computational intelligence - download.e-bookshelf.de fileda universidade de sao paulo departamento...

22
Computational Intelligence

Upload: vohanh

Post on 08-Feb-2019

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

Computational Intelligence

Page 2: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

ComputationalIntelligence

for Engineering and Manufacturing

Edited by

Diego AndinaTechnical University of Madrid (UPM), Spain

Duc Truong PhamManufacturing Engineering Center, Cardiff University, Cardiff

Page 3: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

A C.I.P. Catalogue record for this book is available from the Library of Congress.

ISBN-10 0-387-37450-7 (HB)ISBN-13 978-0-387-37450-5 (HB)ISBN-10 0-387-37452-3 (e-book)ISBN-13 978-0-387-37452-9 (e-book)

Published by Springer,P.O. Box 17, 3300 AA Dordrecht, The Netherlands.

www.springer.com

Printed on acid-free paper

All Rights Reserved© 2007 SpringerNo part of this work may be reproduced, stored in a retrieval system, or transmittedin any form or by any means, electronic, mechanical, photocopying, microfilming, recordingor otherwise, without written permission from the Publisher, with the exceptionof any material supplied specifically for the purpose of being enteredand executed on a computer system, for exclusive use by the purchaser of the work.

Page 4: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

This book is dedicated to thememory of

Roberto Carranza E., whoinduced the authors the

enthusiasm to jointly preparethis book.

Page 5: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

CONTENTS

Contributing Authors ix

Preface xi

Acknowledgements xiii

1. Soft Computing and its Applications in Engineering and Manufacture 1D. T. Pham, P. T. N. Pham, M. S. Packianather, A. A. Afify

2. Neural Networks Historical Review 39D. Andina, A. Vega-Corona, J. I. Seijas,J. Torres-García

3. Artificial Neural Networks 67D. T. Pham, M. S. Packianather, A. A. Afify

4. Application of Neural Networks 93D. Andina, A. Vega-Corona, J. I. Seijas,M. J. Alarcón

5. Radial Basis Function Networks and their Applicationin Communication Systems 109Ascensión Gallardo Antolín, Juan Pascual García,José Luis Sancho Gómez

6. Biological Clues for Up-to-Date Artificial Neurons 131Javier Ropero Peláez, Jose Roberto Castillo Piqueira

7. Support Vector Machines 147Jaime Gómez Sáenz de Tejada, Juan Seijas Martínez-Echevarría

8. Fractals as Pre-Processing Tool for Computational IntelligenceApplication 193Ana M. Tarquis, Valeriano Méndez, Juan B. Grau, José M. Antón,Diego Andina

vii

Page 6: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

CONTRIBUTING AUTHORS

D. Andina, J. I. Seijas, J. Torres-García, M. J. Alarcón, A. Tarquis, J. B. Grauand J. M. Antón work for Technical University of Madrid (UPM), Spain, wherethey form the Group for Automation and Soft Computing (GASC).

D. T. Pham, P. T. N. Pham, M. S. Packianather and A. A. Afify work for CardiffUniversity .

Javier Ropero Peláez, José Roberto Castillo Piqueira work for Escola Politecnicada Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoese Controle, Brazil.

A. Gallardo Antolín, J. Pascual García and J. L. Sancho Gómez work forUniversity Carlos III of Madrid, Spain,

A. Vega-Corona, V. Méndez and J. Gómez Sáenz de Tejada work for Universityof Guanajuato, Mexico, Technical University of Madrid and Universidad Autónomaof Madrid, Spain, respectively.

ix

Page 7: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

PREFACE

This book presents a selected collection of contributions on a focused treatmentof important elements of Computational Intelligence. Unlike traditional comput-ing, Computational Intelligence (CI) is tolerant of imprecise information, partialtruth and uncertainty. The principle components of CI that currently have frequentapplication in Engineering and Manufacturing are: Neural Networks (NN), fuzzylogic (FL) and Support Vector Machines (SVM). In CI, NN and SVM are concernedwith learning, while FL with imprecision and reasoning.

This volume mainly covers a key element of Computational Intelligence∗

learning. All the contributions in this volume have a direct relevance to neuralnetwork learning∗ from neural computing fundamentals to advanced networks suchas Multilayer Perceptrons (MLP), Radial Basis Function Networks (RBF), and theirrelations with fuzzy set and support vector machines theory. The book also dis-cusses different applications in Engineering and Manufacturing. These are amongapplications where CI have excellent potentials for use.

Both novice and expert readers should find this book a useful reference in the fieldof Computational Intelligence. The editors and the authors hope to have contributedto the field by paving the way for learning paradigms to solve real-world problems

D. Andina

xi

Page 8: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

ACKNOWLEDGEMENTS

This document has been produced with the financial assistance of the EuropeanCommunity, ALFA project II-0026-FA. The views expressed herein are those ofthe Authors and can therefore in no way be taken to reflect the official opinion ofthe European Community.

The editors wish to thank Dr A. Afify of Cardiff University and Mr A. Jevtic ofthe Technical University of Madrid for their support and helpful comments duringthe revision of this text.

The editors also wish to thank Nagib Callaos, President of the InternationalInstitute of Informatics and Systemics, IIIS, for his permission and freedom toreproduce in Chapters 2 and 4 of this book contents from the book by D.Andinaand F.Ballesteros (Eds), “Recent Advances in Neural Networks” Ed. IIIS press,ILL, USA (2000).

xiii

Page 9: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

CHAPTER 1

SOFT COMPUTING AND ITS APPLICATIONSIN ENGINEERING AND MANUFACTURE

D. T. PHAM, P. T. N. PHAM, M. S. PACKIANATHER, A. A. AFIFYManufacturing Engineering Centre, Cardiff University, Cardiff CF24 3AA, United Kingdom

INTRODUCTION

Soft computing is a recent term for a computing paradigm that has been in existencefor almost fifty years. This chapter reviews five soft computing tools. They are:knowledge-based systems, fuzzy logic, inductive learning, neural networks andgenetic algorithms. All of these tools have found many practical applications.Examples of applications in engineering and manufacture will be given in thechapter.

1. KNOWLEDGE-BASED SYSTEMS

Knowledge-based systems, or expert systems, are computer programs embodyingknowledge about a narrow domain for solving problems related to that domain.An expert system usually comprises two main elements, a knowledge base and aninference mechanism. The knowledge base contains domain knowledge which maybe expressed as any combination of “IF-THEN” rules, factual statements (or asser-tions), frames, objects, procedures and cases. The inference mechanism is that partof an expert system which manipulates the stored knowledge to produce solutionsto problems. Knowledge manipulation methods include the use of inheritance andconstraints (in a frame-based or object-oriented expert system), the retrieval andadaptation of case examples (in a case-based expert system) and the application ofinference rules such as modus ponens (If A Then B; A Therefore B) and modustollens (If A Then B; NOT B Therefore NOT A) according to “forward chaining” or“backward chaining” control procedures and “depth-first” or “breadth-first” searchstrategies (in a rule-based expert system). With forward chaining or data-driveninferencing, the system tries to match available facts with the IF portion of the

1

D. Andina and D.T. Pham (eds.), Computational Intelligence, 1–38.© 2007 Springer.

Page 10: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

2 CHAPTER 1

IF-THEN rules in the knowledge base. When matching rules are found, one of themis “fired”, i.e. its THEN part is made true, generating new facts and data which inturn causes other rules to “fire”. Reasoning stops when no more new rules can fire.In backward chaining or goal-driven inferencing, a goal to be proved is specified.If the goal cannot be immediately satisfied by existing facts in the knowledge base,the system will examine the IF-THEN rules for rules with the goal in their THENportion. Next, the system will determine whether there are facts that can cause anyof those rules to fire. If such facts are not available they are set up as subgoals.The process continues recursively until either all the required facts are found andthe goal is proved or any one of the subgoals cannot be satisfied, in which casethe original goal is disproved. Both control procedures are illustrated in Figure 1.Figure 1a shows how, given the assertion that a lathe is a machine tool and a set ofrules concerning machine tools, a forward-chaining system will generate additionalassertions such as “a lathe is power driven” and “a lathe has a tool holder”. Figure 1bdetails the backward-chaining sequence producing the answer to the query “does alathe require a power source?”.

In the forward chaining example of Figure 1a, both rules R2 and R3 simulta-neously qualify for firing when inferencing starts as both their IF parts match thepresented fact F1. Conflict resolution has to be performed by the expert system todecide which rule should fire. The conflict resolution method adopted in this exam-ple is “first come, first served”: R2 fires as it is the first qualifying rule encountered.Other conflict resolution methods include “priority”, “specificity” and “recency”.

The search strategies can also be illustrated using the forward chaining example ofFigure 1a. Suppose that, in addition to F1, the knowledge base also initially containsthe assertion “a CNC turning centre is a machine tool”. Depth-first search involvesfiring rules R2 and R3 with X instantiated to “lathe” (as shown in Figure 1a) beforefiring them again with X instantiated to “CNC turning centre”. Breadth-first searchwill activate rule R2 with X instantiated to “lathe” and again with X instantiated to“CNC turning centre”, followed by rule R3 and the same sequence of instantiations.Breadth-first search finds the shortest line of inferencing between a start positionand a solution if it exists. When guided by heuristics to select the correct searchpath, depth-first search might produce a solution more quickly, although the searchmight not terminate if the search space is infinite [Jackson, 1999].

For more information on the technology of expert systems, see [Pham and Pham,1988; Durkin, 1994; Giarratano and Riley, 1998; Darlington, 1999; Jackson, 1999;Badiru and Cheung, 2002; Nurminen et al., 2003].

Most expert systems are nowadays developed using programs known as “shells”.These are essentially ready-made expert systems complete with inferencing andknowledge storage facilities but without the domain knowledge. Some sophisticatedexpert systems are constructed with the help of “development environments”. Thelatter are more flexible than shells in that they also provide means for users toimplement their own inferencing and knowledge representation methods. Moredetails on expert systems shells and development environments can be found in[Price, 1990].

Page 11: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

SOFT COMPUTING AND ITS APPLICATIONS IN ENGINEERING AND MANUFACTURE 3

KNOWLEDGE BASE (Initial State)

Fact : F1 - A lathe is a machine tool

Fact : F1 - A lathe is a machine tool F2 - A lathe has a tool holder

Rules : R1 - If X is power driven Then X requires a power source R2 - If X is a machine tool Then X has a tool holder R3 - If X is a machine tool Then X is power driven

F1 & R2 match

KNOWLEDGE BASE (Intermediate State)

Rules : R1 - If X is power driven Then X requires a power source R2 - If X is a machine tool Then X has a tool holder R3 - If X is a machine tool Then X is power driven

F1 & R3 match

F3 & R1 match

KNOWLEDGE BASE (Intermediate State)

Fact : F1 - A lathe is a machine tool F2 - A lathe has a tool holder F3 - A lathe is power driven

Rules : R1 - If X is power driven Then X requires a power source R2 - If X is a machine tool Then X has a tool holder R3 - If X is a machine tool Then X is power driven

KNOWLEDGE BASE (Final State)

Fact : F1 - A lathe is a machine tool F2 - A lathe has a tool holder F3 - A lathe is power driven F4 - A lathe requires a power sourceRules : R1 - If X is power driven Then X requires a power source R2 - If X is a machine tool Then X has a tool holder R3 - If X is a machine tool Then X is power driven

Figure 1a. An example of forward chaining

Page 12: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

4 CHAPTER 1

G1 - A lathe requires a power source

G1 - A lathe requires a power sourceGoal :

F1 & R3

F2 & R1

G2 & R3

G1 & R1

KNOWLEDGE BASE(Intermediate State)

Fact : Fact :

Fact :

Goal : Satisfied?

G2 - A lathe is a power driven ?

KNOWLEDGE BASE(Initial State)

Rules :

Rules :

GOAL STACK

GOAL STACK

GOAL STACK

Goal : SatisfiedG1 - A lathe requires a power source ?

Goal : Satisfied

Goal :

Yes

GOAL STACK

? ? Yes

Goal :Satisfied Satisfied

G2 - A lathe is a power driven ? G3 - A lathe is a machine tool G3 - A lathe is a machine tool ?

KNOWLEDGE BASE KNOWLEDGE BASE

KNOWLEDGE BASE

(Final State) KNOWLEDGE BASE

? G1 - A lathe requires a power source G2 - A lathe is a power driven

GOAL STACK

G1 - A lathe requires a power source G2 - A lathe is a power driven

? Yes

G1 - A lathe requires a power source

(Intermediate State) (Intermediate State)

GOAL STACK

(Intermediate State)

Satisfied

F1 -A lathe is a machine tool F1 -A lathe is a machine tool

F1 -A lathe is a machine tool F1 -A lathe is a machine tool

F1 -A lathe is a machine tool F1 -A lathe is a machine tool

F2 -A lathe is power driven

F2 -A lathe is power driven F3 -A lathe requires a power source R1 - If X is power driven Then X requires a power

source

R1 - If X is power driven Then X requires a powersource

R1 - If X is power driven Then X requires a powersource

R1 - If X is power driven Then X requires a powersource

R1 - If X is power driven Then X requires a powersource

R1 - If X is power driven Then X requires a powersource

R2 - If X is a machine tool Then X has a tool holderR3 - If X is a machine tool Then X is power driven

R2 - If X is a machine tool Then X has a tool holderR3 - If X is a machine tool Then X is power driven

R2 - If X is a machine tool Then X has a tool holderR3 - If X is a machine tool Then X is power driven

R2 - If X is a machine tool Then X has a tool holderR3 - If X is a machine tool Then X is power driven

R2 - If X is a machine tool Then X has a tool holderR3 - If X is a machine tool Then X is power driven

R2 - If X is a machine tool Then X has a tool holderR3 - If X is a machine tool Then X is power driven

Rules :

Fact : Fact :

Fact :

Rules :

Rules : Rules :

Figure 1b. An example of backward chaining

Page 13: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

SOFT COMPUTING AND ITS APPLICATIONS IN ENGINEERING AND MANUFACTURE 5

Among the five tools considered in this chapter, expert systems are probablythe most mature, with many commercial shells and development tools availableto facilitate their construction. Consequently, once the domain knowledge to beincorporated in an expert system has been extracted, the process of building thesystem is relatively simple. The ease with which expert systems can be developedhas led to a large number of applications of the tool. In engineering, applicationscan be found for a variety of tasks including selection of materials, machine ele-ments, tools, equipment and processes, signal interpreting, condition monitoring,fault diagnosis, machine and process control, machine design, process planning,production scheduling and system configuring. Some recent examples of specifictasks undertaken by expert systems are:• identifying and planning inspection schedules for critical components of an

offshore structure [Peers et al., 1994];• automating the evaluation of manufacturability in CAD systems [Venkatachalam,

1994];• choosing an optimal robot for a particular task [Kamrani et al., 1995];• monitoring the technical and organisational problems of vehicle maintenance in

coal mining [Streichfuss and Burgwinkel, 1995];• configuring paper feeding mechanisms [Koo and Han, 1996];• training technical personnel in the design and evaluation of energy cogeneration

plants [Lara Rosano et al., 1996];• storing, retrieving and adapting planar linkage designs [Bose et al., 1997];• designing additive formulae for engine oil products [Shi et al., 1997];• carrying out automatic remeshing during a finite-elements analysis of forging

deformation [Yano et al., 1997];• designing of products and their assembly processes [Zha et al., 1998];• modelling and control of combustion processes [Kalogirou, 2003];• optimising the transient performances in the adaptive control of a planar robot

[De La Sen et al., 2004].

2. FUZZY LOGIC

A disadvantage of ordinary rule-based expert systems is that they cannot handlenew situations not covered explicitly in their knowledge bases (that is, situationsnot fitting exactly those described in the “IF” parts of the rules). These rule-basedsystems are completely unable to produce conclusions when such situations areencountered. They are therefore regarded as shallow systems which fail in a “brittle”manner, rather than exhibit a gradual reduction in performance when faced withincreasingly unfamiliar problems, as human experts would.

The use of fuzzy logic [Zadeh, 1965] which reflects the qualitative and inexactnature of human reasoning can enable expert systems to be more resilient. Withfuzzy logic, the precise value of a variable is replaced by a linguistic description,the meaning of which is represented by a fuzzy set, and inferencing is carried

Page 14: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

6 CHAPTER 1

out based on this representation. Fuzzy set theory may be considered an extensionof classical set theory. While classical set theory is about “crisp” sets with sharpboundaries, fuzzy set theory is concerned with “fuzzy” sets whose boundaries are“grey”.

In classical set theory, an element ui can either belong or not belong to a set A∼, i.e.

the degree to which element u belongs to set A∼is either 1 or 0. However, in fuzzy

set theory, the degree of belonging of an element u to a fuzzy set A∼is a real number

between 0 and 1. This is denoted by �A∼�ui�, the grade of membership of ui in A∼

. Fuzzy

set A∼is a fuzzy set in U, the “universe of discourse” or “universe” which includes all

objects to be discussed. �A∼�ui� is 1 when ui is definitely a member of A∼

and �A∼�ui� is

0 when ui is definitely not a member of A∼. For instance, a fuzzy set defining the term

“normal room temperature” might be:-

(1)

normal room temperature ≡ 0�0/below10� C +0�3/10� C–16� C

+0�8/16� C–18� C +1�0/18� C–22� C +0�8/22� C–24� C

+0�3/24� C–30� C +0�0/above 30� C

The values 0.0, 0.3, 0.8 and 1.0 are the grades of membership to the givenfuzzy set of temperature ranges below 10� C (above 30� C), between 10� C and16� C�24� C–30� C�, between 16� C and 18� C�22� C–24� C� and between 18� C and22� C. Figure 2(a) shows a plot of the grades of membership for “normal roomtemperature”. For comparison, Figure 2(b) depicts the grades of membership for acrisp set defining room temperatures in the normal range.

Knowledge in an expert system employing fuzzy logic can be expressed asqualitative statements (or fuzzy rules) such as “If the room temperature is normal,then set the heat input to normal”, where “normal room temperature” and “normalheat input” are both fuzzy sets.

A fuzzy rule relating two fuzzy sets A∼and B∼

is effectively the Cartesian product

A∼×B∼

which can be represented by a relation matrix �R∼�. Element Rij of �R∼

� is the

membership to A∼×B∼

of pair �ui� vj�� ui ∈ A∼and vj ∈ B∼

. Rij is given by:

(2) Rij = min��A∼�ui���B∼

�vj��

For example, with “normal room temperature” defined as before and “normalheat input” described by:

(3) normal heat input ≡ 0�2/1 kW +0�9/2 kW +0�2/3 kW

Page 15: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

SOFT COMPUTING AND ITS APPLICATIONS IN ENGINEERING AND MANUFACTURE 7

0.5

1

1

µ

(a)

µ

(b)

10 20 30 40

10 20 30 40 Temperature ( ˚C )

Temperature ( ˚C )

Figure 2. (a) Fuzzy set of “normal temperature” (b) Crisp set of “normal temperature”

�R∼� can be computed as:

(4) �R∼� =

⎡⎢⎢⎢⎢⎢⎢⎢⎢⎣

0�0 0�0 0�00�2 0�3 0�20�2 0�8 0�20�2 0�9 0�20�2 0�8 0�20�2 0�3 0�20�0 0�0 0�0

⎤⎥⎥⎥⎥⎥⎥⎥⎥⎦

A reasoning procedure known as the compositional rule of inference, whichis the equivalent of the modus-ponens rule in rule-based expert systems, enablesconclusions to be drawn by generalisation (extrapolation or interpolation) from thequalitative information stored in the knowledge base. For instance, when the room

Page 16: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

8 CHAPTER 1

temperature is detected to be “slightly below normal”, a temperature-controllingfuzzy expert system might deduce that the heat input should be set to “slightlyabove normal”. Note that this conclusion might not be contained in any of thefuzzy rules stored in the system. A well-known compositional rule of inference isthe max-min rule. Let �R∼

� represent the fuzzy rule “If A∼Then B∼

” and a∼ ≡∑

ii/ui

a fuzzy assertion. A∼and a

∼ are fuzzy sets in the same universe of discourse. The

max-min rule enables a fuzzy conclusion b∼≡∑

jj/vj to be inferred from a

∼ and �R∼�

as follows:

b∼= a

∼o�R∼�(5)

�j = maxi

�min�i� Rij��(6)

For example, given the fuzzy rule “If the room temperature is normal, then set theheat input to normal” where “normal room temperature” and “normal heat input”are as defined previously, and a fuzzy temperature measurement of

(7)

temperature ≡ 0�0/below10� C +0�4/10� C–16� C +0�8/16� C–18� C

+0�8/18� C–22� C +0�2/22� C–24� C +0�0/24� C–30� C

+0�0/above30� C

the heat input will be deduced as:

heat input = temperature o�R∼�

= 0�2/1 kW +0�8/2 kW +0�2/3 kW(8)

For further information on fuzzy logic, see [Kaufmann, 1975; Klir and Yuan,1995; 1996; Ross, 1995; Zimmermann, 1996; Dubois and Prade, 1998].

Fuzzy logic potentially has many applications in engineering where the domainknowledge is usually imprecise. Notable successes have been achieved in the areaof process and machine control although other sectors have also benefited from thistool. Recent examples of engineering applications include:• controlling the height of the arc in a welding process [Bigand et al., 1994];• controlling the rolling motion of an aircraft [Ferreiro Garcia, 1994];• controlling a multi-fingered robot hand [Bas and Erkmen, 1995];• analysing the chemical composition of minerals [Da Rocha Fernandes and Cid

Bastos, 1996];• monitoring of tool-breakage in end-milling operations [Chen and Black, 1997];• modelling of the set-up and bend sequencing process for sheet metal bending

[Ong et al., 1997];• determining the optimal formation of manufacturing cells [Szwarc et al., 1997;

Zülal and Arikan, 2000];

Page 17: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

SOFT COMPUTING AND ITS APPLICATIONS IN ENGINEERING AND MANUFACTURE 9

• classifying discharge pulses in electrical discharge machining [Tarng et al.,1997];

• modelling an electrical drive system [Costa Branco and Dente, 1998];• improving the performance of hard disk drive final assembly [Zhao and De

Souza, 1998; 2001];• analysing chatter occurring during a machine tool cutting process [Kong et al.,

1999];• addressing the relationships between customer needs and design requirements

[Sohen and Choi, 2001; Vanegas and Labib, 2001; Karsak, 2004];• assessing and selecting advanced manufacturing systems [Karsak and Kuz-

gunkaya, 2002; Bozdag et al., 2003; Beskese et al., 2004; Kulak and Kahraman,2004];

• evaluating cutting force uncertainty in turning [Wang et al., 2002];• reducing defects in automotive coating operations [Lou and Huang, 2003].

3. INDUCTIVE LEARNING

The acquisition of domain knowledge to build into the knowledge base of an expertsystem is generally a major task. In some cases, it has proved a bottleneck inthe construction of an expert system. Automatic knowledge acquisition techniqueshave been developed to address this problem. Inductive learning is an automatictechnique for knowledge acquisition. The inductive approach produces a structuredrepresentation of knowledge as the outcome of learning. Induction involves gener-alising a set of examples to yield a selected representation which can be in termsof a set of rules, concepts or logical inferences or a decision tree.

An inductive learning program usually requires as input a set of examples. Eachexample is characterised by the values of a number of attributes and the classto which it belongs. In one approach to inductive learning, through a process of“dividing-and-conquering” where attributes are chosen according to some strategy(for example, to maximise the information gain) to divide the original example setinto subsets, the inductive learning program builds a decision tree that correctlyclassifies the given example set. The tree represents the knowledge generalisedfrom the specific examples in the set. This can subsequently be used to handlesituations not explicitly covered by the example set.

In another approach known as the “covering approach”, the inductive learningprogram attempts to find groups of attributes uniquely shared by examples in givenclasses and forms rules with the IF part as conjunctions of those attributes and theTHEN part as the classes. The program removes correctly classified examples fromconsideration and stops when rules have been formed to classify all examples inthe given set.

A new approach to inductive learning, “inductive logic programming”, is acombination of induction and logic programming. Unlike conventional inductivelearning which uses propositional logic to describe examples and represent newconcepts, inductive logic programming (ILP) employs the more powerful predicate

Page 18: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

10 CHAPTER 1

logic to represent training examples and background knowledge and to express newconcepts. Predicate logic permits the use of different forms of training examplesand background knowledge. It enables the results of the induction process, that isthe induced concepts, to be described as general first-order clauses with variablesand not just as zero-order propositional clauses made up of attribute-value pairs.There are two main types of ILP systems, the first, based on the top-down general-isation/specialisation method, and the second, on the principle of inverse resolution[Muggleton, 1992; Lavrac, 1994].

A number of inductive learning programs have been developed. Some of thewell known programs are CART [Breiman et al., 1998], ID3 and its descen-dants C4.5 and C5.0 [Quinlan, 1983; 1986; 1993; ISL, 1998; RuleQuest, 2000]which are divide-and-conquer programs, the AQ family of programs [Michalski,1969; 1990; Michalski et al., 1986; Cervone et al., 2001; Michalski and Kaufman,2001] which follow the covering approach, the FOIL program [Quinlan, 1990;Quinlan and Cameron-Jones, 1995] which is an ILP system adopting the gener-alisation/specialisation method and the GOLEM program [Muggleton and Feng,1990] which is an ILP system based on inverse resolution. Although most pro-grams only generate crisp decision rules, algorithms have also been developed toproduce fuzzy rules [Wang and Mendel, 1992; Janikow, 1998; Hang and Chen,2000; Baldwin and Martin, 2001; Wang et al., 2001; Baldwin and Karale, 2003;Wang et al., 2003].

Figure 3 shows the main steps in RULES–3 Plus, an induction algorithm in thecovering category [Pham and Dimov, 1997] and belonging to the RULES family ofrule extraction systems [Pham and Aksoy, 1994; 1995a; 1995b; Pham et al., 2000;Pham et al., 2003; Pham and Afify; 2005a]. The simple problem of detecting thestate of a metal cutting tool is used to explain the operation of RULES-3 Plus.Three sensors are employed to monitor the cutting process and, according to thesignals obtained from them (1 or 0 for sensors 1 and 3; −1, 0, or 1 for sensor 2),the tool is inferred as being “normal” or “worn”. Thus, this problem involves threeattributes which are the states of sensors 1, 2 and 3 and the signals that they emitconstitute the values of those attributes. The example set for the problem is givenin Table 1.

Table 1. Training set for the Cutting Tool problem

Example Sensor_1 Sensor_2 Sensor_3 Tool State

1 0 −1 0 Normal2 1 0 0 Normal3 1 −1 1 Worn4 1 0 1 Normal5 0 0 1 Normal6 1 1 1 Worn7 1 −1 0 Normal8 0 −1 1 Worn

Page 19: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

SOFT COMPUTING AND ITS APPLICATIONS IN ENGINEERING AND MANUFACTURE 11

Step 1. Take an unclassified example and form array SETAV. Step 2. Initialise arrays PRSET and T_PRSET (PRSET and T_PRSET will consist of mPRSET expressions with null conditions and zero H measures) and set nco = 0.

Step 3. IF nco < na THEN nco = nco + 1 and set m = 0; ELSE the example itself is taken as a rule and STOP.

Step 4. DO m = m + 1; Specialise expression m in PRSET by appending to it a condition from SETAV that differs from the conditions already included in the expression;

Compute the H measure for the expression; IF its H measure is higher than the H measure of any expression in T_PRSET THEN replace the expression having the lowest H measure with the newly formed expression; ELSE discard the new expression; WHILE m < mPRSET .

Step 5. IF there are consistent expressions in T_PRSET THEN choose as a rule the expression that has the highest H measure and discard the others;

ELSE copy T_PRSET into PRSET; initialise T_PRSET and go to step 3.

Figure 3. Rule forming procedure of RULES-3 Plus

Notes: nco – number of conditions; na-number of attributes;

mPRSET – number of expressions stored in PRSET (mPRSET is user-provided);

T_PRSET - a temporary array of partial rules of the same dimension as PRSET

In step 1, example 1 is used to form the attribute-value array SETAV which willcontain the following attribute-value pairs: [Sensor_1 = 0�� �Sensor_2 = −1� and�Sensor_3 = 0�.

In step 2, the partial rule set PRSET and T_PRSET, the temporary version ofPRSET used for storing partial rules in the process of rule construction, are ini-tialised. This creates for each of these sets three expressions having null conditionsand zero H measures. The H measure for an expression is defined as:

(9) H =√

Ec

E

[2−2

√Ec

i

Ec

Ei

E−2

√(1− Ec

i

Ec

)(1− Ei

E

)]

where Ec is the number of examples covered by the expression (the total numberof examples correctly classified and misclassified by a given rule), E is the totalnumber of examples, Ec

i is the number of examples covered by the expression andbelonging to the target class i (the number of examples correctly classified by agiven rule), and Ei is the number of examples in the training set belonging to the

Page 20: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

12 CHAPTER 1

target class i. In Equation (9), the first term

(10) G =√

Ec

E

relates to the generality of the rule and the second term

(11) A = 2−2

√Ec

i

Ec

Ei

E−2

√(1− Ec

i

Ec

)(1− Ei

E

)

indicates its accuracy.In steps 3 and 4, by specialising PRSET using the conditions stored in SETAV,

the following expressions are formed and stored in T_PRSET:

1 � �Sensor_3 = 0� ⇒ �Alarm = OFF� H = 0�2565

2 � �Sensor_2 = −1� ⇒ �Alarm = OFF� H = 0�0113

3 � �Sensor_1 = 0� ⇒ �Alarm = OFF� H = 0�0012

In step 5, a rule is produced as the first expression in T_PRSET applies to onlyone class:

Rule1 � IF �Sensor_3 = 0� THEN �Alarm = OFF�� H = 0�2565

Rule 1 can classify examples 2 and 7 in addition to example 1. Therefore, theseexamples are marked as classified and the induction proceeds.

In the second iteration, example 3 is considered. T_PRSET, formed in step 4after specialising the initial PRSET, now consists of the following expressions:

1 � �Sensor_3 = 1� ⇒ �Alarm = ON� H = 0�0406

2 � �Sensor_2 = −1� ⇒ �Alarm = ON� H = 0�0079

3 � �Sensor_1 = 1� ⇒ �Alarm = ON� H = 0�0005

As none of the expressions cover only one class, T_PRSET is copied into PRSET(step 5) and the new PRSET has to be specialised further by appending the existingexpressions with conditions from SETAV. Therefore the procedure returns to step3 for a new pass. The new T_PRSET formed at the end of step 4 contains thefollowing three expressions:

1 � �Sensor_2 = −1��Sensor_3 = 1� ⇒ �Alarm = ON� H = 0�3876

2 � �Sensor_1 = 1��Sensor_3 = 1� ⇒ �Alarm = ON� H = 0�0534

3 � �Sensor_1 = 1��Sensor_2 = −1� ⇒ �Alarm = ON� H = 0�0008

Page 21: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

SOFT COMPUTING AND ITS APPLICATIONS IN ENGINEERING AND MANUFACTURE 13

As the first expression applies to only one class, the following rule is obtained:

Rule 2 � IF �Sensor_2 = −1� AND �Sensor_3 = 1� THEN

�Alarm = ON�� H = 0�3876�

Rule 2 can classify examples 3 and 8, which again are marked as classified.In the third iteration, example 4 is used to obtained the next rule:

Rule 3 � IF �Sensor_2 = 0� THEN �Alarm = OFF�� H = 0�2565�

This rule can classify examples 4 and 5 and so they are also marked as classified.In iteration 4, the last unclassified example 6 is employed for rule extraction,

yielding:

Rule 4 � IF �Sensor_2 = 1� THEN �Alarm = ON�� H = 0�2741�

There are no remaining unclassified examples in the example set and the proce-dure terminates at this point.

Due to its requirement for a set of examples in a rigid format (with knownattributes and of known classes), inductive learning has found rather limited appli-cations in engineering as not many engineering problems can be described in termsof such a set of examples. Another reason for the paucity of applications is thatinductive learning is generally more suitable for problems where attributes havediscrete or symbolic values than for those with continuous-valued attributes as inmany engineering problems. Some recent examples of applications of inductivelearning are:• controlling a laser cutting robot [Luzeaux, 1994];• controlling the functional electrical stimulation of spinally-injured humans

[Kostov et al., 1995];• modelling job complexity in clothing production systems [Hui et al., 1997];• analysing the constructability of a beam in a reinforced-concrete frame

[Skibniewski et al., 1997];• analysing the results of tests on portable electronic products to discover useful

design knowledge [Zhou, 2001];• accelerating rotogravure printing [Evans and Fisher, 2002];• predicting JIT factory performance from past data that includes both good and

poor factory performance [Mathieu et al., 2002];• developing an intelligent monitoring system for improving the reliability of a

manufacturing process [Peng, 2004].• analysing data in a steel bar manufacturing company to help intelligent decision

making [Pham et al., 2004];More information on inductive learning techniques and their applications in

engineering and manufacture can be found in [Pham et al., 2002; Pham and Afify,2005b].

Page 22: Computational Intelligence - download.e-bookshelf.de fileda Universidade de Sao Paulo Departamento de Engenharia de Telecomunicaçoes e Controle, Brazil. A. Gallardo Antolín, J. Pascual

14 CHAPTER 1

4. NEURAL NETWORKS

Like inductive learning programs, neural networks can capture domain knowledgefrom examples. However, they do not archive the acquired knowledge in an explicitform such as rules or decision trees and they can readily handle both continuousand discrete data. They also have a good generalisation capability as with fuzzyexpert systems.

A neural network is a computational model of the brain. Neural network modelsusually assume that computation is distributed over several simple units calledneurons which are interconnected and which operate in parallel (hence, neuralnetworks are also called parallel-distributed-processing systems or connectionistsystems). Figure 4 illustrates a typical model of a neuron. Output signal yj is afunction f of the sum of weighted input signals xi. The activation function f canbe a linear, simple threshold, sigmoidal, hyberbolic tangent or radial basis function.Instead of being deterministic, f can be a probabilistic function, in which case yj

will be a binary quantity, for example, +1 or −1. The net input to such a stochasticneuron – that is, the sum of weighted input signals xi – will then give the probabilityof yj being +1 or −1.

How the inter-neuron connections are arranged and the nature of the connectionsdetermine the structure of a network. How the strengths of the connections areadjusted or trained to achieve a desired overall behaviour of the network is governedby its learning algorithm. Neural networks can be classified according to theirstructures and learning algorithms.

In terms of their structures, neural networks can be divided into two types:feedforward network and recurrent networks. Feedforward networks can perform astatic mapping between an input space and an output space: the output at a giveninstant is a function only of the input at that instant. The most popular feedforwardneural network is the multi-layer perceptron (MLP): all signals flow in a singledirection from the input to the output of the network. Figure 5 shows an MLP withthree layers: an input layer, an output layer and an intermediate or hidden layer.Neurons in the input layer only act as buffers for distributing the input signals xi toneurons in the hidden layer. Each neuron j in the hidden layer operates accordingto the model of Figure 4. That is, its output yj is given by:

(12) yj = f� wjixi�

x1

xi

xn

wj1

wji

wjn

f(.)yj

Figure 4. Model of a neuron