58 International Journal of Cognitive Informatics and Natural Intelligence, 7(3), 58-79, July-September 2013
Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
ABSTRACT
This paper proposes the application of chaos in large search space problems, and suggests that this represents
the next evolutionary step in the development of adaptive and intelligent systems towards cognitive machines
and systems. Three different versions of chaotic simulated annealing (XSA) were applied to combinatorial
optimization problems in multiprocessor task allocation. Chaotic walks in the solution space were taken to
search for the global optimum or “good enough” task-to-processor allocation solutions. Chaotic variables
were generated to set the number of perturbations made in each iteration of a XSA algorithm. In addition,
parameters of a chaotic variable generator were adjusted to create different chaotic distributions with which
to search the solution space. The results show that the convergence rate of the XSA algorithm is faster than
simulated annealing when the solutions are far apart in the solution space. In particular, the XSA algorithms
found simulated annealing’s best result on average about 4 times faster than simulated annealing.
Chaotic Walk in Simulated
Annealing Search Space
for Task Allocation in a
Multiprocessing System
Ken Ferens, Department of Electrical and Computer Engineering, University of Manitoba,
Winnipeg, Canada
Darcy Cook, JCA Electronics, Winnipeg, Canada
Witold Kinsner, Department of Electrical and Computer Engineering, University of Manitoba,
Winnipeg, Canada
Keywords: Chaotic Simulated Annealing (XSA), Combinatorial Optimization, Processor Scheduling, Task
Allocation, Task-To-Processor
1. INTRODUCTION
Many attempts are being made to evolve
adaptive and intelligent systems to cognitive
machines and systems (e.g., Kinsner, 2007(Kin-
sner, 2007); Kinsner, 2009(Kinsner, 2009);
Hollnagel & Woods, 2005) such as cognitive
radio (e.g., Haykin, 2005 ; Biglieri, Goldsmith,
Greenstein, Mandayam, & Poor, 2013), cogni-
tive radar (Haykin, 2006), cognitive wireless
networks (e.g., Hossain & Bhargava, 2010;
Marshall, 2013), cognitive control (Haykin,
Fatemi, Setoodeh, & Xue, 2012), cognitive
robots (Wang, Zhang, & Kinsner, 2010), cogni-
tive security (Kinsner, 2012), cognitive signal
processing (e.g., (Kinsner & Zhang, 2010)),
DOI: 10.4018/ijcini.2013070104