SlideShare a Scribd company logo
1 of 36
Department of Computer
Science
University of North
Carolina at Wilmington
Using Membrane Computers to Find
Nearly-Optimal Solutions to Cost-
Based Abduction
Curry Guinn
Department of Computer
Science
University of North
Carolina at Wilmington
Acknowledgements
 Lexxle, Inc.
 Ed Addison
 Dr. Jeff Brown
 Bill Shipman
 Eric Harris
 Dave Crist
 Brian Bullard
 Rose Rahinemejad
 Special thanks to Dr. Ashraf Abdelbar and
Shawn Chivers
Department of Computer
Science
University of North
Carolina at Wilmington
Talk Outline
 What is membrane computing?
 What is cost-based abduction (CBA)?
 What does Lexxle’s ABC system do?
 How does one model CBA on a membrane
computer?
 What are some experimental results?
 What are some open questions?
Department of Computer
Science
University of North
Carolina at Wilmington
What is Membrane Computing?
 Biologically-inspired branch of natural computing
 Abstracting computing models from the structure and
functioning of living cells and from the organization of
cells in tissues or other higher order structures
 The basic elements of a membrane system are the
membrane structure and the sets of evolution rules
which process multisets of objects placed in the
compartments of the membrane architecture
 Also known as a P-System after Gheorghe Păun.
Department of Computer
Science
University of North
Carolina at Wilmington
How are membranes
composed?
 A membrane structure is a hierarchically arranged set of
membranes.
 Objects within membranes evolve through a set of rules
which may combine objects, mutate objects, delete
objects, or pass objects through membranes.
 Rules potentially can change membrane structures
themselves (dissolving, dividing or creating
membranes).
 Object selection and rule selection is a non-
deterministic process.
 Certain classes of membrane architectures have been
shown to be equivalent to Turing Machines and thus are
capable of any computation
Department of Computer
Science
University of North
Carolina at Wilmington
The Hierarchical Structure of
Membranes
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation
RAT
RAT
RAT
RAT
RAT
H
H
H
H
H
H
O
O
O
O
O
O
O
O
H
H
H
Al
Al
Al
Al
Al
P
P
P
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Inner membrane rules:
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few iterations)
RAT
RAT
RAT
RAT
RAT
HH
H
HH
H
OO
OO
O
O
O
O
HH
H
Al
Al
AlP
AlP
Al
P
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
HHO
HHO
HHO
OO
OO
HHO
HH
AlP
Al
AlP
AlP
Al
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
PHHH
OO
OO
PHHH
HH
AlP
Al
AlP
AlP
AlAlOOO
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
PHHH
OO
OO
PHHH
HH
AlP
Al
AlP
AlP
AlAlOOO
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
H
PHHH
OO
O
O
PHHH
H
Al
Al
AlP
AlP
AlAlOOO
P
P
Rules for outer membrane
PHHH is phosphine gas
Highly Toxic!!
PHHH + RAT  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
H
PHHH
OO
O
O
PHHH
H
Al
Al
AlP
AlP
AlAlOOO
P
P
Rules for outer membrane
PHHH is phosphine gas
Highly Toxic!!
PHHH + RAT  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
What is Cost-Based Abduction
(CBA)?
An attempt to find a proof with
the lowest cost
Reasoning under uncertainty
NP-Hard
Department of Computer
Science
University of North
Carolina at Wilmington
CBA
 Abduction is the process of proceeding from data describing
observations or events, to a set of hypotheses, which best
explains or accounts for the data.
 Employed in a variety of application domains including medical
diagnostics, natural language processing, belief revision,
and automated planning.
 Cost-based abduction is a formalism in which
 Evidence to be explained is treated as a goal to be proven,
 Proofs have costs based on how much needs to be assumed to
complete the proof, and
 The set of assumptions needed to complete the least-cost proof are
taken as the best explanation for the given evidence.
Department of Computer
Science
University of North
Carolina at Wilmington
CBA, Formally Defined
 A CBA system is a knowledge representation in
which a given world situation is modeled as a 4-tuple
K = (H,R, c, G), where
 H is a set of hypotheses or propositions,
 R is a set of rules of the form
(hi1 ^ hi2 ^ : : : ^ hin)  hik ,
where hi1 ; : : : ; hin (called the antecedents) and hik (called
the consequent) are all members of H,
 c is a function c : H  +, where c(h) is called the
assumability cost of hypothesis h  H and + denotes
the positive reals,
 G  H is called the goal set or the evidence.
Department of Computer
Science
University of North
Carolina at Wilmington
CBA, An Informal Example
(A  B)  G
(C  D)  G
(E  F)  C
A: 50
B: 100
C: 
D: 10
E: 30
F: 90
What’s the lowest cost proof?
Department of Computer
Science
University of North
Carolina at Wilmington
Representing a CBA Solution
As A String
 A possible solution to a CBA problem may
be represented as a string with each
character (or bit) of the string indicating
whether a particular hypothesis is true or
false.
 As an example, a 6-bit string 101110 would
indicate
 the hypotheses 1, 3, 4, and 5 are assumed
 while hypotheses 2 and 6 are not.
 The cost of the solution is then the sum of the
cost of hypotheses 1, 3, 4, and 5.
Department of Computer
Science
University of North
Carolina at Wilmington
Not All Strings Are Solutions;
How Can We Fix Them?
 A repair technique based on a type of stochastic
local search.
 If the hypotheses (represented by the string x)
assumed are sufficient to prove the goal, then the
fitness of the solution is made equal to the
assumability cost of the hypotheses corresponding
to the 1-bits of x and no further processing is
needed.
 Otherwise, we randomly choose a 0-bit in the x
vector and assign it to 1. If the goal still cannot be
proven, then we randomly choose another 0-bit and
assign it to 1, until the goal is provable.
 Repeat as necessary until the modified x is sufficient
to prove the goal.
Department of Computer
Science
University of North
Carolina at Wilmington
Retracting unnecessary
assumptions
 This process can of course result in many
unnecessary hypotheses being assumed.
 We, therefore, follow up this process with a simple 1-
OPT optimization process.
 We examine each of the 1-bits of the x vector: one by
one and in a random order, each 1-bit is assigned to
0 and if the goal can still be proven, then it is
retained as 0, otherwise it is set back to 1.
Department of Computer
Science
University of North
Carolina at Wilmington
CBA inside of a Membrane
General idea
Generate some random
hypotheses
Repair them
Throw away bad hypothesis
Keep good hypotheses
Breed good hypotheses
Department of Computer
Science
University of North
Carolina at Wilmington
Repair Membranes
 Each possible solution to the CBA problem
is represented as a string with each bit of
the string representing whether a particular
hypothesis is assumed to be true or false.
 Candidate solutions are placed in an inner
(Repair) membrane.
 To pass to the parent membrane, solutions
must be repaired so that they actual prove
the goal.
Department of Computer
Science
University of North
Carolina at Wilmington
Breeding Membranes
 Delete Rule: Grab a number of strings within the
membrane (in our implementation that number is 7),
determine the cost of each hypothesis and delete the
lowest.
 Crossing Rule: Grab a number of strings (3, for
instance) and choose the one with the best score.
Grab another 3 strings and choose the best. Do a
point-wise cross of the two strings at a random point
creating two children. Pass the children to the
Repair sub-membrane.
 Ascend Rule: Grab a number of strings (6),
choose the one with the best score, and pass to
parent membrane.
Department of Computer
Science
University of North
Carolina at Wilmington
Breeding Membranes Can Be
Arranged Hierarchically
 Each membrane potentially could reach a local
minima and obtain no further improvement. One
enhancement to the model is to allow parent
membranes to occasionally pass down one of its
best solutions to a child. This feedback would then
cause the child to splice its best solution with this
new solution, starting a new cycle of splices and
repairs.
 Feedback Rule: Grab a number of hypotheses in
the membrane (we chose 7), pick the best and send
to a randomly chosen child membrane.
Department of Computer
Science
University of North
Carolina at Wilmington
101011011
10011011 100011
110011
111100
10011011
10011011
Repair
Crossing Rule
Child
Repair Crossing Rule
Child
Repair Crossing Rule
Repair
Splice
Child
Repair
10011011 100011
110011
111100
Crossing Rule
Repair
Crossing Rule
Outer Skin
Parent Parent
GrandParent
Child
Repair Crossing Rule
Ascend Rule
Feedback Rule
Ascend Rule
Ascend Rule
Ascend Rule
Ascend Rule
Feedback Rule
10011011
10011011 110011
111001 101010
111100 001101
111110
Delete Rule
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
Department of Computer
Science
University of North
Carolina at Wilmington
Lexxle’s ABC System
 Our implementation of the membrane
computer is accomplished using the Lexxle
P-System/ABC System Toolkit by Lexxle,
Inc. developed specifically for use on
cluster computers.
 Design and testing of the architecture is
accomplished using a graphical user
interface supported by the GridNexus
software developed at the University of
North Carolina Wilmington.
Department of Computer
Science
University of North
Carolina at Wilmington
A Screenshot of Lexxle’s ABC
System Interface
Department of Computer
Science
University of North
Carolina at Wilmington
The CBA Problem Set
Standard
collection found
at
www.cbalib.org
created by Dr.
Abdelbar.
Instance raa180
No. of
hypotheses
300
No. of rules 900
No. of
Assumable
hypotheses
180
Rule depth
max: 38,
avg: 25.0
median: 27
Optimal
solution cost
10,821
ILP CPU
time (sec)
88,835
Department of Computer
Science
University of North
Carolina at Wilmington
Experimental Results
Some previous results
Iterated local search (ILS)
Repetitive simulated annealing (RSA),
and
A hybrid two-stage approach combining
these two methods (ILS-RSA)
Hierarchical particle swarm optimization
technique (HPSO)
Evolutionary algorithm (EA)
Department of Computer
Science
University of North
Carolina at Wilmington
ILS, RSA, and ILS-RSA
Department of Computer
Science
University of North
Carolina at Wilmington
HPSO and EA
 Chivers et al. use a hierarchical particle swarm
optimization technique (HPSO)
 A mean score of 12,155 (89% of optimal) for raa180.
The minimum score found out of 3,584 trials was
11,381 (95% of optimal).
 Chivers et al. : An evolutionary algorithm (EA) which
uses point-wise splicing as our method does.
 Best results were reported with an initial population
size of 100 with 1000 iterations for each trial.
 The average solution was 11,574 (93.5% of optimal)
with the best solution out of 543 trials being 11,374
(95% of optimal).
Department of Computer
Science
University of North
Carolina at Wilmington
A 1-1-7-3 Membrane Computer
Number of
Iterations
Mean Score Min Score
% of the
Optimum
100 12158 12011 89.00
200 11497 11100 94.12
300 11423 11330 94.73
400 11084 11019 97.62
500 11087 10972 97.60
600 11062 11019 97.82
700 11036 10977 98.05
800 11019 11019 98.20
900 11059 10994 97.85
1000 10929 10821 99.01
Department of Computer
Science
University of North
Carolina at Wilmington
Different Topologies
# of Iterations 1-1-20 1-2-10 1-4-5 1-3-7 1-10-2
100 12202 (88.7) 12103 (89.4) 11719 (92.3) 12158 (89.0) 11501 (94.1)
200 11581 (93.4) 11521 (93.9) 11438 (94.6) 11497 (94.1) 11366 (95.2)
300 11541 (93.8) 11194 (96.6) 11203 (96.6) 11423 (94.7) 11261 (96.1)
400 11132 (97.2) 11112 (97.4) 11189 (96.7) 11084 (97.6) 11153 (97.0)
500 11084 (97.6) 11052 (97.9) 11122 (97.3) 11087 (97.6) 11027 (98.1)
600 11024 (98.2) 11040 (98.0) 11129 (97.2) 11061 (97.8) 11048 (97.9)
700 11026 (98.1) 11022 (98.2) 11124 (97.3) 11036 (98.1) 11007 (98.3)
800 11066 (97.8) 11016 (98.2) 11150 (97.0) 11019 (98.2) 11036 (98.1)
900 11019 (98.2) 11008 (98.3) 11072 (97.7) 11058 (97.8) 11019 (98.2)
1000 11012 (98.3) 11007 (98.3) 11000 (98.4) 10929 (99.0) 10991 (98.5)
Department of Computer
Science
University of North
Carolina at Wilmington
Different Topologies
0.88
0.9
0.92
0.94
0.96
0.98
1
100 600 1100 1600
1-4-5 1-2-10 1-10-2 1-1-20 1-7-3
Department of Computer
Science
University of North
Carolina at Wilmington
Some Open Questions
Efficient Parallelization of
Membrane Computers
Cluster computing environment
Application to other domains
Traveling Salesman
N-queens
Motif-finding (Bioinformatics)
Department of Computer
Science
University of North
Carolina at Wilmington
Thank you!
Your Questions?

More Related Content

Similar to MembraneCBA.ppt

Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...Ana Luísa Pinho
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0Robert Fry
 
Intro to Feature Selection
Intro to Feature SelectionIntro to Feature Selection
Intro to Feature Selectionchenhm
 
Chapter09.ppt
Chapter09.pptChapter09.ppt
Chapter09.pptbutest
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Codiax
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithmgarima931
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Learning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOILLearning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOILPavithra Thippanaik
 
Trends in Computer Science and Information Technology
Trends in Computer Science and Information TechnologyTrends in Computer Science and Information Technology
Trends in Computer Science and Information Technologypeertechzpublication
 
Development of Multi-Level ROM
Development of Multi-Level ROMDevelopment of Multi-Level ROM
Development of Multi-Level ROMMohammad
 
Analysis of optimization algorithms
Analysis of optimization algorithmsAnalysis of optimization algorithms
Analysis of optimization algorithmsGem WeBlog
 
Hyponymy extraction of domain ontology
Hyponymy extraction of domain ontologyHyponymy extraction of domain ontology
Hyponymy extraction of domain ontologyIJwest
 
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...dannyijwest
 
New_ML_Lecture_9.ppt
New_ML_Lecture_9.pptNew_ML_Lecture_9.ppt
New_ML_Lecture_9.pptEmmaMaria6
 
Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)lakshmi.ec
 
Review of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk AlgorithmReview of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk AlgorithmXin-She Yang
 

Similar to MembraneCBA.ppt (20)

Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0
 
Intro to Feature Selection
Intro to Feature SelectionIntro to Feature Selection
Intro to Feature Selection
 
Chapter09.ppt
Chapter09.pptChapter09.ppt
Chapter09.ppt
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Learning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOILLearning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOIL
 
Trends in Computer Science and Information Technology
Trends in Computer Science and Information TechnologyTrends in Computer Science and Information Technology
Trends in Computer Science and Information Technology
 
ANSSummer2015
ANSSummer2015ANSSummer2015
ANSSummer2015
 
Development of Multi-Level ROM
Development of Multi-Level ROMDevelopment of Multi-Level ROM
Development of Multi-Level ROM
 
Analysis of optimization algorithms
Analysis of optimization algorithmsAnalysis of optimization algorithms
Analysis of optimization algorithms
 
Hyponymy extraction of domain ontology
Hyponymy extraction of domain ontologyHyponymy extraction of domain ontology
Hyponymy extraction of domain ontology
 
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
 
New_ML_Lecture_9.ppt
New_ML_Lecture_9.pptNew_ML_Lecture_9.ppt
New_ML_Lecture_9.ppt
 
Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Review of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk AlgorithmReview of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk Algorithm
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 

Recently uploaded

Gas-ExchangeS-in-Plants-and-Animals.pptx
Gas-ExchangeS-in-Plants-and-Animals.pptxGas-ExchangeS-in-Plants-and-Animals.pptx
Gas-ExchangeS-in-Plants-and-Animals.pptxGiovaniTrinidad
 
whole genome sequencing new and its types including shortgun and clone by clone
whole genome sequencing new  and its types including shortgun and clone by clonewhole genome sequencing new  and its types including shortgun and clone by clone
whole genome sequencing new and its types including shortgun and clone by clonechaudhary charan shingh university
 
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests GlycosidesGLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests GlycosidesNandakishor Bhaurao Deshmukh
 
Loudspeaker- direct radiating type and horn type.pptx
Loudspeaker- direct radiating type and horn type.pptxLoudspeaker- direct radiating type and horn type.pptx
Loudspeaker- direct radiating type and horn type.pptxpriyankatabhane
 
Environmental Acoustics- Speech interference level, acoustics calibrator.pptx
Environmental Acoustics- Speech interference level, acoustics calibrator.pptxEnvironmental Acoustics- Speech interference level, acoustics calibrator.pptx
Environmental Acoustics- Speech interference level, acoustics calibrator.pptxpriyankatabhane
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024Jene van der Heide
 
complex analysis best book for solving questions.pdf
complex analysis best book for solving questions.pdfcomplex analysis best book for solving questions.pdf
complex analysis best book for solving questions.pdfSubhamKumar3239
 
FBI Profiling - Forensic Psychology.pptx
FBI Profiling - Forensic Psychology.pptxFBI Profiling - Forensic Psychology.pptx
FBI Profiling - Forensic Psychology.pptxPayal Shrivastava
 
Probability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UGProbability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UGSoniaBajaj10
 
Science (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and PitfallsScience (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and PitfallsDobusch Leonhard
 
BACTERIAL SECRETION SYSTEM by Dr. Chayanika Das
BACTERIAL SECRETION SYSTEM by Dr. Chayanika DasBACTERIAL SECRETION SYSTEM by Dr. Chayanika Das
BACTERIAL SECRETION SYSTEM by Dr. Chayanika DasChayanika Das
 
Oxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptxOxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptxfarhanvvdk
 
Abnormal LFTs rate of deco and NAFLD.pptx
Abnormal LFTs rate of deco and NAFLD.pptxAbnormal LFTs rate of deco and NAFLD.pptx
Abnormal LFTs rate of deco and NAFLD.pptxzeus70441
 
DETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptxDETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptx201bo007
 
LAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary Microbiology
LAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary MicrobiologyLAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary Microbiology
LAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary MicrobiologyChayanika Das
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptxpallavirawat456
 
LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2
LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2
LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2AuEnriquezLontok
 

Recently uploaded (20)

Gas-ExchangeS-in-Plants-and-Animals.pptx
Gas-ExchangeS-in-Plants-and-Animals.pptxGas-ExchangeS-in-Plants-and-Animals.pptx
Gas-ExchangeS-in-Plants-and-Animals.pptx
 
whole genome sequencing new and its types including shortgun and clone by clone
whole genome sequencing new  and its types including shortgun and clone by clonewhole genome sequencing new  and its types including shortgun and clone by clone
whole genome sequencing new and its types including shortgun and clone by clone
 
Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?Let’s Say Someone Did Drop the Bomb. Then What?
Let’s Say Someone Did Drop the Bomb. Then What?
 
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests GlycosidesGLYCOSIDES Classification Of GLYCOSIDES  Chemical Tests Glycosides
GLYCOSIDES Classification Of GLYCOSIDES Chemical Tests Glycosides
 
Loudspeaker- direct radiating type and horn type.pptx
Loudspeaker- direct radiating type and horn type.pptxLoudspeaker- direct radiating type and horn type.pptx
Loudspeaker- direct radiating type and horn type.pptx
 
Environmental Acoustics- Speech interference level, acoustics calibrator.pptx
Environmental Acoustics- Speech interference level, acoustics calibrator.pptxEnvironmental Acoustics- Speech interference level, acoustics calibrator.pptx
Environmental Acoustics- Speech interference level, acoustics calibrator.pptx
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
 
complex analysis best book for solving questions.pdf
complex analysis best book for solving questions.pdfcomplex analysis best book for solving questions.pdf
complex analysis best book for solving questions.pdf
 
Ultrastructure and functions of Chloroplast.pptx
Ultrastructure and functions of Chloroplast.pptxUltrastructure and functions of Chloroplast.pptx
Ultrastructure and functions of Chloroplast.pptx
 
FBI Profiling - Forensic Psychology.pptx
FBI Profiling - Forensic Psychology.pptxFBI Profiling - Forensic Psychology.pptx
FBI Profiling - Forensic Psychology.pptx
 
Probability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UGProbability.pptx, Types of Probability, UG
Probability.pptx, Types of Probability, UG
 
Science (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and PitfallsScience (Communication) and Wikipedia - Potentials and Pitfalls
Science (Communication) and Wikipedia - Potentials and Pitfalls
 
BACTERIAL SECRETION SYSTEM by Dr. Chayanika Das
BACTERIAL SECRETION SYSTEM by Dr. Chayanika DasBACTERIAL SECRETION SYSTEM by Dr. Chayanika Das
BACTERIAL SECRETION SYSTEM by Dr. Chayanika Das
 
Oxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptxOxo-Acids of Halogens and their Salts.pptx
Oxo-Acids of Halogens and their Salts.pptx
 
Abnormal LFTs rate of deco and NAFLD.pptx
Abnormal LFTs rate of deco and NAFLD.pptxAbnormal LFTs rate of deco and NAFLD.pptx
Abnormal LFTs rate of deco and NAFLD.pptx
 
AZOTOBACTER AS BIOFERILIZER.PPTX
AZOTOBACTER AS BIOFERILIZER.PPTXAZOTOBACTER AS BIOFERILIZER.PPTX
AZOTOBACTER AS BIOFERILIZER.PPTX
 
DETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptxDETECTION OF MUTATION BY CLB METHOD.pptx
DETECTION OF MUTATION BY CLB METHOD.pptx
 
LAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary Microbiology
LAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary MicrobiologyLAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary Microbiology
LAMP PCR.pptx by Dr. Chayanika Das, Ph.D, Veterinary Microbiology
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptx
 
LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2
LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2
LESSON PLAN IN SCIENCE GRADE 4 WEEK 1 DAY 2
 

MembraneCBA.ppt

  • 1. Department of Computer Science University of North Carolina at Wilmington Using Membrane Computers to Find Nearly-Optimal Solutions to Cost- Based Abduction Curry Guinn
  • 2. Department of Computer Science University of North Carolina at Wilmington Acknowledgements  Lexxle, Inc.  Ed Addison  Dr. Jeff Brown  Bill Shipman  Eric Harris  Dave Crist  Brian Bullard  Rose Rahinemejad  Special thanks to Dr. Ashraf Abdelbar and Shawn Chivers
  • 3. Department of Computer Science University of North Carolina at Wilmington Talk Outline  What is membrane computing?  What is cost-based abduction (CBA)?  What does Lexxle’s ABC system do?  How does one model CBA on a membrane computer?  What are some experimental results?  What are some open questions?
  • 4. Department of Computer Science University of North Carolina at Wilmington What is Membrane Computing?  Biologically-inspired branch of natural computing  Abstracting computing models from the structure and functioning of living cells and from the organization of cells in tissues or other higher order structures  The basic elements of a membrane system are the membrane structure and the sets of evolution rules which process multisets of objects placed in the compartments of the membrane architecture  Also known as a P-System after Gheorghe Păun.
  • 5. Department of Computer Science University of North Carolina at Wilmington How are membranes composed?  A membrane structure is a hierarchically arranged set of membranes.  Objects within membranes evolve through a set of rules which may combine objects, mutate objects, delete objects, or pass objects through membranes.  Rules potentially can change membrane structures themselves (dissolving, dividing or creating membranes).  Object selection and rule selection is a non- deterministic process.  Certain classes of membrane architectures have been shown to be equivalent to Turing Machines and thus are capable of any computation
  • 6. Department of Computer Science University of North Carolina at Wilmington The Hierarchical Structure of Membranes
  • 7. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation RAT RAT RAT RAT RAT H H H H H H O O O O O O O O H H H Al Al Al Al Al P P P P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH Inner membrane rules:
  • 8. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few iterations) RAT RAT RAT RAT RAT HH H HH H OO OO O O O O HH H Al Al AlP AlP Al P P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 9. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT HHO HHO HHO OO OO HHO HH AlP Al AlP AlP Al P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 10. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT PHHH OO OO PHHH HH AlP Al AlP AlP AlAlOOO P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 11. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT PHHH OO OO PHHH HH AlP Al AlP AlP AlAlOOO P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 12. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT H PHHH OO O O PHHH H Al Al AlP AlP AlAlOOO P P Rules for outer membrane PHHH is phosphine gas Highly Toxic!! PHHH + RAT  PHHH
  • 13. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) H PHHH OO O O PHHH H Al Al AlP AlP AlAlOOO P P Rules for outer membrane PHHH is phosphine gas Highly Toxic!! PHHH + RAT  PHHH
  • 14. Department of Computer Science University of North Carolina at Wilmington What is Cost-Based Abduction (CBA)? An attempt to find a proof with the lowest cost Reasoning under uncertainty NP-Hard
  • 15. Department of Computer Science University of North Carolina at Wilmington CBA  Abduction is the process of proceeding from data describing observations or events, to a set of hypotheses, which best explains or accounts for the data.  Employed in a variety of application domains including medical diagnostics, natural language processing, belief revision, and automated planning.  Cost-based abduction is a formalism in which  Evidence to be explained is treated as a goal to be proven,  Proofs have costs based on how much needs to be assumed to complete the proof, and  The set of assumptions needed to complete the least-cost proof are taken as the best explanation for the given evidence.
  • 16. Department of Computer Science University of North Carolina at Wilmington CBA, Formally Defined  A CBA system is a knowledge representation in which a given world situation is modeled as a 4-tuple K = (H,R, c, G), where  H is a set of hypotheses or propositions,  R is a set of rules of the form (hi1 ^ hi2 ^ : : : ^ hin)  hik , where hi1 ; : : : ; hin (called the antecedents) and hik (called the consequent) are all members of H,  c is a function c : H  +, where c(h) is called the assumability cost of hypothesis h  H and + denotes the positive reals,  G  H is called the goal set or the evidence.
  • 17. Department of Computer Science University of North Carolina at Wilmington CBA, An Informal Example (A  B)  G (C  D)  G (E  F)  C A: 50 B: 100 C:  D: 10 E: 30 F: 90 What’s the lowest cost proof?
  • 18. Department of Computer Science University of North Carolina at Wilmington Representing a CBA Solution As A String  A possible solution to a CBA problem may be represented as a string with each character (or bit) of the string indicating whether a particular hypothesis is true or false.  As an example, a 6-bit string 101110 would indicate  the hypotheses 1, 3, 4, and 5 are assumed  while hypotheses 2 and 6 are not.  The cost of the solution is then the sum of the cost of hypotheses 1, 3, 4, and 5.
  • 19. Department of Computer Science University of North Carolina at Wilmington Not All Strings Are Solutions; How Can We Fix Them?  A repair technique based on a type of stochastic local search.  If the hypotheses (represented by the string x) assumed are sufficient to prove the goal, then the fitness of the solution is made equal to the assumability cost of the hypotheses corresponding to the 1-bits of x and no further processing is needed.  Otherwise, we randomly choose a 0-bit in the x vector and assign it to 1. If the goal still cannot be proven, then we randomly choose another 0-bit and assign it to 1, until the goal is provable.  Repeat as necessary until the modified x is sufficient to prove the goal.
  • 20. Department of Computer Science University of North Carolina at Wilmington Retracting unnecessary assumptions  This process can of course result in many unnecessary hypotheses being assumed.  We, therefore, follow up this process with a simple 1- OPT optimization process.  We examine each of the 1-bits of the x vector: one by one and in a random order, each 1-bit is assigned to 0 and if the goal can still be proven, then it is retained as 0, otherwise it is set back to 1.
  • 21. Department of Computer Science University of North Carolina at Wilmington CBA inside of a Membrane General idea Generate some random hypotheses Repair them Throw away bad hypothesis Keep good hypotheses Breed good hypotheses
  • 22. Department of Computer Science University of North Carolina at Wilmington Repair Membranes  Each possible solution to the CBA problem is represented as a string with each bit of the string representing whether a particular hypothesis is assumed to be true or false.  Candidate solutions are placed in an inner (Repair) membrane.  To pass to the parent membrane, solutions must be repaired so that they actual prove the goal.
  • 23. Department of Computer Science University of North Carolina at Wilmington Breeding Membranes  Delete Rule: Grab a number of strings within the membrane (in our implementation that number is 7), determine the cost of each hypothesis and delete the lowest.  Crossing Rule: Grab a number of strings (3, for instance) and choose the one with the best score. Grab another 3 strings and choose the best. Do a point-wise cross of the two strings at a random point creating two children. Pass the children to the Repair sub-membrane.  Ascend Rule: Grab a number of strings (6), choose the one with the best score, and pass to parent membrane.
  • 24. Department of Computer Science University of North Carolina at Wilmington Breeding Membranes Can Be Arranged Hierarchically  Each membrane potentially could reach a local minima and obtain no further improvement. One enhancement to the model is to allow parent membranes to occasionally pass down one of its best solutions to a child. This feedback would then cause the child to splice its best solution with this new solution, starting a new cycle of splices and repairs.  Feedback Rule: Grab a number of hypotheses in the membrane (we chose 7), pick the best and send to a randomly chosen child membrane.
  • 25. Department of Computer Science University of North Carolina at Wilmington 101011011 10011011 100011 110011 111100 10011011 10011011 Repair Crossing Rule Child Repair Crossing Rule Child Repair Crossing Rule Repair Splice Child Repair 10011011 100011 110011 111100 Crossing Rule Repair Crossing Rule Outer Skin Parent Parent GrandParent Child Repair Crossing Rule Ascend Rule Feedback Rule Ascend Rule Ascend Rule Ascend Rule Ascend Rule Feedback Rule 10011011 10011011 110011 111001 101010 111100 001101 111110 Delete Rule 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100
  • 26. Department of Computer Science University of North Carolina at Wilmington Lexxle’s ABC System  Our implementation of the membrane computer is accomplished using the Lexxle P-System/ABC System Toolkit by Lexxle, Inc. developed specifically for use on cluster computers.  Design and testing of the architecture is accomplished using a graphical user interface supported by the GridNexus software developed at the University of North Carolina Wilmington.
  • 27. Department of Computer Science University of North Carolina at Wilmington A Screenshot of Lexxle’s ABC System Interface
  • 28. Department of Computer Science University of North Carolina at Wilmington The CBA Problem Set Standard collection found at www.cbalib.org created by Dr. Abdelbar. Instance raa180 No. of hypotheses 300 No. of rules 900 No. of Assumable hypotheses 180 Rule depth max: 38, avg: 25.0 median: 27 Optimal solution cost 10,821 ILP CPU time (sec) 88,835
  • 29. Department of Computer Science University of North Carolina at Wilmington Experimental Results Some previous results Iterated local search (ILS) Repetitive simulated annealing (RSA), and A hybrid two-stage approach combining these two methods (ILS-RSA) Hierarchical particle swarm optimization technique (HPSO) Evolutionary algorithm (EA)
  • 30. Department of Computer Science University of North Carolina at Wilmington ILS, RSA, and ILS-RSA
  • 31. Department of Computer Science University of North Carolina at Wilmington HPSO and EA  Chivers et al. use a hierarchical particle swarm optimization technique (HPSO)  A mean score of 12,155 (89% of optimal) for raa180. The minimum score found out of 3,584 trials was 11,381 (95% of optimal).  Chivers et al. : An evolutionary algorithm (EA) which uses point-wise splicing as our method does.  Best results were reported with an initial population size of 100 with 1000 iterations for each trial.  The average solution was 11,574 (93.5% of optimal) with the best solution out of 543 trials being 11,374 (95% of optimal).
  • 32. Department of Computer Science University of North Carolina at Wilmington A 1-1-7-3 Membrane Computer Number of Iterations Mean Score Min Score % of the Optimum 100 12158 12011 89.00 200 11497 11100 94.12 300 11423 11330 94.73 400 11084 11019 97.62 500 11087 10972 97.60 600 11062 11019 97.82 700 11036 10977 98.05 800 11019 11019 98.20 900 11059 10994 97.85 1000 10929 10821 99.01
  • 33. Department of Computer Science University of North Carolina at Wilmington Different Topologies # of Iterations 1-1-20 1-2-10 1-4-5 1-3-7 1-10-2 100 12202 (88.7) 12103 (89.4) 11719 (92.3) 12158 (89.0) 11501 (94.1) 200 11581 (93.4) 11521 (93.9) 11438 (94.6) 11497 (94.1) 11366 (95.2) 300 11541 (93.8) 11194 (96.6) 11203 (96.6) 11423 (94.7) 11261 (96.1) 400 11132 (97.2) 11112 (97.4) 11189 (96.7) 11084 (97.6) 11153 (97.0) 500 11084 (97.6) 11052 (97.9) 11122 (97.3) 11087 (97.6) 11027 (98.1) 600 11024 (98.2) 11040 (98.0) 11129 (97.2) 11061 (97.8) 11048 (97.9) 700 11026 (98.1) 11022 (98.2) 11124 (97.3) 11036 (98.1) 11007 (98.3) 800 11066 (97.8) 11016 (98.2) 11150 (97.0) 11019 (98.2) 11036 (98.1) 900 11019 (98.2) 11008 (98.3) 11072 (97.7) 11058 (97.8) 11019 (98.2) 1000 11012 (98.3) 11007 (98.3) 11000 (98.4) 10929 (99.0) 10991 (98.5)
  • 34. Department of Computer Science University of North Carolina at Wilmington Different Topologies 0.88 0.9 0.92 0.94 0.96 0.98 1 100 600 1100 1600 1-4-5 1-2-10 1-10-2 1-1-20 1-7-3
  • 35. Department of Computer Science University of North Carolina at Wilmington Some Open Questions Efficient Parallelization of Membrane Computers Cluster computing environment Application to other domains Traveling Salesman N-queens Motif-finding (Bioinformatics)
  • 36. Department of Computer Science University of North Carolina at Wilmington Thank you! Your Questions?