IEEE Computational Intelligence Magazine - May 2018 - 37

each scenario (i.e., with no transformation and for the Linear, Exponential,
Feature Distribution
Preliminary
Instance Analysis
S-shaped, and RBF kernel). We also
Effect of Transformations
include experiments for the combination
of kernel with Linear and S-shaped
15 Runs Each (Two Features)
Performance Comparison
transformations. This leads to 105 selecInitial
All Transformations
Statistical Testing
tion hyper-heuristics (15 × 7). First, we
present their average performance. We
compare it against standalone heuristics
15 Runs Each (Eight Features)
Performance Comparison
Advanced
and baseline selection hyper-heuristics
All Transformations
Statistical Testing
(i.e., with no transformation). Moreover,
we compare our data against that of a
30 Runs Each
Performance Comparison
Confirmatory
synthetic oracle, which can perfectly preBest Transformation
Statistical Testing
dict the best solver for tackling each
instance. Because such solver does not
exist, we build it by using the best solu- FigurE 9 Overview of the four-stage methodology adopted in this work.
tion (among the base heuristics) for each
the correlation between profit and weight. It is important to
instance.We consider it important to highlight that such a process
highlight that each metric is normalized so that their values fall
is infeasible for a real application, but useful as a benchmark.
in the [0, 1] range. Therefore, the first three features are divided
As a second approach, we analyze how stable the data are.
We focus on the success rate and on the search cost of each
by the maximum profit within the instance. The next three
selection hyper-heuristic (see Sect. II-E). We wrap this section
ones are, thus, divided by the maximum weight. The final feaup with a one-tailed Wilcoxon statistical test to determine sigture is increased by one and divided in half. Please bear in mind
nificant increases in the performance of each approach.
that the maximum values are dynamic as they are calculated
from the items remaining in the instance.
Lastly, but not less important, it is worth mentioning that total
C. Advanced Testing
profit is used as the metric for two events. The first one is trainThis stage deepens the previous one by analyzing the effect of
ing the selection hyper-heuristics.The second one is assessing the
transformations over the whole set of eight features (see Sect. II-E).
eventual performance gain derived from the transformation. Also,
Again, we run 15 repetitions of each experiment. We also deterit is important to highlight that the aforementioned profit corremine the performance gain of using each transformation. Moresponds to the sum of profits achieved on each instance. As such,
over, we execute a one-tailed Wilcoxon statistical test to determine
throughout training profit is calculated over 30 instances, but it is
whether a significant performance increase can be achieved.
calculated over 570 throughout testing. As before, we run a onetailed Wilcoxon statistical test to determine whether a significant
D. Confirmatory Testing
increase in profit can be achieved.
In this final stage, we explore the generality of our proposed
approach.Therefore, we select a different domain and generate 30
base selection hyper-heuristics and 30 with the best transformaV. Results and Discussion
tion (more about this in Section V-D). In this work, we chose
This section presents the main results of our work. To make
the knapsack problem, mainly due to its popularity and usefulness,
things easier for the reader, the structure presented in the
and because knowledge about this combinatorial optimization
methodology (Sect. IV) is preserved, reserving one subsection
problem is widespread. Our tests consider two sets of 600 instancfor each main stage.
es each: one with 50 items, and one with 100 items. Each set was
built up with the instances from [29], covering groups 11 to 16.
A. Preliminary Testing
In accordance with previous tests, we trained each selection
Figure 10 shows the distribution of all features in the training
hyper-heuristic using 5% of the instances (i.e., 30).
set, and their transformations. In most cases, the S-shaped transIn this stage, selection hyper-heuristics can select among
formation expands representative data more than the Linear
four popular heuristics. The first three select the item based on
transformation does. Also, in all cases the median of the former
the maximum profit, the minimum weight, or the best profit/
was lower than that of the latter. Another thing worth mentionweight ratio, respectively. The fourth one selects items in their
ing at this point is that the model used in a previous work does
default order. Moreover, selection hyper-heuristics map an
not expand the feature range from zero to unity. However, it
instance based on seven features calculated over the items
allows for values all the way to zero (see Figure 4). This may
remaining in the instance. Three of them use information from
provide it with more flexibility for advanced stages of the search
the profit, and correspond to the mean, median, and standard
where features may migrate to lower regions.
deviation. Another three correspond to the mean, median, and
Figure 11 shows the regions that each instance influences.
standard deviation of the weight. The final one is a measure of
Data are shown for the original features (left), and for the ones

may 2018 | IEEE ComputatIonal IntEllIgEnCE magazInE

37



Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2018

Contents
IEEE Computational Intelligence Magazine - May 2018 - Cover1
IEEE Computational Intelligence Magazine - May 2018 - Cover2
IEEE Computational Intelligence Magazine - May 2018 - Contents
IEEE Computational Intelligence Magazine - May 2018 - 2
IEEE Computational Intelligence Magazine - May 2018 - 3
IEEE Computational Intelligence Magazine - May 2018 - 4
IEEE Computational Intelligence Magazine - May 2018 - 5
IEEE Computational Intelligence Magazine - May 2018 - 6
IEEE Computational Intelligence Magazine - May 2018 - 7
IEEE Computational Intelligence Magazine - May 2018 - 8
IEEE Computational Intelligence Magazine - May 2018 - 9
IEEE Computational Intelligence Magazine - May 2018 - 10
IEEE Computational Intelligence Magazine - May 2018 - 11
IEEE Computational Intelligence Magazine - May 2018 - 12
IEEE Computational Intelligence Magazine - May 2018 - 13
IEEE Computational Intelligence Magazine - May 2018 - 14
IEEE Computational Intelligence Magazine - May 2018 - 15
IEEE Computational Intelligence Magazine - May 2018 - 16
IEEE Computational Intelligence Magazine - May 2018 - 17
IEEE Computational Intelligence Magazine - May 2018 - 18
IEEE Computational Intelligence Magazine - May 2018 - 19
IEEE Computational Intelligence Magazine - May 2018 - 20
IEEE Computational Intelligence Magazine - May 2018 - 21
IEEE Computational Intelligence Magazine - May 2018 - 22
IEEE Computational Intelligence Magazine - May 2018 - 23
IEEE Computational Intelligence Magazine - May 2018 - 24
IEEE Computational Intelligence Magazine - May 2018 - 25
IEEE Computational Intelligence Magazine - May 2018 - 26
IEEE Computational Intelligence Magazine - May 2018 - 27
IEEE Computational Intelligence Magazine - May 2018 - 28
IEEE Computational Intelligence Magazine - May 2018 - 29
IEEE Computational Intelligence Magazine - May 2018 - 30
IEEE Computational Intelligence Magazine - May 2018 - 31
IEEE Computational Intelligence Magazine - May 2018 - 32
IEEE Computational Intelligence Magazine - May 2018 - 33
IEEE Computational Intelligence Magazine - May 2018 - 34
IEEE Computational Intelligence Magazine - May 2018 - 35
IEEE Computational Intelligence Magazine - May 2018 - 36
IEEE Computational Intelligence Magazine - May 2018 - 37
IEEE Computational Intelligence Magazine - May 2018 - 38
IEEE Computational Intelligence Magazine - May 2018 - 39
IEEE Computational Intelligence Magazine - May 2018 - 40
IEEE Computational Intelligence Magazine - May 2018 - 41
IEEE Computational Intelligence Magazine - May 2018 - 42
IEEE Computational Intelligence Magazine - May 2018 - 43
IEEE Computational Intelligence Magazine - May 2018 - 44
IEEE Computational Intelligence Magazine - May 2018 - 45
IEEE Computational Intelligence Magazine - May 2018 - 46
IEEE Computational Intelligence Magazine - May 2018 - 47
IEEE Computational Intelligence Magazine - May 2018 - 48
IEEE Computational Intelligence Magazine - May 2018 - 49
IEEE Computational Intelligence Magazine - May 2018 - 50
IEEE Computational Intelligence Magazine - May 2018 - 51
IEEE Computational Intelligence Magazine - May 2018 - 52
IEEE Computational Intelligence Magazine - May 2018 - 53
IEEE Computational Intelligence Magazine - May 2018 - 54
IEEE Computational Intelligence Magazine - May 2018 - 55
IEEE Computational Intelligence Magazine - May 2018 - 56
IEEE Computational Intelligence Magazine - May 2018 - 57
IEEE Computational Intelligence Magazine - May 2018 - 58
IEEE Computational Intelligence Magazine - May 2018 - 59
IEEE Computational Intelligence Magazine - May 2018 - 60
IEEE Computational Intelligence Magazine - May 2018 - 61
IEEE Computational Intelligence Magazine - May 2018 - 62
IEEE Computational Intelligence Magazine - May 2018 - 63
IEEE Computational Intelligence Magazine - May 2018 - 64
IEEE Computational Intelligence Magazine - May 2018 - 65
IEEE Computational Intelligence Magazine - May 2018 - 66
IEEE Computational Intelligence Magazine - May 2018 - 67
IEEE Computational Intelligence Magazine - May 2018 - 68
IEEE Computational Intelligence Magazine - May 2018 - 69
IEEE Computational Intelligence Magazine - May 2018 - 70
IEEE Computational Intelligence Magazine - May 2018 - 71
IEEE Computational Intelligence Magazine - May 2018 - 72
IEEE Computational Intelligence Magazine - May 2018 - 73
IEEE Computational Intelligence Magazine - May 2018 - 74
IEEE Computational Intelligence Magazine - May 2018 - 75
IEEE Computational Intelligence Magazine - May 2018 - 76
IEEE Computational Intelligence Magazine - May 2018 - 77
IEEE Computational Intelligence Magazine - May 2018 - 78
IEEE Computational Intelligence Magazine - May 2018 - 79
IEEE Computational Intelligence Magazine - May 2018 - 80
IEEE Computational Intelligence Magazine - May 2018 - Cover3
IEEE Computational Intelligence Magazine - May 2018 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com