Non-inertial opposition-based particle swarm optimization and its theoretical analysis for deep learning applications

被引:37
作者
Kang, Lanlan [1 ]
Chen, Ruey-Shun [2 ]
Cao, Wenliang [2 ]
Chen, Yeh-Cheng [3 ]
机构
[1] Jiangxi Univ Sci & Technol, Coll Appl Sci, Gangzhou 341000, Peoples R China
[2] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[3] Univ Calif Davis, Dept Comp Sci 3, Davis, CA 95616 USA
关键词
Deep learning applications; Particle swarm optimization; Non-inertial velocity update formula; Theoretical analysis; ALGORITHM; STRATEGY; MUTATION;
D O I
10.1016/j.asoc.2019.106038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Particle Swarm Optimization (PSO) and its variants are often used to train and optimize the structure and parameters of deep learning models to improve accuracy of learning results in the reasonable time-consuming. The performance of PSO is completed determined by its kinetic equation of particles. To accelerate convergence rate, a novel kinetic equation without inertial term is devised and applied to PSO, and then a non-inertial opposition-based particle swarm optimization (NOPSO) is generated combined with a adaptive elite mutation strategy and generalized opposition-based learning strategy. Simulation Experimental results show that the new kinetic equation has effectively accelerated convergence rate of PSO. Meanwhile, Theoretical analysis of the new kinetic equation is carried out by order-2 difference recurrence equation, the inference conclusions of which are consistent with the results of simulation experiments. NOPSO algorithm with a new kinetic equation is a highly competitive algorithm compared with some state-of-art PSOs and is suitable for deep learning applications. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:10
相关论文
共 43 条
[1]  
[Anonymous], 2010, BENCHMARK FUNCTIONS
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], [No title captured]
[4]   Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications [J].
Chen, Chien-Ming ;
Wang, King-Hang ;
Yeh, Kuo-Hui ;
Xiang, Bin ;
Wu, Tsu-Yang .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) :3133-3142
[5]   A Secure Authentication Protocol for Internet of Vehicles [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Liu, Yining ;
Wang, King-Hang .
IEEE ACCESS, 2019, 7 :12047-12057
[6]   Using High-Bandwidth Networks Efficiently for Fast Graph Computation [J].
Cheng, Yongli ;
Jiang, Hong ;
Wang, Fang ;
Hua, Yu ;
Feng, Dan ;
Guo, Wenzhong ;
Wu, Yunxiang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (05) :1170-1183
[7]   The particle swarm - Explosion, stability, and convergence in a multidimensional complex space [J].
Clerc, M ;
Kennedy, J .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (01) :58-73
[8]   Two improved differential evolution schemes for faster global search [J].
Das, Swagatam ;
Konar, Amit ;
Chakraborty, Uday K. .
GECCO 2005: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOLS 1 AND 2, 2005, :991-998
[9]   Opposition-based particle swarm optimization with adaptive mutation strategy [J].
Dong, Wenyong ;
Kang, Lanlan ;
Zhang, Wensheng .
SOFT COMPUTING, 2017, 21 (17) :5081-5090
[10]  
Eberhart R., 1995, 6 INT S MICR HUM SCI, P39, DOI DOI 10.1109/MHS.1995.494215