Learning unified mutation operator for differential evolution by natural evolution strategies

被引:6
|
作者
Zhang, Haotian [1 ]
Sun, Jianyong [1 ]
Xu, Zongben [1 ]
Shi, Jialong [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Math & Stat, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential evolution; Adaptive parameter control; Adaptive operator selection; Markov decision process; OPTIMIZATION; ADAPTATION;
D O I
10.1016/j.ins.2023.03.043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential evolution (DE) is one of the widely studied algorithms in evolutionary computation. Recently, many adaptive mechanisms have been proposed for DE including adaptive operator selection and adaptive parameter control. Existing studies consider the two kinds of mechanisms independently. In this paper, we first propose a unified mutation operator with learnable parameters. With different parameter settings, the unified mutation operator degenerates into various classic mutation operators. As a result, by adapting the control parameters of the unified mutation operator, we can realize parameter control and operator selection simultaneously. We then present how to use a neural network to adaptively determine the control parameters. We use natural evolution strategies to train the neural network by modeling the evolutionary process as a Markov decision process. We then embed it into three DEs including classic DE, JADE and LSHADE. Experimental studies show that by embedding the learned unified mutation operator, the performances of these backbone DEs can be improved. Particularly, by embedding the unified mutation operator, LSHADE can perform competitively among state-of-the-art EAs including the winner algorithms in the past CEC competitions. Furthermore, we verify the effectiveness of the unified mutation operator through analyzing the population diversity theoretically.
引用
收藏
页码:594 / 616
页数:23
相关论文
共 50 条
  • [41] Natural Evolution Strategies
    Wierstra, Daan
    Schaul, Tom
    Glasmachers, Tobias
    Sun, Yi
    Peters, Jan
    Schmidhuber, Juergen
    JOURNAL OF MACHINE LEARNING RESEARCH, 2014, 15 : 949 - 980
  • [42] Natural Evolution Strategies
    Wierstra, Daan
    Schaul, Tom
    Peters, Jan
    Schmidhuber, Juergen
    2008 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-8, 2008, : 3381 - +
  • [43] DE/isolated/1: a new mutation operator for multimodal optimization with differential evolution
    Takahiro Otani
    Reiji Suzuki
    Takaya Arita
    International Journal of Machine Learning and Cybernetics, 2013, 4 : 99 - 105
  • [44] Improving Classical and Decentralized Differential Evolution with New Mutation Operator and Population Topologies
    Dorronsoro, Bernabe
    Bouvry, Pascal
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2011, 15 (01) : 67 - 98
  • [45] DE/isolated/1: A New Mutation Operator for Multimodal Optimization with Differential Evolution
    Otani, Takahiro
    Suzuki, Reiji
    Arita, Takaya
    AI 2011: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2011, 7106 : 321 - 330
  • [46] Constrained multi-objective differential evolution algorithm with ranking mutation operator
    Yu, Xiaobing
    Luo, Wenguan
    Xu, WangYing
    Li, ChenLiang
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 208
  • [47] DE/isolated/1: a new mutation operator for multimodal optimization with differential evolution
    Otani, Takahiro
    Suzuki, Reiji
    Arita, Takaya
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2013, 4 (02) : 99 - 105
  • [48] Differential evolution algorithm with fitness and diversity ranking-based mutation operator
    Cheng, Jianchao
    Pan, Zhibin
    Liang, Hao
    Gao, Zhaoqi
    Gao, Jinghuai
    Swarm and Evolutionary Computation, 2021, 61
  • [49] Differential evolution algorithm with fitness and diversity ranking-based mutation operator
    Cheng, Jianchao
    Pan, Zhibin
    Liang, Hao
    Gao, Zhaoqi
    Gao, Jinghuai
    SWARM AND EVOLUTIONARY COMPUTATION, 2021, 61
  • [50] A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming Problems
    Li, Hong
    Zhang, Li
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 55 - 60