-
Game-Theoretic Protection Adoption Against Networked SIS Epidemics
Authors:
Abhisek Satapathi,
Ashish R. Hota
Abstract:
In this paper, we investigate game-theoretic strategies for containing spreading processes on large-scale networks. Specifically, we consider the class of networked susceptible-infected-susceptible (SIS) epidemics where a large population of agents strategically choose whether to adopt partially effective protection. We define the utilities of the agents which depends on the degree of the agent, i…
▽ More
In this paper, we investigate game-theoretic strategies for containing spreading processes on large-scale networks. Specifically, we consider the class of networked susceptible-infected-susceptible (SIS) epidemics where a large population of agents strategically choose whether to adopt partially effective protection. We define the utilities of the agents which depends on the degree of the agent, its individual infection status and action, as well as the the overall prevalence of the epidemic and strategy profile of the entire population. We further present the coupled dynamics of epidemic evolution as well as strategy update which is assumed to follow the replicator dynamics. By relying on timescale separation arguments, we first derive the optimal strategy of protection adoption by the agents for a given epidemic state, and then present the reduced epidemic dynamics. The existence and uniqueness of endemic equilibrium is rigorously characterized and forms the main result of this paper. Finally, we present extensive numerical results to highlight the impacts of heterogeneous node degrees, infection rates, cost of protection adoption, and effectiveness of protection on the epidemic prevalence at the equilibrium.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Bayesian Persuasion for Containing SIS Epidemic with Asymptomatic Infection
Authors:
Ashish R. Hota,
Abhisek Satapathi,
Urmee Maitra
Abstract:
We investigate the strategic behavior of a large population of agents who decide whether to adopt a costly partially effective protection or remain unprotected against the susceptible-infected-susceptible epidemic. In contrast with most prior works on epidemic games, we assume that the agents are not aware of their true infection status while making decisions. We adopt the Bayesian persuasion fram…
▽ More
We investigate the strategic behavior of a large population of agents who decide whether to adopt a costly partially effective protection or remain unprotected against the susceptible-infected-susceptible epidemic. In contrast with most prior works on epidemic games, we assume that the agents are not aware of their true infection status while making decisions. We adopt the Bayesian persuasion framework where the agents receive a noisy signal regarding their true infection status, and maximize their expected utility computed using the posterior probability of being infected conditioned on the received signal. We completely characterize the stationary Nash equilibrium of this setting, and identify conditions under which partial information disclosure leads to a smaller proportion of infected individuals at the equilibrium compared to full information disclosure, and vice versa.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Data-Driven Robust Optimization for Energy-Aware and Safe Navigation of Electric Vehicles
Authors:
Simran Kumari,
Ashish R. Hota,
Siddhartha Mukhopadhyay
Abstract:
In this paper, we simultaneously tackle the problem of energy optimal and safe navigation of electric vehicles in a data-driven robust optimization framework. We consider a dynamic model of the electric vehicle which includes kinematic variables in both inertial and body coordinate systems in order to capture both longitudinal and lateral motion as well as state-of-energy of the battery. We levera…
▽ More
In this paper, we simultaneously tackle the problem of energy optimal and safe navigation of electric vehicles in a data-driven robust optimization framework. We consider a dynamic model of the electric vehicle which includes kinematic variables in both inertial and body coordinate systems in order to capture both longitudinal and lateral motion as well as state-of-energy of the battery. We leverage past data of obstacle motion to construct a future occupancy set with probabilistic guarantees, and formulate robust collision avoidance constraints with respect to such an occupancy set using convex programming duality. Consequently, we present the finite horizon optimal control problem subject to robust collision avoidance constraints while penalizing resulting energy consumption. Finally, we show the effectiveness of the proposed approach in reducing energy consumption and ensuring safe navigation via extensive simulations involving curved roads and multiple obstacles.
△ Less
Submitted 22 July, 2023; v1 submitted 25 April, 2023;
originally announced April 2023.
-
Generalized Gradient Flows with Provable Fixed-Time Convergence and Fast Evasion of Non-Degenerate Saddle Points
Authors:
Mayank Baranwal,
Param Budhraja,
Vishal Raj,
Ashish R. Hota
Abstract:
Gradient-based first-order convex optimization algorithms find widespread applicability in a variety of domains, including machine learning tasks. Motivated by the recent advances in fixed-time stability theory of continuous-time dynamical systems, we introduce a generalized framework for designing accelerated optimization algorithms with strongest convergence guarantees that further extend to a s…
▽ More
Gradient-based first-order convex optimization algorithms find widespread applicability in a variety of domains, including machine learning tasks. Motivated by the recent advances in fixed-time stability theory of continuous-time dynamical systems, we introduce a generalized framework for designing accelerated optimization algorithms with strongest convergence guarantees that further extend to a subclass of non-convex functions. In particular, we introduce the GenFlow algorithm and its momentum variant that provably converge to the optimal solution of objective functions satisfying the Polyak-Łojasiewicz (PL) inequality in a fixed time. Moreover, for functions that admit non-degenerate saddle-points, we show that for the proposed GenFlow algorithm, the time required to evade these saddle-points is uniformly bounded for all initial conditions. Finally, for strongly convex-strongly concave minimax problems whose optimal solution is a saddle point, a similar scheme is shown to arrive at the optimal solution again in a fixed time. The superior convergence properties of our algorithm are validated experimentally on a variety of benchmark datasets.
△ Less
Submitted 22 October, 2023; v1 submitted 7 December, 2022;
originally announced December 2022.
-
Data-Driven Risk-sensitive Model Predictive Control for Safe Navigation in Multi-Robot Systems
Authors:
Atharva Navsalkar,
Ashish R. Hota
Abstract:
Safe navigation is a fundamental challenge in multi-robot systems due to the uncertainty surrounding the future trajectory of the robots that act as obstacles for each other. In this work, we propose a principled data-driven approach where each robot repeatedly solves a finite horizon optimization problem subject to collision avoidance constraints with latter being formulated as distributionally r…
▽ More
Safe navigation is a fundamental challenge in multi-robot systems due to the uncertainty surrounding the future trajectory of the robots that act as obstacles for each other. In this work, we propose a principled data-driven approach where each robot repeatedly solves a finite horizon optimization problem subject to collision avoidance constraints with latter being formulated as distributionally robust conditional value-at-risk (CVaR) of the distance between the agent and a polyhedral obstacle geometry. Specifically, the CVaR constraints are required to hold for all distributions that are close to the empirical distribution constructed from observed samples of prediction error collected during execution. The generality of the approach allows us to robustify against prediction errors that arise under commonly imposed assumptions in both distributed and decentralized settings. We derive tractable finite-dimensional approximations of this class of constraints by leveraging convex and minmax duality results for Wasserstein distributionally robust optimization problems. The effectiveness of the proposed approach is illustrated in a multi-drone navigation setting implemented in Gazebo platform.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Coupled Evolutionary Behavioral and Disease Dynamics under Reinfection Risk
Authors:
Abhisek Satapathi,
Narendra Kumar Dhar,
Ashish R. Hota,
Vaibhav Srivastava
Abstract:
We study the interplay between epidemic dynamics and human decision making for epidemics that involve reinfection risk; in particular, the susceptible-infected-susceptible (SIS) and the susceptible-infected-recovered-infected (SIRI) epidemic models. In the proposed game-theoretic setting, individuals choose whether to adopt protection or not based on the trade-off between the cost of adopting prot…
▽ More
We study the interplay between epidemic dynamics and human decision making for epidemics that involve reinfection risk; in particular, the susceptible-infected-susceptible (SIS) and the susceptible-infected-recovered-infected (SIRI) epidemic models. In the proposed game-theoretic setting, individuals choose whether to adopt protection or not based on the trade-off between the cost of adopting protection and the risk of infection; the latter depends on the current prevalence of the epidemic and the fraction of individuals who adopt protection in the entire population. We define the coupled epidemic-behavioral dynamics by modeling the evolution of individual protection adoption behavior according to the replicator dynamics. For the SIS epidemic, we fully characterize the equilibria and their stability properties. We further analyze the coupled dynamics under timescale separation when individual behavior evolves faster than the epidemic, and characterize the equilibria of the resulting discontinuous hybrid dynamical system for both SIS and SIRI models. Numerical results illustrate how the coupled dynamics exhibits oscillatory behavior and convergence to sliding mode solutions under suitable parameter regimes.
△ Less
Submitted 29 May, 2023; v1 submitted 15 September, 2022;
originally announced September 2022.
-
Epidemic Propagation under Evolutionary Behavioral Dynamics: Stability and Bifurcation Analysis
Authors:
Abhisek Satapathi,
Narendra Kumar Dhar,
Ashish R. Hota,
Vaibhav Srivastava
Abstract:
We consider the class of SIS epidemic models in which a large population of individuals chooses whether to adopt protection or to remain unprotected as the epidemic evolves. For a susceptible individual, adopting protection reduces the probability of becoming infected but it comes with a cost that is weighed with the instantaneous risk of becoming infected. An infected individual adopting protecti…
▽ More
We consider the class of SIS epidemic models in which a large population of individuals chooses whether to adopt protection or to remain unprotected as the epidemic evolves. For a susceptible individual, adopting protection reduces the probability of becoming infected but it comes with a cost that is weighed with the instantaneous risk of becoming infected. An infected individual adopting protection transmits a new infection with a smaller probability compared to an unprotected infected individual. We focus on the replicator evolutionary dynamics to model the evolution of protection decisions by susceptible and infected subpopulations. We completely characterize the existence and local stability of the equilibria of the resulting coupled epidemic and replicator dynamics. We further show how the stability of different equilibrium points gets exchanged as certain parameters change. Finally, we investigate the system behavior under timescale separation between the epidemic and the evolutionary dynamics.
△ Less
Submitted 19 March, 2022;
originally announced March 2022.
-
A Dynamic Population Model of Strategic Interaction and Migration under Epidemic Risk
Authors:
Ezzat Elokda,
Saverio Bolognani,
Ashish R. Hota
Abstract:
In this paper, we show how a dynamic population game can model the strategic interaction and migration decisions made by a large population of agents in response to epidemic prevalence. Specifically, we consider a modified susceptible-asymptomatic-infected-recovered (SAIR) epidemic model over multiple zones. Agents choose whether to activate (i.e., interact with others), how many other agents to i…
▽ More
In this paper, we show how a dynamic population game can model the strategic interaction and migration decisions made by a large population of agents in response to epidemic prevalence. Specifically, we consider a modified susceptible-asymptomatic-infected-recovered (SAIR) epidemic model over multiple zones. Agents choose whether to activate (i.e., interact with others), how many other agents to interact with, and which zone to move to in a time-scale which is comparable with the epidemic evolution. We define and analyze the notion of equilibrium in this game, and investigate the transient behavior of the epidemic spread in a range of numerical case studies, providing insights on the effects of the agents' degree of future awareness, strategic migration decisions, as well as different levels of lockdown and other interventions. One of our key findings is that the strategic behavior of agents plays an important role in the progression of the epidemic and can be exploited in order to design suitable epidemic control measures.
△ Less
Submitted 7 September, 2021;
originally announced September 2021.
-
Optimization Based Collision Avoidance for Multi-Agent DynamicalSystems in Goal Reaching Task
Authors:
Adarsh Patnaik,
Ashish Ranjan Hota
Abstract:
This work presents a distributed MPC-based approach to solving the problem of multi-agent point-to-point transition with optimization-based collision avoidance. The problem is formulated, motivated by the work on collision avoidance for multi-agent systems and dynamic obstacles. With modifications to the formulation, the problem is converted into a distributed problem with a separable objective an…
▽ More
This work presents a distributed MPC-based approach to solving the problem of multi-agent point-to-point transition with optimization-based collision avoidance. The problem is formulated, motivated by the work on collision avoidance for multi-agent systems and dynamic obstacles. With modifications to the formulation, the problem is converted into a distributed problem with a separable objective and coupled constraints. The problem is divided into local sub-problems and solved using Alternating Directions Method of Multipliers(ADMM) applied on an augmented local lagrangian objective.This work aims to understand the multi-agent point-to-point transition problem as an extension of optimization-based collision avoidance and analyze the aspects of computational times, reliability, and optimality of the solution obtained.
△ Less
Submitted 3 August, 2021;
originally announced August 2021.
-
A Generalized SIS Epidemic Model on Temporal Networks with Asymptomatic Carriers and Comments on Decay Ratio
Authors:
Ashish R. Hota,
Kavish Gupta
Abstract:
We study the class of SIS epidemics on temporal networks and propose a new activity-driven and adaptive epidemic model that captures the impact of asymptomatic and infectious individuals in the network. In the proposed model, referred to as the A-SIYS epidemic, each node can be in three possible states: susceptible, infected without symptoms or asymptomatic and infected with symptoms or symptomati…
▽ More
We study the class of SIS epidemics on temporal networks and propose a new activity-driven and adaptive epidemic model that captures the impact of asymptomatic and infectious individuals in the network. In the proposed model, referred to as the A-SIYS epidemic, each node can be in three possible states: susceptible, infected without symptoms or asymptomatic and infected with symptoms or symptomatic. Both asymptomatic and symptomatic individuals are infectious. We show that the proposed A-SIYS epidemic captures several well-established epidemic models as special cases and obtain sufficient conditions under which the disease gets eradicated by resorting to mean-field approximations.
In addition, we highlight a potential inaccuracy in the derivation of the upper bound on the decay ratio in the activity-driven adaptive SIS (A-SIS) model in (Ogura et. al., 2019) and present a more general version of their result. We numerically illustrate the evolution of the fraction of infected nodes in the A-SIS epidemic model and show that the bound in (Ogura et. al., 2019) often fails to capture the behavior of the epidemic in contrast with our results.
△ Less
Submitted 26 July, 2020;
originally announced August 2020.
-
A Closed-Loop Framework for Inference, Prediction and Control of SIR Epidemics on Networks
Authors:
Ashish R. Hota,
Jaydeep Godbole,
Philip E Paré
Abstract:
Motivated by the ongoing pandemic COVID-19, we propose a closed-loop framework that combines inference from testing data, learning the parameters of the dynamics and optimal resource allocation for controlling the spread of the susceptible-infected-recovered (SIR) epidemic on networks. Our framework incorporates several key factors present in testing data, such as the fact that high risk individua…
▽ More
Motivated by the ongoing pandemic COVID-19, we propose a closed-loop framework that combines inference from testing data, learning the parameters of the dynamics and optimal resource allocation for controlling the spread of the susceptible-infected-recovered (SIR) epidemic on networks. Our framework incorporates several key factors present in testing data, such as the fact that high risk individuals are more likely to undergo testing. We then present two tractable optimization problems to evaluate the trade-off between controlling the growth-rate of the epidemic and the cost of non-pharmaceutical interventions (NPIs). We illustrate the significance of the proposed closed-loop framework via extensive simulations and analysis of real, publicly-available testing data for COVID-19. Our results illustrate the significance of early testing and the emergence of a second wave of infections if NPIs are prematurely withdrawn.
△ Less
Submitted 25 April, 2021; v1 submitted 23 June, 2020;
originally announced June 2020.
-
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
Authors:
Mustafa Abdallah,
Parinaz Naghizadeh,
Ashish R. Hota,
Timothy Cason,
Saurabh Bagchi,
Shreyas Sundaram
Abstract:
We consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associ…
▽ More
We consider a system consisting of multiple interdependent assets, and a set of defenders, each responsible for securing a subset of the assets against an attacker. The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter asset. Each edge has an associated probability of successful attack, which can be reduced via security investments by the defenders. In such scenarios, we investigate the security investments that arise under certain features of human decision-making that have been identified in behavioral economics. In particular, humans have been shown to perceive probabilities in a nonlinear manner, typically overweighting low probabilities and underweighting high probabilities. We show that suboptimal investments can arise under such weighting in certain network topologies. We also show that pure strategy Nash equilibria exist in settings with multiple (behavioral) defenders, and study the inefficiency of the equilibrium investments by behavioral defenders compared to a centralized socially optimal solution.
△ Less
Submitted 9 May, 2020; v1 submitted 9 January, 2020;
originally announced January 2020.
-
Game-Theoretic Choice of Curing Rates Against Networked SIS Epidemics by Human Decision-Makers
Authors:
Ashish R. Hota,
Shreyas Sundaram
Abstract:
We study networks of human decision-makers who independently decide how to protect themselves against Susceptible-Infected-Susceptible (SIS) epidemics. Motivated by studies in behavioral economics showing that humans perceive probabilities in a nonlinear fashion, we examine the impacts of such misperceptions on the equilibrium protection strategies. In our setting, nodes choose their curing rates…
▽ More
We study networks of human decision-makers who independently decide how to protect themselves against Susceptible-Infected-Susceptible (SIS) epidemics. Motivated by studies in behavioral economics showing that humans perceive probabilities in a nonlinear fashion, we examine the impacts of such misperceptions on the equilibrium protection strategies. In our setting, nodes choose their curing rates to minimize the infection probability under the degree-based mean-field approximation of the SIS epidemic plus the cost of their selected curing rate. We establish the existence of a degree based equilibrium under both true and nonlinear perceptions of infection probabilities (under suitable assumptions). When the per-unit cost of curing rate is sufficiently high, we show that true expectation minimizers choose the curing rate to be zero at the equilibrium, while curing rate is nonzero under nonlinear probability weighting.
△ Less
Submitted 1 October, 2018;
originally announced October 2018.
-
Controlling Human Utilization of Failure-Prone Systems via Taxes
Authors:
Ashish R. Hota,
Shreyas Sundaram
Abstract:
We consider a game-theoretic model where individuals compete over a shared failure-prone system or resource. We investigate the effectiveness of a taxation mechanism in controlling the utilization of the resource at the Nash equilibrium when the decision-makers have behavioral risk preferences, captured by prospect theory. We first observe that heterogeneous prospect-theoretic risk preferences can…
▽ More
We consider a game-theoretic model where individuals compete over a shared failure-prone system or resource. We investigate the effectiveness of a taxation mechanism in controlling the utilization of the resource at the Nash equilibrium when the decision-makers have behavioral risk preferences, captured by prospect theory. We first observe that heterogeneous prospect-theoretic risk preferences can lead to counter-intuitive outcomes. In particular, for resources that exhibit network effects, utilization can increase under taxation and there may not exist a tax rate that achieves the socially optimal level of utilization. We identify conditions under which utilization is monotone and continuous, and then characterize the range of utilizations that can be achieved by a suitable choice of tax rate. We further show that resource utilization is higher when players are charged differentiated tax rates compared to the case when all players are charged an identical tax rate, under suitable assumptions.
△ Less
Submitted 7 April, 2020; v1 submitted 26 February, 2018;
originally announced February 2018.
-
Game-Theoretic Vaccination Against Networked SIS Epidemics and Impacts of Human Decision-Making
Authors:
Ashish R. Hota,
Shreyas Sundaram
Abstract:
We study decentralized protection strategies against Susceptible-Infected-Susceptible (SIS) epidemics on networks. We consider a population game framework where nodes choose whether or not to vaccinate themselves, and the epidemic risk is defined as the infection probability at the endemic state of the epidemic under a degree-based mean-field approximation. Motivated by studies in behavioral econo…
▽ More
We study decentralized protection strategies against Susceptible-Infected-Susceptible (SIS) epidemics on networks. We consider a population game framework where nodes choose whether or not to vaccinate themselves, and the epidemic risk is defined as the infection probability at the endemic state of the epidemic under a degree-based mean-field approximation. Motivated by studies in behavioral economics showing that humans perceive probabilities and risks in a nonlinear fashion, we specifically examine the impacts of such misperceptions on the Nash equilibrium protection strategies. We first establish the existence and uniqueness of a threshold equilibrium where nodes with degrees larger than a certain threshold vaccinate. When the vaccination cost is sufficiently high, we show that behavioral biases cause fewer players to vaccinate, and vice versa. We quantify this effect for a class of networks with power-law degree distributions by proving tight bounds on the ratio of equilibrium thresholds under behavioral and true perceptions of probabilities. We further characterize the socially optimal vaccination policy and investigate the inefficiency of Nash equilibrium.
△ Less
Submitted 2 March, 2019; v1 submitted 25 March, 2017;
originally announced March 2017.
-
Interdependent Security Games on Networks under Behavioral Probability Weighting
Authors:
Ashish R. Hota,
Shreyas Sundaram
Abstract:
We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a node is a function of her own investment and the investment by her neighbors in the network. Most of the existing work in these settings considers players who are risk-neutral. In contrast, studies in behavioral decision theory ha…
▽ More
We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a node is a function of her own investment and the investment by her neighbors in the network. Most of the existing work in these settings considers players who are risk-neutral. In contrast, studies in behavioral decision theory have shown that individuals often deviate from risk-neutral behavior while making decisions under uncertainty. In particular, the true probabilities associated with uncertain outcomes are often transformed into perceived probabilities in a highly nonlinear fashion by the users, which then influence their decisions. In this paper, we investigate the effects of such behavioral probability weightings by the nodes on their optimal investment strategies and the resulting security risk profiles that arise at the Nash equilibria of interdependent network security games. We characterize graph topologies that achieve the largest and smallest worst case average attack probabilities at Nash equilibria in Total Effort games, and equilibrium investments in Weakest Link and Best Shot games.
△ Less
Submitted 12 August, 2016; v1 submitted 30 October, 2015;
originally announced October 2015.
-
Fragility of the Commons under Prospect-Theoretic Risk Attitudes
Authors:
Ashish R. Hota,
Siddharth Garg,
Shreyas Sundaram
Abstract:
We study a common-pool resource game where the resource experiences failure with a probability that grows with the aggregate investment in the resource. To capture decision making under such uncertainty, we model each player's risk preference according to the value function from prospect theory. We show the existence and uniqueness of a pure Nash equilibrium when the players have heterogeneous ris…
▽ More
We study a common-pool resource game where the resource experiences failure with a probability that grows with the aggregate investment in the resource. To capture decision making under such uncertainty, we model each player's risk preference according to the value function from prospect theory. We show the existence and uniqueness of a pure Nash equilibrium when the players have heterogeneous risk preferences and under certain assumptions on the rate of return and failure probability of the resource. Greater competition, vis-a-vis the number of players, increases the failure probability at the Nash equilibrium; we quantify this effect by obtaining bounds on the ratio of the failure probability at the Nash equilibrium to the failure probability under investment by a single user. We further show that heterogeneity in attitudes towards loss aversion leads to higher failure probability of the resource at the equilibrium.
△ Less
Submitted 30 June, 2016; v1 submitted 25 August, 2014;
originally announced August 2014.
-
Ant Colony Optimization and Hypergraph Covering Problems
Authors:
Ankit Pat,
Ashish Ranjan Hota
Abstract:
Ant Colony Optimization (ACO) is a very popular metaheuristic for solving computationally hard combinatorial optimization problems. Runtime analysis of ACO with respect to various pseudo-boolean functions and different graph based combinatorial optimization problems has been taken up in recent years. In this paper, we investigate the runtime behavior of an MMAS*(Max-Min Ant System) ACO algorithm o…
▽ More
Ant Colony Optimization (ACO) is a very popular metaheuristic for solving computationally hard combinatorial optimization problems. Runtime analysis of ACO with respect to various pseudo-boolean functions and different graph based combinatorial optimization problems has been taken up in recent years. In this paper, we investigate the runtime behavior of an MMAS*(Max-Min Ant System) ACO algorithm on some well known hypergraph covering problems that are NP-Hard. In particular, we have addressed the Minimum Edge Cover problem, the Minimum Vertex Cover problem and the Maximum Weak- Independent Set problem. The influence of pheromone values and heuristic information on the running time is analysed. The results indicate that the heuristic information has greater impact towards improving the expected optimization time as compared to pheromone values. For certain instances of hypergraphs, we show that the MMAS* algorithm gives a constant order expected optimization time when the dominance of heuristic information is suitably increased.
△ Less
Submitted 29 December, 2013; v1 submitted 14 May, 2011;
originally announced May 2011.
-
An Adaptive Quantum-inspired Differential Evolution Algorithm for 0-1 Knapsack Problem
Authors:
Ashish Ranjan Hota,
Ankit Pat
Abstract:
Differential evolution (DE) is a population based evolutionary algorithm widely used for solving multidimensional global optimization problems over continuous spaces. However, the design of its operators makes it unsuitable for many real-life constrained combinatorial optimization problems which operate on binary space. On the other hand, the quantum inspired evolutionary algorithm (QEA) is very w…
▽ More
Differential evolution (DE) is a population based evolutionary algorithm widely used for solving multidimensional global optimization problems over continuous spaces. However, the design of its operators makes it unsuitable for many real-life constrained combinatorial optimization problems which operate on binary space. On the other hand, the quantum inspired evolutionary algorithm (QEA) is very well suitable for handling such problems by applying several quantum computing techniques such as Q-bit representation and rotation gate operator, etc. This paper extends the concept of differential operators with adaptive parameter control to the quantum paradigm and proposes the adaptive quantum-inspired differential evolution algorithm (AQDE). The performance of AQDE is found to be significantly superior as compared to QEA and a discrete version of DE on the standard 0-1 knapsack problem for all the considered test cases.
△ Less
Submitted 1 January, 2011;
originally announced January 2011.
-
Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks
Authors:
Sisir Koppaka,
Ashish Ranjan Hota
Abstract:
This paper extends the analogies employed in the development of quantum-inspired evolutionary algorithms by proposing quantum-inspired Hadamard walks, called QHW. A novel quantum-inspired evolutionary algorithm, called HQEA, for solving combinatorial optimization problems, is also proposed. The novelty of HQEA lies in it's incorporation of QHW Remote Search and QHW Local Search - the quantum equiv…
▽ More
This paper extends the analogies employed in the development of quantum-inspired evolutionary algorithms by proposing quantum-inspired Hadamard walks, called QHW. A novel quantum-inspired evolutionary algorithm, called HQEA, for solving combinatorial optimization problems, is also proposed. The novelty of HQEA lies in it's incorporation of QHW Remote Search and QHW Local Search - the quantum equivalents of classical mutation and local search, that this paper defines. The intuitive reasoning behind this approach, and the exploration-exploitation balance thus occurring is explained. From the results of the experiments carried out on the 0,1-knapsack problem, HQEA performs significantly better than a conventional genetic algorithm, CGA, and two quantum-inspired evolutionary algorithms - QEA and NQEA, in terms of convergence speed and accuracy.
△ Less
Submitted 4 April, 2010;
originally announced April 2010.