Optimization and Machine Learning. Patrick Siarry

Optimization and Machine Learning - Patrick Siarry


Скачать книгу
methods to be improved.

      This book presents modern advances in the selection, configuration and engineering of algorithms that rely on machine learning and optimization. It is structured into two parts. Part 1 is dedicated to the most common optimization applications. Part 2 describes and implements several applications of machine learning.

      Part 1 comprises four chapters which focus on real-world application of optimization algorithms.

      Chapter 1 addresses the problem of vehicle routing with loading constraints and combines two combinatorial optimization problems: the capacity vehicle routing problem (CVRP) and the two-/three-dimensional bin packing problem (2/3D-BPP). The authors have studied real transport problems such as the transport of furniture or industrial machinery.

      The main objective of Chapter 2 is to create the most appropriate scheduling solution that optimizes several QoS metrics simultaneously; thus, the authors adapt the widely used metaheuristic, “Genetic Algorithm” as an optimization method. The proposed scheduling approach is tested by simulating a healthcare IoT application, modeled as a workflow and several scientific workflow benchmarks. The results show the effectiveness of the proposed approach; it generates a scheduling plan that better optimizes the various QoS metrics considered.

      Chapter 4 addresses the type-2 mixed-model assembly line balancing problem with deterministic task times. To solve this problem, an enhancement of the greedy randomized adaptive search procedure – known as the reactive greedy randomized adaptive search procedure – is proposed. This reactive version is based on variation of the restricted candidate list parameter value, alpha. The proposed reactive GRASP is hybridized with the ranked positional weight heuristic to construct initial solutions. Results obtained by the proposed hybrid reactive GRASP are compared with those obtained by the basic GRASP, demonstrating the effect of the learning mechanism.

      Part 2 comprises four chapters devoted to artificial intelligence and machine learning and their applications.

      The main challenge of recommender systems comes from modeling the dependence between the various entities, incorporating multifaceted information such as user preferences, item attributes and users’ mutual influence, which results in more complex features. To deal with this issue, the authors of Chapter 5 design stacked ensemble machine learning models for recommendations. Their recommender system incorporates a collaborative filtering (CF) module and a stacking recommender module. An interactive attention mechanism is then introduced to model the mutual influence relationship between aspect users and items. Experiments on real-world datasets demonstrate that the proposed algorithm can achieve more accurate predictions and higher recommendation efficiency.

      In internal auditing, the ability to process all of the available information related to the audit universe or subject could improve the quality of results. Classifying the audit text documents (unstructured data) could enable the use of additional information to improve the existing structured data, creating better knowledge support for the audit process. A comparison of results of classical machine learning and deep learning algorithms, combined with advanced word embeddings to classify the findings of internal audit reports, is presented in Chapter 6.

      Intrusion detection is a key concept in modern computer network security. It is aimed at analyzing the current state of a network in real time and identifying potential anomalies in the system, reporting them as soon as they are identified. This allows for the detection of previously unknown malware. Artificial neural networks are supervised machine learning algorithms inspired by the human brain. This kind of network is a popular choice among data mining techniques today and has already been proven to be a valuable choice for intrusion detection. In Chapter 8, the author builds a feed-forward neural network trained on the NSL-KDD dataset, in order to classify network connections as belonging to one of two possible categories: normal or anomalous. Its goal is to maximize the level of accuracy in recognizing new data samples.

PART 1 Optimization

      Vehicle Routing Problems with Loading Constraints: An Overview of Variants and Solution Methods

       Ines SBAI1 and Saoussen KRICHEN1

       1Université de Tunis, Institut Supérieur de Gestion de Tunis, LARODEC Laboratory, Tunisia

      This chapter combines two of the most studied combinatorial optimization problems, namely, the capacitated vehicle routing problem (CVRP) and the two/three-dimensional bin packing problem (2/3D-BPP). It focuses heavily on real-life transportation problems such as the transportation of furniture or industrial machinery. An extensive overview of the CVRP with two/three-dimensional loading constraints is presented by surveying over 76 existing contributions. We provide an updated review of the variants of the L-CVRP studied in the literature and analyze some of the most popular optimization methods presented in the existing literature. Alongside this, we discuss their variants and constraints, their applications for solving real-world problems, as well as their impact on the current literature.


Скачать книгу