IEEE Computational Intelligence Magazine - May 2023 - 83
NTK can be used to characterize the trainability of each
network architecture and therefore is designed to
evaluate the performance of individuals in the
population that can significantly save search time and
computational resources.
most informative components of the features,
thereby improving the representational
capacity of the network
architecture.
3)Variable-Architecture Encoding
Strategy
A variable-architecture encoding strategy
based on the Reg Block is designed
to construct a large search space with
numerous network architectures, as
shown in Fig. 2(c) and (d). Searching
different parameter combinations allows
various network architectures to be
flexibly constructed. First, the value of
the unit num parameter is randomly
selected to determine the initial number
ofReg Units. Then, in each Reg Unit,
block num Reg Blocks are randomly
generated.
As depicted in Fig. 2(b), the input of
each Reg Block comes from the output
of the previous Reg Block. The input
feature maps are divided into group
branches.Eachbranchhas g channel
channels, which are determined by
in channel=group. The width of the bottleneck
ofeach branch is set as the width.
The stride ofthe pooling layer is denoted
asf.f is set to 2 when the feature map is
downsampled; otherwise,f is set to 1. At
the end of each Reg Block, an SENet
module is added with a 50% probability,
which improves the representational ability
of the network without introducing
too many parameters. This dimensionality
is denoted by the parameter
hasSENet. The value ofhasSENet is set to
either 1 or 0, representing whether an
SENet module is in the Reg Block.
When generating a Reg Block, the
parameters group and width are randomly
selected from two specified lists. The
parameter f is randomly selected from
{1, 2}. When the number of existing
pooling layers performing the halving
meets the preset constraint,f is set to 1.
These architectural parameters are automatically
searched and encoded as a digital
string.
By including the group convolution
and SENet module, more dimensions for
constructing network architectures are
added, effectively expanding the search
space and allowing more networks with
better performance to be obtained.
4)Computational Restriction
The length of the network architecture
has an important effect on the test
accuracy [1]. Longer network architectures
generally obtain better test accuracy
but require more parameters,
which makes these network architectures
more challenging to calculate.
Through careful structure design, some
short network architectures can achieve
good classification performance [2], [4],
and determining these architectures is
the goal of the algorithm proposed in
this paper. Although the lengths of the
network architectures in the LoNAS
search space can vary according to the
encoding strategy, the lengths are
restricted to ensure that the number of
parameters of each network architecture
in the search space is limited. Network
architectures with too many or
too few parameters can be avoided
since they are not the target, thereby
improving the search efficiency. The
number of convolutional layers determines
the length of the network architecture:
Length
¼ 1 þ
UXmax
i¼Umin
where unit num is limited to the range
½Umin; Umax. Ublock
i
represents the number
of Reg Blocks in the ith Reg Unit,
which corresponds to the parameter
block num. block num is limited to the
range ½blockmin; blockmax. The number
3 Ublock
i
(1)
of Reg Blocks in each Reg Unit must
be multiplied by a factor of 3 since
each Reg Block contains three convolutional
layers. The total length of the
network architecture is determined by
adding a convolutional layer in the
Conv Unit.
The number of convolutional kernels
also affects the number of network
parameters. When the convolutional
kernels are the same size, more convolutional
kernels improve the feature
extraction ability, leading to better classification
performance for the network
architecture while requiring more
parameters. Therefore, the number of
convolutional kernels should also be
limited to avoid requiring too many
parameters. The number of convolutional
kernels reflects the number of
output feature maps in the intermediate
layer, which is determined by the product
of the group and width parameters.
The proposed encoding strategy implements
two rules to restrict the number
of feature maps. The first rule is that
larger values have lower selection probabilities
when randomly selecting the
group and width parameters. The other
rule is that maximum and minimum
values are set for the product of group
and width.Ifgroup width is larger than
the maximum value or less than the
minimum value, both parameters need
to be randomly selected again until the
product meets the limit. Algorithm 2
shows the application of these rules in
the construction of the network architecture.
Under these rules, the overall
number of network architecture parameters
in the search space is limited,
which guarantees better search performance
to discover highly accurate network
architectures with few parameters.
Compared to the coding strategies
in [9], [26], [46], there are more parameter
dimensions included in the proposed
encoding strategy. As a result, finer
blocks can be generated, and more various
network architectures can be discovered.
In addition, network architectures
with too few or too many parameters
that do not meet the parameter requirements
are not generated by adding
computational restrictions, resulting in a
MAY 2023 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 83
IEEE Computational Intelligence Magazine - May 2023
Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2023
Contents
IEEE Computational Intelligence Magazine - May 2023 - Cover1
IEEE Computational Intelligence Magazine - May 2023 - Cover2
IEEE Computational Intelligence Magazine - May 2023 - Contents
IEEE Computational Intelligence Magazine - May 2023 - 2
IEEE Computational Intelligence Magazine - May 2023 - 3
IEEE Computational Intelligence Magazine - May 2023 - 4
IEEE Computational Intelligence Magazine - May 2023 - 5
IEEE Computational Intelligence Magazine - May 2023 - 6
IEEE Computational Intelligence Magazine - May 2023 - 7
IEEE Computational Intelligence Magazine - May 2023 - 8
IEEE Computational Intelligence Magazine - May 2023 - 9
IEEE Computational Intelligence Magazine - May 2023 - 10
IEEE Computational Intelligence Magazine - May 2023 - 11
IEEE Computational Intelligence Magazine - May 2023 - 12
IEEE Computational Intelligence Magazine - May 2023 - 13
IEEE Computational Intelligence Magazine - May 2023 - 14
IEEE Computational Intelligence Magazine - May 2023 - 15
IEEE Computational Intelligence Magazine - May 2023 - 16
IEEE Computational Intelligence Magazine - May 2023 - 17
IEEE Computational Intelligence Magazine - May 2023 - 18
IEEE Computational Intelligence Magazine - May 2023 - 19
IEEE Computational Intelligence Magazine - May 2023 - 20
IEEE Computational Intelligence Magazine - May 2023 - 21
IEEE Computational Intelligence Magazine - May 2023 - 22
IEEE Computational Intelligence Magazine - May 2023 - 23
IEEE Computational Intelligence Magazine - May 2023 - 24
IEEE Computational Intelligence Magazine - May 2023 - 25
IEEE Computational Intelligence Magazine - May 2023 - 26
IEEE Computational Intelligence Magazine - May 2023 - 27
IEEE Computational Intelligence Magazine - May 2023 - 28
IEEE Computational Intelligence Magazine - May 2023 - 29
IEEE Computational Intelligence Magazine - May 2023 - 30
IEEE Computational Intelligence Magazine - May 2023 - 31
IEEE Computational Intelligence Magazine - May 2023 - 32
IEEE Computational Intelligence Magazine - May 2023 - 33
IEEE Computational Intelligence Magazine - May 2023 - 34
IEEE Computational Intelligence Magazine - May 2023 - 35
IEEE Computational Intelligence Magazine - May 2023 - 36
IEEE Computational Intelligence Magazine - May 2023 - 37
IEEE Computational Intelligence Magazine - May 2023 - 38
IEEE Computational Intelligence Magazine - May 2023 - 39
IEEE Computational Intelligence Magazine - May 2023 - 40
IEEE Computational Intelligence Magazine - May 2023 - 41
IEEE Computational Intelligence Magazine - May 2023 - 42
IEEE Computational Intelligence Magazine - May 2023 - 43
IEEE Computational Intelligence Magazine - May 2023 - 44
IEEE Computational Intelligence Magazine - May 2023 - 45
IEEE Computational Intelligence Magazine - May 2023 - 46
IEEE Computational Intelligence Magazine - May 2023 - 47
IEEE Computational Intelligence Magazine - May 2023 - 48
IEEE Computational Intelligence Magazine - May 2023 - 49
IEEE Computational Intelligence Magazine - May 2023 - 50
IEEE Computational Intelligence Magazine - May 2023 - 51
IEEE Computational Intelligence Magazine - May 2023 - 52
IEEE Computational Intelligence Magazine - May 2023 - 53
IEEE Computational Intelligence Magazine - May 2023 - 54
IEEE Computational Intelligence Magazine - May 2023 - 55
IEEE Computational Intelligence Magazine - May 2023 - 56
IEEE Computational Intelligence Magazine - May 2023 - 57
IEEE Computational Intelligence Magazine - May 2023 - 58
IEEE Computational Intelligence Magazine - May 2023 - 59
IEEE Computational Intelligence Magazine - May 2023 - 60
IEEE Computational Intelligence Magazine - May 2023 - 61
IEEE Computational Intelligence Magazine - May 2023 - 62
IEEE Computational Intelligence Magazine - May 2023 - 63
IEEE Computational Intelligence Magazine - May 2023 - 64
IEEE Computational Intelligence Magazine - May 2023 - 65
IEEE Computational Intelligence Magazine - May 2023 - 66
IEEE Computational Intelligence Magazine - May 2023 - 67
IEEE Computational Intelligence Magazine - May 2023 - 68
IEEE Computational Intelligence Magazine - May 2023 - 69
IEEE Computational Intelligence Magazine - May 2023 - 70
IEEE Computational Intelligence Magazine - May 2023 - 71
IEEE Computational Intelligence Magazine - May 2023 - 72
IEEE Computational Intelligence Magazine - May 2023 - 73
IEEE Computational Intelligence Magazine - May 2023 - 74
IEEE Computational Intelligence Magazine - May 2023 - 75
IEEE Computational Intelligence Magazine - May 2023 - 76
IEEE Computational Intelligence Magazine - May 2023 - 77
IEEE Computational Intelligence Magazine - May 2023 - 78
IEEE Computational Intelligence Magazine - May 2023 - 79
IEEE Computational Intelligence Magazine - May 2023 - 80
IEEE Computational Intelligence Magazine - May 2023 - 81
IEEE Computational Intelligence Magazine - May 2023 - 82
IEEE Computational Intelligence Magazine - May 2023 - 83
IEEE Computational Intelligence Magazine - May 2023 - 84
IEEE Computational Intelligence Magazine - May 2023 - 85
IEEE Computational Intelligence Magazine - May 2023 - 86
IEEE Computational Intelligence Magazine - May 2023 - 87
IEEE Computational Intelligence Magazine - May 2023 - 88
IEEE Computational Intelligence Magazine - May 2023 - 89
IEEE Computational Intelligence Magazine - May 2023 - 90
IEEE Computational Intelligence Magazine - May 2023 - 91
IEEE Computational Intelligence Magazine - May 2023 - 92
IEEE Computational Intelligence Magazine - May 2023 - 93
IEEE Computational Intelligence Magazine - May 2023 - 94
IEEE Computational Intelligence Magazine - May 2023 - 95
IEEE Computational Intelligence Magazine - May 2023 - 96
IEEE Computational Intelligence Magazine - May 2023 - 97
IEEE Computational Intelligence Magazine - May 2023 - 98
IEEE Computational Intelligence Magazine - May 2023 - 99
IEEE Computational Intelligence Magazine - May 2023 - 100
IEEE Computational Intelligence Magazine - May 2023 - 101
IEEE Computational Intelligence Magazine - May 2023 - 102
IEEE Computational Intelligence Magazine - May 2023 - 103
IEEE Computational Intelligence Magazine - May 2023 - 104
IEEE Computational Intelligence Magazine - May 2023 - Cover3
IEEE Computational Intelligence Magazine - May 2023 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com