Available online at www.sciencedirect.com

European Journal of Operational Research 187 (2008) 371–392 www.elsevier.com/locate/ejor

Continuous Optimization

An evolutionary artificial immune system for multi-objective optimization K.C. Tan *, C.K. Goh, A.A. Mamun, E.Z. Ei Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering Drive 3, Singapore 117576, Singapore Received 12 December 2005; accepted 28 February 2007 Available online 7 April 2007

Abstract In this paper, an evolutionary artificial immune system for multi-objective optimization which combines the global search ability of evolutionary algorithms and immune learning of artificial immune systems is proposed. A new selection strategy is developed based upon the concept of clonal selection principle to maintain the balance between exploration and exploitation. In order to maintain a diverse repertoire of antibodies, an information-theoretic based density preservation mechanism is also presented. In addition, the performances of various multi-objective evolutionary algorithms as well as the effectiveness of the proposed features are examined based upon seven benchmark problems characterized by different difficulties in local optimality, non-uniformity, discontinuity, non-convexity, high-dimensionality and constraints. The comparative study shows the effectiveness of the proposed algorithm, which produces solution sets that are highly competitive in terms of convergence, diversity and distribution. Investigations also demonstrate the contribution and robustness of the proposed features. Ó 2007 Elsevier B.V. All rights reserved. Keywords: Evolutionary algorithms; Artificial immune systems; Multi-objective optimization; Clonal selection principle

1. Introduction Many real-world problems involve the simultaneous optimization of various competing specifications and constraints that are difficult, if not impossible, to solve without the aid of powerful optimization algorithms. In the recent years, many different population-based stochastic optimization methods such as evolutionary algorithms (EA), evo* Corresponding author. Tel.: +65 65162127; fax: +65 67791103. E-mail address: [email protected] (K.C. Tan).

lutionary strategies (ES) and particle swarm optimization (PSO) have been successful developed and applied to solve multi-objective (MO) problems. While it has been shown that these biologically inspired heuristics offers better performances over classical optimization approaches in complex MO problems, they are plagued by their own limitations such as premature convergence and poor exploitation abilities. Artificial immune system (AIS) is a computational intelligence paradigm inspired by the biological immune system, which has found application in pattern recognition (Carter, 2000; Carvalho and

0377-2217/$ - see front matter Ó 2007 Elsevier B.V. All rights reserved. doi:10.1016/j.ejor.2007.02.047

372

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

Freitas, 1991), scheduling (Mori et al., 1998; Cui et al., 2001), control (Bersini, 1991; Kim and Lee, 2004), machine-learning (Hunt and Cooke, 1996; Timmis and Knight, 2001) and information systems security (Harmer et al., 2002; Dasgupta and Gonzalez, 2002). AIS has also been applied successfully to a variety of optimization problems and studies have shown that it possesses several attractive immune properties that allow EAs to avoid premature convergence (Fukuda et al., 1999) and improve local search (Bersini and Varela, 1991). However, the issue of MO optimization is rarely considered and the success of AIS in single objective (SO) problems may not extend well into MO problems where MO techniques are required to maintain a diverse and uniformly distributed solution set. This paper considers the development of an evolutionary multi-objective immune algorithm (EMOIA) to exploit the complementary features of EA and AIS. The algorithm incorporates the features of clonal selection and immune memory to improve evolutionary search by identifying potential regions to explore while avoiding over emphasis in any region of the search space. The proposed clonal selection (CS) is different from many existing works in the sense that the selection and clonal rate of memory cells are based on the diversity in the evolving population. An entropy-based density assessment scheme (EDAS) is also proposed in this paper to distribute non-dominated individuals along the discovered Pareto-front uniformly for MO optimization. Unlike existing density assessment schemes, the assessment is based on the individuals’ contribution to the total information content of the archive, and can be applied in either the decision or objective domain space depending on the nature of the problem involved. The remainder of this paper is organized as follows: Section 2 provides a brief introduction to MO optimization while Section 3 provides some background information on AIS for MO optimization. The computational framework of AIS for MO optimization, details of EMOIA implementation and the proposed features of CS and EDAS are described in Section 4. Extensive empirical studies are conducted in Section 5, including a comparative study of the proposed algorithm with wellknown MO optimization algorithms on a number of benchmark problems, further investigation on the effects of the proposed EDAS and parameter sensitivity analysis. Conclusions are drawn in Section 6.

2. Background information In general, many real-world applications involve complex optimization problems with various competing specifications and constraints. Without loss of generality, we consider a minimization problem with decision space, X, a subset of real numbers. For the minimization problem, it tends to find a parameter set P for MinP2X FðPÞ;

P 2 RD ;

ð1Þ

where P ¼ fp1 ; p2 ; . . . ; pD g is a vector with D decision variables and F ¼ ff1 ; f2 ; . . . ; fM g are M objectives to be minimized. The solution to MO optimization problem exists in the form of an alternate tradeoff known as Pareto optimal set where each objective component of any non-dominated solution in the set can only be improved by degrading at least one of its other objective components. Pareto dominance can be used to assess the relative strength or fitness between any two candidate solutions in MO optimization and the concept has been widely adopted in the research of MO optimization since it was proposed by Pareto et al. (1896). Specifically, a vector Fa is said to dominate another vector Fb, denoted as F a  F b ; iff f a;i 6 fb;i 8i ¼ f1; 2; . . . ; Mg and 9j 2 f1; 2; . . . ; Mg where f a;j < fb;j :

ð2Þ

3. Artificial immune systems AIS for optimization have been proposed and implemented in different ways. For instance, immune algorithms developed by Bersini and Varela (1991), Toma et al. (2000) are based on the immune network theory while other researchers such as Cui et al. (2001) and Coello Coello and Cortes (2005) developed AIS based on the concepts of clonal selection principle. Similar to the other stochastic optimization techniques, the AIS maintains and adapts a repertoire of candidate solutions to the problem at hand, which is analogous to immune system’s response to antigens (Ag). In this context, the candidate solutions are called antibodies (Ab), and are associated with an affinity measure that provides an indication of its performance.

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

3.1. Biological immune system The biological immune system, consisting of the innate and adaptive immune systems, is an effective and efficient defence mechanism against infections. The innate immune system serves as the first line of defence, employing phagocytes to destroy infectious pathogens and remains relatively constant, independent of antigenic exposure. On the other hand, the adaptive immune system produces and adapts lymphocytes (T-cells and B-cells) in response to specific Ags, improving their effectiveness with every encounter. The principle of clonal selection describes how the adaptive immune system reacts to Ags and improves its capability of recognizing and eliminating them. When exposed to an antigenic stimulus, T-cells and B-cells that best recognize the infectious pathogen will proliferate and differentiate into effector cells. T-effectors can either be lymphokine secretors which promotes the production of Abs or Tk cells which eliminates antigens while B-cells are antibody secretors. While both types of lymphocytes are crucial in the initialization and control of the adaptive immune response, the adaptability of B-cells allow the immune system to improve itself with each encounter of a given Ag. In contrast to T-cell clonal expansion, the variable region of the B-cell also suffers from somatic mutation which plays an important role in the creation of a diverse repertoire of Abs. Apart from plasma cells, B-cells also proliferate and differentiate into long-lived B-memory cells. While the plasma cells are active antibody secretors, the memory cells circulate around the body producing little or no antibodies. Upon exposure to recognized antigenic stimulus, the memory cells differentiate quickly into plasma cells capable of producing high affinity antibodies by preselecting the specific antigen. Therefore, the presence of both mutation and selection processes in the B-cell clonal expansion allows the lymphocytes to increase repertoire diversity and improve their ability to recognize specific Ags. 3.2. Artificial immune systems for MO optimization Due to the intrinsic similarities between the computational frameworks of EA and AIS, immuneinspired mechanisms can be easily incorporated into the evolutionary optimization process and most exiting works, even in the context of MO optimization, represent some form of hybridization of

373

AIS-EA. In particular, immune-inspired selection schemes are often employed in evolutionary techniques to overcome the problem of premature convergence. Despite the potential advantages of immune properties, the development of immune algorithms for MO problems is rarely considered until recently. This section provides a brief overview of the existing MO immune algorithms, highlighting the mechanisms that improve the effectiveness of MO optimization. Yoo and Hajela (1999) presented a hybrid AISEA for a MO structural design problem, which applies an extension of the immune-based fitness sharing scheme (Hajela and Lee, 1996) to handle the constraints and multiple objectives. In this scheme, a random sample of Abs is selected without replacement at every step, matched against a specified Ag, and a reward based on hamming distance is added to the fitness of the winning Ab. Cui et al. (2001) also implemented a hybrid algorithm with an aggregated fitness function involving the optimization objectives and affinity. Population diversity is maintained by an entropy-based affinity measure similar to the method of niching with a similarity constant that plays a role analogous to the sharing parameter. The approach is validated in a comparative study against MOGA (Fonseca and Fleming, 1993) on a flow shop scheduling problem. The major drawback of the aforementioned techniques is associated with the weighted fitness function used to guide the optimization process; it is sensitive to the weight settings as well as the shape of the Pareto front. Furthermore, there is a lack of an explicit diversity preservation mechanism to maintain a diverse and uniformly distributed Pareto front. In order to improve the balance between exploration and exploitation, Luh et al. (2003) presented a relatively complex realization of the biological immune system with a variety of variation operators such as somatic recombination, somatic mutation, gene conversion, etc. The multi-objective immune algorithm (MOIA) can be considered as a two stage optimization process, (1) the clonal proliferation process where non-dominated solutions are subjected to hypermutation and (2) an antibody diversification process where antibodies selected on basis of avidity values undergo a variety of variation operations. Coello Coello and Cortes (2005) presented a multi-objective immune system algorithm (MISA),

374

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

which extends the clonal selection principle to identify appropriate candidate solutions for clonal expansion. Selection is performed on the basis of Pareto dominance relationship and feasibility while the cloning rate depends on the degree of similarity between the selected antibodies to promote sampling of the less crowded region. A secondary population is also employed to store the non-dominated solutions found and an adaptive grid mechanism is incorporated to ensure the uniform distribution of the stored solutions. Freschi and Repetto (2005) proposed a vector artificial immune system (VAIS) that is based on the artificial immune network (De Castro and Timmis, 2002) for MO optimization. The VAIS is different from the algorithms described thus far because of the absence of any explicit diversity preservation mechanism. Instead, a suppression operator is used to suppress similar solutions to prevent over representation of these solutions in the memory. In addition, VAIS implements a ranking scheme which is modified from the strength Pareto approach adopted in strength Pareto evolutionary algorithm 2 (SPEA2) (Zitzler et al., 2001) such that diversity information is not considered at all. Two methods are applied to handle infeasible solutions. The first method simply discards infeasible solutions and it is applied when new solutions are generated. The second method is applied whenever a solution becomes infeasible after mutation and it involves an iterative process of reducing mutation strength with a bisection rule until the mutated clone becomes feasible. Jiao et al. (2005) proposed an immune dominance clonal multi-objective algorithm (IDCMA) which maintains three different populations of solutions. The first population denoted as the immune dominance Abs population is used to store the set of non-dominated solutions with the best immune differential degree. In every generation, IDCMA generates a new population of Abs and a set of these Abs are selected based on their affinity to undergo cloning and recombination. The set of recombined Abs form the second population which is denoted as the generic Abs population. The rest of the Abs will constitute the third population known as the immune energy Abs population.

rates the immune features of pattern recognition and immune learning through the mechanism of clonal selection and immune memory for MO problems. In particular, archive diversity is maintained by the proposed entropy-based density assessment technique while evolving population diversity is maintained by a new clonal selection scheme. Archive diversity ensures that a representative set of non-dominated solutions is stored while evolving population diversity is crucial to the discovery of a diverse, well-distributed and near-optimal solution set.

4. Evolutionary artificial immune system

Affinity calculation Antibody production

This section describes the proposed evolutionary multi-objective immune algorithm, which incorpo-

4.1. Computational framework The algorithmic representation for the biological immune system is summarized in Table 1. Similar to Fukuda et al. (1999) and Cui et al. (2001), the antigenic stimulus and the antibodies are defined as the MO problem to be solved and the potential solutions to the problem respectively. Intuitively, the affinity of the antibodies is associated with how well it solves the problem which is defined in terms of Pareto dominance. Immune memory is implemented in the form of a fixed-sized archive and memory cells are represented by non-dominated antibodies. In order to promote antibody diversity and to facilitate the exchange of good information among antibodies, antibodies are subjected to genetic operators such as crossover and mutation after the processes of clonal selection and expansion. 4.2. Algorithmic flow of EMOIA In order to design an algorithm that is capable of exploiting the complementary features of EA and Table 1 The biological immune system and EMOIA Immune system

EMOIA

Antigen Antibody Immune memory Memory cell Clonal selection

MO problem Candidate solution Archive Archived solution or non-dominated antibody Selection of antibodies contributing to quality of solution set Identification of antibodies Evolution

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

AIS, a few features such as archive, entropy-based density assessment scheme (EDAS), clonal selection and genetic operators are incorporated in the EMOIA. The flowchart of EMOIA is shown in Fig. 1. The evolutionary process starts with the random initialization of the initial population of Abs. After which, all Abs are evaluated based on the respective objective functions and non-dominated Abs are updated into the archive as memory cells. The archive is updated at each cycle, e.g., if the candidate solution is not dominated by any members in the archive, it will be added to the archive. Likewise, any memory cells dominated by this solution will be removed from the archive. When the predetermined archive size, archivebd, is reached, a recurrent truncation process (Khor et al., 2005) based on the EDAS is used to remove the most ineffective archive member. The EDAS will be described in the Section 4.4. The rationale of eliminating memory cells based on EDAS is to maintain a set of uniformly distributed memory cells in the archive. After the archiving process, appropriate Abs are selected into the mating pool which has the same

Initialize Population

size as the evolving population. The selection process is actually a two stage process. The first stage involves the cloning of memory cells from the archive by means of the proposed clonal selection scheme which will be described in Section 4.5. These cloned memory cells will form only part of the mating pool solution. As illustrated in Fig. 1, binary tournament selection will be conducted to fill up the archive with Abs from the evolving population and archive in the second stage. This binary tournament selection is performed on the basis of constrained-dominance scheme which will be described in Section 4.3 and the EDAS will be used in the event when both Abs are incomparable. In contrast to conventional AIS paradigm where mutation is the main source of Abs variation, Abs will be subjected to both crossover and mutation in the EMOIA. In particular, the Abs in the mating pool is subjected to naı¨ve uniform crossover (Deb, 2001) and uniform mutation. For each Abs undergoing the mutation operation, each decision variable is perturbed by a uniformly distributed number on the interval ½S; S. In order to promote exploration in the initial stages and exploitation in the later stages, the mutation strength S is adapted as S ¼ ðuppbd mut  lowbd mut Þ 

Evaluate Abs

Archive Upate

375

Genbd  gen þ lowbd mut ; Genbd ð3Þ

where Genbd is the maximum number of generations to be carried out and gen is the current generation of the evolutionary process. In this paper, uppbdmut and lowbdmut are set as 0.4 and 0.2, respectively. The optimization process is repeated until the maximum number of evaluations is met.

Yes Output Archive

Stopping Criteria Satisfied?

No Clonal Selection

Binary Tournament Selection

No Mating pool filled?

Yes

Yes Crossover/ Mutation

Fig. 1. The flowchart of EMOIA.

4.3. Constrained dominance scheme In order to evolve solutions that satisfy the various constraints, a constrained Pareto dominance scheme is applied in this paper. In particular, an Abs Fa dominates an Abs Fb if, 1. Fa is feasible and Fb is infeasible. 2. Both solutions are infeasible and Fa has fewer constraint violations than Fb. 3. Both solutions are infeasible, have the same number of constraint violations and Fa dominates Fb in terms of the objective values. 4. Both solutions are feasible and Fa dominates Fb in terms of the objective values.

376

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

4.4. Entropy-based density assessment In this paper, an entropy-based density assessment scheme is proposed to maintain a uniformly distributed set of non-dominated solutions. Unlike existing density assessment schemes such as niche sharing (Goldberg, 1989), crowding (Deb et al., 2002) and clustering (Zitzler and Thiele, 1999) where assessment of each individual solution is only depended on its’ immediate neighbours, the proposed scheme is based on the individuals’ contribution to the total information content of the archive. In addition, EDAS is different from the approach presented by Cui et al. (2001) in two aspects: (1) density assessment is performed in the objective space instead of the genotype space and (2) it does require the specification of any additional parameters such as the similarity constant. In particular, the width of the kernel used to estimate the distribution density is adapted based on the size of the objective space along the optimization process. This method is motivated by the immune system ability to maintain a regulated repertoire of lymphocytes that is representative of the actual antigenic environment. Similarly, it is necessary to maximize the information conveyed by the memory cells about the problem at hand. Since information theory provides us with a mathematical formalization of the intuitive notion of information, the concept of entropy or information gain is applied here to quantify the information contributed by each memory cell to the archive. In order to compute the*entropy of each memory cell, consider the*archive Y as a statistical population containing j Y j non-dominated Abs or memory cells in an m-dimensional feature space which can be modeled as *

*

*

Y ¼ fy i ji ¼ 0; 1; 2; . . . ; tj Y jg;

ð4Þ *

*

where y i 2 Rm 8i ¼ 1; 2; . . . ; j Y j, y i;j 2 ½lowbd j ; uppbd j  is a memory cell with a probability, *

*

p*y i ¼ P ðy i 2 Y Þ:

ð5Þ

Entropy is defined in terms of probability density * and the entropy of y i is given by the logarithmic function *

Iðy i Þ ¼  logðp*y i Þ:

ð6Þ

The entropy of any particular memory cell can be interpreted as the information that can be gained by the archive when it is part of it.

Since entropy is defined in terms of probability density, density estimation is required to construct an estimate of an unobservable underlying probability density function based on observed Abs. In this paper, the Parzen window density estimation which is a non-parametric method of estimating the probability density function is applied to estimate the probability density. The Parzen window can be defined as *

^pðY Þ ¼

1 X *

jY j

*

*

yi

*

KðY y i Þ;

ð7Þ

where K is the kernel function. In this paper, the multi-variate Gaussian kernel is used and it can be described by   * 1 1 *T 1 * KðY Þ ¼  Y R Y ; ð8Þ M 1 exp 2 ð2pÞ 2 jRj2 where R is the covariance matrix, T is the transpose operator, M is the number of objectives and the kerpffiffiffi ffi * * nel width is defined by r ¼ R; r 2 RM . It is known that the Parzen window is sensitive to the kernel * width setting. Therefore, r is adapted along the optimization process, rj ¼

uppbd j  lowbd j ; archivebd

ð9Þ

where uppbdj and lowbdj denotes the maximum and minimum values along the jth dimension of the feature space found in the archive respectively. Consequently, Eq. (6) can be rewritten as  *  1 1 * * Iðy i Þ ¼ ^pðy i ÞjRj2 log p^ðy i ÞjRj2 :

ð10Þ

Eq. (10) can be easily extended for the calculation of the entropy of Abs in the evolving population. Intuitively, an antibody with a higher I will have a better contribution to the overall information content of the archive. Note that I is maximized when the memory cells are uniformly distributed along the Pareto front. As mentioned before, recurrent truncation will be performed to remove the most ineffective memory cell when the predetermined archive size is reached. In particular, the memory cell with the least I is removed to accommodate a new memory cell with better information contribution to the archive. This will allow the archive to maintain a set of uniformly distributed memory cells in the archive.

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

4.5. Clonal selection In AIS, the selection of non-dominated solutions or memory cells from the archive for the cloning process (Luh and Chueh, 2004; Coello Coello and Cortes, 2005) can result in fast convergence speed due to high selection pressure. However, the selection of memory cells based on its density in the archive can also result in rapid loss of evolving population diversity, particularly if there are isolated points on the Pareto front. This motivates the development of a clonal selection (CS) scheme which is dependent on the diversity in the evolving population instead. In contrast to existing works, the selection and clonal rate of memory cells are based on the degree of their representation (dr) in the evolving population. The rationale is that the evolving population provides a better indication of the less explored regions of the search space. CS scheme is a two stage process involving the calculation of dr for each memory cell and then the cloning rate assignment based on the computed dr for the memory cells. There are two steps involved in the calculation of dr for each memory * cell, y i . The first step determines the Abs in the evolving population that are representative of the memory cells. Since we are only interested guiding the search towards better and less explored regions in the search space, only* a subset of the evolving * * population denoted as P  where x k 2 P  is only dominated by memory cells is considered in the cal* * culation of dr. An Abs, x k 2 P  is representative of a * particular memory cell y i along the jth dimension if, xk;j 2 Ri;j

iff ky i;j ; xk;j k 6 ki;j ;

ð11Þ

where ki,j is the range of similarity and Ri,j denotes * the set of Abs that are representative of y i along the jth dimension. For simplicity, ki,j is adapted along the optimization process as 0.15 Æ (uppbdj  lowbdj) where uppbdj and lowbdj denotes the maximum and minimum values along the jth dimension of the objective space found in the archive respectively. After the representatives of the memory cells are determined, the second* step computes the dr of each * memory cell y i in P  . dr is calculated by the following: Xm * drðy i Þ ¼ min ky i;j ; xk;j k  Eðy i;j ; xk;j Þ; ð12Þ j * xk 2P

 Eðy i;j ; xk;j Þ ¼

1 if xk;j 2 Ri;j ; 0 otherwise;

ð13Þ

377

where kÆk implies the 2-norm. A higher value of dr implies that a lesser degree of similarity between the memory cell and its representatives and, hence denotes a lower level of representation in the evolving population. Intuitively, memory cells with higher dr should play a more active role in the subsequent adaptation process and assigned higher cloning rates. The cloning rate assignment requires the ranking of the memory cells in terms of dr and the overall cloning procedure is outlined in the following pseudocode. The rationale of cloning higher number of memory cells with a lesser degree of representation is to promote exploration and exploitation of the less populated regions. The actual distribution of the clonal rates across the different ranks shown in the pseudocode is empirically derived from exhaustive experimentation and the effects of different cloning rate settings will be studied empirically in the next section. As mentioned in Section 4.2, memory cells selected and cloned by CS will only form part of the mating pool. The rest of the mating pool Abs will be selected through tournament selection. Determine degree of representation * Calculate dry i for all y i * Calculate rank for all y i based on dry i Perform cloning * IF j Y j < 0:1  archivebd * Clone s1 = 4 copies of all y i *

ELSEIF j Y j < 0:2  archivebd Clone s21 = 3 copies of the first 10 ranks of * yi * Clone s22 = 2 copies of the rest of y i ELSE Clone s31 = 2 copies of the first 10 ranks of * yi Clone s32 = 2 copies of the next 10 ranks of * yi * Clone s33 = 1 copy of the rest of y i up to rank 0.5 Æ archivebd END 5. Simulation studies In this section, extensive empirical studies are conducted to analyze the performance of the proposed EMOIA upon six benchmark problems. The different benchmark problems and performance metrics for MO optimization employed are described in Sections 5.1 and 5.2, respectively. Comparative studies

378

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

are conducted in Section 5.3 while the effects of the EDAS are examined in Section 5.4. This section concludes with a parameter sensitivity analysis in Section 5.5. 5.1. Benchmark problems In the context of multi-objective optimization, these test functions must present sufficient difficulty to impede MO optimizer’s search for Pareto optimal solutions. Deb (1999) has identified several characteristics that may challenge algorithm’s ability to converge and maintain population diversity. Multi-modality is one of the characteristics that hinder convergence in MO optimization. Multi-modal-

ity essentially refers to the presence of multiple local Pareto fronts. Convexity, discontinuity and nonuniformity of the Pareto front may prevent population-based heuristics from finding a diverse set of solution. Seven benchmark problems; ZDT1, ZDT4, ZDT6, FON, KUR, DTLZ3 and CTP7 are employed in this paper. CTP7 is a constrained test problem. In order to challenge the algorithmic capability in handling high-dimensional objective space, DTLZ3 is setup as a five-objective problem. Many researchers, such as Knowles and Corne (2000), Corne et al. (2000), Deb et al. (2002), Tan et al. (2001), Zitzler et al. (2000, 2001), have used these problems in the validations of their algorithms. Therefore these problems should serve as a good

Table 2 Benchmark Problems Benchmark problem

Definition

1

ZDT1

f1(x1) = x1 P gðx2 ; . . . ; xm Þ ¼p1ffiffiffiffiffiffiffiffiffi þ9 m i¼2 x1 =ðm  1Þ hðf1 ; gÞ ¼ 1  f1 =g where m = 30, and x1 2 ½0; 1

2

ZDT4

f1(x1) = x1 P 2 gðx2 ; . . . ; xm Þ ¼p1ffiffiffiffiffiffiffiffiffi þ 10  m i¼2 ½x1  10 cosð4px1 Þ hðf1 ; gÞ ¼ 1  f1 =g where m = 10, and x1 2 ½0; 1 and x2 ; . . . ; xm 2 ½5; 5

3

ZDT6

6 f1(x1) = 1  exp(4x1)sin 1) P(6px 0:25 gðx2 ; . . . ; xm Þ ¼ 1 þ 9  ½ð m i¼2 ðx1 Þ=ðm  1Þ h(f1, g) = 1  (f1/g)2 where m = 10, and x1 2 ½0; 1

4

FON

Minimize (f1, f2) pffiffiffi P f1 ðx1 ; . . . ; x8 Þ ¼ 1  exp½ 8i¼1 ðxi  1=p8ffiffiffiÞ2  P8 f2 ðx1 ; . . . ; x8 Þ ¼ 1  exp½ i¼1 ðxi  1= 8Þ2  where 2 6 xi 6 2; 8i ¼ 1; 2; . . . ; 8

5

KUR

Minimize qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi P(f1, f2) f1 ðxÞ ¼ 2i¼1 ½10 expð0:2 x2i þ xi þ 12 Þ P3 f2 ðxÞ ¼ i¼1 ½jxi j0:8 þ 5 sinðx3i Þ where 5 6 xi < 5; 8i ¼ 1; 2; 3

6

DTLZ3

f1(x) = (1 + g(xM))cos (x1p/2)    cos(xM1p/2) f2(x) = (1 + g(xM))cos(x1p/2)    sin(xM1p/2) ... fM(x) = (1 + g(xM))sin(x P 1p/2) gðxM Þ ¼ 100fjxM j þ xi 2xM ½ðxi  0:5Þ2  cosð20pðxi  0:5ÞÞg xM ¼ fxM ; . . . ; xMþ9 g where xi 2 ½0; 1 8i ¼ 1; 2; . . . ; M þ 9

7

CTP7

f1(x1) = x1 P 0:5 gðx2 ; . . . ; xm Þ ¼ 1 þ 9  ½ m i¼2 xi =ðm  1Þ f2 ðx2 ; . . . ; xm Þ ¼ g  ð1  fg1 Þ subject to Cðf1 ; f2 Þ  cosðhÞ½f2  e  sinðhÞf1 P ajsin{bp[sin(h)(f2  e) + cos(h)f1]c}jd where m ¼ 10; xi 2 ½0; 1; h ¼ 0:05p, a ¼ 40; b ¼ 5; c ¼ 1; d ¼ 6; e ¼ 0

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

take all these objectives into account. In this work, three different quantitative performance interpretation of MO optimization are applied to validate the effectiveness of the proposed measures, together with the selected algorithms. These metrics are taken from references such as Deb (2001), Veldhuizen and Lamont (1999), Zitzler et al. (2000), and are chosen since they have been widely used for performance comparisons in MO optimization. Generational distance (GD) is a measure of the distance between the true and generated Pareto front. This metric of individual distance representing the distance is given by !1=2 n 1X 2 GD ¼ d ; ð14Þ n i¼1 i

Table 3 Indices of the different algorithms Index

1

2

3

4

5

Algorithm

EMOIA

IMOEA

NSGAII

SPEA2

PAES

379

test suite for a fair comparison of different multiobjective algorithms (see Table 2). 5.2. Performance metrics In comparative studies, the choice of performance metrics is very important. The optimization goal of MO algorithms is (1) to minimize distance between the generated and true Pareto front, (2) to obtain a good distribution and (3) to obtain a good spread. Hence, the performance metric should Table 4 Parameter setting for different algorithms Populations archivebd Coding Chromosome length Selection Crossover method Crossover rate Mutation method Mutation rate Hyper-grid size Evaluations

a

Population size 100 in EMOIA, IMOEA, NSGAII, and SPEA2; Population size 1 in PAES 100 Real number coding for EMOIA; Binary coding for IMOEA, NSGAII, SPEA2 and PAES 15 Bits for each variable Binary tournament selection Naı¨ve crossover for EMOIA; Uniform crossover for IMOEA, NSGAII, SPEA2 and PAES 0.8 Bit-flip mutation in IMOEA, NSGAII, SPEA2 and PAES; Adaptive for EMOIA 0.1 for EMOIA; 1/chromosome_length for ZDT1, ZDT4, ZDT6, DTLZ3 and CTP7 in IMOEA, NSGAII, SPEA2 and PAES; 1/bit_number for FON and KUR in IMOEA, NSGAII, SPEA2 and PAES 23 per dimension for DTLZ3; 25 per dimension for others 30,000 for FON; 10,000 for KUR and ZDT6; 28,000 for DTLZ3; 50,000 for ZDT1 and ZDT4; 40,000 for CTP7

1

b

c

1

1

0.8

0.4 0.2 0

0.8

0.6

0.6

f2

f2

f2

0.6

0.8

0.4

0.4

0.2

0.2

0 0

0.2

0.4

0.6

0.8

1

0 0

0.2

0.4

f1

0.8

1

0

0.2

f1

e

1

0.6

0.8

1

1 0.8

0.6

0.6

0.4

0.4

0.2

0.2

0

0.4

f1

0.8

f2

f2

d

0.6

0 0

0.2

0.4

0.6

f1

0.8

1

0

0.2

0.4

0.6

0.8

1

f1

Fig. 2. The evolved Pareto front from (a) EMOIA, (b) IMOEA, (c) NSGAII, (d) SPEA2 and (e) PAES for ZDT1.

380

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

where n is the number of members in PFknown, di is the Euclidean distance (in objective space) between the member i of and PFknown its nearest member of PFtrue. A smaller value of GD implies better convergence. The metric of spacing (S) (Scott, 1995) measures how ‘‘evenly’’ members in PFknown are distributed. It is defined as " #1=2 , n n X 1X 2   where d ¼ 1 S¼ ðd i  dÞ d i; d; n i¼1 n i¼1

Zitzler et al. (2000) defined the metric of maximum spread (MS) measuring how well the true Pareto front is covered by the discovered Pareto front through the hyper-boxes formed by the extreme function values observed in the true Pareto front and generated Pareto front. In order to normalize the metric, this metric is modified as vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi u M u1 X 2 MS ¼ t ½ðmaxni¼1 fmi  minni¼1 fmi Þ=ðF max  F min m m Þ ; M m¼1 ð16Þ

ð15Þ

where n is the number of members in the discovered Pareto front, fmi is the mth objective of member i, min F max are the maximum and minimum of the m , Fm mth objective in the true Pareto front. A larger value of MS implies a better spread of solutions.

where n is the number of members in PFknown, di is the Euclidean distance (in objective space) between the member i of PFknown and its nearest member of PFknown Æ PFtrue. A smaller value of S implies a more uniform distribution of solutions in PFknown.

a

b

0.03

c

2

1

1.5 0.99

0.01

1

MS

S

GD

0.02

0.5

0.97

0

0 1

2

3

4

5

0.98

1

2

3

4

0.96

5

1

2

3

4

5

Fig. 3. Performance metric of (a) GD, (b) S, and (c) MS for ZDT1.

0.8

1

0.6 0.4

1.5

1

f2

f2

c

b 1.5

1

f2

a

0.5

0.5

0.2 0

0 0

0.2

0.4

0.6

0.8

1

0 0

0.2

0.4

0.8

1

0

0.2

0.4

f1

f1

0.6

0.8

1

f1

1.5

e 1.5

1

1

f2

f2

d

0.6

0.5

0.5

0

0 0

0.2

0.4

0.6

f1

0.8

1

0

0.2

0.4

0.6

0.8

1

f1

Fig. 4. The evolved Pareto front from (a) EMOIA, (b) IMOEA, (c) NSGAII, (d) SPEA2 and (e) PAES for ZDT4.

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

5.3. Comparative study

seven benchmark problems listed in Table 2. All algorithms are implemented with the constraineddominance scheme described in Section 4.3. The indices of the five algorithms are listed in Table 3. The simulations are implemented in C++ on an Intel Pentium 4 2.8 GHz computer. Thirty independent runs are performed for each of the test

In order to examine the effectiveness of the proposed algorithm, a comparative study with IMOEA (Tan et al., 2001), SPEA2 (Zitzler et al., 2001), NSGAII (Deb et al., 2002) and PAES (Knowles and Corne, 2000) is carried out based upon the

a

381

c

b 10

1

4

MS

S

GD

0.9 5

2

0.8

0.7

0

0 1

2

3

4

5

1

2

3

4

5

1

2

3

4

5

Fig. 5. Performance metric of (a) GD, (b) S, and (c) MS for ZDT4.

a

1

b

c

1.5

0.8

1 0.8

1

0.6

0.4

f2

f2

f2

0.6

0.4

0.5

0.2

0.2

0 0.2

0.4

0.6

0.8

0 0.2

1

0.4

0.6

0.8

0 0.2

1

0.4

f1

f1 1

d

e

0.6

0.8

1

f1 1 0.8

0.6

0.6

f2

f2

0.8

0.4

0.4

0.2

0.2

0 0.2

0.4

0.6

0.8

0 0.2

1

0.4

0.6

0.8

1

f1

f1

Fig. 6. The evolved Pareto front from (a) EMOIA, (b) IMOEA, (c) NSGAII, (d) SPEA2 and (e) PAES for ZDT6.

b

0.8

1 0.9

0.6

6

S

GD

c 8

0.4 0.2

MS

a

4

0.8 0.7

2

0 1

2

3

4

5

1

2

3

4

5

1

Fig. 7. Performance metric of (a) GD, (b) S, and (c) MS for ZDT6.

2

3

4

5

382

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

constantly within 50,000 evaluations as evident from Fig. 3a–c. (2) ZDT4: ZDT4 challenges the algorithm’s ability to deal with the problem of multi-modality. The evolved tradeoffs from the different algorithms with the best mean value of GD is showed in Fig. 4a–e while the distribution of the different performance metrics is represented by box plots in Fig. 5a–c. It can be observed from Figs. 4b–e and 5a that IMOEA, NSGAII, SPEA2 and PAES are unable to find any solutions near the global Pareto front resulting in the relatively large GD for ZDT4 at the end of 50,000 evaluations. Furthermore, Fig. 4c shows these algorithms are unable to evolve a diverse set of solutions consistently. On the other hand, EMOIA is able to escape the local optima of ZDT4 consistently due to its feature of clonal selection, as reflected by its low value of GD. While EMOIA has a relatively high variance for S, it is

functions in order to obtain the statistical information, such as consistency and robustness of the algorithms. The various parameter settings for each algorithm are listed in Table 4. (1) ZDT1: ZDT1 has a convex Pareto front with a large number of variables to be optimized. The evolved tradeoffs from the different algorithms with the best mean value of GD is showed in Fig. 2a–e while the distribution of the different performance metrics is represented by box plots in Fig. 3a–c. From the plots of the evolved tradeoffs in Fig. 2a– e, it can be observed that all algorithms are able of finding solutions near the global Pareto front. While IMOEA, SPEA2 and NSGAII are capable of competitive results in the aspects of S, the algorithms demonstrate varying degree of success with respect to the metrics of GD and MS. On the other hand, EMOIA is able to evolve a diverse and welldistributed near-optimal Pareto front for ZDT1

b

1

c

1

1 0.8

0.6

0.6

0.6

f2

0.8

f2

0.8

f2

a

0.4

0.4

0.4

0.2

0.2

0.2

0

0 0

0.2

0.4

0.6

0.8

1

0 0

0.2

0.4

0.6

0.8

1

0

0.2

0.4

f1

f1 1

d

0.6

0.8

1

f1 1

e

0.8

0.6

0.6

f2

f2

0.8

0.4

0.4

0.2

0.2

0

0 0

0.2

0.4

0.6

0.8

1

0

0.2

0.4

0.6

0.8

1

f1

f1

Fig. 8. The evolved Pareto front from (a) EMOIA, (b) IMOEA, (c) NSGAII, (d) SPEA2 and (e) PAES for FON.

a

b 0.04

c

1

1.5 0.8

0.03

MS

S

GD

1

0.02 0.6

0.5 0.01 1

2

3

4

5

1

2

3

4

5

1

Fig. 9. Performance metric of (a) GD, (b) S, and (c) MS for FON.

2

3

4

5

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

able to evolve a diverse solution set within 50,000 evaluations. (3) ZDT6: ZDT6 has a biased search space and non-uniformly distributed solutions along the global tradeoffs, which makes it difficult for algorithms to evolve a well-distributed Pareto front. The

5

b

evolved tradeoffs from the different algorithms with the best mean value of GD is showed in Fig. 6a–e while the distribution of the different performance metrics is represented by box plots in Fig. 7a–c. From Fig. 7a, it can be seen that IMOEA, NSGAII and SPEA2 is unable to find the global Pareto front

c

5

5

0

0

-5

-5

-5

-10

f2

0

f2

f2

a

-10

-15 -20

-18

-16

-10

-15 -20

-14

-18

-16

-15 -20

-14

-18

f1

f1

e

5

-14

5 0

-5

-5

-10

-16

f1

0

f2

f2

d

383

-10

-15 -20

-18

-16

-15 -20

-14

-18

-16

-14

f1

f1

Fig. 10. The evolved Pareto front from (a) EMOIA, (b) IMOEA, (c) NSGAII, (d) SPEA2 and (e) PAES for KUR.

b

0.08

0.04

2

0.02

1

1

2

3

4

5

1 0.99

3

S

GD

0.06

c

4

MS

a

0.98 0.97

1

2

3

4

5

1

2

3

4

5

3

4

5

Fig. 11. Performance metric of (a) GD, (b) S, and (c) MS for KUR.

a

2000

b

c

1

5

1500 0.8

MS

S

GD

4 1000

3 2

500

0.6

1 0 1

2

3

4

5

1

2

3

4

5

1

Fig. 12. Performance metric of (a) GD, (b) S, and (c) MS for DTLZ3.

2

384

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

EMOIA found no problems converging and maintaining a diverse solution set uniformly as reflected by the metric of MS in Fig. 9c. Furthermore, EMOIA offers the best performance in terms of solution distribution and optimality as evident from Fig. 9a and b probably due to its features of clonal selection and entropy-based diversity preservation scheme. While IMOEA, NSGAII and SPEA2 demonstrate similar performance with respect to the three performance metrics, PAES demonstrates the worst overall performance. This is probably because PAES is a non-population based approach. (5) KUR: KUR is characterized by an optimal Pareto front that is non-convex and disconnected, i.e., it contains three distinct disconnected regions on the final tradeoffs. The decision variables correspond to the global tradeoffs for KUR are difficult to be discovered, since they are also disconnected in the decision variable space. The evolved tradeoff

for ZDT6 consistently within 10,000 evaluations. Although the performance of PAES on GD are better than the above mentioned three algorithms, PAES is unable to evolve a well-distributed solution set as shown in Fig. 7b. On the other hand, it is evident from Figs. 6a and 7a–c that EMOIA is able to evolve a near-optimal, diverse and well-distributed near-optimal Pareto front consistently for ZDT6 within 10,000 evaluations. (4) FON: FON challenges the algorithm’s ability to find and maintain the entire tradeoffs curve uniformly. The evolved tradeoffs from the different algorithms with the best mean value of GD is showed in Fig. 8a–e while the distribution of the different performance metrics is represented by box plots in Fig. 9a–c. It can be observed from Figs. 8 and 9 that IMOEA, NSGAII, SPEA2 and PAES are only capable of finding some parts of the optimal Pareto front. On the other hand, the proposed

a

1.5

c

1

b

1.5

0.8 1

1

f2

f2

f2

0.6 0.4

0.5

0.5

0.2 0

0 0

0.2

0.4

0.6

0.8

1

0 0

0.2

0.4

0.6

1

0

0.2

0.4

1.5

e

1

0.6

0.8

1

f1

f1

f1

d

0.8

1.5

f2

f2

1

0.5

0.5

0 0

0.2

0.4

0.6

0.8

0

1

0

0.2

f1

0.4

0.6

0.8

1

f1

Fig. 13. The evolved Pareto front from (a) EMOIA, (b) IMOEA, (c) NSGAII, (d) SPEA2 and (e) PAES for CTP7.

a

b

c

8

1

0.2 6 0.9

0.1

MS

S

GD

0.15 4

0.8

0.05

2

0

0

0.7 1

2

3

4

5

1

2

3

4

5

1

Fig. 14. Performance metric of (a) GD, (b) S, and (c) MS for CTP7.

2

3

4

5

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

with the best mean value of GD is showed in Fig. 10a–e while the distribution of the different performance metrics is represented by box plots in Fig. 11a–c. From the plots of the evolved tradeoffs in Figs. 10a–e and 11a, it can be observed that all algorithms have no problems overcoming the barrier of discontinuities. However, it can be observed from Fig. 11b and c that EMOIA is capable of evolving a more diverse and better distributed solution set as compared to IMOEA, NSGAII, SPEA2 and PAES. (6) DTLZ3: DTLZ3 is used to evaluate the performance of MOEAs in producing adequate pressure for driving the evolution of individuals towards the large Pareto front in the high-dimensional objective domain. Similar to ZDT4, it also challenges the algorithm’s ability to deal with multi-modality. The distribution of the different performance metrics is represented by box plots in Fig. 12a–c. From Fig. 12a, it is clear that only EMOIA and PAES are capable of handling highdimensional objective space. In particular, NSGAII, SPEA2 and IMOEA still have solutions that are far away from the optimal Pareto front as evident by the high values of GD. Fig. 12c shows that EMOIA is capable of evolving a more diverse Pareto front as compared to IMOEA, PAES and SPEA2. It seems that EMOIA performs poorly on the metric of S. However, further investigation shows that it is due to the presence of non-dominated solutions that are located at the extreme edges of the evolved Pareto front. These solutions usually have a small improvement in one objective that is gained at the expense of significant degradation of others. (7) CTP7: The constraint makes parts of CTP7 infeasible, resulting in a discontinuous Pareto front. This problem challenges the MOEA ability to maintain adequate diversity in order to discover all regions of the Pareto front. The evolved tradeoffs for an arbitrary run from the different algorithms with the best mean value of GD is showed in Fig. 13a–e while the distribution of the different performance metrics is represented by box plots in Fig. 14a–c. From Figs. 13 and 14a, it is observed that all algorithms except PAES are capable of finding a near optimal Pareto front. However, the algorithms have different degree of success in maintaining diversity and finding all the discontinuous regions of the Pareto front. For instance, IMOEA is unable to locate any solutions in the extreme region along f2 for all 30 runs resulting in poor MS values.

385

5.4. Effects of entropy-based density assessment In this section, the effectiveness of the proposed EDAS is examined through a comparative study against the technique of niche sharing (NS). Thirty independent simulation runs are performed for the test problems of ZDT1 and FON. The niche radius is a key parameter that affects algorithmic performance. In practice, the niche radius is difficult to estimate because there is no priori knowledge about the shape of the Pareto front for many problems. Fonseca and Fleming (1993) gave some bounding guidelines of appropriate niche radius when the number of individuals in the population and the minimum/maximum values in each objective dimension are given. The niche radius adopted in this section is based on extensive experimental studies and 1 is set as archivebd . The performances of EDAS and NS in terms of GD, S and MS are summarized in Tables 5–7, Table 5 GD performance by different density assessment schemes for ZDT1 and FON Problem

Method

GD NS

EDAS

ZDT1

Mean Std

0.001903 0.002340

0.002307 0.000436

FON

Mean Std

0.005931 0.000562

0.005053 0.000351

Table 6 S performance by different density assessment schemes for ZDT1 and FON Problem

Method

S NS

EDAS

ZDT1

Mean Std

0.335688 0.152815

0.216951 0.033864

FON

Mean Std

0.200729* 0.021675*

0.206287 0.031867

Table 7 MS performance by different density assessment schemes for ZDT1 and FON Problem

Method

MS NS

EDAS

ZDT1

Mean Std

0.995417 0.007563

1.000000 0.000000

FON

Mean Std

0.924121 0.018966

0.955796 0.013011

386

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

5.5. Parameter sensitivity analysis

respectively. In addition, the Kolmogorov–Smirnov (KS) test is applied to assess the statistical difference of the simulation results. An asterisk (*) is appended to the metric value when there is no statistical significance. It can be observed that the solution sets evolved by EDAS and NS are better in the aspect of GD for FON and ZDT1, respectively. Nonetheless, EDAS provides greater consistency as indicated by the low values of standard deviation. EDAS only allows the algorithm to achieve competitive performance in the metric of S while attaining better performance in the aspects of MS, demonstrating the merits of the diversity assessment scheme. Even though NS has a slight edge in S for FON, the KS test revealed that the results are not statistically different.

a

b

x 10-3 3.5

(1) Effects of rj on EDAS: The maintenance of a well-distributed and diverse Pareto front depends on appropriate settings of the kernel width rj for the estimation of the information gain for each memory cell in EDAS. Although rj is adaptive based on the evolved tradeoffs, it is also important to examine how it affects the performance of EMOIA. Simulations are conducted for rj ¼ ðuppbd j lowbd j Þ f1; 2; 3; 4; 5g  archivebd and 30 independent simulation runs are performed for the test problems of ZDT1 and FON. The median, first and third quartile performances of EMOIA with the various settings with respect to the different metrics are plotted in Figs. 15 and 16.

c

1 0.8

2

1.5

3

MS

S

GD

0.6 2.5

1

0.4

2

0.5

0.2

1.5

0 1

2

3

4

5

0 1

2

3

4

5

1

2

3

4

5

Fig. 15. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for ZDT1 at various settings of rj.

b

x 10-3 10

0.98 0.97

0.6

9

0.96

8

S

GD

c

0.8

MS

a

0.4

7

0.95 0.94

0.2 6

0.93

5

0.92

0 1

2

3

4

5

1

2

3

4

5

1

2

3

4

5

Fig. 16. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for FON at various settings of rj.

x 10-3

b

3

S

2

2

1.5

0.22

2.5

GD

c

0.24

MS

a

0.2 0.18

1

0.5

1.5 0.16 1

0 11

13

15

17

19

11

13

15

17

19

11

13

15

17

19

Fig. 17. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for ZDT1 at various settings of ki,j.

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

In general, it can be observed that the convergence and distribution of the evolved solution set improves with decreasing rj and EMOIA performs ðuppbd j lowbd j Þ best at the original setting of rj ¼ archivebd . This is expected since the entropy of the archive is maximized only if all memory cells have a unique contribution to the overall information content at this particular setting, i.e. uniformly distributed along the Pareto front. At larger settings of rj, the probability density is over-smoothed and the contribution of Abs cannot be determined properly. This results in the degradation of EMOIA ability to distribute solutions uniformly. On the other hand, EMOIA remains robust in the aspects of diversity as evident from Figs. 15c and 16c. In fact, MS actually improved with increasing rj in the case of FON. (2) Effects of ki,j and cloning rates on CS: In order to investigate the robustness of CS to parameter sensitivity, a number of simulations are performed with different settings of ki;j ¼ f0:11; 0:13; 0:17; 0:19g  ðuppbd j  lowbd j Þ as well as the various numbers of clones under different conditions in the cloning procedure. The various cloning rates determine the degree at which elitist memory cells and dominated solutions are cloned for the next generation and it is interesting to analyze it affects the optimization process. In addition, multiple comparison tests are performed based on the one-way analysis of variance to determine the presence of any statistical significance in results between different settings. Thirty independent simulation runs with different settings of ki,j are performed for the test problems of ZDT1 and FON and the median, first and third quartile performances are shown in Figs. 17 and 18, respectively. From the results, it is observed that the CS is capable of performing consistently and effectively within a large range of ki,j settings for ZDT1 and FON. This fact is also validated by the multiple comparison test, which demonstrates that

b

x 10-3 7

S

GD

6.5 6 5.5

5

there is no significant statistical difference in all aspects of GD, S and MS. The performances of EMOIA with different cloning numbers for ZDT1 and FON are shown in Figs. 19 and 20, respectively. For each experimental set up, a particular clone number is varied while maintaining the original setting for the other parameters. Figs. 19a and 20a show that EMOIA performance remains consistent in all aspects of convergence and diversity for both problems when the number of memory cells is small, a fact that is validated by the multiple comparison tests. More significantly, it implies that high evolutionary pressure at the initial stages do not lead to premature convergence for EMOIA. When the size of the archive increases to 20% of archivebd, the cloning rates, s21 and s22, have a more significant impact on the convergence of EMOIA for FON. In particular, EMOIA attained significantly better performance in the metric of GD at s21 = 3 and s22 = 2, while algorithmic performance remains invariant for other settings. Nonetheless, it can also be easily noted that EMOIA still outperforms the other test algorithms by comparing Fig. 20b and c with Fig. 9 at these settings. When the size of the archive increases beyond 20% of archivebd, only the distribution of EMOIA is affected by the cloning rates of s31 and s32. In the case of FON, these two cloning rates have an impact on convergence and diversity while distribution of solutions remains invariant. For both problems, the multiple comparison tests showed that s31 has a greater influence on EMOIA performance. Remember that increasing s31 and s32 will allow a greater number of memory cells to be cloned into the evolving population. Since the memory cells cloned are based on their degree of representation in the evolving population, this allows EMOIA to improve solution set diversity as evident from Fig. 20d for FON. However, the

c

0.24

0.96

0.22

0.95

0.21

13

15

17

19

0.94

0.2

0.93

0.19

0.92 0.91

0.18 11

0.97

0.23

MS

a

387

11

13

15

17

19

11

13

15

17

19

Fig. 18. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for FON at various settings of ki,j.

388

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

a

x 10-3

0.35

2

0.3

1.5

3

2

MS

S

GD

2.5 0.25

0.2

1.5

0.5

1

0 2

b

1

4

6

8

10

2

4

6

8

10

0.3

x 10-3 2.5

2

4

6

8

10

1

2

3

4

5

1

2

3

4

5

1

2

3

4

5

1

2

3

4

5

2

0.28 1.5 0.26

MS

GD

S

2 0.24

1

0.22

1.5

0.5 0.2

1

0.18 1

c

2

3

4

5

0 1

2

3

4

5

0.3

x 10-3 2.5

2

0.28 1.5 0.26

MS

GD

S

2 0.24

1

0.22

1.5

0.5 0.2 0.18

1 1

d

2

3

4

5

0 1

2

3

4

5

0.3

x 10-3 3

2

0.28 1.5

S

GD

2

MS

0.26

2.5

0.24

1

0.22 0.5

1.5

0.2 0.18

1 1

e

3

2

3

4

5

0 1

2

3

4

5

0.3

x 10-3

2

0.28 1.5

S

GD

2

MS

0.26

2.5

0.24

1

0.22 0.5

1.5

0.2 0

0.18

1 1

2

3

4

5

1

2

3

4

5

Fig. 19. Performance relative to the original settings in the aspects of GD, S, and MS for ZDT1 at (a) s1 ¼ f2; 4; 6; 8; 10g, (b) s21 ¼ f1; 2; 3; 4; 5g, (c) s22 ¼ f1; 2; 3; 4; 5g, (d) s31 ¼ f1; 2; 3; 4; 5g, and (e) s32 ¼ f1; 2; 3; 4; 5g.

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

x 10-3 6.6

6.2

S

GD

6.4

0.98

0.23

0.97

0.22

0.96

0.21 0.2

0.94

5.8

0.19

0.93

5.6

0.18

4

6

8

10

0.92 2

4

6

8

10

MS

S

GD

6

8

10

1

2

3

4

5

0.96 0.22

6.5

0.21

6

0.93 0.92

0.19 1

2

3

4

5

1

2

3

4

5 0.98

0.24

x 10-3

0.95 0.94

0.2

5.5

7.5

0.97

0.23

0.96

7

S

MS

0.22 6.5

0.21

6

0.94

0.2

0.93 0.92

0.19

5.5 1

2

3

4

5

1

x 10-3 8

2

3

4

5

0.24

0.98

0.23

0.96

0.22

0.94

GD

S

7

0.95

1

2

3

4

5

1

2

3

4

5

1

2

3

4

5

MS

GD

4

0.97

7

d

2 0.98

0.24

x 10-3 7.5

0.23

c

0.95

6

2

b

0.24

MS

a

389

0.21

0.92

0.2

0.9

6

0.19

5 1

e

2

3

4

5

0.88 1

2

3

4

5 0.97

0.24

x 10-3 7.5

0.96

0.23

0.95

7

MS

S

GD

0.22 6.5

0.94

0.21 0.93

6

0.2

5.5

0.92 0.91

0.19 1

2

3

4

5

1

2

3

4

5

Fig. 20. Performance relative to the original settings in the aspects of GD, S, and MS for FON at (a) s1 ¼ f2; 4; 6; 8; 10g, (b) s21 ¼ f1; 2; 3; 4; 5g, (c) s22 ¼ f1; 2; 3; 4; 5g, (d) s31 ¼ f1; 2; 3; 4; 5g, and (e) s32 ¼ f1; 2; 3; 4; 5g.

390

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

tradeoffs between convergence and diversity can be observed by comparing the trend of GD and MS over the various settings in Fig. 20d. It is also worth noting that the performance of EMOIA for ZDT1 in the metric of MS remains invariant to the various cloning rates. (3) Effects of lowbdmut,i and uppbdmut,i on mutation: In order to examine the robustness of EMOIA to various settings of sensitivity of the lowbdmut,i and uppbdmut,i, a number of simulations are performed with different settings of lowbd mut;i ¼ f0:05; 0:1; 0:15; 0:2; 0:25g and uppbd mut;i ¼ f0:25; 0:3; 0:35; 0:4; 0:45g for ZDT1 and FON. Algorithmic performances for ZDT1 and FON with the various settings of lowbdmut,i are shown in Figs. 21 and 22, respectively. Likewise, simulation results for ZDT1

a

b

x 10-3 3

and FON with the various settings of uppbdmut,i are shown in Figs. 23 and 24. By comparing Figs. 21 and 22, it can be observed that the performance of EMOIA is relatively more robust in ZDT1 as compared to FON. A lower lowbdmut,i typically implies more exploitation allowing the EMOIA to achieve better convergence as well as diversity as in the case of FON. On the contrary, EMOIA performs better in the aspect of convergence as indicated by the metric of GD when lowbdmut,i is increased. From Figs. 23 and 24, it can be observed that the performance of EMOIA remains competitive over different settings of uppbdmut,i for both ZDT1 and FON. As before, a multiple comparison test is performed and it demonstrates that there is no significant statistical differ-

c

0.3

2

0.28 1.5 0.26

MS

GD

S

2.5 0.24

1

0.22

2

0.5 0.2

1.5

0.18 0.05

0.1

0.15

0.2

0.25

0 0.05

0.1

0.15

0.2

0.25

0.05

0.1

0.15

0.2

0.25

Fig. 21. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for ZDT1 at various settings of lowbdmut,i.

a

b

x 10-3 7

c

0.24

0.22

0.98

0.96

5

MS

GD

S

6 0.2

0.18

4 0.05

0.1

0.15

0.2

0.16

0.25

0.94

0.92

0.9 0.05

0.1

0.15

0.2

0.25

0.05

0.1

0.15

0.2

0.25

Fig. 22. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for FON at various settings of lowbdmut,i.

a

x 10-3

b

3

0.3

c

2

0.28 1.5

2

MS

0.26

S

GD

2.5

0.24

1

0.22 0.5

1.5

0.2

1

0.18 0.25

0.3

0.35

0.4

0.45

0 0.25

0.3

0.35

0.4

0.45

0.25

0.3

0.35

0.4

0.45

Fig. 23. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for ZDT1 at various settings of uppbdmut,i.

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

a

b

x 10-3 7

c

0.24

391

0.98

0.23

0.97

0.22

0.96

6

5.5

MS

GD

S

6.5 0.21 0.2

0.94

0.19

0.93 0.92

0.18 0.25

0.3

0.35

0.4

0.45

0.95

0.25

0.3

0.35

0.4

0.45

0.25

0.3

0.35

0.4

0.45

Fig. 24. EMOIA performances in the aspects of (a) GD, (b) S, and (c) MS for FON at various settings of uppbdmut,i.

ence between the various settings for uppbdmut,i in all aspects of GD, S and MS. 6. Conclusions A new evolutionary multi-objective immune algorithm has been designed to exploit the complementary features of evolutionary algorithms and artificial immune systems. In particular, two new features in the form of an entropy-based density assessment and a clonal selection scheme have been proposed. In contrast to existing works, the proposed clonal selection scheme is based on the diversity in the evolving population. The proposed entropy-based density assessment is based on the individuals’ contribution to the total information content of the archive, and can be applied in either the decision or objective space depending on the nature of the problem involved. In addition, the effectiveness of the proposed algorithm is validated upon seven benchmark problems characterized by different difficulties in local optimality, non-uniformity, discontinuity, non-convexity, high-dimensionality and constraints. The comparative study shows the effectiveness of the proposed algorithm, which produces solution sets that are highly competitive in terms of convergence, diversity and distribution. The parameter sensitivity analysis conducted reveals further insights to the EMOIA performance and validates the robustness of algorithmic performance to parametric variations. Acknowledgement The authors wish to thank the Editor and anonymous reviewers for their valuable comments and helpful suggestions which greatly improved the paper’s quality.

References Bersini, H., 1991. Immune network and adaptive control. In: Varela, F.J., Bourgine, P. (Eds.), Proceedings of the First European Conference on Artificial Life. MIT Press, pp. 217– 226. Bersini, H., Varela, F.J., 1991. The immune recruitment mechanism: A selective evolutionary strategy. In: Belew, R.K., Booker, L.B. (Eds.), Proceedings of Fourth International Conference on Genetic Algorithms, pp. 520–526. Carter, J.H., 2000. The immune system as a model for pattern recognition and classification. Journal of the American Medical Informatics Association 7 (1), 28–41. Carvalho, D.R., Freitas, A.A., 1991. An immunological algorithm for discovering small-disjunct rules in data mining. In: Specter et al. (Eds.), Proceedings of the 1991 Genetic and Evolutionary Computation Conference, pp. 401–404. Coello Coello, C.A., Cortes, N. Cruz., 2005. Solving multiobjective optimization problems using an artificial immune system. Genetic Programming and Evolvable Machines 6, 163–190. Corne, D.W., Knowles, J.D., Oates, M.J., 2000. The Pareto envelope-based selection algorithm for multiobjective optimization. In: Schoenauer, M. et al. (Eds.), Proceedings of the Sixth International Conference on Parallel Problem Solving from Nature (PPSN VI), Lecture Notes in Computer Science, 1917. Springer, pp. 839–848. Cui, X., Li, M., Fang, T., 2001. Study of population diversity of multiobjective evolutionary algorithm based on immune and entropy principles. In: Proceedings of the 2001 Congress on Evolutionary Computation, vol. 2, pp. 1316–1321. Dasgupta, D., Gonzalez, F., 2002. An immunity-based technique to characterize intrusions in computer security networks. IEEE Transactions on Evolutionary Computation 6 (3), 281– 291. Deb, K., 1999. Multi-objective genetic algorithms: Problem difficulties and construction of test problem. Evolutionary Computation 7 (3), 205–230. Deb, K., 2001. Multi-objective Optimization using Evolutionary Algorithms. John Wiley & Sons, LTD. Deb, K., Agrawal, S., Pratap, A., Meyarivan, T., 2002. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6 (2), 182– 197. De Castro, L., Timmis, J., 2002. An artificial immune network for multimodal function optimization. In: Proceedings of the 2002 Congress on Evolutionary Computation, vol. 1, pp. 699– 704.

392

K.C. Tan et al. / European Journal of Operational Research 187 (2008) 371–392

Fonseca, C.M., Fleming, P.J., 1993. Genetic algorithm for multiobjective optimization, formulation, discussion and generalization. In: Forrest, S. (Ed.), Proceeding of the Fifth International Conference on Genetic Algorithms, pp. 416– 423. Freschi, F., Repetto, M., 2005. Multiobjective optimization by a modified artificial immune system algorithm. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J. (Eds.), Proceedings of the Fourth International Conference on Artificial Immune Systems, Lecture Notes in Computer Science, vol. 3627. Springer, pp. 248–261. Fukuda, T., Mori, K., Tsukiyama, M., 1999. Parallel search for multi-modal function optimization with diversity and learning of immune algorithm. In: Dasgupta, D. (Ed.), Artificial Immune Systems and their Applications. Springer-Verlag, pp. 210–229. Goldberg, D.E., 1989. Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading, MA. Hajela, P., Lee, J., 1996. Constrained genetic search via schema adaptation. An immune network solution. Structural Optimization 12, 11–15. Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B., 2002. An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation 6 (3), 252–280. Hunt, J.E., Cooke, D.E., 1996. Learning using an artificial immune system. Journal of Network and Computer Applications 19, 189–212. Jiao, L., Gong, M., Shang, R., Du, H., Lu, B., 2005. Clonal selection with immune dominance and energy based multiobjective optimization. In: Coello Coello, C.A., Hernandez Aguirre, A., Zitzler, E. (Eds.), Proceedings of the Third International Conference on Evolutionary Multi-Criterion Optimization, Lecture Notes in Computer Science, 3410. Springer, pp. 474–489. Khor, E.F., Tan, K.C., Lee, T.H., Goh, C.K., 2005. A study on distribution preservation mechanism in evolutionary multiobjective optimization. Artificial Intelligence Review 23 (1), 31–56. Kim, D.H., Lee, H., 2004. Intelligent control of nonlinear power plant using immune algorithm based multiobjective optimization. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, pp. 1388– 1393. Knowles, J.D., Corne, D.W., 2000. Approximating the nondominated front using the Pareto archived evolution strategy. Evolutionary Computation 8 (2), 149–172.

Luh, G.C., Chueh, C.H., Liu, W.W., 2003. MOIA: Multiobjective immune algorithm. Engineering Optimization 35 (2), 143–164. Luh, G.C., Chueh, C.H., 2004. Multi-objective optimal design of truss structure with immune algorithm. Computers and Structures 82 (11–12), 829–844. Mori, M., Tsukiyama, M., Fukada, T., 1998. Adaptive scheduling system inspired by immune system. In: Proceedings of the 1998 IEEE Systems, Man and Cybernetics Conference, pp. 1614–1619. Pareto, V., 1896. Cours D’Economie Politique, vol. 1 and 2, F. Rouge, Lausanne, 1896. Scott, J.R., 1995. Fault tolerant design using single and multicriteria genetic algorithms. Master’s thesis, Department of Aeronautics and Astronautics, Institute of Technology, Massachusetts. Tan, K.C., Lee, T.H., Khor, E.F., 2001. Evolutionary algorithms with dynamic population size and local exploration for multiobjective optimization. IEEE Transactions on Evolutionary Computation 5 (6), 565–588. Timmis, J., Knight, T., 2001. Artificial immune systems: Using the immune system as inspiration for data mining. In: Abbass, H.A. et al., Data Mining, pp. 209–230. Toma, N., Endo, S., Yamada, K., Miyagi, H., 2000. Evolutionary optimization algorithm using MHC and immune network. In: Proceedings of the 26th IEEE Annual Conference on Industrial Electronics Society, pp. 2849–2854. Veldhuizen, D.A.V., Lamont, G.B., 1999. Multiobjective evolutionary algorithm test suites. In: Carroll, J. et al., Proceedings of the 1999 ACM Symposium on Applied Computing, San Antonio, Texas, pp. 351–357. Yoo, J., Hajela, P., 1999. Immune network simulations in multicriterion design. Structural Optimization 18, 85–94. Zitzler, E., Thiele, L., 1999. Multiobjective evolutionary algorithms: A comparative case study and the strength Pareto approach. IEEE Transactions on Evolutionary Computation 3 (4), 257–271. Zitzler, E., Deb, K., Thiele, L., 2000. Comparison of multiobjective evolutionary algorithms: Empirical results. Evolutionary Computation 8 (2), 173–195. Zitzler, E., Laumanns, M., Thiele, L., 2001. SPEA2: Improving the strength Pareto evolutionary algorithm. Technical Report 103, Computer Engineering and Networks Laboratory (TIK), Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, May.

An evolutionary artificial immune system for multi ...

Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering Drive 3, ... Available online at www.sciencedirect.com.

637KB Sizes 0 Downloads 289 Views

Recommend Documents

AISIID: An artificial immune system for interesting ...
systems over numerous separate hosts. Most web-mining algorithms are specifically designed with this in mind, but due to its population-based nature an AIS ...

Learning using an artificial immune system
deleted from the immune population (and the immune network). Next the ... ASCII files and are loaded into the Artificial Immune System by the antigen population ..... vantages of neural networks, machine induction and case-based retrieval.

An Evolutionary System using Development and Artificial Genetic ...
the system point of view, biological development could be viewed as a .... model systems for real time control tasks by allowing signal coupling in ... design application. Genome Layer. DNA Sequence. Cell. Diffusion Action. Protein Table. Protein Lay

An evolutionary system using development and artificial ...
arise from attractors in artificial gene regulatory networks. .... as genetic code, immune systems, neural networks and evolution ...... IEEE Computer Society, pp.

Evolutionary Generative Process for an Artificial ...
15 Apr 2009 - An artificial creature, Rity, is developed in the virtual 3-D world created in a PC to demonstrate the ... These software agents have great potential for use in the en- tertainment industry. With a simplified model ...... Virtual Realit

An overview of the immune system
Education (B Cohen BSc), St Bartholomew's and the Royal London ... function of the immune system in recognising, repelling, and eradicating pathogens and ...

Architecture for an Artificial Immune System
classes of noisy trafiic sources, such as web servers and ftp servers, ...... 0 Have storage capacities on any single node that are small compared to the amount of.

An overview of the immune system
travel round the body. They normally flow freely in the ...... 18 The International Chronic Granulomatous Disease Cooperative. Study Group. A controlled trial of ...

Language as an evolutionary system
Jul 27, 2005 - At some point in the last five million years the arrival of human language .... game, but constraints are the rules that we play by [38]. ... effect on the framework we use to explain why language has the ..... entails the acquisition

Modular RADAR: An Immune System Inspired Search ...
... and Melanie Moses1. Department of Computer Science, University of New Mexico, USA ..... systems, computer nodes store data or a particular service and no single node ..... Brown, J. H.: Toward a Metabolic Theory of Ecology. Ecology 85 ...

AVERT: An Autonomous Multi-Robot System for Vehicle Extraction ...
View segment: the AVERT system remotely scans and rapidly ... dense 360o 3D map of the environment. .... The rotation angle for the pan axis was set 360◦,.

Locus: An indoor localization, tracking and navigation system for multi ...
tracking and navigation system for multi-story buildings called Locus that determines floor and location by ... Key words: Indoor location, Localization, Tracking, Navigation, Context- and location-aware applications and .... human effort. To the bes

The Immune System
May 1, 2009 - and may be the serendipitous outcome of invading DNA introduced by a virus or microbe infecting a fishlike creature. It may seem ironic that an infectious agent endowed vertebrates with the keys to a new microbial defense, but it illust

Modular RADAR: An Immune System Inspired Search ...
ized search with Automated Response) strategy for distributed systems. .... call this a modular RADAR (Robust Adaptive Decentralized search with Auto- .... cient solutions locally with robots in their DR and globally with other computer .... processi

Immune System Key.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Immune System Key.pdf. Immune System Key.pdf. Open. Extract.

Immune System Vocab.pdf
defense when the real infection becomes a threat. ... and pubic areas, it is too dry and poor in nutrients to support much microbial ... Respond to bacterial infections by means of phagocytosis and respiratory burst. .... Immune System Vocab.pdf.

An overview of the immune system
network of lymphoid organs, cells, humoral factors, and cytokines. The essential function of the ...... effects of social, psychological, and environmental factors.

A Unified Model for Evolutionary Multi-objective ...
a good approximation of it, where evolutionary algorithms seem particularly ... de Lille, 40 avenue Halley, 59650 Villeneuve d'Ascq, France (email: {Arnaud.

An Evolutionary System using Development and ...
implemented essential features of Genetic Regulatory Networks. (GRNs) and ... the system point of view, biological development could be ..... Computer Society.