resource:

On the Life-Long Learning Capabilities of a NELLI*: A Hyper-Heuristic Optimisation System

Wikipedia Hyper-heuristic: https://en.wikipedia.org/wiki/Hyper-heuristic

Wikipedia Heuristic: https://en.wikipedia.org/wiki/Heuristic_(computer_science)


1. Hyper-heuristics

1.1 What is Hyper-heuristics

Hyper-heuristics cover a general class of search methods that attempt to automate the process of selecting, combining, generating or adapting simple heuristics in order to solve large classes of problems.

1.2 Advantages and disadvantages

Some compromise in solution quality is likely when comparing the quality of any single solution to a specifically tuned optimisation algorithm.

The motivation is that this is compensated for by guaranteeing acceptable performance across very large problem sets, using cheap heuristics that are often simple to understand and can incorporate human knowledge.

1.3 Motivation

One of the motivations for studying hyper-heuristics is to build systems which can handle classes of problems rather than solving just one problem.

1.4 Purpose of hyper-heuristic

There might be multiple heuristics from which one can choose for solving a problem, and each heuristic has its own strength and weakness. The idea is to automatically devise algorithms by combining the strength and compensating for the weakness of known heuristics. In a typical hyper-heuristic framework there is a high-level methodology and a set of low-level heuristics (either constructive or perturbative heuristics). Given a problem instance, the high-level method selects which low-level heuristic should be applied at any given time, depending upon the current problem state, or search stage.

1.4 Online methods and offline methods

Online hyper-heuristic methods typically learn a sequence of low-level heuristics that can be applied to perturb an existing solution and learn during the solving phase.

Offline methods attempt to find mapping between problem state and heuristic in order todetermine how to solve a problem, requiring an initial offline training period using a representative set of problems.

2. NELLI* Algorithm

2.1 What is NELLI

The first version of NELLI comprised of three main parts:

  1. a stream of problem instances
  2. a continuously generated stream of novel heuristics
  3. a network that sustains co-stimulating components (heuristics and problem instances)

Problem instances and heuristics can be added in any quantity at any point.

An AIS is responsible for governing the dy namic process that enable heuristics and problem instances to be incorporated(stimulated) or rejected(suppressed) by the network.

2.2 Representation

A linear sequence of heuristic-components, each of wich explicitly results in some items to be placed into the solution.

2.3 Mutation

A proportion pwere generated by appliying one of five mutation operators to an existing heuristic randomly chosen from the sustained network.

By varying the value of pm, it is possible to alter the balance between exploration(random generation of heuristics) and exploitation(focus the search around existing heuristics).

The exploitation process is achieved through finve operators:

  1. Select a random heuristicv and swap the position of two random nodes.
  2. Select a random heuristic and replace a random node with a randomly selected node.
  3. Select a random heuristic from the network and remove a random.
  4. Select a random heuristic and addd a random node at a random position.
  5. Select two random heuristics from the network and concatenate their nodes.

2.4 A generic example

The first figure above shows a generic example of a heuristic represented by a string of five heuristic components with a "pointer" used by an encompassing wrapper to indicate the current component position.

Each component is chosen from the list of nodes shown.

If a node is successful in packing one or more items into a bin, then the pointer is advanced to the next node and the process continues with the current bin - when a node fails, a new bin is opened, and the pointer advances.

If a node fails, a new bin is opened, and the pointer advances.

The pointer is returned to the start after evaluation of the last node in the sequence.

Evolutionary Computing: [reading notes]On the Life-Long Learning Capabilities of a NELLI*: A Hyper-Heuristic Optimisation System的更多相关文章

  1. Evolutionary Computing: 5. Evolutionary Strategies(2)

    Resource: Introduction to Evolutionary Computing, A.E.Eliben Outline recombination parent selection ...

  2. Evolutionary Computing: 5. Evolutionary Strategies(1)

    resource: Evolutionary computing, A.E.Eiben Outline What is Evolution Strategies Introductory Exampl ...

  3. Evolutionary Computing: 4. Review

    Resource:<Introduction to Evolutionary Computing> 1. What is an evolutionary algorithm? There ...

  4. Reading Notes of Acceptance Test Engineering Guide

    The Acceptance Test Engineering Guide will provide guidance for technology stakeholders (developers, ...

  5. Evolutionary Computing: 1. Introduction

    Outline 什么是进化算法 能够解决什么样的问题 进化算法的重要组成部分 八皇后问题(实例) 1. 什么是进化算法 遗传算法(GA)是模拟生物进化过程的计算模型,是自然遗传学与计算机科学相互结合的 ...

  6. [Notes] Reading Notes on [Adaptive Robot Control – mxautomation J. Braumann 2015]

    Reading sources: 1.Johannes Braumann, Sigrid Brell-Cokcan, Adaptive Robot Control (ARC  ) Note: buil ...

  7. Reading Notes : 180213 计算机的硬件构成与处理流程

    读书<计算机组成原理>,<鸟哥的Linux私房菜基础篇> 基本上接触过计算机的人,都多少知道计算机的具体构成,但是真正能讲明白的却说了很多,本节将讲解一下计算机的基本硬件构成和 ...

  8. Evolutionary Computing: Assignments

    Assignment 1: TSP Travel Salesman Problem Assignment 2: TTP Travel Thief Problem The goal is to find ...

  9. Evolutionary Computing: multi-objective optimisation

    1. What is multi-objective optimisation [wikipedia]: Multi-objective optimization (also known as mul ...

随机推荐

  1. (四)SQL入门 数据库的操作与事务管理

    数据库的操作,有三个最基本的语句,insert插入,update修改,delete删除. 不同的数据库厂商的实现可能不同,所以就不说具体的语法怎么写的了.说语法也没有意义,到处都可以复制粘贴,记得听某 ...

  2. 【转】lower_case_table_names=1 让MySQL不区分大小写

    lower_case_table_names=1 让MySQL不区分大小写! 此前有款网络游戏的数据库是采用MySQL.操作系统是CentOS.部分服务器的操作系统又是Windows. 出现了一个小毛 ...

  3. UVA 11624 BFS的妙用

    题意: 迷宫里起火了,有若干个障碍物,有多个起火点,起火点每经过一个时间间隔就向它的上下左右相邻的格子扩散. 有个倒霉的人好像叫做“Joe”,他要逃出来,他每次可以向上下左右任意移动一格,但是即要避开 ...

  4. hsql数据库使用详解(入门)及快速使用

    一.简介: hsql数据库是一款纯Java编写的免费数据库,许可是BSD-style的协议,如果你是使用Java编程的话,不凡考虑一下使用它,相对其 他数据库来说,其体积小,才563kb.仅一个hsq ...

  5. 多Web服务器之间共享Session的解决方案

    一.提出问题: 为了满足足够大的应用,满足更多的客户,于是我们架设了N台Web服务器(N>=2),在多台Web服务器的情况下,我们会涉及到一个问题:用户登陆一台服务器以后,如果在跨越到另一台服务 ...

  6. gerrit add review标签

    添加verifyed标签 http://blog.csdn.net/terence427/article/details/16840697

  7. Time crumbles things; everything grows old under the power of Time and is forgotten through the lapse of Time

    Time crumbles things; everything grows old under the power of Time and is forgotten through the laps ...

  8. Linux:-杀进程的技巧

    <---kill进程的技巧---> 1.杀掉某个关键字的进程 pgrep -f 2.批量杀掉某个关键字的进程 pkill - "name" 3.批量杀掉多个关键字的进程

  9. js 自带的 map() 方法

    1. 方法概述 map() 方法返回一个由原数组中的每个元素调用一个指定方法后的返回值组成的新数组. 2. 例子 2.1 在字符串中使用map 在一个 String  上使用 map 方法获取字符串中 ...

  10. AngularJS控制器

    AngularJS 控制器 控制 AngularJS 应用程序的数据,控制器是常规的 JavaScript 对象. 1. angular.module(name, [requires], [confi ...