Computational Intelligence - May 2015 - 76

14
12

ELM
QKLMS

Number

10
8
6
4
2
0

0

1

3

2
Testing MSE

Algorithm

4
-3

#10

Testing MSE
Best

Average

ELM

0.00017028

0.00092244

QKLMS

0.00014414

0.00040414

Figure 7 Histogram of the errors across realizations of QKLMS and ELM, and the best and
average results.

number of data samples. However, they
are practically different. The ESN and
ELM use random projection spaces,
while the KLMS uses data centered
functional bases. The ESN and ELM still
suffer from design choices, translated in
free parameters, which are difficult to set
optimally with the current mathematical
framework, so practically they involve
many trials and cross validation to find a
good projection space, on top of the
selection of the number of hidden PEs
and the nonlinear functions. On the
other hand, the KLMS algor ithm
answers this question easily: just map the
data nonlinearly and deterministically to
a Hilbert space and use the Hilbert

space functions as the bases selected by
the input data (the representer theorem),
and adapt online the projection. The
KAF and its data centered basis functions have the great advantage of concentrating bases on the part of the functional space where the input data exist.
Therefore, KAFs are more parsimonious
and can span the cloud of points in the
joint space with fewer bases, at least for
some applications (e.g. for prediction
where the targets and inputs come from
the same cloud). Moreover, we can
expect that the eigenspread of the basis
vector matrix is reasonable, because
there is at least one data sample per basis.
For the Gaussian kernel, the basis func-

Table 1 Comparison of CULMs.
eSN

elM

QKlMS

DynaMic (D)/Static
Mapping (S)
RanDoM baSES/cRoSS
vaLiDation
coMpLExity foR N
SaMpLES/ M baSES

D

S

S

yES

yES

no

O ^NM + M 3h

O ^NM + M 3h

O ^NMh

fREE paRaMEtERS

DiStRibution, Rng,
oRDER, nonLinEaRity,
SpEctRaL RaDiuS,
SpaRSEnESS

DiStRibution,
Rng, oRDER,
nonLinEaRity

KERnEL, SizE, StEpSizE, Quantization
RaDiuS

76

IEEE ComputatIonal IntEllIgEnCE magazInE | may 2015

tions are local, and can be controlled by
a single parameter, the kernel bandwidth
(kernel size). In the Hilbert space, the
generalization is mainly controlled by
two parameters. Smaller kernel sizes
decrease the correlation between the
basis functions, so practically, the fundamental compromise of correlated bases
is easy to control in KLMS without
affecting the computational complexity.
The second parameter is the stepsize
that controls the weight norm, where a
small stepsize also improves the generalization [33]. However, a decrease in the
learning rate achieves a better solution at
the expense of using more samples to
converge. To sparsify the bases a third
parameter is needed to control the
quantization radius. The ESN is the only
dynamic network of the three, but it
turns out that KAF has been recently
extended to recurrent structures [48].
The KAFs have been mostly applied in
adaptive filtering (regression for static
data), but recent results show that their
characteristics for classification are also
very competitive with those of ELMs.
Therefore, KAFs are also ready to be
applied by the engineering and machine
learning communities.
The current literature on ELMs fails
to acknowledge the dependency of the
results on the careful offline selection of
the basis functions. Therefore, the reported results should be interpreted as
best case. Moreover, the computation
time in finding the best basis functions,
which can be considerable, should also
be included in the ELM training time.
Theoretically, three important questions
remain in the ELM approach. How
good is the best basis set? How does one
find it reliably without cross validation?
And, is there a strategy to help select the
size of the space and the RNG parameters for the problem? Here it is proper
to recall Chen's framework [44] of incrementally adding random PEs after
successive linearized projections to the
original problem, which avoids the selection of all the weights randomly and
should decrease the correlation amongst
the basis functions. In terms of the KAF,
the randomness in KLMS appears because of the stochastic gradient and can



Table of Contents for the Digital Edition of Computational Intelligence - May 2015

Computational Intelligence - May 2015 - Cover1
Computational Intelligence - May 2015 - Cover2
Computational Intelligence - May 2015 - 1
Computational Intelligence - May 2015 - 2
Computational Intelligence - May 2015 - 3
Computational Intelligence - May 2015 - 4
Computational Intelligence - May 2015 - 5
Computational Intelligence - May 2015 - 6
Computational Intelligence - May 2015 - 7
Computational Intelligence - May 2015 - 8
Computational Intelligence - May 2015 - 9
Computational Intelligence - May 2015 - 10
Computational Intelligence - May 2015 - 11
Computational Intelligence - May 2015 - 12
Computational Intelligence - May 2015 - 13
Computational Intelligence - May 2015 - 14
Computational Intelligence - May 2015 - 15
Computational Intelligence - May 2015 - 16
Computational Intelligence - May 2015 - 17
Computational Intelligence - May 2015 - 18
Computational Intelligence - May 2015 - 19
Computational Intelligence - May 2015 - 20
Computational Intelligence - May 2015 - 21
Computational Intelligence - May 2015 - 22
Computational Intelligence - May 2015 - 23
Computational Intelligence - May 2015 - 24
Computational Intelligence - May 2015 - 25
Computational Intelligence - May 2015 - 26
Computational Intelligence - May 2015 - 27
Computational Intelligence - May 2015 - 28
Computational Intelligence - May 2015 - 29
Computational Intelligence - May 2015 - 30
Computational Intelligence - May 2015 - 31
Computational Intelligence - May 2015 - 32
Computational Intelligence - May 2015 - 33
Computational Intelligence - May 2015 - 34
Computational Intelligence - May 2015 - 35
Computational Intelligence - May 2015 - 36
Computational Intelligence - May 2015 - 37
Computational Intelligence - May 2015 - 38
Computational Intelligence - May 2015 - 39
Computational Intelligence - May 2015 - 40
Computational Intelligence - May 2015 - 41
Computational Intelligence - May 2015 - 42
Computational Intelligence - May 2015 - 43
Computational Intelligence - May 2015 - 44
Computational Intelligence - May 2015 - 45
Computational Intelligence - May 2015 - 46
Computational Intelligence - May 2015 - 47
Computational Intelligence - May 2015 - 48
Computational Intelligence - May 2015 - 49
Computational Intelligence - May 2015 - 50
Computational Intelligence - May 2015 - 51
Computational Intelligence - May 2015 - 52
Computational Intelligence - May 2015 - 53
Computational Intelligence - May 2015 - 54
Computational Intelligence - May 2015 - 55
Computational Intelligence - May 2015 - 56
Computational Intelligence - May 2015 - 57
Computational Intelligence - May 2015 - 58
Computational Intelligence - May 2015 - 59
Computational Intelligence - May 2015 - 60
Computational Intelligence - May 2015 - 61
Computational Intelligence - May 2015 - 62
Computational Intelligence - May 2015 - 63
Computational Intelligence - May 2015 - 64
Computational Intelligence - May 2015 - 65
Computational Intelligence - May 2015 - 66
Computational Intelligence - May 2015 - 67
Computational Intelligence - May 2015 - 68
Computational Intelligence - May 2015 - 69
Computational Intelligence - May 2015 - 70
Computational Intelligence - May 2015 - 71
Computational Intelligence - May 2015 - 72
Computational Intelligence - May 2015 - 73
Computational Intelligence - May 2015 - 74
Computational Intelligence - May 2015 - 75
Computational Intelligence - May 2015 - 76
Computational Intelligence - May 2015 - 77
Computational Intelligence - May 2015 - 78
Computational Intelligence - May 2015 - 79
Computational Intelligence - May 2015 - 80
Computational Intelligence - May 2015 - Cover3
Computational Intelligence - May 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com