Mutation (genetic algorithm)

From HandWiki
Short description: Genetic operation used to add population diversity

Mutation is a genetic operator used to maintain genetic diversity of the chromosomes of a population of a genetic or, more generally, an evolutionary algorithm (EA). It is analogous to biological mutation.

The classic example of a mutation operator of a binary coded genetic algorithm (GA) involves a probability that an arbitrary bit in a genetic sequence will be flipped from its original state. A common method of implementing the mutation operator involves generating a random variable for each bit in a sequence. This random variable tells whether or not a particular bit will be flipped. This mutation procedure, based on the biological point mutation, is called single point mutation. Other types of mutation operators are commonly used for representations other than binary, such as floating-point encodings or representations for combinatorial problems.

The purpose of mutation in EAs is to introduce diversity into the sampled population. Mutation operators are used in an attempt to avoid local minima by preventing the population of chromosomes from becoming too similar to each other, thus slowing or even stopping convergence to the global optimum. This reasoning also leads most EAs to avoid only taking the fittest of the population in generating the next generation, but rather selecting a random (or semi-random) set with a weighting toward those that are fitter.[1]

The following requirements apply to all mutation operators used in an EA:[2][3]

  1. every point in the search space must be reachable by one or more mutations.
  2. there must be no preference for parts or directions in the search space (no drift).
  3. small mutations should be more probable than large ones.

For different genome types, different mutation types are suitable. Some mutations are Gaussian, Uniform, Zigzag, Scramble, Insertion, Inversion, Swap, and so on.[4][5][6] An overview and more operators than those presented below can be found in the introductory book by Eiben and Smith[7] or in.[8]

Bit string mutation

The mutation of bit strings ensue through bit flips at random positions.

Example:

1 0 1 0 0 1 0
1 0 1 0 1 1 0

The probability of a mutation of a bit is [math]\displaystyle{ \frac{1}{l} }[/math], where [math]\displaystyle{ l }[/math] is the length of the binary vector. Thus, a mutation rate of [math]\displaystyle{ 1 }[/math] per mutation and individual selected for mutation is reached.

Mutation of real numbers

Many EAs, such as the evolution strategy[9][10] or the real-coded genetic algorithms,[11][12][8] work with real numbers instead of bit strings. This is due to the good experiences that have been made with this type of coding.[8][13]

The value of a real-valued gene can either be changed or redetermined. A mutation that implements the latter should only ever be used in conjunction with the value-changing mutations and then only with comparatively low probability, as it can lead to large changes.

In practical applications, the decision variables to be changed of the optimisation problem to be solved are usually limited. Accordingly, the values of the associated genes are each restricted to an interval [math]\displaystyle{ [x_{\min}, x_{\max}] }[/math]. Mutations may or may not take these restrictions into account. In the latter case, suitable post-treatment is then required as described below.

Mutation without consideration of restrictions

Example of a normally distributed random variable. Note that the given proportions of the subranges add up to 99.8 % and not 100 % due to rounding.

A real number [math]\displaystyle{ x }[/math] can be mutated using normal distribution [math]\displaystyle{ \mathcal{N}(0,\sigma) }[/math] by adding the generated random value to the old value of the gene, resulting in the mutated value [math]\displaystyle{ x' }[/math]:

[math]\displaystyle{ x' = x + \mathcal{N}(0, \sigma) }[/math]

In the case of genes with a restricted range of values, it is a good idea to choose the step size of the mutation [math]\displaystyle{ \sigma }[/math] so that it reasonably fits the range [math]\displaystyle{ [x_{\min}, x_{\max}] }[/math] of the gene to be changed, e.g.:

[math]\displaystyle{ \sigma = \frac{x_\text{max} - x_\text{min}}{6} }[/math]

The step size can also be adjusted to the smaller permissible change range depending on the current value. In any case, however, it is likely that the new value [math]\displaystyle{ x' }[/math] of the gene will be outside the permissible range of values. Such a case must be considered a lethal mutation, since the obvious repair by using the respective violated limit as the new value of the gene would lead to a drift. This is because the limit value would then be selected with the entire probability of the values beyond the limit of the value range.

The evolution strategy works with real numbers and mutation based on normal distribution. The step sizes are part of the chromosome and are subject to evolution together with the actual decision variables.

Mutation with consideration of restrictions

One possible form of changing the value of a gene while taking its value range [math]\displaystyle{ [x_{\min}, x_{\max}] }[/math] into account is the mutation relative parameter change of the evolutionary algorithm GLEAM (General Learning Evolutionary Algorithm and Method),[14] in which, as with the mutation presented earlier, small changes are more likely than large ones.

Distribution of probabilities for k=10 sub-areas of the total change interval. The sub-areas each cover 1/k of the width of the total change interval.

First, an equally distributed decision is made as to whether the current value [math]\displaystyle{ x }[/math] should be increased or decreased and then the corresponding total change interval is determined. Without loss of generality, an increase is assumed for the explanation and the total change interval is then [math]\displaystyle{ [x, x_\max] }[/math]. It is divided into [math]\displaystyle{ k }[/math] sub-areas of equal size with the width [math]\displaystyle{ \delta }[/math], from which [math]\displaystyle{ k }[/math] sub-change intervals of different size are formed:

[math]\displaystyle{ i }[/math]-th sub-change interval: [math]\displaystyle{ [x, x + \delta \cdot i] }[/math] with
[math]\displaystyle{ \delta = \frac{(x_\text{max} - x)}{k} }[/math] and [math]\displaystyle{ i = 1, \dots, k }[/math]

Subsequently, one of the [math]\displaystyle{ k }[/math] sub-change intervals is selected in equal distribution and a random number, also equally distributed, is drawn from it as the new value [math]\displaystyle{ x' }[/math] of the gene. The resulting summed probabilities of the sub-change intervals result in the probability distribution of the [math]\displaystyle{ k }[/math] sub-areas for the exemplary case of [math]\displaystyle{ k=10 }[/math] shown in the adjacent figure. This is not a normal distribution as before, but this distribution also clearly favours small changes over larger ones.

This mutation for larger values of [math]\displaystyle{ k }[/math], such as 10, is less well suited for tasks where the optimum lies on one of the value range boundaries. This can be remedied by significantly reducing [math]\displaystyle{ k }[/math] when a gene value approaches its limits very closely.

Mutation of permutations

Mutations of permutations are specially designed for genomes that are themselves permutations of a set. These are often used to solve combinatorial tasks.[8][15][16] In the two mutations presented, parts of the genome are rotated or inverted.

Rotation to the right

The presentation of the procedure[16] is illustrated by an example on the right:

Procedure    Example
* Let a permutation be given.    [math]\displaystyle{ P_0 = \left( A,B,C,D,E,F,G \right) }[/math]
* Select a partial list, i.e. a start index [math]\displaystyle{ i }[/math] and an end index [math]\displaystyle{ j }[/math] in [math]\displaystyle{ P_0 }[/math], which are both natural numbers between 0 and [math]\displaystyle{ \left|P_0\right|-1 }[/math]. Choose the number of positions [math]\displaystyle{ k }[/math] by which the partial list should be rotated, where [math]\displaystyle{ 0 \lt k \lt |P_0| }[/math]. The start index can also be after the end index. Then the partial list simply starts again from the beginning (periodic boundary condition). This is necessary so that the permutation probability in the genome is the same everywhere and is not greater in the middle than at the edges.    [math]\displaystyle{ i = 5 }[/math], [math]\displaystyle{ j = 1 }[/math], [math]\displaystyle{ k = 1 }[/math]
* Copy [math]\displaystyle{ P_0 }[/math] to [math]\displaystyle{ P_1 }[/math] and rotate the partial list by [math]\displaystyle{ k }[/math] positions to the right.    [math]\displaystyle{ P_1 = \left( \underline {G,A},C,D,E,\underline {B,F} \right) }[/math]
* [math]\displaystyle{ P_1 }[/math] is then the mutated genome.    [math]\displaystyle{ P_1 = \left( G,A,C,D,E,B,F \right) }[/math]

Inversion

The presentation of the procedure[15] is illustrated by an example on the right:

Procedure    Example
* Let a permutation be given.    [math]\displaystyle{ P_0 = \left( A,B,C,D,E,F,G \right) }[/math]
* Select a partial list, i.e. a start index [math]\displaystyle{ i }[/math] and an end index [math]\displaystyle{ j }[/math] in [math]\displaystyle{ P_0 }[/math], which are both natural numbers between 0 and [math]\displaystyle{ \left|P_0\right|-1 }[/math], where [math]\displaystyle{ i \ne j }[/math]. This condition causes the mutation to always produce a genotypically altered chromosome. The start index can also be after the end index. Then the partial list simply starts again from the beginning (periodic boundary condition). This is necessary so that the permutation probability in the genome is the same everywhere and is not greater in the middle than at the edges.    [math]\displaystyle{ i = 5 }[/math], [math]\displaystyle{ j = 1 }[/math]
* Copy [math]\displaystyle{ P_0 }[/math] to [math]\displaystyle{ P_1 }[/math] and invert the partial list.    [math]\displaystyle{ P_1 = \left( \underline {G,F},C,D,E,\underline {B,A} \right) }[/math]
* [math]\displaystyle{ P_1 }[/math] is then the mutated genome.    [math]\displaystyle{ P_1 = \left( G,F,C,D,E,B,A \right) }[/math]

Variants with preference for smaller changes

The requirement raised at the beginning for mutations, according to which small changes should be more probable than large ones, is only inadequately fulfilled by the two permutation mutations presented, since the lengths of the partial lists and the number of shift positions are determined in an equally distributed manner. However, the longer the partial list and the shift, the greater the change in gene order.

This can be remedied by the following modifications. The end index [math]\displaystyle{ j }[/math] of the partial lists is determined as the distance [math]\displaystyle{ d }[/math] to the start index [math]\displaystyle{ i }[/math]:

[math]\displaystyle{ j = (i+ d) \bmod \left|P_0\right| }[/math]

where [math]\displaystyle{ d }[/math] is determined randomly according to one of the two procedures for the mutation of real numbers from the interval [math]\displaystyle{ \left[0, \left|P_0\right| - 1\right] }[/math] and rounded.

For the rotation, [math]\displaystyle{ k }[/math] is determined similarly to the distance [math]\displaystyle{ d }[/math], but the value [math]\displaystyle{ 0 }[/math] is forbidden.

For the inversion, note that [math]\displaystyle{ i \ne j }[/math] must hold, so for [math]\displaystyle{ d }[/math] the value [math]\displaystyle{ 0 }[/math] must be excluded.

See also

References

  1. "XI. Crossover and Mutation". Marek Obitko. http://www.obitko.com/tutorials/genetic-algorithms/crossover-mutation.php. Retrieved 2011-04-07. 
  2. Eiben, A.E.; Smith, J.E. (2015). "Variation Operators (Mutation and Recombination)". Introduction to Evolutionary Computing. Natural Computing Series. Berlin, Heidelberg: Springer. pp. 31–32. doi:10.1007/978-3-662-44874-8. ISBN 978-3-662-44873-1. http://link.springer.com/10.1007/978-3-662-44874-8. 
  3. Bäck, Thomas; Fogel, David B.; Whitley, Darrell; Angeline, Peter J. (1999). "Mutation operators". in Bäck, Thomas (in en). Evolutionary computation. Vol. 1, Basic algorithms and operators. Boca Racon: CRC Press. pp. 237–255. ISBN 0-585-30560-9. OCLC 45730387. https://www.worldcat.org/oclc/45730387. 
  4. Mirjalili, Seyedali (2019), Mirjalili, Seyedali, ed., "Genetic Algorithm" (in en), Evolutionary Algorithms and Neural Networks: Theory and Applications, Studies in Computational Intelligence (Cham: Springer International Publishing) 780: pp. 43–55, doi:10.1007/978-3-319-93025-1_4, ISBN 978-3-319-93025-1, https://doi.org/10.1007/978-3-319-93025-1_4, retrieved 2023-05-26 
  5. Harifi, Sasan; Mohamaddoust, Reza (2023-05-01). "Zigzag mutation: a new mutation operator to improve the genetic algorithm" (in en). Multimedia Tools and Applications. doi:10.1007/s11042-023-15518-3. ISSN 1573-7721. https://doi.org/10.1007/s11042-023-15518-3. 
  6. Katoch, Sourabh; Chauhan, Sumit Singh; Kumar, Vijay (2021-02-01). "A review on genetic algorithm: past, present, and future" (in en). Multimedia Tools and Applications 80 (5): 8091–8126. doi:10.1007/s11042-020-10139-6. ISSN 1573-7721. PMID 33162782. PMC 7599983. https://doi.org/10.1007/s11042-020-10139-6. 
  7. Eiben, A.E.; Smith, J.E. (2015). "Representation, Mutation, and Recombination". Introduction to Evolutionary Computing. Natural Computing Series. Berlin, Heidelberg: Springer. pp. 49–78. doi:10.1007/978-3-662-44874-8. ISBN 978-3-662-44873-1. http://link.springer.com/10.1007/978-3-662-44874-8. 
  8. 8.0 8.1 8.2 8.3 Michalewicz, Zbigniew (1992). Genetic Algorithms + Data Structures = Evolution Programs. Artificial Intelligence. Berlin, Heidelberg: Springer Berlin Heidelberg. doi:10.1007/978-3-662-02830-8. ISBN 978-3-662-02832-2. http://link.springer.com/10.1007/978-3-662-02830-8. 
  9. Rechenberg, Ingo (1973) (in de). Evolutionsstrategie – Optimierung technischer Systeme nach Prinzipien der biologischen Evolution (PhD thesis). Frommann-Holzboog. ISBN 3-7728-0373-3. 
  10. Schwefel, Hans-Paul (1977) (in de). Numerische Optimierung von Computermodellen (PhD thesis). Basel: Birkhäuser Verlag. Translation: Numerical optimization of computer models, Wiley, Chichester, 1981. ISBN 0-471-09988-0. OCLC 8011455. 
  11. Wright, Alden H. (1991), Rawlins, Gregory J. E., ed. (in en), Genetic Algorithms for Real Parameter Optimization, Foundations of Genetic Algorithms, 1, Elsevier, pp. 205–218, doi:10.1016/b978-0-08-050684-5.50016-1, ISBN 9780080506845, https://www.sciencedirect.com/science/article/pii/B9780080506845500161, retrieved 2023-01-02 
  12. Eshelman, Larry J.; Schaffer, J. David (1993), "Real-Coded Genetic Algorithms and Interval-Schemata" (in en), Foundations of Genetic Algorithms (Elsevier) 2: pp. 187–202, doi:10.1016/b978-0-08-094832-4.50018-0, ISBN 978-0-08-094832-4, https://linkinghub.elsevier.com/retrieve/pii/B9780080948324500180, retrieved 2023-01-01 
  13. Herrera, F.; Lozano, M.; Verdegay, J.L. (1998). "Tackling Real-Coded Genetic Algorithms: Operators and Tools for Behavioural Analysis.". Artificial Intelligence Review 12 (4): 265–319. doi:10.1023/A:1006504901164. http://link.springer.com/10.1023/A:1006504901164. 
  14. Blume, Christian; Jakob, Wilfried (2002), "GLEAM - An Evolutionary Algorithm for Planning and Control Based on Evolution Strategy", Conf. Proc. of Genetic and Evolutionary Computation Conference (GECCO 2002) Late Breaking Papers: pp. 31–38, https://publikationen.bibliothek.kit.edu/170053025/3814288, retrieved 2023-01-01 
  15. 15.0 15.1 Eiben, A.E.; Smith, J.E. (2015). "Mutation for Permutation Representation" (in en). Introduction to Evolutionary Computing. Natural Computing Series. Berlin, Heidelberg: Springer. pp. 69–70. doi:10.1007/978-3-662-44874-8. ISBN 978-3-662-44873-1. https://link.springer.com/10.1007/978-3-662-44874-8. 
  16. 16.0 16.1 Yu, Xinjie; Gen, Mitsuo (2010). "Mutation Operators" (in en). Introduction to Evolutionary Algorithms. Decision Engineering. London: Springer. pp. 286–288. doi:10.1007/978-1-84996-129-5. ISBN 978-1-84996-128-8. http://link.springer.com/10.1007/978-1-84996-129-5. 

Bibliography