IEEE Computational Intelligence Magazine - May 2021 - 20
w k " wu k = n + d k # min c 1,
r
m .(10)
A -1 d k
Note that the denominator A -1d k is the Mahalanobis distance
between w k and the target distribution center. As demonstrated
in Figure 4, these projected pseudo-offspring are now closer to
the target distribution, while preserving directional and fitness
information for the update. As a result, they induce a d- efinite
directional bias on the evolution of the target search distribution
without absurdly changing it in a single update.
Our formulation of transfer neuroevolution with mixture
modelling and pseudo-offspring projection is generic for probabilistic model-based search, and does not depend on a specific
algorithm. The next section presents a particular instantiation of
this method by implementing it on a variant of NES. This
transfer NES algorithm will be subsequently applied to solve
differential equations problems.
not activated, m pseudo-offspring are sampled from the target
distribution and follow the original xNES procedure. Otherwise, pseudo-offspring are sampled from the mixture model (6)
and their fitness are evaluated. Additionally, projection (10) is
applied to all pseudo-offspring from the source distribution,
after which a coordinate transformation z k = A -1^wu k - n h
maps the projected pseudo-offspring to the natural coordinates
of the target distribution (this step is required for xNES
updates). Then, fitness shaping is applied. All pseudo-offspring
(now z k) are sorted by their fitness, i.e., f ^w 1h $ g $ f ^w mh,
and the rank-based utility value:
uk =
max ` 0, log ` m + 1 j - log k j
2
, (11)
m
/ j = 1 max `0, log ` 2m + 1 j - log j j
is computed to replace the k-th best fitness f ^w kh. Subsequently, the algorithm follows the xNES procedure for the
C. An Instantiation: Transfer NES (tNES) Algorithm
In this section, transfer neuroevolution with a variant of NES,
namely the exponential NES (xNES) algorithm [50], is presented.
The xNES efficiently updates the mean n and the full covariance matrix R = A A T of a search distribution via a coordinate
transformation trick, to avoid trivial operations on computing
and inverting the Fisher information matrix in (5). The details of
the xNES algorithm can be found in [50]. Algorithm 1 presents
the pseudocode of our transfer implementation on xNES, which
is hereafter referred to as tNES.
The tNES algorithm requires the following inputs: fitness
function, initial search distribution, a source distribution, and
initial mixing coefficients. In the iteration loop, the tNES algorithm firstly checks for the transfer flag. If the transfer mode is
Algorithm 1 Pseudocode of tNES.
Input: optimization problem f ! R d " R, initial search
-distribution n ! R d, A = vI ! R d # d, source distribution
n { ! R d, A { ! R d # d, initial mixture coefficient a { ! 60, 1@
a r ! 1- a {
while stopping criteria not met do
p ! a { if transfer activated else p ! 0
for k ! " 1, 2, f, m , do
sample z k + N ^0, I h , s k + bernoulli ^ p h
if s k = 1 then
w k ! A { z k + n {
d k ! w k - n
u k ! n + d k # min c 1,
w
High
1
µ
Directional Bias
0.5
0
Projection of PseudoOffspring From Source
Distribution
-0.5
-1
Source
Target
-1
-0.5
0
0.5
1
Low
FIGURE 4 An illustration of projecting the pseudo-offspring (marker:
cross) produced by the source distribution towards the target search
distribution. The projected pseudo-offspring are within r Mahalanobis distance from the search distribution center, while still preserving
the same directional and fitness information (indicated by color
scale). By combining them with the pseudo-offspring originating from
the target distribution (marker: round), a definite directional bias is
induced on the evolution of the target search without absurdly
changing it in a single update, thus promoting numerical stability.
20
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | MAY 2021
u k - nh
z k ! A -1 ^w
else
w k ! Az k + n
end
end
sort " ^ z k, w k h, w.r.t. f ^w k h
compute " u k ,
r
m
A -1 d k
d n J ! R mk = 1 u k z k
d A J ! R mk = 1 u k^ z k z Tk - I h
n ! n + hn $ dn J
A ! A $ exp ^1/ 2 $ h A $ d A J h
if transfer activated then
d ar J m = R mk =1 u k
d a{ J m = R mk =1 u k
r ^w k h
a r r ^w kh + a { { ^w k h
{ ^w kh
a r r ^w kh + a { { ^w k h
a r ! a r + h a $ d ar J m
a { ! a { + h a $ d a{ J m
normalize ^a r, a {h s.t. a r + a { = 1
end
end
IEEE Computational Intelligence Magazine - May 2021
Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2021
Contents
IEEE Computational Intelligence Magazine - May 2021 - Cover1
IEEE Computational Intelligence Magazine - May 2021 - Cover2
IEEE Computational Intelligence Magazine - May 2021 - Contents
IEEE Computational Intelligence Magazine - May 2021 - 2
IEEE Computational Intelligence Magazine - May 2021 - 3
IEEE Computational Intelligence Magazine - May 2021 - 4
IEEE Computational Intelligence Magazine - May 2021 - 5
IEEE Computational Intelligence Magazine - May 2021 - 6
IEEE Computational Intelligence Magazine - May 2021 - 7
IEEE Computational Intelligence Magazine - May 2021 - 8
IEEE Computational Intelligence Magazine - May 2021 - 9
IEEE Computational Intelligence Magazine - May 2021 - 10
IEEE Computational Intelligence Magazine - May 2021 - 11
IEEE Computational Intelligence Magazine - May 2021 - 12
IEEE Computational Intelligence Magazine - May 2021 - 13
IEEE Computational Intelligence Magazine - May 2021 - 14
IEEE Computational Intelligence Magazine - May 2021 - 15
IEEE Computational Intelligence Magazine - May 2021 - 16
IEEE Computational Intelligence Magazine - May 2021 - 17
IEEE Computational Intelligence Magazine - May 2021 - 18
IEEE Computational Intelligence Magazine - May 2021 - 19
IEEE Computational Intelligence Magazine - May 2021 - 20
IEEE Computational Intelligence Magazine - May 2021 - 21
IEEE Computational Intelligence Magazine - May 2021 - 22
IEEE Computational Intelligence Magazine - May 2021 - 23
IEEE Computational Intelligence Magazine - May 2021 - 24
IEEE Computational Intelligence Magazine - May 2021 - 25
IEEE Computational Intelligence Magazine - May 2021 - 26
IEEE Computational Intelligence Magazine - May 2021 - 27
IEEE Computational Intelligence Magazine - May 2021 - 28
IEEE Computational Intelligence Magazine - May 2021 - 29
IEEE Computational Intelligence Magazine - May 2021 - 30
IEEE Computational Intelligence Magazine - May 2021 - 31
IEEE Computational Intelligence Magazine - May 2021 - 32
IEEE Computational Intelligence Magazine - May 2021 - 33
IEEE Computational Intelligence Magazine - May 2021 - 34
IEEE Computational Intelligence Magazine - May 2021 - 35
IEEE Computational Intelligence Magazine - May 2021 - 36
IEEE Computational Intelligence Magazine - May 2021 - 37
IEEE Computational Intelligence Magazine - May 2021 - 38
IEEE Computational Intelligence Magazine - May 2021 - 39
IEEE Computational Intelligence Magazine - May 2021 - 40
IEEE Computational Intelligence Magazine - May 2021 - 41
IEEE Computational Intelligence Magazine - May 2021 - 42
IEEE Computational Intelligence Magazine - May 2021 - 43
IEEE Computational Intelligence Magazine - May 2021 - 44
IEEE Computational Intelligence Magazine - May 2021 - 45
IEEE Computational Intelligence Magazine - May 2021 - 46
IEEE Computational Intelligence Magazine - May 2021 - 47
IEEE Computational Intelligence Magazine - May 2021 - 48
IEEE Computational Intelligence Magazine - May 2021 - 49
IEEE Computational Intelligence Magazine - May 2021 - 50
IEEE Computational Intelligence Magazine - May 2021 - 51
IEEE Computational Intelligence Magazine - May 2021 - 52
IEEE Computational Intelligence Magazine - May 2021 - 53
IEEE Computational Intelligence Magazine - May 2021 - 54
IEEE Computational Intelligence Magazine - May 2021 - 55
IEEE Computational Intelligence Magazine - May 2021 - 56
IEEE Computational Intelligence Magazine - May 2021 - 57
IEEE Computational Intelligence Magazine - May 2021 - 58
IEEE Computational Intelligence Magazine - May 2021 - 59
IEEE Computational Intelligence Magazine - May 2021 - 60
IEEE Computational Intelligence Magazine - May 2021 - 61
IEEE Computational Intelligence Magazine - May 2021 - 62
IEEE Computational Intelligence Magazine - May 2021 - 63
IEEE Computational Intelligence Magazine - May 2021 - 64
IEEE Computational Intelligence Magazine - May 2021 - 65
IEEE Computational Intelligence Magazine - May 2021 - 66
IEEE Computational Intelligence Magazine - May 2021 - 67
IEEE Computational Intelligence Magazine - May 2021 - 68
IEEE Computational Intelligence Magazine - May 2021 - 69
IEEE Computational Intelligence Magazine - May 2021 - 70
IEEE Computational Intelligence Magazine - May 2021 - 71
IEEE Computational Intelligence Magazine - May 2021 - 72
IEEE Computational Intelligence Magazine - May 2021 - 73
IEEE Computational Intelligence Magazine - May 2021 - 74
IEEE Computational Intelligence Magazine - May 2021 - 75
IEEE Computational Intelligence Magazine - May 2021 - 76
IEEE Computational Intelligence Magazine - May 2021 - 77
IEEE Computational Intelligence Magazine - May 2021 - 78
IEEE Computational Intelligence Magazine - May 2021 - 79
IEEE Computational Intelligence Magazine - May 2021 - 80
IEEE Computational Intelligence Magazine - May 2021 - 81
IEEE Computational Intelligence Magazine - May 2021 - 82
IEEE Computational Intelligence Magazine - May 2021 - 83
IEEE Computational Intelligence Magazine - May 2021 - 84
IEEE Computational Intelligence Magazine - May 2021 - 85
IEEE Computational Intelligence Magazine - May 2021 - 86
IEEE Computational Intelligence Magazine - May 2021 - 87
IEEE Computational Intelligence Magazine - May 2021 - 88
IEEE Computational Intelligence Magazine - May 2021 - 89
IEEE Computational Intelligence Magazine - May 2021 - 90
IEEE Computational Intelligence Magazine - May 2021 - 91
IEEE Computational Intelligence Magazine - May 2021 - 92
IEEE Computational Intelligence Magazine - May 2021 - 93
IEEE Computational Intelligence Magazine - May 2021 - 94
IEEE Computational Intelligence Magazine - May 2021 - 95
IEEE Computational Intelligence Magazine - May 2021 - 96
IEEE Computational Intelligence Magazine - May 2021 - 97
IEEE Computational Intelligence Magazine - May 2021 - 98
IEEE Computational Intelligence Magazine - May 2021 - 99
IEEE Computational Intelligence Magazine - May 2021 - 100
IEEE Computational Intelligence Magazine - May 2021 - Cover3
IEEE Computational Intelligence Magazine - May 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com