Non-inertial opposition-based particle swarm optimization and its theoretical analysis for deep learning applications

被引:35
作者
Kang, Lanlan [1 ]
Chen, Ruey-Shun [2 ]
Cao, Wenliang [2 ]
Chen, Yeh-Cheng [3 ]
机构
[1] Jiangxi Univ Sci & Technol, Coll Appl Sci, Gangzhou 341000, Peoples R China
[2] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[3] Univ Calif Davis, Dept Comp Sci 3, Davis, CA 95616 USA
关键词
Deep learning applications; Particle swarm optimization; Non-inertial velocity update formula; Theoretical analysis; ALGORITHM; STRATEGY; MUTATION;
D O I
10.1016/j.asoc.2019.106038
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Particle Swarm Optimization (PSO) and its variants are often used to train and optimize the structure and parameters of deep learning models to improve accuracy of learning results in the reasonable time-consuming. The performance of PSO is completed determined by its kinetic equation of particles. To accelerate convergence rate, a novel kinetic equation without inertial term is devised and applied to PSO, and then a non-inertial opposition-based particle swarm optimization (NOPSO) is generated combined with a adaptive elite mutation strategy and generalized opposition-based learning strategy. Simulation Experimental results show that the new kinetic equation has effectively accelerated convergence rate of PSO. Meanwhile, Theoretical analysis of the new kinetic equation is carried out by order-2 difference recurrence equation, the inference conclusions of which are consistent with the results of simulation experiments. NOPSO algorithm with a new kinetic equation is a highly competitive algorithm compared with some state-of-art PSOs and is suitable for deep learning applications. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:10
相关论文
共 43 条
  • [1] [Anonymous], 2010, BENCHMARK FUNCTIONS
  • [2] [Anonymous], [No title captured]
  • [3] [Anonymous], [No title captured]
  • [4] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
    Chen, Chien-Ming
    Wang, King-Hang
    Yeh, Kuo-Hui
    Xiang, Bin
    Wu, Tsu-Yang
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 3133 - 3142
  • [5] A Secure Authentication Protocol for Internet of Vehicles
    Chen, Chien-Ming
    Xiang, Bin
    Liu, Yining
    Wang, King-Hang
    [J]. IEEE ACCESS, 2019, 7 : 12047 - 12057
  • [6] Using High-Bandwidth Networks Efficiently for Fast Graph Computation
    Cheng, Yongli
    Jiang, Hong
    Wang, Fang
    Hua, Yu
    Feng, Dan
    Guo, Wenzhong
    Wu, Yunxiang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (05) : 1170 - 1183
  • [7] The particle swarm - Explosion, stability, and convergence in a multidimensional complex space
    Clerc, M
    Kennedy, J
    [J]. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (01) : 58 - 73
  • [8] Two improved differential evolution schemes for faster global search
    Das, Swagatam
    Konar, Amit
    Chakraborty, Uday K.
    [J]. GECCO 2005: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOLS 1 AND 2, 2005, : 991 - 998
  • [9] Opposition-based particle swarm optimization with adaptive mutation strategy
    Dong, Wenyong
    Kang, Lanlan
    Zhang, Wensheng
    [J]. SOFT COMPUTING, 2017, 21 (17) : 5081 - 5090
  • [10] Eberhart R., 1995, MHS 95 P 6 INT S MIC, P39, DOI [DOI 10.1109/MHS.1995.494215, 10.1109/MHS.1995.494215, 10.1109/mhs.1995.494215]