications. The codes are written in VHDL (Very High Speed Hardware Description Language). Here BCH decoder (15, 5, and 3) is implemented and discussed. And decoder uses serial input and serial output architecture. BCH code forms a large class of powerful random error correcting cyclic codes. BCH operates over algebraic structure called finite fields and they are binary multiple error correcting codes. BCH decoder is implemented by syndrome calculation circuit, the BMA (Berlekamp-Massey algorithm) and Chien search circuit. The codecs are implemented over cyclone FPGA device.
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...IJRESJOURNAL
With the development of productivity and the fast growth of the economy, environmental pollution, resource utilization and low product recovery rate have emerged subsequently, so more and more attention has been paid to the recycling and reuse of products. However, since the complexity of disassembly line balancing problem (DLBP) increases with the number of parts in the product, finding the optimal balance is computationally intensive. In order to improve the computational ability of particle swarm optimization (PSO) algorithm in solving DLBP, this paper proposed an improved adaptive multi-objective particle swarm optimization (IAMOPSO) algorithm. Firstly, the evolution factor parameter is introduced to judge the state of evolution using the idea of fuzzy classification and then the feedback information from evolutionary environment is served in adjusting inertia weight, acceleration coefficients dynamically. Finally, a dimensional learning strategy based on information entropy is used in which each learning object is uncertain. The results from testing in using series of instances with different size verify the effect of proposed algorithm.
Design of frequency selective surface comprising of dipoles using artificial ...IJAAS Team
This paper depicts the design of Frequency Selective Surface (FSS) comprising of dipoles using Artificial Neural Network (ANN). It has been observed that with the change of the dimensions and periodicity of FSS, the resonating frequency of the FSS changes. This change in resonating frequency has been studied and investigated using simulation software. The simulated data were used to train the proposed ANN models. The trained ANN models are found to predict the FSS characteristics precisely with negligible error. Compared to traditional EM simulation softwares (like ANSOFT Designer), the proposed technique using ANN models is found to significantly reduce the FSS design complexity and computational time. The FSS simulations were made using ANSOFT Designer v2 software and the neural network was designed using MATLAB software.
The objective of this paper is to introduce a fuzzy linear programming problem with hexagonal fuzzy
numbers. Here the parameters are hexagonal fuzzy numbers and Simplex method is used to arrive an
optimal solution by a new method compared to the earlier existing method. This procedure is illustrated
with numerical example. This will further help the decision makers to come out with a feasible alternatives
with better economical viability.
The objective of this paper is to introduce a fuzzy linear programming problem with hexagonal fuzzy numbers. Here the parameters are hexagonal fuzzy numbers and Simplex method is used to arrive an optimal solution by a new method compared to the earlier existing method. This procedure is illustrated with numerical example. This will further help the decision makers to come out with a feasible alternatives with better economical viability.
T-S Fuzzy Observer and Controller of Doubly-Fed Induction GeneratorIJPEDS-IAES
This paper aims to ensure a stability and observability of doubly fed induction generator DFIG of a wind turbine based on the approach of fuzzy control type T-S PDC (Parallel Distributed Compensation) which determines the control laws by return state and fuzzy observers.First, the fuzzy TS model is used to precisely represent a nonlinear model of DFIG proposed and adopted in this work. Then, the stability analysis is based on the quadratic Lyapunov function to determine the gains that ensure the stability conditions.The fuzzy observer of DFIG is built to estimate non-measurable state vectors and the estimated states converging to the actual statements. The gains of observatory and of stability are obtained by solving a set of linear matrix inequality (LMI).Finally, numerical simulations are performed to verify the theoretical results and demonstrate satisfactory performance.
This paper tries to compare more accurate and efficient L1 norm regression algorithms. Other comparative studies are mentioned, and their conclusions are discussed. Many experiments have been performed to evaluate the comparative efficiency and accuracy of the selected algorithms.
Abstract : Motivated by the recovery and prediction of electricity consumption time series, we extend Nonnegative Matrix Factorization to take into account external features as side information. We consider general linear measurement settings, and propose a framework which models non-linear relationships between external features and the response variable. We extend previous theoretical results to obtain a sufficient condition on the identifiability of NMF with side information. Based on the classical Hierarchical Alternating Least Squares (HALS) algorithm, we propose a new algorithm (HALSX, or Hierarchical Alternating Least Squares with eXogeneous variables) which estimates NMF in this setting. The algorithm is validated on both simulated and real electricity consumption datasets as well as a recommendation system dataset, to show its performance in matrix recovery and prediction for new rows and columns.
This study introduces and compares different methods for estimating the two parameters of generalized logarithmic series distribution. These methods are the cuckoo search optimization, maximum likelihood estimation, and method of moments algorithms. All the required derivations and basic steps of each algorithm are explained. The applications for these algorithms are implemented through simulations using different sample sizes (n = 15, 25, 50, 100). Results are compared using the statistical measure mean square error.
USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WI...ijcsit
This study introduces and compares different methods for estimating the two parameters of generalized logarithmic series distribution. These methods are the cuckoo search optimization, maximum likelihood estimation, and method of moments algorithms. All the required derivations and basic steps of each algorithm are explained. The applications for these algorithms are implemented through simulations using different sample sizes (n = 15, 25, 50, 100). Results are compared using the statistical measure mean square error.
This study introduces and compares different methods for estimating the two parameters of generalized logarithmic series distribution. These methods are the cuckoo search optimization, maximum likelihood estimation, and method of moments algorithms. All the required derivations and basic steps of each algorithm are explained. The applications for these algorithms are implemented through simulations using different sample sizes (n = 15, 25, 50, 100). Results are compared using the statistical measure mean square error.
Optimum Algorithm for Computing the Standardized Moments Using MATLAB 7.10(R2...Waqas Tariq
A fundamental task in many statistical analyses is to characterize the location and variability of a data set. A further characterization of the data includes skewness and kurtosis. This paper emphasizes the real time computational problem for generally the rth standardized moments and specially for both skewness and kurtosis. It has therefore been important to derive an optimum computational technique for the standardized moments. A new algorithm has been designed for the evaluation of the standardized moments. The evaluation of error analysis has been discussed. The new algorithm saved computational energy by approximately 99.95% than that of the previously published algorithms.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
Metaheuristic Tuning of Type-II Fuzzy Inference System for Data Mining
1. Metaheuristic Tuning of Type-II Fuzzy Inference
System for Data Mining
V. K. Ojha1, Ajith Abraham2, and V. Sn´aˇsel1
1
IT4Innovations, VˇSB-Technical University of Ostrava Czech Republic
2
Machine Intelligence Research Lab, Auburn, WA, USA
26 July 2016
2. Main Goal
1 To create diverse rules in Interval Type-2 Fuzzy Inference System
2 To reduce number of fuzzy rules in IT2FIS
3 To determine appropriate shape of type-2 fuzz sets
4 To analyze performance of the proposed IT2FIS optimization methods
2 / 20
3. Proposed optimization framework
1 Genetic algorithm based tuning of the knowledge-base of fuzzy
inference system.
2 Swarm intelligence based tuning of the parameters of the rules in the
knowledge-base.
3 / 20
5. Improved results:
For large learning iterations (10,000)
Table: Interval type-2 FIS training results over 80% data
Dataset ABC BFO DE GWO PSO IT2FNN-SVR(N)
Fridman 1.444 1.742 1.360 2.200 1.667 1.409
5 / 20
6. Models used for comparisons
Table: Models from literature
Model Ref. Description
NBAG Carney et al. [1] Neural Bootstrap Aggregation Bagging
Bench Carney et al. [1] Benchmark Bagging Ensemble
Simple Carney et al. [1] Simple Bagging Ensemble
GRNNFA Lee et al. [10] General Regression NN and Fuzzy Reasoning
Theory
SONFIN Juang et al. [6] Self-constructing neural fuzzy inference network
T2FLS-G Mendel [11] Gradient-descent based IT2FIS tuning
SEIT2FNN Juang et al. [7] Self-evolving IT2FIS
IT2FNN-SVR(N) Juang et al. [5] IT2 Fuzzy-NN-Support-Vector Regression-
Numeric Input
IT2FNN-SVR(F) Juang et al. [5] IT2 Fuzzy-NN-Support-Vector Regression-Fuzzy
Input
6 / 20
7. IT2FIS training and test results (10 fold CV)
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
ABC BFO DE GWO PSO
RMSE
Training Test
Figure: Average training test performance of algorithms for all datasets
7 / 20
8. How result was achieved
Initialize W0
Fittest solution
w∗
= fittest(W0
)
Wt+1
:= MHOperator(Wt
)
ˆw = fittest(Wt+1
)
c( ˆw) < c(w∗
)
Stopping criteria
satisfied
w∗
= ˆw
START
STOP
YES
YES
NO
NO
Stopping criteria
satisfied
STOP
YES
NO
START
Genetic algorithm
based tuning of
knowledge-base
Swarm intelligence
based tuning of
knowledge-base
Knowledge base optimization Metaheusitic basic framework
8 / 20
10. Swarm Inspired Algorithms
Example of algorithms:
1 Particle swarm optimization
(Eberhart and Kennedy [2])
2 Artificial bee colony
(Karaboga [8])
3 Bacteria foraging
optimization (Passino [14])
4 Gray wolf optimization (Mirjalili
et al. [13])
10 / 20
11. IT2FIS optimization: Pittsburgh approach
1 Each rule in a FIS are randomly assigned a status “0” (inactive) or
“1” (active).
2 The i-th rule base (FIS) Ri is defined as:
Ri = {Ri1, Ri2, . . . , RiM} ∀ i = 1, 2, . . . , k, (1)
where the status of a rule Rij ∈ Ri is randomly set to either “0” or
“1.”
3 A population Q = (R1, R2, . . . , Rk) of a total k FISs are generated.
4 Population Q is a genetic population, where the individuals are coded
into a binary vector.
11 / 20
12. Illustration Pittsburgh approach
Set of fuzzy sets Set of fuzzy rules
Set of Knowledge-
Bases (FISs)
Random
formation
Random
formation
Population of
Knowledge-Bases
Genetic
Operations
If best Rule
found?
Best FIS
Yes
12 / 20
13. IT2FIS optimization: Michigan approach
1 A single rule or rule parameters are encoded into a genotype.
2 For a rule Ri that has a total pi fuzzy set, the parameter vector wi is
designed as follows:
wi
= (m, λ, σ)i
1, . . . , (m, λ, σ)i
pi , (c0, s0)i
, (c1, s1)i
, . . . , (cpi , spi )i
where (m, λ, σ)i
j is the parameters (center, center deviation factor,
and width) of the j-th T2FS.
3 The pairs (cj , sj )i , j = 0 to pi are the consequent part parameters and
their deviation factors.
13 / 20
14. Illustration Michigan approach
Parameter vector of the best obtained FIS:
w1 w2 w2 w3 w4 w5 w6 … wn-1 wN
Differential evolution for the optimization of parameter vector of the best obtained FIS:
Solution 1
Solution 2
Solution 3
Solution 4
:
:
Solution N-2
Solution N-1
Solution N
Gen 1: A
population of N
Solutions
A new solution is created beaded on a Crossover Factor
CR and by picnicking-up the following solution vectors
from the population:
F – Mutation Factor.
Solution a Solution b Solution c
A New Solution = +
F x ( - ) +
F x ( - ) +
Best solution
Solution a
Best solution Solution a
Solution b Solution c
Solution 1
Solution 2
Solution 3
Solution 4
:
:
Solution N-2
Solution N-1
Solution N
Gen 2: A
population of N
Solutions
New Solution
14 / 20
15. Limitations:
Best algorithms identification for the datasets
Table: Training and test performance of the algorithms
Data Training Test
Abalone DE DE
Diabetes DE GWO
Elevator DE PSO
Fridman DE DE
15 / 20
18. Conclusions
1 Random combination of fuzzy sets for the creation of rules followed by
random combination of rules for the creation of fuzzy inference system
(FIS), and the genetic operation on the population of FISs helps in obtaining
optimum FIS.
2 Metaheuristic for the IT2FIS parameter optimization helps in improving
approximation ability of FIS.
3 Use of fixed weights (left and right weights) at the type-2 rules was useful
during ,metaheuristic tuning.
4 No one algorithm performed best in all cases. For example, test performance
of GWO and PSO was best for the datases DIB and ELV respectively;
whereas DE performed best for the others.
5 Convergence trajectory of the algorithms were tended to slow down quickly
during IT2FIS optimization.
18 / 20
19. Future scope
1 Nature inspired heuristic may be used instead of random combination
fuzzy sets for constructing rules. Similarly, such heuristic may be used
for the construction FISs from the set of rules.
2 Gradient based local search algorithm can be combined with
metaheuristic to avoid falling local minima.
19 / 20
22. Results: Parameter setting
Parameter setting and datasets
Table: Parameter Setting of the Algorithms
# Algo. Pop. Eval. Other
1 ABC 50 5000 tabc = 100
2 BFO 50 5000 Nr = Nd = Ns = 10, dr = 0.25
3 DE 50 5000 CR = 0.9, F = 0.7
4 GWO 50 5000 -
5 PSO 50 5000 c0 = 0.729, c1 = 1.49 c2 = 1.49
Table: Datasets for the Experiments
# Dataset Abbr. Attributes Samples Difficulty
1 Abalone ABL 8 4177 130
2 Diabetes DIB 2 43 40
3 Elevator ELV 18 16599 280
4 Fridman FRD 5 1200 85
Note: The dataset FRD has random Gaussian noise included as mentioned in [5]
22 / 20
23. Fuzzy Inference System Interval Type-II FIS
Interval Type-II Fuzzy Inference System
Fuzzifier Rule-base Defuzzifier
Type-reducerInference Engine
Crisp
Input
Crisp
Output
Figure: Type-2 Fuzzy Inference System
A rule in type-2 FIS may be represented as:
Ri
: IF x1is ˜Ai
1and . . . and xnis ˜Ai
nTHEN y is Bi
n (2)
where B = [¯b, b] is weights at consequent part of the rule and
i = 1, 2, . . . , M.
23 / 20
24. Fuzzy Inference System Type-II Fuzzy Set
Type-II Fuzzy Set
A T2FS ˜A is characterized by a 3-dimensional membership function [12].
˜A = (x, u) , µ ˜A (x, u) |∀x ∈ X, ∀u ∈ [0, 1] . (3)
1 x-axis is called primary variable (x).
2 y-axis is called secondary variable or primary MF (u).
3 the value of the T2MF is considered to be along the z-axis.
24 / 20
25. Fuzzy Inference System Type-II Fuzzy Set
Type-II Fuzzy Set (Contd..)
A Gaussian function with uncertain mean within [m1, m2] and standard
deviation σ is an interval type-2 MF:
µ ˜A(x, m, σ) = exp −
1
2
x − m
σ
, m ∈ [m1, m2]. (4)
The upper MF [9]:
¯µ ˜A(x) =
µ ˜A(x, m1, σ), x < m1
1, m1 ≤ x ≤ m2
µ ˜A(x, m2, σ), x > m2
(5)
and the lower MF [9]:
µ ˜A
(x) =
µ ˜A(x, m2, σ), x ≤ (m1 + m2)/2
µ ˜A(x, m1, σ), x > (m1 + m2)/2
(6)
25 / 20
26. Fuzzy Inference System Type-II Fuzzy Set
Type-II Fuzzy Set (Contd..)
0 1 2 3 4 5 6 7 8 9 10
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
primary axis (x)
membershipvalue(µ)
µA(x)
0 2 4 6 8 10
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
primary axis (x)
secondaryaxis(u)
¯µ ˜A(x)
µ ˜A(x)
¯µ ˜A(xp
)
µ ˜A(xp
)
xp
Figure: Type-1 MF with mean m = 5.0 (left). Type-2 Fuzzy MF with fixed
σ = 2.0 and means m1 = 4.5 and m2 = 5.5. Upper MF in bold line and lower MF
in doted line are defined as per (5) and (6) (right).
26 / 20
27. References
References I
[1] John G Carney and Padraig Cunningham.
Tuning diversity in bagged ensembles.
International Journal of Neural Systems, 10(04):267–279, 2000.
[2] R. Eberhart and J. Kennedy.
A new optimizer using particle swarm theory.
In Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995. MHS ’95.,, pages
39–43, 1995.
[3] David E Goldberg and John H Holland.
Genetic algorithms and machine learning.
Machine Learning, 3(2):95–99, Oct 1988.
[4] Hisao Ishibuchi, Tomoharu Nakashima, and Tetsuya Kuroda.
A hybrid fuzzy genetics-based machine learning algorithm: hybridization of michigan approach and pittsburgh approach.
In 1999 IEEE International Conference on Systems, Man, and Cybernetics, 1999. IEEE SMC’99 Conference Proceedings.,
volume 1, pages 296–301. IEEE, 1999.
[5] Chia-Feng Juang, Ren-Bo Huang, and Wei-Yuan Cheng.
An interval type-2 fuzzy-neural network with support-vector regression for noisy regression problems.
IEEE Transactions on Fuzzy Systems, 18(4):686–699, 2010.
[6] Chia-Feng Juang and Chin-Teng Lin.
An online self-constructing neural fuzzy inference network and its applications.
IEEE Transactions on Fuzzy Systems, 6(1):12–32, 1998.
[7] Chia-Feng Juang and Yu-Wei Tsao.
A self-evolving interval type-2 fuzzy neural network with online structure and parameter learning.
IEEE Transactions on Fuzzy Systems, 16(6):1411–1424, 2008.
28. References
References II
[8] Dervis Karaboga.
An idea based on honey bee swarm for numerical optimization.
Technical Report TR06, Computer Engineering Department, Erciyes University, 2005.
[9] Nilesh N Karnik, Jerry M Mendel, and Qilian Liang.
Type-2 fuzzy logic systems.
IEEE Transactions on Fuzzy Systems, 7(6):643–658, 1999.
[10] Eric WM Lee, Chee Peng Lim, Richard KK Yuen, and SM Lo.
A hybrid neural network model for noisy data regression.
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 34(2):951–960, 2004.
[11] Jerry M Mendel.
Computing derivatives in interval type-2 fuzzy logic systems.
IEEE Transactions on Fuzzy Systems, 12(1):84–98, 2004.
[12] Jerry M Mendel.
On km algorithms for solving type-2 fuzzy set problems.
IEEE Transactions on Fuzzy Systems, 21(3):426–446, 2013.
[13] Seyedali Mirjalili, Seyed Mohammad Mirjalili, and Andrew Lewis.
Grey wolf optimizer.
Adv. Eng. Softw., 69:46–61, 2014.
[14] Kevin M Passino.
Biomimicry of bacterial foraging for distributed optimization and control.
IEEE Control Syst., 22(3):52–67, Jan 2002.
[15] Rainer Storn and Kenneth Price.
Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces.
J. Glob. Optim., 11(4):341–359, Dec 1997.