SlideShare a Scribd company logo
1 of 36
Department of Computer
Science
University of North
Carolina at Wilmington
Using Membrane Computers to Find
Nearly-Optimal Solutions to Cost-
Based Abduction
Curry Guinn
Department of Computer
Science
University of North
Carolina at Wilmington
Acknowledgements
 Lexxle, Inc.
 Ed Addison
 Dr. Jeff Brown
 Bill Shipman
 Eric Harris
 Dave Crist
 Brian Bullard
 Rose Rahinemejad
 Special thanks to Dr. Ashraf Abdelbar and
Shawn Chivers
Department of Computer
Science
University of North
Carolina at Wilmington
Talk Outline
 What is membrane computing?
 What is cost-based abduction (CBA)?
 What does Lexxle’s ABC system do?
 How does one model CBA on a membrane
computer?
 What are some experimental results?
 What are some open questions?
Department of Computer
Science
University of North
Carolina at Wilmington
What is Membrane Computing?
 Biologically-inspired branch of natural computing
 Abstracting computing models from the structure and
functioning of living cells and from the organization of
cells in tissues or other higher order structures
 The basic elements of a membrane system are the
membrane structure and the sets of evolution rules
which process multisets of objects placed in the
compartments of the membrane architecture
 Also known as a P-System after Gheorghe Păun.
Department of Computer
Science
University of North
Carolina at Wilmington
How are membranes
composed?
 A membrane structure is a hierarchically arranged set of
membranes.
 Objects within membranes evolve through a set of rules
which may combine objects, mutate objects, delete
objects, or pass objects through membranes.
 Rules potentially can change membrane structures
themselves (dissolving, dividing or creating
membranes).
 Object selection and rule selection is a non-
deterministic process.
 Certain classes of membrane architectures have been
shown to be equivalent to Turing Machines and thus are
capable of any computation
Department of Computer
Science
University of North
Carolina at Wilmington
The Hierarchical Structure of
Membranes
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation
RAT
RAT
RAT
RAT
RAT
H
H
H
H
H
H
O
O
O
O
O
O
O
O
H
H
H
Al
Al
Al
Al
Al
P
P
P
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Inner membrane rules:
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few iterations)
RAT
RAT
RAT
RAT
RAT
HH
H
HH
H
OO
OO
O
O
O
O
HH
H
Al
Al
AlP
AlP
Al
P
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
HHO
HHO
HHO
OO
OO
HHO
HH
AlP
Al
AlP
AlP
Al
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
PHHH
OO
OO
PHHH
HH
AlP
Al
AlP
AlP
AlAlOOO
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
PHHH
OO
OO
PHHH
HH
AlP
Al
AlP
AlP
AlAlOOO
P
Rule 1: H + H  HH
Rule 2: O + O  OO
Rule 3: 2HH + OO 
2HHO
Rule 4: Al + P  AlP
Rule 5: 2AlP + 3HHO 
AlAlOOO + 2PHHH
Rule 6: PHHH  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
RAT
RAT
RAT
RAT
RAT
H
PHHH
OO
O
O
PHHH
H
Al
Al
AlP
AlP
AlAlOOO
P
P
Rules for outer membrane
PHHH is phosphine gas
Highly Toxic!!
PHHH + RAT  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
An Example Membrane
Computation (after a few more
iterations)
H
PHHH
OO
O
O
PHHH
H
Al
Al
AlP
AlP
AlAlOOO
P
P
Rules for outer membrane
PHHH is phosphine gas
Highly Toxic!!
PHHH + RAT  PHHH
Department of Computer
Science
University of North
Carolina at Wilmington
What is Cost-Based Abduction
(CBA)?
An attempt to find a proof with
the lowest cost
Reasoning under uncertainty
NP-Hard
Department of Computer
Science
University of North
Carolina at Wilmington
CBA
 Abduction is the process of proceeding from data describing
observations or events, to a set of hypotheses, which best
explains or accounts for the data.
 Employed in a variety of application domains including medical
diagnostics, natural language processing, belief revision,
and automated planning.
 Cost-based abduction is a formalism in which
 Evidence to be explained is treated as a goal to be proven,
 Proofs have costs based on how much needs to be assumed to
complete the proof, and
 The set of assumptions needed to complete the least-cost proof are
taken as the best explanation for the given evidence.
Department of Computer
Science
University of North
Carolina at Wilmington
CBA, Formally Defined
 A CBA system is a knowledge representation in
which a given world situation is modeled as a 4-tuple
K = (H,R, c, G), where
 H is a set of hypotheses or propositions,
 R is a set of rules of the form
(hi1 ^ hi2 ^ : : : ^ hin)  hik ,
where hi1 ; : : : ; hin (called the antecedents) and hik (called
the consequent) are all members of H,
 c is a function c : H  +, where c(h) is called the
assumability cost of hypothesis h  H and + denotes
the positive reals,
 G  H is called the goal set or the evidence.
Department of Computer
Science
University of North
Carolina at Wilmington
CBA, An Informal Example
(A  B)  G
(C  D)  G
(E  F)  C
A: 50
B: 100
C: 
D: 10
E: 30
F: 90
What’s the lowest cost proof?
Department of Computer
Science
University of North
Carolina at Wilmington
Representing a CBA Solution
As A String
 A possible solution to a CBA problem may
be represented as a string with each
character (or bit) of the string indicating
whether a particular hypothesis is true or
false.
 As an example, a 6-bit string 101110 would
indicate
 the hypotheses 1, 3, 4, and 5 are assumed
 while hypotheses 2 and 6 are not.
 The cost of the solution is then the sum of the
cost of hypotheses 1, 3, 4, and 5.
Department of Computer
Science
University of North
Carolina at Wilmington
Not All Strings Are Solutions;
How Can We Fix Them?
 A repair technique based on a type of stochastic
local search.
 If the hypotheses (represented by the string x)
assumed are sufficient to prove the goal, then the
fitness of the solution is made equal to the
assumability cost of the hypotheses corresponding
to the 1-bits of x and no further processing is
needed.
 Otherwise, we randomly choose a 0-bit in the x
vector and assign it to 1. If the goal still cannot be
proven, then we randomly choose another 0-bit and
assign it to 1, until the goal is provable.
 Repeat as necessary until the modified x is sufficient
to prove the goal.
Department of Computer
Science
University of North
Carolina at Wilmington
Retracting unnecessary
assumptions
 This process can of course result in many
unnecessary hypotheses being assumed.
 We, therefore, follow up this process with a simple 1-
OPT optimization process.
 We examine each of the 1-bits of the x vector: one by
one and in a random order, each 1-bit is assigned to
0 and if the goal can still be proven, then it is
retained as 0, otherwise it is set back to 1.
Department of Computer
Science
University of North
Carolina at Wilmington
CBA inside of a Membrane
General idea
Generate some random
hypotheses
Repair them
Throw away bad hypothesis
Keep good hypotheses
Breed good hypotheses
Department of Computer
Science
University of North
Carolina at Wilmington
Repair Membranes
 Each possible solution to the CBA problem
is represented as a string with each bit of
the string representing whether a particular
hypothesis is assumed to be true or false.
 Candidate solutions are placed in an inner
(Repair) membrane.
 To pass to the parent membrane, solutions
must be repaired so that they actual prove
the goal.
Department of Computer
Science
University of North
Carolina at Wilmington
Breeding Membranes
 Delete Rule: Grab a number of strings within the
membrane (in our implementation that number is 7),
determine the cost of each hypothesis and delete the
lowest.
 Crossing Rule: Grab a number of strings (3, for
instance) and choose the one with the best score.
Grab another 3 strings and choose the best. Do a
point-wise cross of the two strings at a random point
creating two children. Pass the children to the
Repair sub-membrane.
 Ascend Rule: Grab a number of strings (6),
choose the one with the best score, and pass to
parent membrane.
Department of Computer
Science
University of North
Carolina at Wilmington
Breeding Membranes Can Be
Arranged Hierarchically
 Each membrane potentially could reach a local
minima and obtain no further improvement. One
enhancement to the model is to allow parent
membranes to occasionally pass down one of its
best solutions to a child. This feedback would then
cause the child to splice its best solution with this
new solution, starting a new cycle of splices and
repairs.
 Feedback Rule: Grab a number of hypotheses in
the membrane (we chose 7), pick the best and send
to a randomly chosen child membrane.
Department of Computer
Science
University of North
Carolina at Wilmington
101011011
10011011 100011
110011
111100
10011011
10011011
Repair
Crossing Rule
Child
Repair Crossing Rule
Child
Repair Crossing Rule
Repair
Splice
Child
Repair
10011011 100011
110011
111100
Crossing Rule
Repair
Crossing Rule
Outer Skin
Parent Parent
GrandParent
Child
Repair Crossing Rule
Ascend Rule
Feedback Rule
Ascend Rule
Ascend Rule
Ascend Rule
Ascend Rule
Feedback Rule
10011011
10011011 110011
111001 101010
111100 001101
111110
Delete Rule
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
10011011 100011
110011
111100
Department of Computer
Science
University of North
Carolina at Wilmington
Lexxle’s ABC System
 Our implementation of the membrane
computer is accomplished using the Lexxle
P-System/ABC System Toolkit by Lexxle,
Inc. developed specifically for use on
cluster computers.
 Design and testing of the architecture is
accomplished using a graphical user
interface supported by the GridNexus
software developed at the University of
North Carolina Wilmington.
Department of Computer
Science
University of North
Carolina at Wilmington
A Screenshot of Lexxle’s ABC
System Interface
Department of Computer
Science
University of North
Carolina at Wilmington
The CBA Problem Set
Standard
collection found
at
www.cbalib.org
created by Dr.
Abdelbar.
Instance raa180
No. of
hypotheses
300
No. of rules 900
No. of
Assumable
hypotheses
180
Rule depth
max: 38,
avg: 25.0
median: 27
Optimal
solution cost
10,821
ILP CPU
time (sec)
88,835
Department of Computer
Science
University of North
Carolina at Wilmington
Experimental Results
Some previous results
Iterated local search (ILS)
Repetitive simulated annealing (RSA),
and
A hybrid two-stage approach combining
these two methods (ILS-RSA)
Hierarchical particle swarm optimization
technique (HPSO)
Evolutionary algorithm (EA)
Department of Computer
Science
University of North
Carolina at Wilmington
ILS, RSA, and ILS-RSA
Department of Computer
Science
University of North
Carolina at Wilmington
HPSO and EA
 Chivers et al. use a hierarchical particle swarm
optimization technique (HPSO)
 A mean score of 12,155 (89% of optimal) for raa180.
The minimum score found out of 3,584 trials was
11,381 (95% of optimal).
 Chivers et al. : An evolutionary algorithm (EA) which
uses point-wise splicing as our method does.
 Best results were reported with an initial population
size of 100 with 1000 iterations for each trial.
 The average solution was 11,574 (93.5% of optimal)
with the best solution out of 543 trials being 11,374
(95% of optimal).
Department of Computer
Science
University of North
Carolina at Wilmington
A 1-1-7-3 Membrane Computer
Number of
Iterations
Mean Score Min Score
% of the
Optimum
100 12158 12011 89.00
200 11497 11100 94.12
300 11423 11330 94.73
400 11084 11019 97.62
500 11087 10972 97.60
600 11062 11019 97.82
700 11036 10977 98.05
800 11019 11019 98.20
900 11059 10994 97.85
1000 10929 10821 99.01
Department of Computer
Science
University of North
Carolina at Wilmington
Different Topologies
# of Iterations 1-1-20 1-2-10 1-4-5 1-3-7 1-10-2
100 12202 (88.7) 12103 (89.4) 11719 (92.3) 12158 (89.0) 11501 (94.1)
200 11581 (93.4) 11521 (93.9) 11438 (94.6) 11497 (94.1) 11366 (95.2)
300 11541 (93.8) 11194 (96.6) 11203 (96.6) 11423 (94.7) 11261 (96.1)
400 11132 (97.2) 11112 (97.4) 11189 (96.7) 11084 (97.6) 11153 (97.0)
500 11084 (97.6) 11052 (97.9) 11122 (97.3) 11087 (97.6) 11027 (98.1)
600 11024 (98.2) 11040 (98.0) 11129 (97.2) 11061 (97.8) 11048 (97.9)
700 11026 (98.1) 11022 (98.2) 11124 (97.3) 11036 (98.1) 11007 (98.3)
800 11066 (97.8) 11016 (98.2) 11150 (97.0) 11019 (98.2) 11036 (98.1)
900 11019 (98.2) 11008 (98.3) 11072 (97.7) 11058 (97.8) 11019 (98.2)
1000 11012 (98.3) 11007 (98.3) 11000 (98.4) 10929 (99.0) 10991 (98.5)
Department of Computer
Science
University of North
Carolina at Wilmington
Different Topologies
0.88
0.9
0.92
0.94
0.96
0.98
1
100 600 1100 1600
1-4-5 1-2-10 1-10-2 1-1-20 1-7-3
Department of Computer
Science
University of North
Carolina at Wilmington
Some Open Questions
Efficient Parallelization of
Membrane Computers
Cluster computing environment
Application to other domains
Traveling Salesman
N-queens
Motif-finding (Bioinformatics)
Department of Computer
Science
University of North
Carolina at Wilmington
Thank you!
Your Questions?

More Related Content

Similar to MembraneCBA.ppt

Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...Ana Luísa Pinho
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0Robert Fry
 
Intro to Feature Selection
Intro to Feature SelectionIntro to Feature Selection
Intro to Feature Selectionchenhm
 
Chapter09.ppt
Chapter09.pptChapter09.ppt
Chapter09.pptbutest
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Codiax
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithmgarima931
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautzbutest
 
Learning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOILLearning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOILPavithra Thippanaik
 
Trends in Computer Science and Information Technology
Trends in Computer Science and Information TechnologyTrends in Computer Science and Information Technology
Trends in Computer Science and Information Technologypeertechzpublication
 
Development of Multi-Level ROM
Development of Multi-Level ROMDevelopment of Multi-Level ROM
Development of Multi-Level ROMMohammad
 
Analysis of optimization algorithms
Analysis of optimization algorithmsAnalysis of optimization algorithms
Analysis of optimization algorithmsGem WeBlog
 
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...dannyijwest
 
Hyponymy extraction of domain ontology
Hyponymy extraction of domain ontologyHyponymy extraction of domain ontology
Hyponymy extraction of domain ontologyIJwest
 
New_ML_Lecture_9.ppt
New_ML_Lecture_9.pptNew_ML_Lecture_9.ppt
New_ML_Lecture_9.pptEmmaMaria6
 
Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)lakshmi.ec
 
Review of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk AlgorithmReview of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk AlgorithmXin-She Yang
 

Similar to MembraneCBA.ppt (20)

Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...Functional specialization in human cognition: a large-scale neuroimaging init...
Functional specialization in human cognition: a large-scale neuroimaging init...
 
SPIE Conference V3.0
SPIE Conference V3.0SPIE Conference V3.0
SPIE Conference V3.0
 
Intro to Feature Selection
Intro to Feature SelectionIntro to Feature Selection
Intro to Feature Selection
 
Chapter09.ppt
Chapter09.pptChapter09.ppt
Chapter09.ppt
 
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
Sean Holden (University of Cambridge) - Proving Theorems_ Still A Major Test ...
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Learning to Search Henry Kautz
Learning to Search Henry KautzLearning to Search Henry Kautz
Learning to Search Henry Kautz
 
Learning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOILLearning sets of rules, Sequential Learning Algorithm,FOIL
Learning sets of rules, Sequential Learning Algorithm,FOIL
 
Trends in Computer Science and Information Technology
Trends in Computer Science and Information TechnologyTrends in Computer Science and Information Technology
Trends in Computer Science and Information Technology
 
ANSSummer2015
ANSSummer2015ANSSummer2015
ANSSummer2015
 
Development of Multi-Level ROM
Development of Multi-Level ROMDevelopment of Multi-Level ROM
Development of Multi-Level ROM
 
Analysis of optimization algorithms
Analysis of optimization algorithmsAnalysis of optimization algorithms
Analysis of optimization algorithms
 
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
HYPONYMY EXTRACTION OF DOMAIN ONTOLOGY CONCEPT BASED ON CCRFS AND HIERARCHY C...
 
Hyponymy extraction of domain ontology
Hyponymy extraction of domain ontologyHyponymy extraction of domain ontology
Hyponymy extraction of domain ontology
 
New_ML_Lecture_9.ppt
New_ML_Lecture_9.pptNew_ML_Lecture_9.ppt
New_ML_Lecture_9.ppt
 
Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)Group 9 genetic-algorithms (1)
Group 9 genetic-algorithms (1)
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Review of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk AlgorithmReview of Metaheuristics and Generalized Evolutionary Walk Algorithm
Review of Metaheuristics and Generalized Evolutionary Walk Algorithm
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 

Recently uploaded

Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfSumit Kumar yadav
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSSLeenakshiTyagi
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencySheetal Arora
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPirithiRaju
 

Recently uploaded (20)

Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 

MembraneCBA.ppt

  • 1. Department of Computer Science University of North Carolina at Wilmington Using Membrane Computers to Find Nearly-Optimal Solutions to Cost- Based Abduction Curry Guinn
  • 2. Department of Computer Science University of North Carolina at Wilmington Acknowledgements  Lexxle, Inc.  Ed Addison  Dr. Jeff Brown  Bill Shipman  Eric Harris  Dave Crist  Brian Bullard  Rose Rahinemejad  Special thanks to Dr. Ashraf Abdelbar and Shawn Chivers
  • 3. Department of Computer Science University of North Carolina at Wilmington Talk Outline  What is membrane computing?  What is cost-based abduction (CBA)?  What does Lexxle’s ABC system do?  How does one model CBA on a membrane computer?  What are some experimental results?  What are some open questions?
  • 4. Department of Computer Science University of North Carolina at Wilmington What is Membrane Computing?  Biologically-inspired branch of natural computing  Abstracting computing models from the structure and functioning of living cells and from the organization of cells in tissues or other higher order structures  The basic elements of a membrane system are the membrane structure and the sets of evolution rules which process multisets of objects placed in the compartments of the membrane architecture  Also known as a P-System after Gheorghe Păun.
  • 5. Department of Computer Science University of North Carolina at Wilmington How are membranes composed?  A membrane structure is a hierarchically arranged set of membranes.  Objects within membranes evolve through a set of rules which may combine objects, mutate objects, delete objects, or pass objects through membranes.  Rules potentially can change membrane structures themselves (dissolving, dividing or creating membranes).  Object selection and rule selection is a non- deterministic process.  Certain classes of membrane architectures have been shown to be equivalent to Turing Machines and thus are capable of any computation
  • 6. Department of Computer Science University of North Carolina at Wilmington The Hierarchical Structure of Membranes
  • 7. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation RAT RAT RAT RAT RAT H H H H H H O O O O O O O O H H H Al Al Al Al Al P P P P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH Inner membrane rules:
  • 8. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few iterations) RAT RAT RAT RAT RAT HH H HH H OO OO O O O O HH H Al Al AlP AlP Al P P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 9. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT HHO HHO HHO OO OO HHO HH AlP Al AlP AlP Al P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 10. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT PHHH OO OO PHHH HH AlP Al AlP AlP AlAlOOO P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 11. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT PHHH OO OO PHHH HH AlP Al AlP AlP AlAlOOO P Rule 1: H + H  HH Rule 2: O + O  OO Rule 3: 2HH + OO  2HHO Rule 4: Al + P  AlP Rule 5: 2AlP + 3HHO  AlAlOOO + 2PHHH Rule 6: PHHH  PHHH
  • 12. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) RAT RAT RAT RAT RAT H PHHH OO O O PHHH H Al Al AlP AlP AlAlOOO P P Rules for outer membrane PHHH is phosphine gas Highly Toxic!! PHHH + RAT  PHHH
  • 13. Department of Computer Science University of North Carolina at Wilmington An Example Membrane Computation (after a few more iterations) H PHHH OO O O PHHH H Al Al AlP AlP AlAlOOO P P Rules for outer membrane PHHH is phosphine gas Highly Toxic!! PHHH + RAT  PHHH
  • 14. Department of Computer Science University of North Carolina at Wilmington What is Cost-Based Abduction (CBA)? An attempt to find a proof with the lowest cost Reasoning under uncertainty NP-Hard
  • 15. Department of Computer Science University of North Carolina at Wilmington CBA  Abduction is the process of proceeding from data describing observations or events, to a set of hypotheses, which best explains or accounts for the data.  Employed in a variety of application domains including medical diagnostics, natural language processing, belief revision, and automated planning.  Cost-based abduction is a formalism in which  Evidence to be explained is treated as a goal to be proven,  Proofs have costs based on how much needs to be assumed to complete the proof, and  The set of assumptions needed to complete the least-cost proof are taken as the best explanation for the given evidence.
  • 16. Department of Computer Science University of North Carolina at Wilmington CBA, Formally Defined  A CBA system is a knowledge representation in which a given world situation is modeled as a 4-tuple K = (H,R, c, G), where  H is a set of hypotheses or propositions,  R is a set of rules of the form (hi1 ^ hi2 ^ : : : ^ hin)  hik , where hi1 ; : : : ; hin (called the antecedents) and hik (called the consequent) are all members of H,  c is a function c : H  +, where c(h) is called the assumability cost of hypothesis h  H and + denotes the positive reals,  G  H is called the goal set or the evidence.
  • 17. Department of Computer Science University of North Carolina at Wilmington CBA, An Informal Example (A  B)  G (C  D)  G (E  F)  C A: 50 B: 100 C:  D: 10 E: 30 F: 90 What’s the lowest cost proof?
  • 18. Department of Computer Science University of North Carolina at Wilmington Representing a CBA Solution As A String  A possible solution to a CBA problem may be represented as a string with each character (or bit) of the string indicating whether a particular hypothesis is true or false.  As an example, a 6-bit string 101110 would indicate  the hypotheses 1, 3, 4, and 5 are assumed  while hypotheses 2 and 6 are not.  The cost of the solution is then the sum of the cost of hypotheses 1, 3, 4, and 5.
  • 19. Department of Computer Science University of North Carolina at Wilmington Not All Strings Are Solutions; How Can We Fix Them?  A repair technique based on a type of stochastic local search.  If the hypotheses (represented by the string x) assumed are sufficient to prove the goal, then the fitness of the solution is made equal to the assumability cost of the hypotheses corresponding to the 1-bits of x and no further processing is needed.  Otherwise, we randomly choose a 0-bit in the x vector and assign it to 1. If the goal still cannot be proven, then we randomly choose another 0-bit and assign it to 1, until the goal is provable.  Repeat as necessary until the modified x is sufficient to prove the goal.
  • 20. Department of Computer Science University of North Carolina at Wilmington Retracting unnecessary assumptions  This process can of course result in many unnecessary hypotheses being assumed.  We, therefore, follow up this process with a simple 1- OPT optimization process.  We examine each of the 1-bits of the x vector: one by one and in a random order, each 1-bit is assigned to 0 and if the goal can still be proven, then it is retained as 0, otherwise it is set back to 1.
  • 21. Department of Computer Science University of North Carolina at Wilmington CBA inside of a Membrane General idea Generate some random hypotheses Repair them Throw away bad hypothesis Keep good hypotheses Breed good hypotheses
  • 22. Department of Computer Science University of North Carolina at Wilmington Repair Membranes  Each possible solution to the CBA problem is represented as a string with each bit of the string representing whether a particular hypothesis is assumed to be true or false.  Candidate solutions are placed in an inner (Repair) membrane.  To pass to the parent membrane, solutions must be repaired so that they actual prove the goal.
  • 23. Department of Computer Science University of North Carolina at Wilmington Breeding Membranes  Delete Rule: Grab a number of strings within the membrane (in our implementation that number is 7), determine the cost of each hypothesis and delete the lowest.  Crossing Rule: Grab a number of strings (3, for instance) and choose the one with the best score. Grab another 3 strings and choose the best. Do a point-wise cross of the two strings at a random point creating two children. Pass the children to the Repair sub-membrane.  Ascend Rule: Grab a number of strings (6), choose the one with the best score, and pass to parent membrane.
  • 24. Department of Computer Science University of North Carolina at Wilmington Breeding Membranes Can Be Arranged Hierarchically  Each membrane potentially could reach a local minima and obtain no further improvement. One enhancement to the model is to allow parent membranes to occasionally pass down one of its best solutions to a child. This feedback would then cause the child to splice its best solution with this new solution, starting a new cycle of splices and repairs.  Feedback Rule: Grab a number of hypotheses in the membrane (we chose 7), pick the best and send to a randomly chosen child membrane.
  • 25. Department of Computer Science University of North Carolina at Wilmington 101011011 10011011 100011 110011 111100 10011011 10011011 Repair Crossing Rule Child Repair Crossing Rule Child Repair Crossing Rule Repair Splice Child Repair 10011011 100011 110011 111100 Crossing Rule Repair Crossing Rule Outer Skin Parent Parent GrandParent Child Repair Crossing Rule Ascend Rule Feedback Rule Ascend Rule Ascend Rule Ascend Rule Ascend Rule Feedback Rule 10011011 10011011 110011 111001 101010 111100 001101 111110 Delete Rule 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100 10011011 100011 110011 111100
  • 26. Department of Computer Science University of North Carolina at Wilmington Lexxle’s ABC System  Our implementation of the membrane computer is accomplished using the Lexxle P-System/ABC System Toolkit by Lexxle, Inc. developed specifically for use on cluster computers.  Design and testing of the architecture is accomplished using a graphical user interface supported by the GridNexus software developed at the University of North Carolina Wilmington.
  • 27. Department of Computer Science University of North Carolina at Wilmington A Screenshot of Lexxle’s ABC System Interface
  • 28. Department of Computer Science University of North Carolina at Wilmington The CBA Problem Set Standard collection found at www.cbalib.org created by Dr. Abdelbar. Instance raa180 No. of hypotheses 300 No. of rules 900 No. of Assumable hypotheses 180 Rule depth max: 38, avg: 25.0 median: 27 Optimal solution cost 10,821 ILP CPU time (sec) 88,835
  • 29. Department of Computer Science University of North Carolina at Wilmington Experimental Results Some previous results Iterated local search (ILS) Repetitive simulated annealing (RSA), and A hybrid two-stage approach combining these two methods (ILS-RSA) Hierarchical particle swarm optimization technique (HPSO) Evolutionary algorithm (EA)
  • 30. Department of Computer Science University of North Carolina at Wilmington ILS, RSA, and ILS-RSA
  • 31. Department of Computer Science University of North Carolina at Wilmington HPSO and EA  Chivers et al. use a hierarchical particle swarm optimization technique (HPSO)  A mean score of 12,155 (89% of optimal) for raa180. The minimum score found out of 3,584 trials was 11,381 (95% of optimal).  Chivers et al. : An evolutionary algorithm (EA) which uses point-wise splicing as our method does.  Best results were reported with an initial population size of 100 with 1000 iterations for each trial.  The average solution was 11,574 (93.5% of optimal) with the best solution out of 543 trials being 11,374 (95% of optimal).
  • 32. Department of Computer Science University of North Carolina at Wilmington A 1-1-7-3 Membrane Computer Number of Iterations Mean Score Min Score % of the Optimum 100 12158 12011 89.00 200 11497 11100 94.12 300 11423 11330 94.73 400 11084 11019 97.62 500 11087 10972 97.60 600 11062 11019 97.82 700 11036 10977 98.05 800 11019 11019 98.20 900 11059 10994 97.85 1000 10929 10821 99.01
  • 33. Department of Computer Science University of North Carolina at Wilmington Different Topologies # of Iterations 1-1-20 1-2-10 1-4-5 1-3-7 1-10-2 100 12202 (88.7) 12103 (89.4) 11719 (92.3) 12158 (89.0) 11501 (94.1) 200 11581 (93.4) 11521 (93.9) 11438 (94.6) 11497 (94.1) 11366 (95.2) 300 11541 (93.8) 11194 (96.6) 11203 (96.6) 11423 (94.7) 11261 (96.1) 400 11132 (97.2) 11112 (97.4) 11189 (96.7) 11084 (97.6) 11153 (97.0) 500 11084 (97.6) 11052 (97.9) 11122 (97.3) 11087 (97.6) 11027 (98.1) 600 11024 (98.2) 11040 (98.0) 11129 (97.2) 11061 (97.8) 11048 (97.9) 700 11026 (98.1) 11022 (98.2) 11124 (97.3) 11036 (98.1) 11007 (98.3) 800 11066 (97.8) 11016 (98.2) 11150 (97.0) 11019 (98.2) 11036 (98.1) 900 11019 (98.2) 11008 (98.3) 11072 (97.7) 11058 (97.8) 11019 (98.2) 1000 11012 (98.3) 11007 (98.3) 11000 (98.4) 10929 (99.0) 10991 (98.5)
  • 34. Department of Computer Science University of North Carolina at Wilmington Different Topologies 0.88 0.9 0.92 0.94 0.96 0.98 1 100 600 1100 1600 1-4-5 1-2-10 1-10-2 1-1-20 1-7-3
  • 35. Department of Computer Science University of North Carolina at Wilmington Some Open Questions Efficient Parallelization of Membrane Computers Cluster computing environment Application to other domains Traveling Salesman N-queens Motif-finding (Bioinformatics)
  • 36. Department of Computer Science University of North Carolina at Wilmington Thank you! Your Questions?