Landscapes and Other Art Forms.

Size: px
Start display at page:

Download "Landscapes and Other Art Forms."

Transcription

1 Landscapes and Other Art Forms. Darrell Whitley Computer Science, Colorado State University Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Copyright is held by the owner/author(s).

2 Blind No More = GRAY BOX Optimization Darrell Whitley Computer Science, Colorado State University With Thanks to: Francisco Chicano, Gabriela Ochoa, Andrew Sutton and Renato Tinós

3 GRAY BOX OPTIMIZATION We can construct Gray Box optimization for pseudo-boolean optimization problems composed of M subfunctions, where each subfunction accepts at most k variables. Exploit the general properties of every Mk Landscape: m f(x) = f i (x) i=1 Which can be expressed as a Walsh Polynomial m W (f(x)) = W (f i (x)) i=1 Or can be expressed as a sum of k Elementary Landscapes k f(x) = ϕ (k) (W (f(x))) i=1

4 Walsh Example: MAXSAT

5 Walsh Example

6 Walsh Example

7 BLACK BOX OPTIMIZATION Don t wear a blind fold when walking about London if you can help it!

8 NK-Landscapes An Adjacent NK Landscape: n = 6 and k = 3. The subfunctions: f 0 (x 0, x 1, x 2 ) f 1 (x 1, x 2, x 3 ) f 2 (x 2, x 3, x 4 ) f 3 (x 3, x 4, x 5 ) f 4 (x 4, x 5, x 0 ) f 5 (x 5, x 0, x 1 ) These problems can be solved to optimality using Dynamic Programming.

9 Percent of Offspring that are Local Optima Using a Very Simple (Stupid) Hybrid GA: N k Model 2-point Xover Uniform Xover PX Adj 74.2 ± ± ± Adj 30.7 ± ± ± Adj 78.0 ± ± ± Adj 31.0 ± ± ± Rand 0.8 ± ± ± Rand 0.0 ± ± ± Rand 0.0 ± ± ± Rand 0.0 ± ± ±16.8

10 Number of partition components discovered N k Model Paired PX Mean Max Adjacent 3.34 ± Adjacent 5.24 ± Adjacent 7.66 ± Adjacent 7.52 ± Random 3.22 ± Random 2.41 ± Random 6.98 ± Random 2.46 ± Paired PX uses Tournament Selection. The first parent is selected by fitness. The second parent is selected by Hamming Distance.

11 Optimal Solutions for Adjacent NK 2-point Uniform Paired PX N k Found Found Found Percentage over 50 runs where the global optimum was Found in the experiments of the hybrid GA with the Adjacent NK Landscape.

12 Tunnelling Local Optima Networks NK Landscapes: Ochoa et al. GECCO 2015

13 NK and Mk Landscapes, P and NP

14 NK and Mk Landscapes, P and NP

15 But a Hybrid Genetic Algorithm is NOT how we should solve these NK Landscape Problems. We can exactly know the location of improving moves in constant time. No enumeration of neighbors is needed. Under well behaved conditions, we can exactly know the location of improving moves for r steps ahead in constant time.

16 Walsh Analysis Every n-bit MAXSAT or NK-landscape or P-spin problem is a sum of m subfunctions, f i : f(x) = m f i (x) The Walsh transform of f is a sum of the Walsh transforms of the individual subfunctions. W (f(x)) = i=1 m W (f i (x)) If m is O(n) then the number of Walsh coefficients is m 2 k = O(n). i=1

17 Mk Landscapes A General Model for all bounded Pseudo-Boolean Problems f(x) = m i = 1 fi (x, mask) f 1 f 2 f 3 f f 4 m

18 When 1 bit flips what happens? f(x) = m i = 1 fi (x, mask ) i f 1 f 2 f 3 f f 4 m flip

19 Constant Time Steepest Descent Assume we flip bit p to move from x to y p N(x). Construct a vector Score such that Score(x, y p ) = 2 1 bt x w b (x) b, p b In this way, all of the Walsh coefficients whose signs will be changed by flipping bit p are collected into a single number Score(x, y p ). The GSAT algorithm has done this for 23 years (Thanks to H. Hoos). NOTE: Hoos and Stützle have claimed a constant time result, but without proof. An average case complexity proof is required to obtain general constant time complexity results (Whitley 2013, AAAI). Also it does not matter if the problems are uniform random or not.

20 Best Improving and Next Improving moves Best Improving and Next Improving moves cost the same. GSAT uses a Buffer of best improving moves Buffer(best.improvement) =< M 10, M 1919, M 9999 > But the Buffer does not empty monotonically: this leads to thrashing. Instead uses multiple Buckets to hold improving moves Bucket(best.improvement) =< M 10, M 1919, M 9999 > Bucket(best.improvement 1) =< M 8371, M 4321, M 847 > Bucket(all.other.improving.moves) =< M 40, M 519, M 6799 > This improves the runtime of GSAT by a factor of 20X to 30X. The solution for NK Landscapes is only slightly more complicated.

21 The locations of the updates are obvious Score(y p, y 1 ) = Score(x, y 1 ) Score(y p, y 2 ) = Score(x, y 2 ) Score(y p, y 3 ) = Score(x, y 3 ) 2( w b(x)) b, (p 3) b Score(y p, y 4 ) = Score(x, y 4 ) Score(y p, y 5 ) = Score(x, y 5 ) Score(y p, y 6 ) = Score(x, y 6 ) Score(y p, y 7 ) = Score(x, y 7 ) Score(y p, y 8 ) = Score(x, y 8 ) 2( w b(x)) Score(y p, y 9 ) = Score(x, y 9 ) b, (p 8) b

22 The locations of the updates are obvious

23 What if we could look R Moves Lookahead? Consider R=3 Let Score(3, x, y i,j,k ) indicate we move from x to y i,j,k by flipping the 3 bits i, j, k. In general, we compute Score(r, x, y p ) when flipping r bits. f(y i ) = f(x) + Score(1, x, y i ) f(y i,j ) = f(y i ) + Score(1, y i, y j ) f(y i,j ) = f(x) + Score(2, x, y i,j ) f(y i,j,k ) = f(y i,j ) + Score(1, y i,j, y k ) f(y i,j,k ) = f(x) + Score(3, x, y i,j,k ) With thanks to Francisco Chicano!

24 Why Doesn t this exponentially EXPLODE??? f(y i,j,k ) = ((f(x) + Score(1, x, y i)) + Score(1, y i, y j)) + Score(1, y i,j, y k ) Score(3, x, y i,j,k ) = Score(2, x, y i,j) + Score(1, y i,j, y i,j,k ) If there is no Walsh Coefficient w i,j then Score(1, y i, y i,j ) = 0. Assume we have already moves of length shorter than 3. If there are no Walsh Coefficients linking i, j, k then Score(3, x, y i,j,k ) = 0.

25 The Variable Interaction Graph The Variable Interaction Graph Assume all distance 1 moves are taken. There cannot be a move flipping bits 4, 6, 9 that yields an improving move because there are no interactions and no Walsh coefficients.

26 Multiple Step Lookahead Local Search distance to optimum r=1 r=2 r=3 r=4 r=5 r= time in seconds In this figure, N = 12,000, k=3, and q=4. The radius is 1, 2, 3, 4, 5, 6. At r=6 the global optimum is found.

27 Steepest Descent on Moments Both f(x) and Avg(N(x)) can be computed with Walsh Spans. 3 f(x) = ϕ (z) (x) z=0 3 Avg(N(x)) = f(x) 1/d 2zϕ (p) (x) z=0 3 3 Avg(N(x)) = ϕ (z) (x) 1/N 2zϕ (z) (x) z=0 z=0 3 3 Avg(N(x)) = ϕ (z) (x) 2/N zϕ (z) (x) z=0 z=0

28 Steepest Descent on Moments Assume the vectors S p = Score p and Z p just map the change in the Walsh coefficients. Z p is computed using changes in zϕ (z) (x) ScoreAvg(y p, y 1 ) = ScoreAvg(x, y 1 ) ScoreAvg(y p, y 2 ) = ScoreAvg(x, y 2 ) ScoreAvg(y p, y 3 ) = ScoreAvg(x, y 3 ) + W eightedw alshupdate ScoreAvg(y p, y 4 ) = ScoreAvg(x, y 4 ) ScoreAvg(y p, y 5 ) = ScoreAvg(x, y 5 ) ScoreAvg(y p, y 6 ) = ScoreAvg(x, y 6 ) ScoreAvg(y p, y 7 ) = ScoreAvg(x, y 7 ) ScoreAvg(y p, y 8 ) = ScoreAvg(x, y 8 ) + W eightedw alshupdate ScoreAvg(y p, y 9 ) = ScoreAvg(x, y 9 )

29 Θ(1) Steepest Descent on Moments

30 What s (Obviously) Next? Local Search with r Move Lookahead PLUS Partition Crossover. Apply r Move Lookahead and Partition Crossover to MAX-kSAT. Use Deterministic Improving Moves. Use Deterministic Recombination.

31 What s (Obviously) Next? We can now solve 1 million variable NK-Landscapes to optimality in approximately linear time. (Paper submitted.)

32 What s (Obviously) Next? Put an End to the domination of Black Box Optimization. Wait for Tonight and Try to Take over the World.

33 THANK YOU Take Home Message: PROBLEM STRUCTURE MATTERS. Black Box Optimizers can never match the performance of an algorithm that efficiently exploits problem structure. But we need only a small amount of information: Gray Box Optimization. For Mk Landscapes, we can use Deterministic Moves and Deterministic Crossover.

Next Generation Genetic Algorithms. Next Generation Genetic Algorithms. What if you could... Know your Landscape! And Go Downhill!

Next Generation Genetic Algorithms. Next Generation Genetic Algorithms. What if you could... Know your Landscape! And Go Downhill! Next Generation Genetic Algorithms Next Generation Genetic Algorithms With Thanks to: Darrell Whitley Computer Science, Colorado State University Francisco Chicano, Gabriela Ochoa, Andrew Sutton and Renato

More information

Elementary Landscape Decomposition of the Test Suite Minimization Problem

Elementary Landscape Decomposition of the Test Suite Minimization Problem Elementary Decomposition of the Test Suite Minimization Problem Francisco Chicano, Javier Ferrer and Enrique Alba SSBSE 2, Szeged, Hungary, September -2 / 26 Problem Formalization Test Suite Minimization

More information

Adele Howe L. Darrell Whitley Computer Science Department Colorado State University Fort Collins, CO

Adele Howe L. Darrell Whitley Computer Science Department Colorado State University Fort Collins, CO Final Report for AFOSR #FA9550-08-1-0422 Landscape Analysis and Algorithm Development for Plateau Plagued Search Spaces August 1, 2008 to November 30, 2010 Adele Howe L. Darrell Whitley Computer Science

More information

Introduction to Black-Box Optimization in Continuous Search Spaces. Definitions, Examples, Difficulties

Introduction to Black-Box Optimization in Continuous Search Spaces. Definitions, Examples, Difficulties 1 Introduction to Black-Box Optimization in Continuous Search Spaces Definitions, Examples, Difficulties Tutorial: Evolution Strategies and CMA-ES (Covariance Matrix Adaptation) Anne Auger & Nikolaus Hansen

More information

1. Computação Evolutiva

1. Computação Evolutiva 1. Computação Evolutiva Renato Tinós Departamento de Computação e Matemática Fac. de Filosofia, Ciência e Letras de Ribeirão Preto Programa de Pós-Graduação Em Computação Aplicada 1.6. Aspectos Teóricos*

More information

Feasibility-Preserving Crossover for Maximum k-coverage Problem

Feasibility-Preserving Crossover for Maximum k-coverage Problem Feasibility-Preserving Crossover for Maximum -Coverage Problem Yourim Yoon School of Computer Science & Engineering Seoul National University Sillim-dong, Gwana-gu Seoul, 151-744, Korea yryoon@soar.snu.ac.r

More information

THESIS A STEP TOWARD CONSTANT TIME LOCAL SEARCH FOR OPTIMIZING PSEUDO BOOLEAN FUNCTIONS. Submitted by Wenxiang Chen Department of Computer Science

THESIS A STEP TOWARD CONSTANT TIME LOCAL SEARCH FOR OPTIMIZING PSEUDO BOOLEAN FUNCTIONS. Submitted by Wenxiang Chen Department of Computer Science THESIS A STEP TOWARD CONSTANT TIME LOCAL SEARCH FOR OPTIMIZING PSEUDO BOOLEAN FUNCTIONS Submitted by Wenxiang Chen Department of Computer Science In partial fulfillment of the requirements For the Degree

More information

A Tractable Walsh Analysis of SAT and its Implications for Genetic Algorithms

A Tractable Walsh Analysis of SAT and its Implications for Genetic Algorithms From: AAAI-98 Proceedings. Copyright 998, AAAI (www.aaai.org). All rights reserved. A Tractable Walsh Analysis of SAT and its Implications for Genetic Algorithms Soraya Rana Robert B. Heckendorn Darrell

More information

Rigorous Analyses for the Combination of Ant Colony Optimization and Local Search

Rigorous Analyses for the Combination of Ant Colony Optimization and Local Search Rigorous Analyses for the Combination of Ant Colony Optimization and Local Search Frank Neumann 1, Dirk Sudholt 2, and Carsten Witt 2 1 Max-Planck-Institut für Informatik, 66123 Saarbrücken, Germany, fne@mpi-inf.mpg.de

More information

Geometric Semantic Genetic Programming (GSGP): theory-laden design of semantic mutation operators

Geometric Semantic Genetic Programming (GSGP): theory-laden design of semantic mutation operators Geometric Semantic Genetic Programming (GSGP): theory-laden design of semantic mutation operators Andrea Mambrini 1 University of Birmingham, Birmingham UK 6th June 2013 1 / 33 Andrea Mambrini GSGP: theory-laden

More information

2-bit Flip Mutation Elementary Fitness Landscapes

2-bit Flip Mutation Elementary Fitness Landscapes RN/10/04 Research 15 September 2010 Note 2-bit Flip Mutation Elementary Fitness Landscapes Presented at Dagstuhl Seminar 10361, Theory of Evolutionary Algorithms, 8 September 2010 Fax: +44 (0)171 387 1397

More information

Computing the moments of k-bounded pseudo-boolean functions over Hamming spheres of arbitrary radius in polynomial time

Computing the moments of k-bounded pseudo-boolean functions over Hamming spheres of arbitrary radius in polynomial time Computer Science Technical Report Computing the moments of k-bounded pseudo-boolean functions over Hamming spheres of arbitrary radius in polynomial time Andrew M. Sutton, L. Darrell Whitley, Adele E.

More information

REIHE COMPUTATIONAL INTELLIGENCE S O N D E R F O R S C H U N G S B E R E I C H 5 3 1

REIHE COMPUTATIONAL INTELLIGENCE S O N D E R F O R S C H U N G S B E R E I C H 5 3 1 U N I V E R S I T Ä T D O R T M U N D REIHE COMPUTATIONAL INTELLIGENCE S O N D E R F O R S C H U N G S B E R E I C H 5 3 1 Design und Management komplexer technischer Prozesse und Systeme mit Methoden

More information

Evolutionary Algorithms How to Cope With Plateaus of Constant Fitness and When to Reject Strings of The Same Fitness

Evolutionary Algorithms How to Cope With Plateaus of Constant Fitness and When to Reject Strings of The Same Fitness Evolutionary Algorithms How to Cope With Plateaus of Constant Fitness and When to Reject Strings of The Same Fitness Thomas Jansen and Ingo Wegener FB Informatik, LS 2, Univ. Dortmund, 44221 Dortmund,

More information

On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms

On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms [Extended Abstract] Tobias Storch Department of Computer Science 2, University of Dortmund, 44221 Dortmund,

More information

Approximating the Distribution of Fitness over Hamming Regions

Approximating the Distribution of Fitness over Hamming Regions Approximating the Distribution of Fitness over Hamming Regions Andrew M. Sutton L. Darrell Whitley Adele E. Howe Department of Computer Science Colorado State University Fort Collins, CO 80523 {sutton,whitley,howe}@cs.colostate.edu

More information

Bounded Approximation Algorithms

Bounded Approximation Algorithms Bounded Approximation Algorithms Sometimes we can handle NP problems with polynomial time algorithms which are guaranteed to return a solution within some specific bound of the optimal solution within

More information

CSCI3390-Second Test with Solutions

CSCI3390-Second Test with Solutions CSCI3390-Second Test with Solutions April 26, 2016 Each of the 15 parts of the problems below is worth 10 points, except for the more involved 4(d), which is worth 20. A perfect score is 100: if your score

More information

Lecture 21: Counting and Sampling Problems

Lecture 21: Counting and Sampling Problems princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 21: Counting and Sampling Problems Lecturer: Sanjeev Arora Scribe: Today s topic of counting and sampling problems is motivated by computational

More information

A Comparison of GAs Penalizing Infeasible Solutions and Repairing Infeasible Solutions on the 0-1 Knapsack Problem

A Comparison of GAs Penalizing Infeasible Solutions and Repairing Infeasible Solutions on the 0-1 Knapsack Problem A Comparison of GAs Penalizing Infeasible Solutions and Repairing Infeasible Solutions on the 0-1 Knapsack Problem Jun He 1, Yuren Zhou 2, and Xin Yao 3 1 J. He is with the Department of Computer Science,

More information

Tightness of LP Relaxations for Almost Balanced Models

Tightness of LP Relaxations for Almost Balanced Models Tightness of LP Relaxations for Almost Balanced Models Adrian Weller University of Cambridge AISTATS May 10, 2016 Joint work with Mark Rowland and David Sontag For more information, see http://mlg.eng.cam.ac.uk/adrian/

More information

how should the GA proceed?

how should the GA proceed? how should the GA proceed? string fitness 10111 10 01000 5 11010 3 00011 20 which new string would be better than any of the above? (the GA does not know the mapping between strings and fitness values!)

More information

Finding Ground States of SK Spin Glasses with hboa and GAs

Finding Ground States of SK Spin Glasses with hboa and GAs Finding Ground States of Sherrington-Kirkpatrick Spin Glasses with hboa and GAs Martin Pelikan, Helmut G. Katzgraber, & Sigismund Kobe Missouri Estimation of Distribution Algorithms Laboratory (MEDAL)

More information

A Glider For Every Graph

A Glider For Every Graph A Glider For Every Graph Alexander Lamb (alex.lamb@gmail.com) The Challenge! Rotationally-invariant, straight-line motion across a discrete medium A pattern that can move in any direction An algorithm

More information

Hill-climbing Strategies on Various Landscapes: An Empirical Comparison

Hill-climbing Strategies on Various Landscapes: An Empirical Comparison Hill-climbing Strategies on Various Landscapes: An Empirical Comparison Matthieu Basseur LERIA, Université d Angers, France matthieu.basseur@univ-angers.fr Adrien Goëffon LERIA, Université d Angers, France

More information

Local Search (Greedy Descent): Maintain an assignment of a value to each variable. Repeat:

Local Search (Greedy Descent): Maintain an assignment of a value to each variable. Repeat: Local Search Local Search (Greedy Descent): Maintain an assignment of a value to each variable. Repeat: I I Select a variable to change Select a new value for that variable Until a satisfying assignment

More information

DRAFT -- DRAFT -- DRAFT -- DRAFT -- DRAFT --

DRAFT -- DRAFT -- DRAFT -- DRAFT -- DRAFT -- Towards an Analytic Framework for Analysing the Computation Time of Evolutionary Algorithms Jun He and Xin Yao Abstract In spite of many applications of evolutionary algorithms in optimisation, theoretical

More information

Introduction. Genetic Algorithm Theory. Overview of tutorial. The Simple Genetic Algorithm. Jonathan E. Rowe

Introduction. Genetic Algorithm Theory. Overview of tutorial. The Simple Genetic Algorithm. Jonathan E. Rowe Introduction Genetic Algorithm Theory Jonathan E. Rowe University of Birmingham, UK GECCO 2012 The theory of genetic algorithms is beginning to come together into a coherent framework. However, there are

More information

Optimization Prof. A. Goswami Department of Mathematics Indian Institute of Technology, Kharagpur. Lecture - 20 Travelling Salesman Problem

Optimization Prof. A. Goswami Department of Mathematics Indian Institute of Technology, Kharagpur. Lecture - 20 Travelling Salesman Problem Optimization Prof. A. Goswami Department of Mathematics Indian Institute of Technology, Kharagpur Lecture - 20 Travelling Salesman Problem Today we are going to discuss the travelling salesman problem.

More information

A.I.: Beyond Classical Search

A.I.: Beyond Classical Search A.I.: Beyond Classical Search Random Sampling Trivial Algorithms Generate a state randomly Random Walk Randomly pick a neighbor of the current state Both algorithms asymptotically complete. Overview Previously

More information

CS/COE

CS/COE CS/COE 1501 www.cs.pitt.edu/~nlf4/cs1501/ P vs NP But first, something completely different... Some computational problems are unsolvable No algorithm can be written that will always produce the correct

More information

Geometric Semantic Genetic Programming (GSGP): theory-laden design of variation operators

Geometric Semantic Genetic Programming (GSGP): theory-laden design of variation operators Geometric Semantic Genetic Programming (GSGP): theory-laden design of variation operators Andrea Mambrini University of Birmingham, UK NICaiA Exchange Programme LaMDA group, Nanjing University, China 7th

More information

Lecture 9 Evolutionary Computation: Genetic algorithms

Lecture 9 Evolutionary Computation: Genetic algorithms Lecture 9 Evolutionary Computation: Genetic algorithms Introduction, or can evolution be intelligent? Simulation of natural evolution Genetic algorithms Case study: maintenance scheduling with genetic

More information

Integer Least Squares: Sphere Decoding and the LLL Algorithm

Integer Least Squares: Sphere Decoding and the LLL Algorithm Integer Least Squares: Sphere Decoding and the LLL Algorithm Sanzheng Qiao Department of Computing and Software McMaster University 28 Main St. West Hamilton Ontario L8S 4L7 Canada. ABSTRACT This paper

More information

CSE200: Computability and complexity Space Complexity

CSE200: Computability and complexity Space Complexity CSE200: Computability and complexity Space Complexity Shachar Lovett January 29, 2018 1 Space complexity We would like to discuss languages that may be determined in sub-linear space. Lets first recall

More information

Plateaus Can Be Harder in Multi-Objective Optimization

Plateaus Can Be Harder in Multi-Objective Optimization Plateaus Can Be Harder in Multi-Objective Optimization Tobias Friedrich and Nils Hebbinghaus and Frank Neumann Max-Planck-Institut für Informatik, Campus E1 4, 66123 Saarbrücken, Germany Abstract In recent

More information

Black Box Search By Unbiased Variation

Black Box Search By Unbiased Variation Black Box Search By Unbiased Variation Per Kristian Lehre and Carsten Witt CERCIA, University of Birmingham, UK DTU Informatics, Copenhagen, Denmark ThRaSH - March 24th 2010 State of the Art in Runtime

More information

Copyright 1972, by the author(s). All rights reserved.

Copyright 1972, by the author(s). All rights reserved. Copyright 1972, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are

More information

An Analysis on Recombination in Multi-Objective Evolutionary Optimization

An Analysis on Recombination in Multi-Objective Evolutionary Optimization An Analysis on Recombination in Multi-Objective Evolutionary Optimization Chao Qian, Yang Yu, Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University, Nanjing 20023, China

More information

ENEE 457: Computer Systems Security 09/19/16. Lecture 6 Message Authentication Codes and Hash Functions

ENEE 457: Computer Systems Security 09/19/16. Lecture 6 Message Authentication Codes and Hash Functions ENEE 457: Computer Systems Security 09/19/16 Lecture 6 Message Authentication Codes and Hash Functions Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland,

More information

Computational statistics

Computational statistics Computational statistics Combinatorial optimization Thierry Denœux February 2017 Thierry Denœux Computational statistics February 2017 1 / 37 Combinatorial optimization Assume we seek the maximum of f

More information

UNIVERSITY OF DORTMUND

UNIVERSITY OF DORTMUND UNIVERSITY OF DORTMUND REIHE COMPUTATIONAL INTELLIGENCE COLLABORATIVE RESEARCH CENTER 531 Design and Management of Complex Technical Processes and Systems by means of Computational Intelligence Methods

More information

Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions

Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions Matthew J. Streeter Computer Science Department and Center for the Neural Basis of Cognition Carnegie Mellon University

More information

TECHNISCHE UNIVERSITÄT DORTMUND REIHE COMPUTATIONAL INTELLIGENCE COLLABORATIVE RESEARCH CENTER 531

TECHNISCHE UNIVERSITÄT DORTMUND REIHE COMPUTATIONAL INTELLIGENCE COLLABORATIVE RESEARCH CENTER 531 TECHNISCHE UNIVERSITÄT DORTMUND REIHE COMPUTATIONAL INTELLIGENCE COLLABORATIVE RESEARCH CENTER 531 Design and Management of Complex Technical Processes and Systems by means of Computational Intelligence

More information

Markov Chain Monte Carlo The Metropolis-Hastings Algorithm

Markov Chain Monte Carlo The Metropolis-Hastings Algorithm Markov Chain Monte Carlo The Metropolis-Hastings Algorithm Anthony Trubiano April 11th, 2018 1 Introduction Markov Chain Monte Carlo (MCMC) methods are a class of algorithms for sampling from a probability

More information

15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete

15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete CS125 Lecture 15 Fall 2016 15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete Already know SAT NP, so only need to show SAT is NP-hard. Let L be any language in NP. Let M be a NTM that decides L

More information

Introduction to Karnaugh Maps

Introduction to Karnaugh Maps Introduction to Karnaugh Maps Review So far, you (the students) have been introduced to truth tables, and how to derive a Boolean circuit from them. We will do an example. Consider the truth table for

More information

Development. biologically-inspired computing. lecture 16. Informatics luis rocha x x x. Syntactic Operations. biologically Inspired computing

Development. biologically-inspired computing. lecture 16. Informatics luis rocha x x x. Syntactic Operations. biologically Inspired computing lecture 16 -inspired S S2 n p!!! 1 S Syntactic Operations al Code:N Development x x x 1 2 n p S Sections I485/H400 course outlook Assignments: 35% Students will complete 4/5 assignments based on algorithms

More information

Analyzing Probabilistic Models in Hierarchical BOA on Traps and Spin Glasses

Analyzing Probabilistic Models in Hierarchical BOA on Traps and Spin Glasses Analyzing Probabilistic Models in Hierarchical BOA on Traps and Spin Glasses Mark Hauschild Missouri Estimation of Distribution Algorithms Laboratory (MEDAL) Dept. of Math and Computer Science, 320 CCB

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Lecture 9. Greedy Algorithm

Lecture 9. Greedy Algorithm Lecture 9. Greedy Algorithm T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to Algorithms, 3rd Edition, MIT Press, 2009 Sungkyunkwan University Hyunseung Choo choo@skku.edu Copyright 2000-2018

More information

Motivating examples Introduction to algorithms Simplex algorithm. On a particular example General algorithm. Duality An application to game theory

Motivating examples Introduction to algorithms Simplex algorithm. On a particular example General algorithm. Duality An application to game theory Instructor: Shengyu Zhang 1 LP Motivating examples Introduction to algorithms Simplex algorithm On a particular example General algorithm Duality An application to game theory 2 Example 1: profit maximization

More information

Crossover Techniques in GAs

Crossover Techniques in GAs Crossover Techniques in GAs Debasis Samanta Indian Institute of Technology Kharagpur dsamanta@iitkgp.ac.in 16.03.2018 Debasis Samanta (IIT Kharagpur) Soft Computing Applications 16.03.2018 1 / 1 Important

More information

Foundations of Artificial Intelligence

Foundations of Artificial Intelligence Foundations of Artificial Intelligence 32. Propositional Logic: Local Search and Outlook Martin Wehrle Universität Basel April 29, 2016 Propositional Logic: Overview Chapter overview: propositional logic

More information

LOCAL SEARCH. Today. Reading AIMA Chapter , Goals Local search algorithms. Introduce adversarial search 1/31/14

LOCAL SEARCH. Today. Reading AIMA Chapter , Goals Local search algorithms. Introduce adversarial search 1/31/14 LOCAL SEARCH Today Reading AIMA Chapter 4.1-4.2, 5.1-5.2 Goals Local search algorithms n hill-climbing search n simulated annealing n local beam search n genetic algorithms n gradient descent and Newton-Rhapson

More information

CSC 4510 Machine Learning

CSC 4510 Machine Learning 10: Gene(c Algorithms CSC 4510 Machine Learning Dr. Mary Angela Papalaskari Department of CompuBng Sciences Villanova University Course website: www.csc.villanova.edu/~map/4510/ Slides of this presenta(on

More information

Unit 1A: Computational Complexity

Unit 1A: Computational Complexity Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if

More information

Total Ordering on Subgroups and Cosets

Total Ordering on Subgroups and Cosets Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre

More information

Crossover can be constructive when computing unique input output sequences

Crossover can be constructive when computing unique input output sequences Crossover can be constructive when computing unique input output sequences Per Kristian Lehre and Xin Yao The Centre of Excellence for Research in Computational Intelligence and Applications (CERCIA),

More information

1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is:

1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is: CS 24 Section #8 Hashing, Skip Lists 3/20/7 Probability Review Expectation (weighted average): the expectation of a random quantity X is: x= x P (X = x) For each value x that X can take on, we look at

More information

CHAPTER 2 POLYNOMIALS KEY POINTS

CHAPTER 2 POLYNOMIALS KEY POINTS CHAPTER POLYNOMIALS KEY POINTS 1. Polynomials of degrees 1, and 3 are called linear, quadratic and cubic polynomials respectively.. A quadratic polynomial in x with real coefficient is of the form a x

More information

Infinite Series. Copyright Cengage Learning. All rights reserved.

Infinite Series. Copyright Cengage Learning. All rights reserved. Infinite Series Copyright Cengage Learning. All rights reserved. Taylor and Maclaurin Series Copyright Cengage Learning. All rights reserved. Objectives Find a Taylor or Maclaurin series for a function.

More information

NP-Complete Problems. More reductions

NP-Complete Problems. More reductions NP-Complete Problems More reductions Definitions P: problems that can be solved in polynomial time (typically in n, size of input) on a deterministic Turing machine Any normal computer simulates a DTM

More information

Performance of Evolutionary Algorithms on NK Landscapes with Nearest Neighbor Interactions and Tunable Overlap

Performance of Evolutionary Algorithms on NK Landscapes with Nearest Neighbor Interactions and Tunable Overlap Performance of Evolutionary Algorithms on NK Landscapes with Nearest Neighbor Interactions and Tunable Overlap Martin Pelikan, Kumara Sastry, David E. Goldberg, Martin V. Butz, and Mark Hauschild Missouri

More information

Runtime Analysis of Evolutionary Algorithms for the Knapsack Problem with Favorably Correlated Weights

Runtime Analysis of Evolutionary Algorithms for the Knapsack Problem with Favorably Correlated Weights Runtime Analysis of Evolutionary Algorithms for the Knapsack Problem with Favorably Correlated Weights Frank Neumann 1 and Andrew M. Sutton 2 1 Optimisation and Logistics, School of Computer Science, The

More information

Hierarchical BOA Solves Ising Spin Glasses and MAXSAT

Hierarchical BOA Solves Ising Spin Glasses and MAXSAT Hierarchical BOA Solves Ising Spin Glasses and MAXSAT Martin Pelikan 1,2 and David E. Goldberg 2 1 Computational Laboratory (Colab) Swiss Federal Institute of Technology (ETH) Hirschengraben 84 8092 Zürich,

More information

Automata Theory CS Complexity Theory I: Polynomial Time

Automata Theory CS Complexity Theory I: Polynomial Time Automata Theory CS411-2015-17 Complexity Theory I: Polynomial Time David Galles Department of Computer Science University of San Francisco 17-0: Tractable vs. Intractable If a problem is recursive, then

More information

Computability and Complexity Theory: An Introduction

Computability and Complexity Theory: An Introduction Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given

More information

Boolean circuits. Lecture Definitions

Boolean circuits. Lecture Definitions Lecture 20 Boolean circuits In this lecture we will discuss the Boolean circuit model of computation and its connection to the Turing machine model. Although the Boolean circuit model is fundamentally

More information

Pengju

Pengju Introduction to AI Chapter04 Beyond Classical Search Pengju Ren@IAIR Outline Steepest Descent (Hill-climbing) Simulated Annealing Evolutionary Computation Non-deterministic Actions And-OR search Partial

More information

Timo Latvala Landscape Families

Timo Latvala Landscape Families HELSINKI UNIVERSITY OF TECHNOLOGY Department of Computer Science Laboratory for Theoretical Computer Science T-79.300 Postgraduate Course in Theoretical Computer Science Timo Latvala Landscape Families

More information

Crossover Gene Selection by Spatial Location

Crossover Gene Selection by Spatial Location Crossover Gene Selection by Spatial Location ABSTRACT Dr. David M. Cherba Computer Science Department Michigan State University 3105 Engineering Building East Lansing, MI 48823 USA cherbada@cse.msu.edu

More information

3 rd class Mech. Eng. Dept. hamdiahmed.weebly.com Fourier Series

3 rd class Mech. Eng. Dept. hamdiahmed.weebly.com Fourier Series Definition 1 Fourier Series A function f is said to be piecewise continuous on [a, b] if there exists finitely many points a = x 1 < x 2

More information

Learning Tetris. 1 Tetris. February 3, 2009

Learning Tetris. 1 Tetris. February 3, 2009 Learning Tetris Matt Zucker Andrew Maas February 3, 2009 1 Tetris The Tetris game has been used as a benchmark for Machine Learning tasks because its large state space (over 2 200 cell configurations are

More information

Search. Search is a key component of intelligent problem solving. Get closer to the goal if time is not enough

Search. Search is a key component of intelligent problem solving. Get closer to the goal if time is not enough Search Search is a key component of intelligent problem solving Search can be used to Find a desired goal if time allows Get closer to the goal if time is not enough section 11 page 1 The size of the search

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Introduction to computational complexity theory Complexity (computability) theory deals with two aspects: Algorithm s complexity. Problem s complexity. References S. Cook,

More information

Zebo Peng Embedded Systems Laboratory IDA, Linköping University

Zebo Peng Embedded Systems Laboratory IDA, Linköping University TDTS 01 Lecture 8 Optimization Heuristics for Synthesis Zebo Peng Embedded Systems Laboratory IDA, Linköping University Lecture 8 Optimization problems Heuristic techniques Simulated annealing Genetic

More information

Local Search & Optimization

Local Search & Optimization Local Search & Optimization CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2017 Soleymani Artificial Intelligence: A Modern Approach, 3 rd Edition, Chapter 4 Outline

More information

Koza s Algorithm. Choose a set of possible functions and terminals for the program.

Koza s Algorithm. Choose a set of possible functions and terminals for the program. Step 1 Koza s Algorithm Choose a set of possible functions and terminals for the program. You don t know ahead of time which functions and terminals will be needed. User needs to make intelligent choices

More information

Centric Selection: a Way to Tune the Exploration/Exploitation Trade-off

Centric Selection: a Way to Tune the Exploration/Exploitation Trade-off : a Way to Tune the Exploration/Exploitation Trade-off David Simoncini, Sébastien Verel, Philippe Collard, Manuel Clergue Laboratory I3S University of Nice-Sophia Antipolis / CNRS France Montreal, July

More information

Estimation-of-Distribution Algorithms. Discrete Domain.

Estimation-of-Distribution Algorithms. Discrete Domain. Estimation-of-Distribution Algorithms. Discrete Domain. Petr Pošík Introduction to EDAs 2 Genetic Algorithms and Epistasis.....................................................................................

More information

How to Treat Evolutionary Algorithms as Ordinary Randomized Algorithms

How to Treat Evolutionary Algorithms as Ordinary Randomized Algorithms How to Treat Evolutionary Algorithms as Ordinary Randomized Algorithms Technical University of Denmark (Workshop Computational Approaches to Evolution, March 19, 2014) 1/22 Context Running time/complexity

More information

Applying Price s Equation to Survival Selection

Applying Price s Equation to Survival Selection Applying Price s Equation to Survival Selection Jeffrey K. Bassett George Mason University Krasnow Institute, MS2A1 4400 University Dr. Fairfax, VA 22030 jbassett@cs.gmu.edu Mitchell A. Potter Naval Research

More information

Expected Running Time Analysis of a Multiobjective Evolutionary Algorithm on Pseudo-boolean Functions

Expected Running Time Analysis of a Multiobjective Evolutionary Algorithm on Pseudo-boolean Functions Expected Running Time Analysis of a Multiobjective Evolutionary Algorithm on Pseudo-boolean Functions Nilanjan Banerjee and Rajeev Kumar Department of Computer Science and Engineering Indian Institute

More information

15.5. Applications of Double Integrals. Density and Mass. Density and Mass. Density and Mass. Density and Mass. Multiple Integrals

15.5. Applications of Double Integrals. Density and Mass. Density and Mass. Density and Mass. Density and Mass. Multiple Integrals 15 Multiple Integrals 15.5 Applications of Double Integrals Copyright Cengage Learning. All rights reserved. Copyright Cengage Learning. All rights reserved. We were able to use single integrals to compute

More information

Seminar 1. Introduction to Quantum Computing

Seminar 1. Introduction to Quantum Computing Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum

More information

Introduction to Cryptography Lecture 13

Introduction to Cryptography Lecture 13 Introduction to Cryptography Lecture 13 Benny Pinkas June 5, 2011 Introduction to Cryptography, Benny Pinkas page 1 Electronic cash June 5, 2011 Introduction to Cryptography, Benny Pinkas page 2 Simple

More information

Computability Theory

Computability Theory CS:4330 Theory of Computation Spring 2018 Computability Theory P versus NP and NP-Completeness Haniel Barbosa Readings for this lecture Chapter 7 of [Sipser 1996], 3rd edition. Section 7.4. The P versus

More information

Local and Stochastic Search

Local and Stochastic Search RN, Chapter 4.3 4.4; 7.6 Local and Stochastic Search Some material based on D Lin, B Selman 1 Search Overview Introduction to Search Blind Search Techniques Heuristic Search Techniques Constraint Satisfaction

More information

Analysis of Crossover Operators for Cluster Geometry Optimization

Analysis of Crossover Operators for Cluster Geometry Optimization Analysis of Crossover Operators for Cluster Geometry Optimization Francisco B. Pereira Instituto Superior de Engenharia de Coimbra Portugal Abstract We study the effectiveness of different crossover operators

More information

Admin NP-COMPLETE PROBLEMS. Run-time analysis. Tractable vs. intractable problems 5/2/13. What is a tractable problem?

Admin NP-COMPLETE PROBLEMS. Run-time analysis. Tractable vs. intractable problems 5/2/13. What is a tractable problem? Admin Two more assignments No office hours on tomorrow NP-COMPLETE PROBLEMS Run-time analysis Tractable vs. intractable problems We ve spent a lot of time in this class putting algorithms into specific

More information

When Hypermutations and Ageing Enable Artificial Immune Systems to Outperform Evolutionary Algorithms 1. Dogan Corus, Pietro S. Oliveto, Donya Yazdani

When Hypermutations and Ageing Enable Artificial Immune Systems to Outperform Evolutionary Algorithms 1. Dogan Corus, Pietro S. Oliveto, Donya Yazdani When Hypermutations and Ageing Enable Artificial Immune Systems to Outperform Evolutionary Algorithms 1 Dogan Corus, Pietro S. Oliveto, Donya Yazdani Department of Computer Science, University of Sheffield

More information

A Gentle Introduction to the Time Complexity Analysis of Evolutionary Algorithms

A Gentle Introduction to the Time Complexity Analysis of Evolutionary Algorithms A Gentle Introduction to the Time Complexity Analysis of Evolutionary Algorithms Pietro S. Oliveto Department of Computer Science, University of Sheffield, UK Symposium Series in Computational Intelligence

More information

Columbus City Schools High School CCSS Mathematics III - High School PARRC Model Content Frameworks Mathematics - Core Standards And Math Practices

Columbus City Schools High School CCSS Mathematics III - High School PARRC Model Content Frameworks Mathematics - Core Standards And Math Practices A Correlation of III Common Core To the CCSS III - - Core Standards And s A Correlation of - III Common Core, to the CCSS III - - Core Standards and s Introduction This document demonstrates how - III

More information

UNIVERSITY OF DORTMUND

UNIVERSITY OF DORTMUND UNIVERSITY OF DORTMUND REIHE COMPUTATIONAL INTELLIGENCE COLLABORATIVE RESEARCH CENTER 531 Design and Management of Complex Technical Processes and Systems by means of Computational Intelligence Methods

More information

Tractable & Intractable Problems

Tractable & Intractable Problems Tractable & Intractable Problems We will be looking at : What is a P and NP problem NP-Completeness The question of whether P=NP The Traveling Salesman problem again Programming and Data Structures 1 Polynomial

More information

How hard is it to find a good solution?

How hard is it to find a good solution? How hard is it to find a good solution? Simons Institute Open Lecture November 4, 2013 Research Area: Complexity Theory Given a computational problem, find an efficient algorithm that solves it. Goal of

More information

2. Duality and tensor products. In class, we saw how to define a natural map V1 V2 (V 1 V 2 ) satisfying

2. Duality and tensor products. In class, we saw how to define a natural map V1 V2 (V 1 V 2 ) satisfying Math 396. Isomorphisms and tensor products In this handout, we work out some examples of isomorphisms involving tensor products of vector spaces. The three basic principles are: (i) to construct maps involving

More information

Lecture 9 Classification of States

Lecture 9 Classification of States Lecture 9: Classification of States of 27 Course: M32K Intro to Stochastic Processes Term: Fall 204 Instructor: Gordan Zitkovic Lecture 9 Classification of States There will be a lot of definitions and

More information