1. Trang chủ
  2. » Khoa Học Tự Nhiên

artificial intelligence and soft computing

788 1,8K 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 788
Dung lượng 8,65 MB

Nội dung

CAT#1385 Half-Title Page 11/29/01 9:42 AM Page Artificial Intelligence and Soft Computing Behavioral and Cognitive Modeling of the Human Brain CAT#1385 Title Page 11/29/01 9:43 AM Page Artificial Intelligence and Soft Computing Behavioral and Cognitive Modeling of the Human Brain Amit Konar Department of Electronics and Tele-communication Engineering Jadavpur University, Calcutta, India CRC Press Boca Raton London New York Washington, D.C Library of Congress Cataloging-in-Publication Data Konar, Amit Artificial intelligence and soft computing : behavioral and cognitive modeling of the human brain / Amit Konar p cm Includes bibliographical references and index ISBN 0-8493-1385-6 (alk paper) Soft computing Artificial intelligence Brain—Computer simulation I Title QA76.9.S63 K59 1999 006.3 dc21 99-048018 CIP This book contains information obtained from authentic and highly regarded sources Reprinted material is quoted with permission, and sources are indicated A wide variety of references are listed Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new works, or for resale Specific permission must be obtained in writing from CRC Press LLC for such copying Direct all inquiries to CRC Press LLC, 2000 N.W Corporate Blvd., Boca Raton, Florida 33431 Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation, without intent to infringe © 2000 by CRC Press LLC No claim to original U.S Government works International Standard Book Number 0-8493-1385 Library of Congress Card Number 99-048018 Printed in the United States of America Printed on acid-free paper PREFACE The book, to the best of the author’s knowledge, is the first text of its kind that presents both the traditional and the modern aspects of ‘AI and Soft Computing’ in a clear, insightful and highly comprehensive writing style It provides an in-depth analysis of the mathematical models and algorithms, and demonstrates their applications in real world problems of significant complexity About the book The book covers 24 chapters altogether It starts with the behavioral perspective of the ‘human cognition’ and covers in detail the tools and techniques required for its intelligent realization on machines The classical chapters on search, symbolic logic, planning and machine learning have been covered in sufficient details, including the latest research in the subject The modern aspects of soft computing have been introduced from the first principles and discussed in a semi-informal manner, so that a beginner of the subject is able to grasp it with minimal effort Besides soft computing, the other leading aspects of current AI research covered in the book include nonmonotonic and spatio-temporal reasoning, knowledge acquisition, verification, validation and maintenance issues, realization of cognition on machines and the architecture of AI machines The book ends with two case studies: one on ‘criminal investigation’ and the other on ‘navigational planning of robots,’ where the main emphasis is given on the realization of intelligent systems using the methodologies covered in the book The book is unique for its diversity in contents, clarity and precision of presentation and the overall completeness of its chapters It requires no mathematical prerequisites beyond the high school algebra and elementary differential calculus; however, a mathematical maturity is required to follow the logical concepts presented therein An elementary background of data structure and a high level programming language like Pascal or C is helpful to understand the book The book, thus, though meant for two semester courses of computer science, will be equally useful to readers of other engineering disciplines and psychology as well as for its diverse contents, clear presentation and minimum prerequisite requirements In order to make the students aware of the applied side of the subject, the book includes a few homework problems, selected from a wide range of topics The problems supplied, in general, are of three types: i) numerical, ii) reflexive and iii) provocative The numerical problems test the students’ understanding of the subject The reflexive type requires a formulation of the problem from its statement before finding its solution The provocative type includes the well-known problems of modern AI research, the solution to some of which are known, and some are open ended With adequate hints supplied with the problems, the students will be able to solve most of the numerical and reflexive type problems themselves The provocative type, however, requires some guidance from the teacher in charge The last type of problems is included in the text to give the research-oriented readers an idea of the current trend in AI research Graduate students of AI will also find these problems useful for their dissertation work The book includes a large number of computer simulations to illustrate the concepts presented in logic programming, fuzzy Petri nets, imaging and robotics Most of the simulation programs are coded in C and Pascal, so that students without any background of PROLOG and LISP may understand them easily These programs will enhance the students’ confidence in the subject and enable them to design the simulation programs, assigned in the exercise as homework problems The professionals will find these simulations interesting as it requires understanding of the end results only, rather than the formal proofs of the theorems presented in the text Special features The book includes the following special features i) Unified theme of presentation: Most of the existing texts on AI cover a set of chapters of diverse thoughts, without demonstrating their inter-relationship The readers, therefore, are misled with the belief that AI is merely a collection of intelligent algorithms, which precisely is not correct The proposed book is developed from the perspective of cognitive science, which provides the readers with the view that the psychological model of cognition can be visualized as a cycle of mental states: sensing, acquisition, perception, planning and action, and there exists a strong interdependence between each two sequential states The significance of search in the state of perception, reasoning in the state of planning, and learning as an intermediate process between sensing and action thus makes sense The unified theme of the book, therefore, is to realize the behavioral perspective of cognition on an intelligent machine, so as to enable it act and think like a human being Readers will enjoy the book especially for its totality with an ultimate aim to build intelligent machines ii) Comprehensive coverage of the mathematical models: This probably is the first book that provides a comprehensive coverage of the mathematical models on AI and Soft Computing The existing texts on “mathematical modeling in AI” are beyond the scope of undergraduate students Consequently, while taking courses at graduate level, the students face much difficulty in studying from monographs and journals The book, however, bridges the potential gap between the textbooks and advanced monographs in the subject by presenting the mathematical models from a layman’s understanding of the problems iii) Case studies: This is the only book that demonstrates the realization of the proposed tools and techniques of AI and Soft Computing through case studies The readers, through these case studies, will understand the significance of the joint usage of the AI and Soft Computing tools and techniques in interesting problems of the real world Case studies for two distinct problems with special emphasis to their realization have been covered in the book in two separate chapters The case study I is concerned with a problem of criminal investigation, where the readers will learn to use the soft computing tools in facial image matching, fingerprint classification, speaker identification and incidental description based reasoning The readers can build up their own systems by adding new fuzzy production rules and facts and deleting the unwanted rules and facts from the system The book thus will serve the readership from both the academic and the professional world Electronic and computer hobbyists will find the case study II on mobile robots very exciting The algorithms of navigational planning (in case study II), though tested with reference to “Nomad Super Scout II robot,” have been presented in generic form, so that the interested readers can code them for other wheel-based mobile robots iv) Line Diagrams: The book includes around 190 line diagrams to give the readers a better insight to the subject Readers will enjoy the book for they directly get a deeper view of the subject through diagrams with a minimal reading of the text Origin of the book The book is an outgrowth of the lecture materials prepared by the author for a one semester course on “Artificial Intelligence,” offered to the graduate students in the department of Electronics and Telecommunication Engineering, Jadavpur University, Calcutta An early version of the text was also used in a summer-school on “AI and Neural Nets,” offered to the faculty members of various engineering colleges for their academic development and training The training program included theories followed by a laboratory course, where the attendees developed programs in PROLOG, Pascal and C with the help of sample programs/toolkit The toolkit is included in the book on a CD and the procedure to use it is presented in Appendix A Structural organization of the book The structural organization of the book is presented below with a dependency graph of chapters, where Ch → Ch 10 means that chapter 10 should be read following chapter 9, for example Ch Ch.2 Ch 16 Ch.3 Ch.17 Ch 13 Ch 19 Ch.5 Ch Ch 23 Ch.18 Ch 14 Ch Ch.7 Ch.11 Ch 15 Ch 20 Ch Ch Ch 12 Ch 10 Ch 24 July 12, 1999 Jadavpur University Ch 22 Ch 21 Amit Konar ABOUT THE AUTHOR Amit Konar is a Reader in the Department of Electronics and Telecommunication Engineering, Jadavpur University, Calcutta He received a Ph.D (Engineering) degree in Artificial Intelligence from the same university in 1994 and has been teaching the subject of Artificial Intelligence to the graduate students of his department for the last 10 years Dr Konar has supervised a number of Ph.D and M.E theses on different aspects of machine intelligence, including logic programming, neural networks, cognitive systems, stochastic and fuzzy models of uncertainty, fuzzy algebra, image understanding, architecture of intelligent machines and navigational planning of mobile robots He has published more than 60 papers in international journals and conferences He is an invited contributor of a book chapter in an edited book published by Academic Press Dr Konar is a recipient of the 1997 Young Scientist Award, offered by the All India Council for Technical Education (AICTE) for his significant contributions in Artificial Intelligence and Soft Computing ACKNOWLEDGMENT The author gratefully acknowledges the contributions of many people, who helped him in different ways to complete the book First and foremost, he wishes to thank his graduate students attending the course entitled “AI and Pattern Recognition” in ETCE department, Jadavpur University during the 1993-1999 sessions Next, he would like to thank the scholars working for their Ph.D degree under his supervision In this regard, the author acknowledges the contribution of Ms Jaya Sil, a recipient of the Ph.D degree in 1996, for spending many of her valuable hours on discussion of the Bayesian and Markov models of knowledge representation The other scholars, to whom the author is greatly indebted for sharing their knowledge in different areas of AI, are Mr Srikant Patnaik, Mr Biswajit Paul, Mrs Bijita Biswas, Ms Sanjukta Pal, Ms Alakananda Bhattacharya and Ms Parbati Saha The contributions of Mr Patnaik in chapter 24, Mr Paul in chapter 14, Ms Biswas in chapter 23, Ms Pal in chapter 16, Ms Bhattacharya in chapter 22 and Ms Saha in chapter 10 need special mention Among his scholars, the author wants to convey his special thanks to Mr Patnaik, who helped him in many ways, which simply cannot be expressed in a few sentences The author acknowledges the contribution of his friend Mr Dipak Laha, a faculty member of the Mechanical Engineering department, Jadavpur University, who helped him in understanding the many difficult problems of scheduling He also would like to thank his friend Dr Uday Kumar Chakraborty, a faculty member of the Computer Science department, Jadavpur University, for teaching him the fundamentals in Genetic Algorithms The author gives a special thanks to Ms Sheli Murmu, his student and now a colleague, who helped him in correcting many syntactical errors in the draft book He also wants to thank his graduate students including Mr Diptendu Bhattacharya, Ms Bandana Barmn, and Mr Srikrishna Bhattacharya for their help in drawing many figures and in the technical editing of this book The author also wishes to thank his ex-student Ms Sragdhara Dutta Choudhury, who helped him draw a very simple but beautiful sketch of the ‘classroom’ figure in chapter The architectural issues of knowledge based systems, which is the main theme of chapter 22, is the summary of the M.E thesis (1991-1992) of Mr Shirshendu Halder, who critically reviewed a large number of research papers and interestingly presented the pros and cons of these works in his thesis The author owes a deep gratitude to Prof A K Mandal of the department of Electronics and Telecommunication Engineering, Jadavpur University, for teaching him the subject of AI and providing him both technical and moral support as a teacher, Ph.D thesis adviser and colleague When the goal is within concave obstacle: The workspace coordinate are (50,50) and (450,450) Enter starting x(between 50 & 450): 70 (press enter) Enter starting y(between 50 & 450): 70 (press enter) Enter sensing range (between 10 & 50): 30 (press enter) Enter robot step size (5 to 30) : 20 (press enter) Time taken to search path: 1.868 Distance covered = 1710.915 units A.8 The Quadtr1 Program This program partitions a given workspace by Quadtree approach and determines the trajectory of the robot by employing heuristic search on the tree NOTE: Save the BGI file with the program on an A-drive before running it A sample run of the program is given below Workspace coordinate range in between (80,80) and (400,400) //diagonal vertices// The obstacle are lying in the following coordinates i.e, coordinates of diagonal of the square region (x1, y1) to (x2,y2) Obstacle1: (80,80) to (120,120) Obstacle2: (200,120) to (240,160) Obstacle3: (240,160) to (320,240) Obstacle4: (160,240) to (240,320) You have to enter the (x,y) coordinates of the starting position of the robot within the workspace and should not lie on the obstacle zone Set goal x_location: 380 (Press enter) Set goal y_location: 380 (Press enter) Set starting x_location: 130 (Press enter) Set starting x_location: 130 (Press enter) (Press enter) Current Node : 120,120 and 160,160 Total Neighbours 120,80 and 160,120 - status: empty node 160,120 and 200,160 - status: empty node 80,160 and 160,240 - status: empty node 80,120 and 120,160 - status: empty node number of neighbours =4 path selected 160,120 and 200,160 Total Neighbours 160,80 and 200,120 - status: empty node 200,120 and 240,160 - status: occupied node 160,160 and 240,240 - status: empty node 120,120 and 160,160 - status: empty node number of neighbours =4 path selected 160,160 and 240,240 Total Neighbours 240,160 and 320,240 - status: occupied node 160,240 and 240,320 - status: occupied node 80,160 and 160,240 - status: empty node 160,120 and 200,160 - status: empty node 200, 120 and 240,160 - status: occupied node number of neighbours =5 path selected 80,160 and 160,240 Total Neighbours 160,160 and 240,240 - status: empty node 80,240 and 160,320 - status: empty node 80,120 and 120,160 - status: empty node 120,120 and 160,160 - status: empty node number of neighbours =4 path selected 80,240 and 160,320 Total Neighbours 80,160 and 160,240 - status: empty node 160,240 and 240,320 - status: occupied node 80,320 and 160,400 - status: empty node number of neighbours =3 path selected 80,320 and 160,400 Total Neighbours 80,240 and 160,320 - status: empty node 160,320 and 240,400 - status: empty node number of neighbours =2 path selected 160,320 and 240,400 Total Neighbours 160,240 and 240,320 - status: occupied node 240,240 and 400,400 - status: empty node 80,320 and 160,400 - status: empty node number of neighbours =3 path node selected 240,240 and 400,400 A.9 The World Program This C++ program builds a map of the obstacles and the room boundary by first determining the room boundary and then employing the depth first traversal following an ordered priority based directed traversal NOTE: Save the BGI file with the program in A-drive The sample run of the program is presented below The workspace is rectangular and co-ordinates are (85,85), (85,395), (395,85) & (395,395) Starting position of robot x(enter value between 85 - 395): 100 Starting position of robot y(enter value between 85 - 395): 380 (a) Robot entering the room (c) After Visiting 10th Obstacle (b) After Visiting 6th Obstacle (d) Obstacle boundaries stored Appendix B Derivation of the Back-propagation Algorithm This appendix presents the derivation of the back-propagation algorithm, covered in chapter 14 We derive it for two cases, with and without nonlinearity in the output layered nodes B.1 Derivation of the Back-propagation Algorithm The back-propagation algorithm is based on the principle of gradient descent learning In gradient descent learning, the weight wp,q,k which is connected between neurons p in layer ( k-1) with neuron q at the k-th (output) layer is hereafter denoted by Wpq for simplicity Let E be the Euclidean norm of the error vector, for a given training pattern, produced at the output layer Formally, E = (1 / 2) ∑ ( tr – Out r )2 ∀r where tr and Outr denote the target (scaler) output and the computed output at node r in the output layer The gradient descent learning requires that for any weight Wpq , Wpq ← Wpq - η(∂E/∂Wpq) (B.1) where η is the learning rate The computation of ∂E/∂Wpq , however, is different in the last layer from the rest of the layers We now consider two types of output layers: output layer with and without non-linearity of neurons When the neurons in the output layer contains no non-linearity, Outq = Netq = ∑ Wpq.Outp (B.2) ∀p in the penultimate layer Now, ∂E/∂Wpq = (∂E/∂Outq) ( ∂Outq/∂Wpq) = - (tq-Outq) Outp Consequently, Wpq ← Wpq - η( tq-Outq) Outp (B.3) [by (B.1)] (B.4) Denoting, (tq -Outq) by δq we have Wpq ← Wpq + η.δq Outp (B.5) Now, we consider the case, when the neurons in all the layers including the output layer contain sigmoid type non-linearity The network structure with two cascaded weights is given in fig B.1 Hidden layer m Wsp Hidden layer( m-1) Wpq Output layer Fig B.1: Defining the weights in a feed-forward topology of neurons Here, Outp = 1/(1+e-Netp) Netp = ∑r Wrp.Outr where the index r corresponds to neurons in the hidden layer m Outr = 1/(1+e-Net r ) Netr = ∑i Wir.Outi where wir are the weights connected to neuron r from its preceding layer Now, for the output layer with sigmoid type non-linearity we have ∂E/∂Wpq = (∂E/∂Outq) (∂Outq/∂Netq) (∂Netq/∂Wpq) = -(tq – Outq) Outq (1- Outq) Outp = - { (tq – Outq) Outq (1- Outq)} Outp = -δq Outp (say) The readers may now compare this result with that given in fig 14.6, where this is written as δq,k Outp,j Now, we compute the updating rule for Wsp: ∂E/∂Wsp = ∑r (∂E/∂Outr) ( ∂Outr/∂Netr) (∂Netr/∂Outp) ( ∂Outp/∂Netp) (∂Netp/∂Wsp) = ∑r – (tr - Outr) Outr (1- Outr) Wpr Outp (1 – Outp) Outs = - ∑r δr Wpr Outp (1-Outp) Outs = - Outp.(1-Outp) Outs ∑r δr Wpr which is the same as expression 14.4 in a more rigid notation Appendix C Proof of the Theorems of Chapter 10 This appendix presents the proof of the theorems stated in chapter 10 The new equations derived in the chapter are numbered C.1 through C.10 Here we will use some of the equations of chapter 10 as well Proof of theorem 10.1: From the definition of the associated places of mij it is clear that if mii is in matrix Mk, then place pi is reachable from itself Further, Mk = (P o Q)k indicates that the diagonal pi ∈ IRSk (pi) Therefore, place pi lies on a cycle through k-transitions Since it is true for any diagonal element of Mk, all the places corresponding to the diagonal elements having value of matrix Mk will lie on cycles, each having k-transitions on the cycle This is all about the proof Proof of theorem10.2: For an oscillatory response, the fuzzy belief at a place should increase as well as decrease with respect to time However, since N(t+1) ≥N(t) for all integer t≥0 (vide expression10.7), hence, the components of N(t) cannot exhibit oscillatory response Further, as components of N(0),T(0),Th and R are bounded between and 1, and N(t+1) is derived by using fuzzy AND/ OR operators over R, N(t) and T(t), hence, components of N(t) remains bounded Thus fuzzy beliefs at places being bounded and free from oscillation exhibit stable behavior This completes the first part of the theorem Now to prove the second part, we first rewrite expression (10.5) in the following form : T(t+1) = T(t) Λ[R o (Q' o Nc(t))c] Λ U [ R o (Q' o Nc(t))c -Th] N (t+1) = N(t) V P' o T(t+1) (C.1) [ (10.5), rewritten ] Now, we compute T(1) and T(0) and N(1) and N(0) by expression (C.1) and (10.5) respectively and find N(1) = N(0) V P' o T(1) (C.2) Now computing T(2) and N(2) by expression (C.1) and (10.5) it is found T(2) ≤T(1) and (C.3) N(2) = N(1) V P' o T(2) = N(0) V P' o T(1) v P' o T(2) [ by C.2 ] = N(0) V P' o T(1) [ by C.3 ] = N(1) Thus it can be easily shown that N(t+1)= N(t) for all integer t ≥1 Therefore, steady-state is reached with only one belief revision step Hence, the theorem follows Proof of theorem10.3: Unconditional stability of the model can be proved following the steps analogous to the proof of theorem 10.2 To prove the second part of the theorem, let us assume that the equilibrium condition is reached at time t= t* Thus, by definition of theorem 10.2 N(t* +1) = N(t* ) ( = N* , by statement of the theorem ) Now, expression (10.8) satisfies expression (C.4) when ( C.4 ) N* ≥ P' o [{ R o ( Q o N*c ) c} ΛU { R o ( Q o N*c )c - Th }] (C.5) Further , if R o (Q o N ) ≥ Th , all the components of U vector being unity, *c c it can be dropped from expression (C.5) Thus we get expression (10.10) Proof of theorem10.5: Q ' f m , by definition, is a TPC matrix used in forward reasoning under IFF implication relationship, with elements qij = when pi ∈O(trj) and qij = 0, otherwise P' bm , on the other hand, is a PTC matrix used in back-directed reasoning under IFF implication relationship with elements pj i = when pi ∈I(trj ), otherwise pj i = Thus for all i, j P ' b m = (Q 'f m )T Analogously, Q ' b m = ( P ' f m )T can also be proved Proof of theorem 10.6: We will use lemma and 2, listed below, to prove this theorem Lemma 1: The distributive law of product holds good with respect to fuzzy composition operator, i.e., A o [B V C] = (A o B) V (A o C) , ( C.6 ) where A is a (n x m) fuzzy matrix and B and C are either fuzzy matrix or vectors of compatible dimensions Proof: Proof, being simple, is omitted Lemma 2: De Morgan's law holds good for fuzzy matrices A and B , i.e., (A Θ B) = (Ac o Bc )c and (C.7(a)) A o B = (Ac Θ Bc )c (C.7(b)) where Θ denotes fuzzy OR-AND composition operator, which plays the role of AND-OR composition operator, with replacement of AND by OR and OR by AND operators Proof: Proof is simple and hence omitted Now, let us consider the reciprocity relations given by expressions (10.19) and (10.22) Since expression (10.19) is nothing but an identity of Nf , it is valid for any arbitrary fuzzy vector Nf Assume Nf to be a vector with only one element equal to and the rest are zero Further, to keep the proof brief, let us consider that Nf is of (3 x 1) dimension Thus, we get 0 = = ’ Q fm T o Rfm o Q’fm T o Rfm o Q’ fm o 1 q 12 c Λ q 13c q 22 c Λ q 23c q 32 c Λ q 33c ( C ) analogously , = Q’fm T o Rfm o q 11 c Λ q 13c q 21 c Λ q 23c q 31 c Λ q 33c ( C ) and 0 = Q’fm T o Rfm o q 11 c Λ q 12c q 21 c Λ q 22c q 31 c Λ q 32c ( C 10 ) where qij are the elements of Q' f (C.10) we find 0 0 0 m matrix Now, combining (C.8), (C.9) and 0 0 ∨ 0 0 q 12 c Λ q 13c Q’fm T o Rfm o { 0 0 ∨ 0 Λ q 22 c 0 q 32 c Λ q 32c = 0 q 22 c q 11 c Λ q 13c c Λ q 23 q 31 0 q 21 c Λ q 33 c c ∨ 0 q 11 c Λ q 12c 0 q 21 c Λ q 22c 0 ⇒ I = Q’fm T o Rfm o ∨ q 31 c Λ q 32c q 12 c Λ q 13 c q 11 c Λ q 13 c q 11 c Λ q 12c q 22 c Λ q 23 c q 21 c Λ q 23c q 21 c Λ q 22c q 31 Λ q 33 q 31 c Λ q 32c q 32 c Λ q 33 c c c ( by lemma 1) = Q’fm T o Rfm o [ Q’fm c Θ Ic ] = ⇒ I Q’fm T o Rfm o ( Q’fm o I )c => I = Q 'f mT o Rf m o [ Q ' f m c Θ Ic ] (by lemma 2) = Q 'f mT o Rf m o ( Q ' f m o I )c ( by lemma ) Now, extending the above operations for an ((n z) x 1) Nf vector (vide section III B), the same results can be easily obtained Considering expression (10.22), an identity of Tf, expression (10.23(b)) can be proved analogously ... 9:42 AM Page Artificial Intelligence and Soft Computing Behavioral and Cognitive Modeling of the Human Brain CAT#1385 Title Page 11/29/01 9:43 AM Page Artificial Intelligence and Soft Computing. .. Chapter 10 Introduction to Artificial Intelligence and Soft Computing This chapter provides a brief overview of the disciplines of Artificial Intelligence (AI) and Soft Computing It introduces the... tools and techniques of AI and Soft Computing through case studies The readers, through these case studies, will understand the significance of the joint usage of the AI and Soft Computing tools and

Ngày đăng: 11/04/2014, 02:04