Extreme learning machine

Extreme learning machines are feedforward neural networks for classification, regression, clustering, sparse approximation, compression and feature learning with a single layer or multiple layers of hidden nodes, where the parameters of hidden nodes (not just the weights connecting inputs to hidden nodes) need to be tuned. These hidden nodes can be randomly assigned and never updated (i.e. they are random projection but with nonlinear transforms), or can be inherited from their ancestors without being changed. In most cases, the output weights of hidden nodes are usually learned in a single step, which essentially amounts to learning a linear model.

The name "extreme learning machine" (ELM) was given to such models by Guang-Bin Huang who originally proposed for the networks with any type of nonlinear piecewise continuous hidden nodes including biological neurons and different type of mathematical basis functions.[1][2] The idea for artificial neural networks goes back to Frank Rosenblatt, who not only published a single layer Perceptron in 1958,[3] but also introduced a multilayer perceptron with 3 layers: an input layer, a hidden layer with randomized weights that did not learn, and a learning output layer.[4]

According to some researchers, these models are able to produce good generalization performance and learn thousands of times faster than networks trained using backpropagation.[5] In literature, it also shows that these models can outperform support vector machines in both classification and regression applications.[6][1][7]

History

edit

From 2001-2010, ELM research mainly focused on the unified learning framework for "generalized" single-hidden layer feedforward neural networks (SLFNs), including but not limited to sigmoid networks, RBF networks, threshold networks,[8] trigonometric networks, fuzzy inference systems, Fourier series,[9][10] Laplacian transform, wavelet networks,[11] etc. One significant achievement made in those years is to successfully prove the universal approximation and classification capabilities of ELM in theory.[9][12][13]

From 2010 to 2015, ELM research extended to the unified learning framework for kernel learning, SVM and a few typical feature learning methods such as Principal Component Analysis (PCA) and Non-negative Matrix Factorization (NMF). It is shown that SVM actually provides suboptimal solutions compared to ELM, and ELM can provide the whitebox kernel mapping, which is implemented by ELM random feature mapping, instead of the blackbox kernel used in SVM. PCA and NMF can be considered as special cases where linear hidden nodes are used in ELM.[14][15]

From 2015 to 2017, an increased focus has been placed on hierarchical implementations[16][17] of ELM. Additionally since 2011, significant biological studies have been made that support certain ELM theories.[18][19][20]

From 2017 onwards, to overcome low-convergence problem during training LU decomposition, Hessenberg decomposition and QR decomposition based approaches with regularization have begun to attract attention[21][22][23]

In 2017, Google Scholar Blog published a list of "Classic Papers: Articles That Have Stood The Test of Time".[24] Among these are two papers written about ELM which are shown in studies 2 and 7 from the "List of 10 classic AI papers from 2006".[25][26][27]

Algorithms

edit

Given a single hidden layer of ELM, suppose that the output function of the  -th hidden node is  , where   and   are the parameters of the  -th hidden node. The output function of the ELM for single hidden layer feedforward networks (SLFN) with   hidden nodes is:

 , where   is the output weight of the  -th hidden node.

  is the hidden layer output mapping of ELM. Given   training samples, the hidden layer output matrix   of ELM is given as:  

and   is the training data target matrix:  

Generally speaking, ELM is a kind of regularization neural networks but with non-tuned hidden layer mappings (formed by either random hidden nodes, kernels or other implementations), its objective function is:

 

where  .

Different combinations of  ,  ,   and   can be used and result in different learning algorithms for regression, classification, sparse coding, compression, feature learning and clustering.

As a special case, a simplest ELM training algorithm learns a model of the form (for single hidden layer sigmoid neural networks):

 

where W1 is the matrix of input-to-hidden-layer weights,   is an activation function, and W2 is the matrix of hidden-to-output-layer weights. The algorithm proceeds as follows:

  1. Fill W1 with random values (e.g., Gaussian random noise);
  2. estimate W2 by least-squares fit to a matrix of response variables Y, computed using the pseudoinverse +, given a design matrix X:
     

Architectures

edit

In most cases, ELM is used as a single hidden layer feedforward network (SLFN) including but not limited to sigmoid networks, RBF networks, threshold networks, fuzzy inference networks, complex neural networks, wavelet networks, Fourier transform, Laplacian transform, etc. Due to its different learning algorithm implementations for regression, classification, sparse coding, compression, feature learning and clustering, multi ELMs have been used to form multi hidden layer networks, deep learning or hierarchical networks.[16][17][28]

A hidden node in ELM is a computational element, which need not be considered as classical neuron. A hidden node in ELM can be classical artificial neurons, basis functions, or a subnetwork formed by some hidden nodes.[12]

Theories

edit

Both universal approximation and classification capabilities[6][1] have been proved for ELM in literature. Especially, Guang-Bin Huang and his team spent almost seven years (2001-2008) on the rigorous proofs of ELM's universal approximation capability.[9][12][13]

Universal approximation capability

edit

In theory, any nonconstant piecewise continuous function can be used as activation function in ELM hidden nodes, such an activation function need not be differential. If tuning the parameters of hidden nodes could make SLFNs approximate any target function  , then hidden node parameters can be randomly generated according to any continuous distribution probability, and   holds with probability one with appropriate output weights  .

Classification capability

edit

Given any nonconstant piecewise continuous function as the activation function in SLFNs, if tuning the parameters of hidden nodes can make SLFNs approximate any target function  , then SLFNs with random hidden layer mapping   can separate arbitrary disjoint regions of any shapes.

Neurons

edit

A wide range of nonlinear piecewise continuous functions   can be used in hidden neurons of ELM, for example:

Real domain

edit

Sigmoid function:  

Fourier function:  

Hardlimit function:  

Gaussian function:  

Multiquadrics function:  

Wavelet:   where   is a single mother wavelet function.

Complex domain

edit

Circular functions:

 

 

Inverse circular functions:

 

 

Hyperbolic functions:

 

 

Inverse hyperbolic functions:

 

 

Reliability

edit

The black-box character of neural networks in general and extreme learning machines (ELM) in particular is one of the major concerns that repels engineers from application in unsafe automation tasks. This particular issue was approached by means of several different techniques. One approach is to reduce the dependence on the random input.[29][30] Another approach focuses on the incorporation of continuous constraints into the learning process of ELMs[31][32] which are derived from prior knowledge about the specific task. This is reasonable, because machine learning solutions have to guarantee a safe operation in many application domains. The mentioned studies revealed that the special form of ELMs, with its functional separation and the linear read-out weights, is particularly well suited for the efficient incorporation of continuous constraints in predefined regions of the input space.

Controversy

edit

There are two main complaints from academic community concerning this work, the first one is about "reinventing and ignoring previous ideas", the second one is about "improper naming and popularizing", as shown in some debates in 2008 and 2015.[33] In particular, it was pointed out in a letter[34] to the editor of IEEE Transactions on Neural Networks that the idea of using a hidden layer connected to the inputs by random untrained weights was already suggested in the original papers on RBF networks in the late 1980s; Guang-Bin Huang replied by pointing out subtle differences.[35] In a 2015 paper,[1] Huang responded to complaints about his invention of the name ELM for already-existing methods, complaining of "very negative and unhelpful comments on ELM in neither academic nor professional manner due to various reasons and intentions" and an "irresponsible anonymous attack which intends to destroy harmony research environment", arguing that his work "provides a unifying learning platform" for various types of neural nets,[1] including hierarchical structured ELM.[28] In 2015, Huang also gave a formal rebuttal to what he considered as "malign and attack."[36] Recent research replaces the random weights with constrained random weights.[6][37]

Open sources

edit

See also

edit

References

edit
  1. ^ a b c d e Huang, Guang-Bin (2015). "What are Extreme Learning Machines? Filling the Gap Between Frank Rosenblatt's Dream and John von Neumann's Puzzle" (PDF). Cognitive Computation. 7 (3): 263–278. doi:10.1007/s12559-015-9333-0. S2CID 13936498. Archived from the original (PDF) on 2017-06-10. Retrieved 2015-07-30.
  2. ^ Huang, Guang-Bin (2014). "An Insight into Extreme Learning Machines: Random Neurons, Random Features and Kernels" (PDF). Cognitive Computation. 6 (3): 376–390. doi:10.1007/s12559-014-9255-2. S2CID 7419259.
  3. ^ Rosenblatt, Frank (1958). "The Perceptron: A Probabilistic Model For Information Storage And Organization in the Brain". Psychological Review. 65 (6): 386–408. CiteSeerX 10.1.1.588.3775. doi:10.1037/h0042519. PMID 13602029. S2CID 12781225.
  4. ^ Rosenblatt, Frank (1962). Principles of Neurodynamics. Spartan, New York.
  5. ^ Huang, Guang-Bin; Zhu, Qin-Yu; Siew, Chee-Kheong (2006). "Extreme learning machine: theory and applications". Neurocomputing. 70 (1): 489–501. CiteSeerX 10.1.1.217.3692. doi:10.1016/j.neucom.2005.12.126. S2CID 116858.
  6. ^ a b c Huang, Guang-Bin; Hongming Zhou; Xiaojian Ding; and Rui Zhang (2012). "Extreme Learning Machine for Regression and Multiclass Classification" (PDF). IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics. 42 (2): 513–529. CiteSeerX 10.1.1.298.1213. doi:10.1109/tsmcb.2011.2168604. PMID 21984515. S2CID 15037168. Archived from the original (PDF) on 2017-08-29. Retrieved 2017-08-19.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  7. ^ Huang, Guang-Bin (2014). "An Insight into Extreme Learning Machines: Random Neurons, Random Features and Kernels" (PDF). Cognitive Computation. 6 (3): 376–390. doi:10.1007/s12559-014-9255-2. S2CID 7419259.
  8. ^ Huang, Guang-Bin, Qin-Yu Zhu, K. Z. Mao, Chee-Kheong Siew, P. Saratchandran, and N. Sundararajan (2006). "Can Threshold Networks Be Trained Directly?" (PDF). IEEE Transactions on Circuits and Systems-II: Express Briefs. 53 (3): 187–191. doi:10.1109/tcsii.2005.857540. S2CID 18076010. Archived from the original (PDF) on 2017-08-29. Retrieved 2017-08-22.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  9. ^ a b c Huang, Guang-Bin, Lei Chen, and Chee-Kheong Siew (2006). "Universal Approximation Using Incremental Constructive Feedforward Networks with Random Hidden Nodes" (PDF). IEEE Transactions on Neural Networks. 17 (4): 879–892. doi:10.1109/tnn.2006.875977. PMID 16856652. S2CID 6477031. Archived from the original (PDF) on 2017-08-29. Retrieved 2017-08-22.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  10. ^ Rahimi, Ali, and Benjamin Recht (2008). "Weighted Sums of Random Kitchen Sinks: Replacing Minimization with Randomization in Learning" (PDF). Advances in Neural Information Processing Systems. 21.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  11. ^ Cao, Jiuwen, Zhiping Lin, Guang-Bin Huang (2010). "Composite Function Wavelet Neural Networks with Extreme Learning Machine". Neurocomputing. 73 (7–9): 1405–1416. doi:10.1016/j.neucom.2009.12.007.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  12. ^ a b c Huang, Guang-Bin, Lei Chen (2007). "Convex Incremental Extreme Learning Machine" (PDF). Neurocomputing. 70 (16–18): 3056–3062. doi:10.1016/j.neucom.2007.02.009. Archived from the original (PDF) on 2017-08-10. Retrieved 2017-08-22.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  13. ^ a b Huang, Guang-Bin, and Lei Chen (2008). "Enhanced Random Search Based Incremental Extreme Learning Machine" (PDF). Neurocomputing. 71 (16–18): 3460–3468. CiteSeerX 10.1.1.217.3009. doi:10.1016/j.neucom.2007.10.008. Archived from the original (PDF) on 2014-10-14. Retrieved 2017-08-22.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  14. ^ He, Qing, Xin Jin, Changying Du, Fuzhen Zhuang, Zhongzhi Shi (2014). "Clustering in Extreme Learning Machine Feature Space" (PDF). Neurocomputing. 128: 88–95. doi:10.1016/j.neucom.2012.12.063. S2CID 30906342.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  15. ^ Kasun, Liyanaarachchi Lekamalage Chamara, Yan Yang, Guang-Bin Huang, and Zhengyou Zhang (2016). "Dimension Reduction With Extreme Learning Machine" (PDF). IEEE Transactions on Image Processing. 25 (8): 3906–3918. Bibcode:2016ITIP...25.3906K. doi:10.1109/tip.2016.2570569. PMID 27214902. S2CID 1803922.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  16. ^ a b Huang, Guang-Bin, Zuo Bai, and Liyanaarachchi Lekamalage Chamara Kasun, and Chi Man Vong (2015). "Local Receptive Fields Based Extreme Learning Machine" (PDF). IEEE Computational Intelligence Magazine. 10 (2): 18–29. doi:10.1109/mci.2015.2405316. S2CID 1417306. Archived from the original (PDF) on 2017-08-08. Retrieved 2017-08-22.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  17. ^ a b Tang, Jiexiong, Chenwei Deng, and Guang-Bin Huang (2016). "Extreme Learning Machine for Multilayer Perceptron" (PDF). IEEE Transactions on Neural Networks and Learning Systems. 27 (4): 809–821. doi:10.1109/tnnls.2015.2424995. PMID 25966483. S2CID 206757279. Archived from the original (PDF) on 2017-07-12. Retrieved 2017-08-22.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  18. ^ Barak, Omri; Rigotti, Mattia; and Fusi, Stefano (2013). "The Sparseness of Mixed Selectivity Neurons Controls the Generalization-Discrimination Trade-off". Journal of Neuroscience. 33 (9): 3844–3856. doi:10.1523/jneurosci.2753-12.2013. PMC 6119179. PMID 23447596.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  19. ^ Rigotti, Mattia; Barak, Omri; Warden, Melissa R.; Wang, Xiao-Jing; Daw, Nathaniel D.; Miller, Earl K.; and Fusi, Stefano (2013). "The Importance of Mixed Selectivity in Complex Cognitive Tasks". Nature. 497 (7451): 585–590. Bibcode:2013Natur.497..585R. doi:10.1038/nature12160. PMC 4412347. PMID 23685452.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  20. ^ Fusi, Stefano, Earl K Miller and Mattia Rigotti (2015). "Why Neurons Mix: High Dimensionality for Higher Cognition" (PDF). Current Opinion in Neurobiology. 37: 66–74. doi:10.1016/j.conb.2016.01.010. PMID 26851755. S2CID 13897721.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  21. ^ Kutlu, Yakup Kutlu, Apdullah Yayık, and Esen Yıldırım, and Serdar Yıldırım (2017). "LU triangularization extreme learning machine in EEG cognitive task classification". Neural Computation and Applications. 31 (4): 1117–1126. doi:10.1007/s00521-017-3142-1. S2CID 6572895.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  22. ^ Apdullah Yayık; Yakup Kutlu; Gökhan Altan (12 July 2019). "Regularized HessELM and Inclined Entropy Measurement forCongestive Heart Failure Prediction". arXiv:1907.05888 [cs.LG].
  23. ^ Altan, Gökhan Altan, Yakup Kutlu, Adnan Özhan Pekmezci and Apdullah Yayık (2018). "Diagnosis of Chronic Obstructive Pulmonary Disease using Deep Extreme Learning Machines with LU Autoencoder Kernel". International Conference on Advanced Technologies.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  24. ^ "Classic Papers: Articles That Have Stood The Test of Time". University of Nottingham. 15 June 2017. Retrieved 21 December 2023.
  25. ^ ""List of 10 classic AI papers from 2006"". 2017. Retrieved 21 December 2023.
  26. ^ Huang, G.B.; Zhu, Q.Y.; Siew, C.K. (December 2006). "Extreme learning machine: theory and applications". Neurocomputing. 70 (1–3): 489–501. doi:10.1016/j.neucom.2005.12.126. ISSN 0925-2312. S2CID 116858. Retrieved 21 December 2023.
  27. ^ Liang, N.Y.; Huang, G.B.; Saratchandran, P.; Sundararajan, N. (November 2006). "A fast and accurate online sequential learning algorithm for feedforward networks". IEEE Transactions on Neural Networks. 17 (6): 1411–1423. doi:10.1109/TNN.2006.880583. PMID 17131657. S2CID 7028394. Retrieved 21 December 2023.
  28. ^ a b Zhu, W.; Miao, J.; Qing, L.; Huang, G. B. (2015-07-01). "Hierarchical Extreme Learning Machine for unsupervised representation learning". 2015 International Joint Conference on Neural Networks (IJCNN). pp. 1–8. doi:10.1109/IJCNN.2015.7280669. ISBN 978-1-4799-1960-4. S2CID 14222151.
  29. ^ Neumann, Klaus; Steil, Jochen J. (2011). "Batch intrinsic plasticity for extreme learning machines". Proc. Of International Conference on Artificial Neural Networks: 339–346.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  30. ^ Neumann, Klaus; Steil, Jochen J. (2013). "Optimizing extreme learning machines via ridge regression and batch intrinsic plasticity". Neurocomputing. 102: 23–30. doi:10.1016/j.neucom.2012.01.041.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  31. ^ Neumann, Klaus; Rolf, Matthias; Steil, Jochen J. (2013). "Reliable integration of continuous constraints into extreme learning machines". International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 21 (supp02): 35–50. doi:10.1142/S021848851340014X. ISSN 0218-4885.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  32. ^ Neumann, Klaus (2014). Reliability. University Library Bielefeld. pp. 49–74.
  33. ^ "The Official Homepage on Origins of Extreme Learning Machines (ELM)". Retrieved 15 December 2018.
  34. ^ Wang, Lipo P.; Wan, Chunru R. (2008). "Comments on "The Extreme Learning Machine"". IEEE Trans. Neural Netw. 19 (8): 1494–5, author reply 1495–6. CiteSeerX 10.1.1.217.2330. doi:10.1109/TNN.2008.2002273. PMID 18701376.
  35. ^ Huang, Guang-Bin (2008). "Reply to "comments on 'the extreme learning machine' "". IEEE Transactions on Neural Networks. 19 (8): 1495–1496. doi:10.1109/tnn.2008.2002275. S2CID 14720232.
  36. ^ Guang-Bin, Huang (2015). "WHO behind the malign and attack on ELM, GOAL of the attack and ESSENCE of ELM" (PDF). www.extreme-learning-machines.org.
  37. ^ Zhu, W.; Miao, J.; Qing, L. (2014-07-01). "Constrained Extreme Learning Machine: A novel highly discriminative random feedforward neural network". 2014 International Joint Conference on Neural Networks (IJCNN). pp. 800–807. doi:10.1109/IJCNN.2014.6889761. ISBN 978-1-4799-1484-5. S2CID 5769519.
  38. ^ Akusok, Anton; Bjork, Kaj-Mikael; Miche, Yoan; Lendasse, Amaury (2015). "High-Performance Extreme Learning Machines: A Complete Toolbox for Big Data Applications". IEEE Access. 3: 1011–1025. Bibcode:2015IEEEA...3.1011A. doi:10.1109/access.2015.2450498.{{cite journal}}: CS1 maint: multiple names: authors list (link)