Analysis of Online Signature Based Learning Classifier Systems for Noisy Environments: A Feedback Control Theoretic Approach

被引:0
作者
Shafi, Kamran [1 ]
Abbass, Hussein A. [1 ]
机构
[1] Univ New S Wales, Sch Engn & Informat Technol, Canberra, ACT, Australia
来源
SIMULATED EVOLUTION AND LEARNING (SEAL 2014) | 2014年 / 8886卷
关键词
Learning Classifier Systems; LCS; UCS; Online rule reduction; Signature based LCS; Noise; Adaptive control; TIME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Post training rule set pruning techniques are amongst one of the approaches to improve model comprehensibility in learning classifier systems which commonly suffer from population bloating in real-valued classification tasks. In an earlier work we introduced the term signatures for accurate and maximally general rules evolved by the learning classifier systems. A framework for online extraction of signatures using a supervised classifier system was presented that allowed identification and retrieval of signatures adaptively as soon as they are discovered. This paper focuses on the analysis of theoretical bounds for learning signatures using existing theory and the performance of the proposed algorithm in noisy environments using benchmark synthetic data sets. The empirical results with the noisy data show that the mechanisms introduced to adapt system parameters enable signature extraction algorithm to cope with significant levels of noise.
引用
收藏
页码:395 / 406
页数:12
相关论文
共 13 条
[1]  
Angluin D., 1988, Machine Learning, V2, P343, DOI 10.1023/A:1022873112823
[2]   Accuracy-based Learning Classifier Systems:: Models, analysis and applications to classification tasks [J].
Bernadó-Mansilla, E ;
Garrell-Guiu, JM .
EVOLUTIONARY COMPUTATION, 2003, 11 (03) :209-238
[3]   An algorithmic description of XCS [J].
M. V. Butz ;
S. W. Wilson .
Soft Computing, 2002, 6 (3) :144-153
[4]  
Butz MV, 2004, LECT NOTES COMPUT SC, V3103, P739
[5]  
Dixon Phillip William, 2003, LECTURE NOTES IN COMPUTER SCIENCE, P20, DOI DOI 10.1007/978-3-540-40029-5_2
[6]  
Fu C., 2002, Proceedings of the Genetic and Evolutionary Computation Conference, P920
[7]  
Gaber MM, 2005, SIGMOD REC, V34, P18, DOI 10.1145/1083784.1083789
[8]   An adaptive genetic-based signature learning system for intrusion detection [J].
Shafi, Kamran ;
Abbass, Hussein A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (10) :12036-12043
[9]  
Shafi K, 2007, IEEE C EVOL COMPUTAT, P2509
[10]  
Tan J., 2013, P 12 EUR C SYNTH SIM, P110, DOI [10.7551/978-0-262-31709-2-ch017, DOI 10.7551/978-0-262-31709-2-CH017]