Next Article in Journal
Towards an Accessible Platform for Multimodal Extended Reality Smart Environments
Previous Article in Journal
Design Factors of Shared Situation Awareness Interface in Human–Machine Co-Driving
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum-Inspired Evolutionary Algorithm for Optimal Service-Matching Task Assignment

Department of Mechanical and Aerospace Engineering, University of California Irvine, Irvine, CA 92697, USA
*
Author to whom correspondence should be addressed.
Information 2022, 13(9), 438; https://doi.org/10.3390/info13090438
Submission received: 1 August 2022 / Revised: 2 September 2022 / Accepted: 9 September 2022 / Published: 17 September 2022

Abstract

:
This paper proposes a quantum-inspired evolutionary algorithm (QiEA) to solve an optimal service-matching task-assignment problem. Our proposed algorithm comes with the advantage of generating always feasible population individuals and, thus, eliminating the necessity for a repair step. That is, with respect to other quantum-inspired evolutionary algorithms, our proposed QiEA algorithm presents a new way of collapsing the quantum state that integrates the problem constraints in order to avoid later adjusting operations of the system to make it feasible. This results in lower computations and also faster convergence. We compare our proposed QiEA algorithm with three commonly used benchmark methods: the greedy algorithm, Hungarian method and Simplex, in five different case studies. The results show that the quantum approach presents better scalability and interesting properties that can be used in a wider class of assignment problems where the matching is not perfect.

1. Introduction

This paper considers a linear optimal service-matching task assignment problem defined by
Z * = arg min i S j T c i , j Z i , j s . t .
Z i , j { 0 , 1 } , i S = { 1 , , N } , j T = { 1 , , M } ,
j T Z i , j = 1 , i S ,
i S Z i , j 1 , j T ,
where Z = [ Z i , j ] is the assignment matrix with N rows and M columns. We refer to S as service agent set and its elements as service agent, and to T as task set and its elements as task. Thus, c i , j > 0 is the cost of the assignment of service agent i S to task j T , and Z i , j = 1 means that service agent i S is assigned to task j T . Without loss of generality, we assume that N M , i.e., the task set, is larger than the service agent set. The imposed constraint (1c) ensures that each service agent gets only one task, while constrain (1d) limits the assignment of any task to, at most, one service agent. Z * is the adjacency matrix of the resultant matching graph after the assignment is peformed.
An example scenario inspired by the service-matching mobile-agent deployment for coverage over a dense set of targets studied in [1] is shown in Figure 1. In this service-matching problem, service UAVs A1, A2, A3 (flying at the same altitude), whose spatial service over the horizontal two-dimensional (2D) plane is described by a Gaussian distribution, should be deployed to provide coverage to a set of dense targets in a 2D flat plane. The targets are clustered into subgroups TC1, TC2, TC3, and TC4, each described by a Gaussian distribution of the targets. The assignment cost c i , j is the measure of similarity between the service distribution of agent Ai and the distribution of targets in subgroup TCj, measured in terms of the Kullback–Leibler divergence (KLD) ([2], p. 34). More details are provided in Section 4, where we conduct a numerical study of this service-matching task assignment.
There are many other service-matching applications which can be used with the optimal AP problem (Section 1). For example, in manufacturing, in assembly lines, where there must be a planning between the operators and the tasks [3,4]. Other situations such as in delivery tasks or ridesharing [5] can also be formulated in the same way. In addition, some social, economical or political situations are no more than an AP [6].
As in other combinatorial optimisation problems, there is a lack of methods that can achieve a good approximation factor in polynomial time with good scalability. Currently, the main algorithms still used to solve service-matching problems (Section 1) are classical methods such as the greedy algorithm, which, theoretically, ensures an approximation factor of 63% [7] with a complexity of O ( N M log M ) [8]. The Hungarian method, with an approximation factor of 1 and a complexity of O ( N M ( N + M ) ) [8], or the Simplex method with, also, an approximation factor of 1 and a complexity of O ( N 2 M 2 ) [8]. The reader should note that the aforementioned complexity bounds for the Hungarian and Simplex algorithms are based on execution of these algorithms when N = M .
With the rise of machine learning, new techniques such as neural networks, reinforcement learning or evolutionary algorithms have been formulated to solve combinatorial optimisation problems. Related to all these techniques, the advances in quantum computation have originated a new field of study: quantum-inspired algorithms. Quantum-inspired algorithms try to formulate classical algorithms in a quantum way, using qbits and its properties, in order to increase the speed of these methods (Quantum-computing- related terminologies used here are defined in Section 2. The interested reader can find more detailed information in [9], Chapter 1.) For example, in [10], they use the superposition property in order to accelerate distribution shaping in the travelling salesman problem, or in [11], they use entanglement to prevent a two-agent autonomous system from cyber-physical attacks. In [12] is seen how quantum formulation helps in clustering problems and in [13,14] is seen how quantum properties are interesting for obtaining a better balance between exploration and exploitation in reinforcement learning. The same idea of reducing model size and increasing robustness is seen in other deep-learning techniques in [15]. One of the interesting applications of quantum-inspired algorithm development is explored in [16], where a quantum-inspired version of an evolutionary algorithm (EA) is implemented to solve a knaspack problem with a proven improvement with respect to classical EA.
This paper focuses on developing a computationally efficient suboptimal solution for the service-matching assignment problem (Section 1) using a quantum-inspired EA (QiEA) algorithm and demonstrates its application in solving a service-matching coverage problem illustrated in Figure 1. Special attention is given to the design of the collapsing procedure to make it more coherent with the real collapsing process of qbits and to speed up the process. In Section 2, preliminary notions about quantum theory are presented. The proposed method is presented in Section 3. In Section 4, a numerical study focused on a service-matching task assignment demonstrates the efficacy of our proposed algorithm. The conclusions and our plan for future work are explained in Section 5.

2. Preliminaries

This section gives the definition of the quantum formulation notion and terminologies we use throughout the paper. For the convenience of the reader, we also provide the definition of the KLD measure.
First, following [17], we introduce the notion and the definitions from the quantum formulation. In quantum computation, the basic unit of information is called a Qbit and it is neither one nor zero, but the superposition of both states. That means that, in one timestamp, there is a certain probability that the qbit is in in state zero or in state one. This can be formulated using Dirac’s notation, also known as brakets, as,
| ψ = α | 0 + β | 1
where | ψ is the qbit, | 0 and | 1 are the two possible states and α and β C are the amplitudes of these states. The Born’s rule tells us that these amplitudes are directly related to the probability of being in state | 0 or | 1 as the probability of one state is the power of its amplitude,
p ( 0 | ψ ) = | 0 | ψ | 2 = | α 0 | 0 + β 0 | 1 | 2 = | α | 2 ,
p ( 1 | ψ ) = | 1 | ψ | 2 = | α 1 | 0 + β 1 | 1 | 2 = | β | 2 ,
| α | 2 + | β | 2 = 1 ,
One qbit remains in this superposition until it is measured or observed. When that happens, the qbit becomes fixed in one of the states in the function of the amplitudes, this process is called collapsing.
As explained in Equation (2), in the superposition state, a qbit depends on two parameters, α = a α + j b α and β = a β + j b β , that are indeed complex numbers. Therefore, qbits can be represented with spherical coordinates,
| ψ = α | 0 + β | 1 = ( a α + j b α ) | 0 + ( a β + j b β ) | 1 = r α e j φ α | 0 + r β e j φ β | 1
applying the Born’s rule, Equation (5),
| ψ = e j φ α cos ( θ 2 ) | 0 + sin ( θ 2 ) e j ( φ β φ α ) | 1
were 0 θ π and 0 φ 2 π . It can be demonstrated that e j φ α has no observable effects [18]; therefore, effectively, we only have to consider the following equation,
| ψ = cos ( θ 2 ) | 0 + e j ϕ sin ( θ 2 ) | 1
From Equation (8), it can be seen that a qbit belongs to a Hilbert space H and can be represented as a sphere. This representation is known as a Bloch Sphere, Figure 2.
From the Bloch Sphere, it can be seen that the state of a qbit can be modified using rotations. Indeed, in quantum computation, the logic gates used to develop circuits are no more than rotation operations. In this work, the only important rotation is the θ rotation, as it is the one that makes the superposition state closer or further to states | 0 or | 1 . Therefore, in this case, qbits can be represented as circles and, in order to modify them, a simple rotation matrix will be used.
R ( θ ) = cos ( θ ) sin ( θ ) sin ( θ ) cos ( θ )
KLD is a measure of similarity (dissimilarity) between two probability distributions p ( x ) and q ( x ) , where the smaller the value the more similar two distributions are. KLD is zero if and only if the two distribution are identical ([2], p.34). For Gaussian distributions, p ( x ) = N ( μ 0 , Σ 0 ) and q ( x ) = N ( μ 1 , Σ 1 ) , the KLD has a closed form expression ([19], Equation (2))
D KL p ( x ) | | q ( x ) = 1 2 ln | Σ 1 | | Σ 0 | + ( μ 0 μ 1 ) Σ 1 1 ( μ 0 μ 1 ) + ( Σ 1 1 Σ 0 ) n ,
where n is the dimension of the distributions.
In what follows, we rely on a function best defined as
Z ^ = best ( Z 1 , Z 2 , , Z p ) ,
which, given any finite number of assignment matrices Z 1 , , Z p , return the assignment matrix Z ^ { Z 1 , Z 2 , , Z p } that results in the smallest of cost i S j T c i , j Z i , j l , l { 1 , , p } , computed according to the assignment cost (1a).

3. QiEA for Optimal Service Matching

Inspired by the concept of quantum computing of qbit representation, rotation, observation and qbit collapsing, we propose the QiEA Algorithm 1 as a suboptimal solution to the optimal service-matching problem (1). To design this algorithm, we proceeded as follows.
Consider the assignment matrix Z = [ Z i , j ] . For any given service agent i S , every feasible assignment consists of assigning 1 to one of the elements of Z i , j , j T and zero to the rest, while respecting also (1d). Since we do not know which element should be 1, the idea is to start by a probabilistic approach and, for every service agent i S , attach a notion of probability to every Z i , j , which indicates with what probability that element is 1. Then, at each iteration t of the algorithm, this probability is adjusted as we describe below. The notion of probability for each element Z i , j can be realised using quantum qbits, | ϕ i , j ( t ) = α i , j ( t ) + j β i , j ( t ) . Thus, at each step t of the algorithm, for each individual l in population set P = { 1 , , K } , there is a qbit matrix
| Φ l ( t ) = α 1 , 1 l ( t ) α 1 , 2 l ( t ) α 1 , M l ( t ) β 1 , 1 l ( t ) β 1 , 2 l ( t ) β 1 , M l ( t ) α N , 1 l ( t ) α N , 2 l ( t ) α N , M l ( t ) β N , 1 l ( t ) β N , 2 l ( t ) β N , M l ( t )
with size 2 N × M where each element ( i , j ) is the mentioned probability | ϕ i , j l ( t ) of the assignment between agent i S and task j T .
Algorithm 1 QiEA algorithm for service-matching assignment
1:
procedureQiEA
2:
    Input size of population K, number of iteration MAX_GEN
3:
     t 0
4:
    initialise | Φ 1 ( t ) , , | Φ K ( t )
5:
    generate K individuals Z 1 ( t ) = [ Z i , j 1 ( t ) ] , , Z K ( t ) = [ Z i , j K ( t ) ] by collapsing | Φ l ( t )
6:
    for  l { 1 , , K }  do
7:
         B local l ( t ) evaluate Z l ( t ) = [ Z i , j l ( t ) ]
8:
    end for
9:
     B ( t ) best ( B local 1 ( t ) , , B local K ( t ) )
10:
    while  t MAX_GEN do
11:
         t t + 1
12:
        for  l = { 1 , , K }  do
13:
           generate  Z l ( t ) = [ Z i , j l ( t ) ] by collapsing | Φ l ( t 1 )
14:
            B local l ( t ) evaluate Z l ( t ) = [ Z i , j l ( t ) ]
15:
           update  | Φ l ( t )
16:
           Update B local l ( t 1 ) if B local l ( t ) is better
17:
           if migration condition then
18:
                B local l ( t ) B ( t )
19:
           end if
20:
        end for
21:
    end while
22:
     Z ^ best ( B local 1 (MAX_GEN) , , B local K (MAX_GEN) , B (MAX_GEN) )
23:
end procedure
Evolutionary algorithms are based on the Darwinian explanation of species evolution where, step by step, there are mutations in each individual of the species and, by the end, only the individuals with better adaptation to the new environment survive. The evolutionary algorithms follow a two-step procedure [20]. First, we generate an initial population of individuals randomly. Next, we repeat the following re-generational steps until termination: (a) the fitness of each individual in the population is evaluated (lowest cost, feasibility), (b) the fittest individuals are selected as parents for reproduction, (c) new individuals are bred (from parents) through crossover and mutation operations to give birth to offspring, (d) the least-fit individuals of the population are replaced with new individuals.
QiEA is a probabilistic algorithm similar to other evolutionary algorithms. We use an evolutionary method to go from an initial state of uncertainty | Φ l ( 0 ) to a final determined system Z ^ * , which is a suboptimal solution to (Section 1). The underlying concept in QiEA is that | Φ l ( t ) informs us on how to select individual Z ( t ) = [ Z i , j ( t ) ] at each step of the algorithm (an individual is selected by collapsing | Φ l ( t ) ). | Φ l ( t ) , which determines the probability of each element of Z ( t ) = [ Z i , j ( t ) ] being 0 or 1, is updated at each step based on the fitness of the generated individuals at step t 1 using the rotation method, which will be described below. The advantage of QiEA is, indeed, in this step of updating the probabilities of selecting future individuals based on feedback from the fitness of the generated individuals. The schematic procedure of our QiEA algorithm is shown in Figure 3. Our proposed QiEA is shown in Figure 3: there is a K parallel process to generate K individuals that constitutes the population set of the algorithm. Each individual generation process l P = { 1 , , K } has its own | Φ l ( t ) , initialised at | Φ l ( 0 ) and updated at each iteration of the algorithm.
Our proposed QiEA algorithm consists of three main procedural steps, collapsing, evaluation and updating and migration.
Collapsing procedure: This process is a novel contribution of this work and it is a faithful representation of the quantum-like collapsing of the qbit systems. With this purpose, the collapsing is performed using the maximum randomness possible. At each step t to generate individual Z l ( t ) , first, one random service i and one random target j are selected to form the agent–task pair ( i , j ) . Then, with a uniform probability, we generate a random value γ i , j l ( t ) [ 0 , 1 ] . Then, Z i , j l ( t ) is generated using the collapsing procedure below
Z i , j l ( t ) = 1 if γ i , j l ( t ) | β i , j l ( t ) | 2 0 otherwise
After collapse, the agent–task pair ( i , j ) is removed from the random selection, and the process is repeated until there is no service agent left to be selected (recall our assumption that there is more service agents than the tasks). Our collapsing procedure is summarised in Algorithm 2. It is important to note that, if a service agent is assigned to one task (qbit ( i , j ) is collapsed to one), no other service agent can be assigned to that task and that service agent can not perform any other task. That is exactly what we formulated in constraints  (1c) and (1d). That is, our individual generation procedure always generates feasible individuals Z l ( t ) , and does not need the costly and often ad-hoc repairing of the individuals that other quantum-inspired algorithms, e.g., [10,21,22], need. The elimination of the repair step also results in faster convergence.
Algorithm 2 Collapsing
1:
procedureCollapsing
2:
    Input Qbit system | Φ l ( t )
3:
     S ¯ [ 1 , , N ]
4:
     T ¯ [ 1 , , M ]
5:
    while  S ¯ { }  do
6:
        select random service i S ¯
7:
        select random service i T ¯
8:
        generate γ i , j l ( t ) uniformly from [ 0 , 1 ]
9:
        collapse: Z i , j l ( t ) Equation ( 13 ) ( | ϕ i , j l ( t ) , γ i , j l ( t ) )
10:
        if  Z i , j l ( t ) = 1  then
11:
           remove i from S ¯
12:
           remove j from T ¯
13:
        end if
14:
    end while
15:
end procedure
Evaluation procedure: This procedure has two parts, the computation of the cost for fitness test, and the formulation/updating of the rotation matrix based on the feedback from the fitness analysis. Given the collapsed individuals Z 1 ( t ) , , Z K ( t ) , at step t, firstly, the cost of the assignment f ( Z l ( t ) ) = i S j T c i , j Z i , j l ( t ) is computed. The fitness evaluation not only depends on the cost at time t due to Z l ( t ) but also has temporal information about the evolution of the system by saving the best obtained solution until that iteration, which is stored as B local l ( t ) . The variable B local l for each individual l { 1 , , K } is initialised by collapsing | Φ l ( 0 ) , as described in step 5 of Algorithm 1. The fitness analysis relies on function (11) and updates each local B local l according to B local l ( t ) = best ( Z l ( t ) , B local l ( t 1 ) ) . Next, in the evaluation procedure, we update the qubit matrix | Φ l according to
α i , j l ( t ) β i , j l ( t ) = R ( θ i , j l , t ) α i , j l ( t 1 ) β i , j l ( t 1 ) ,
where rotation angle θ i , j l { 0 , δ π , δ π } is determined from Table 1. Here, 0 < δ π < π 2 is a design parameter which normally is a very small angle. Recall that, according to the circular qbit representation (8), which is visualised in Figure 2, a positive rotation 0 < δ π < π 2 results in increasing the probability of collapsing to 1 and a negative rotation 0 < δ π < π 2 results in increasing the probability of collapsing to 0. We proposed Table 1 based on the logic that if the value of Z i , j l ( t ) and B local i , j l ( t 1 ) are the same, we make no changes to the qbit corresponding to the agent–task pair ( i , j ) , thus setting θ i , j l ( t ) = 0 (cases 1, 2, 7 and 8 in Table 1). If changing from B local i , j l ( t 1 ) = 1 to Z i , j l ( t ) = 0 results in decreasing the total cost, we want to encourage collapsing to Z i , j l ( t ) = 0 by increasing this probability by using a positive rotation θ i , j l = δ π (case 3 in Table 1). On the other hand, if changing from B local i , j l ( t 1 ) = 0 to Z i , j l ( t ) = 1 results in decreasing the total cost, we want to encourage collapsing to Z i , j l ( t ) = 1 by increasing such probability by using a negative rotation θ i , j l = δ π (case 5 in Table 1). If the changes in the values result in increasing the total cost, we do not make any changes to | Φ i , j l , i.e., θ i , j l ( t ) = 0 (cases 4 and 6 in Table 1). To summarise, we make an adjustment to | Φ i , j l if Z i , j l ( t ) B local i , j l ( t 1 ) and the best value at step t is set to Z l ( t ) ; thus, we can interpret the change in B local i , j l ( t 1 ) value as a contributor to decreasing the cost. Algorithm 3 summarises our evaluation procedure.
Algorithm 3 Evaluation
1:
procedure Evaluation
2:
    Input collapsed system Z l ( t ) , best saved solution B local l ( t 1 )
3:
     B local l ( t ) = best ( Z l ( t ) , B local l ( t 1 ) )
4:
     θ i , j l = 0 for any i S and j T
5:
    if  B local l ( t ) = Z l ( t )  then
6:
        for  i S  do
7:
           for  j T  do
8:
               if  Z i , j l ( t ) < B local i , j l ( t 1 )  then
9:
                    θ i , j = δ π
10:
               end if
11:
               if  Z i , j l ( t ) > B local i , j l ( t 1 )  then
12:
                    θ i , j = δ π
13:
               end if
14:
           end for
15:
        end for
16:
    end if
17:
    for  i S  do
18:
        for  j T  do
19:
           update | Φ i , j l ( t ) according to (14)
20:
        end for
21:
    end for
22:
end procedure
Migration procedure: Like other evolutionary algorithms, to avoid getting stuck in local maxima or minima we perform a migration procedure when the migration condition ( t t last migration ) n × MAX_GEN, where n is a percentage that defines when the process is completed. In the migration step, we simply replace the current best local value B local l ( t ) of all the individuals l { 1 , , K } with B ( t ) = best ( B local 1 ( t ) , , B local K ( t ) ) , i.e., B local l ( t ) = B ( t ) ) for all l { 1 , , K } .

4. Numerical Demonstration

To demonstrate the efficacy of our proposed QiEA, consider the service-matching robot-deployment example we described in Section 1 and depicted in Figure 1. Recall that, in this example, we have a set S of N service agents with spatial service distribution p i ( x ) , i S with Gaussian distribution N ( μ i , Σ i ) . Each target cluster T C j , j T , extracted from a GMM model of the entire targets distribution, has a Gaussian distribution q j ( x ) N ( μ ¯ j , Σ ¯ j ) . According to [1], Theorm 2, the best value for c i , j = D KL p i ( x ) | | q j ( x ) is obtained when the robot is moved such that μ i = μ ¯ j and the principle axes of the two uncertainty ellipsoids corresponding to Σ i and Σ ¯ j are parallel. Considering this configuration, for each service agent we compute c i , j = D KL p i ( x ) | | q j ( x ) to form the weighting matrix [ c i , j ] . Next, through a set of numerical simulations, we evaluate the efficacy of our QiEA algorithm in solving this optimal service-matching deployment problem.
In this work, all the simulation codes are developed with Python using well-known open-source libraries. The optimal deployment for service-matching data is randomly generated. We carry out a simulation study that compares the performance of our proposed Algorithm 1 to that of three well-known algorithms: the greedy algorithm, the Hungarian method and the Simplex linear-programming method. The greedy algorithm is an iterative method that greedily selects the smallest value of c i , j to set Z i , j = 1 , eliminates the row and the column corresponding to ( i , j ) from the weight matrix [ c i , j ] and repeats the procedure. The Hungarian method is a similar technique to the Greedy Algorithm but, instead of picking direct assignments from a static cost matrix, the cost matrix is modified at each step in the function of the minimum values of each row and column. Therefore, this method considers not only the minimum cost for each assignment, but also the rest of the assignments, which is why it can achieve the optimal solution. To have a comprehensive study, we also compare our result to that of the Simplex method, which solves the continuous relaxation of the optimal service-matching problem (Section 1).

4.1. Simulation Results

This section presents the results of our numerical experiments. The proposed algorithm is compared to the benchmark methods in five different scenarios. The simulations are conducted via Python programming on a PC with processor Intel(R) Core(TM) i7-10510U CPU @ 1.80GHz 2.30 GHz and a RAM of 16 GB.

4.1.1. Case Studies

We simulate five different scenarios, which are described in Table 2. Case 1 is the perfect-matching case, where N = M . However, there can also be unbalanced cases where the number of target clusters is bigger than the number of the service agents. To demonstrate how our algorithm scales with respect to N and M and also their relative size, we consider various scenarios for when N < M . The normal distributions for each target/service in each experiment are randomly created using Python.

4.1.2. Hyper-Parameters of the QiEA Algorithm 1

To execute the QiEA Algorithm 1, the set of hyper-parameters listed in the first column from the left of Table 3 should be selected. We chose three candidate values for each hyper-parameter as reported in Table 3. To tune the hyper-parameters for each case study listed in Table 2, a grid search over 81 different combinations was implemented. During this grid search, it was observed that there can be two groups of hyperparameters: the ones that make the algorithm more accurate and the ones that make the algorithm faster (compared over same number of epochs). As such, we report the simulation results for two different executions of Algorithm 1 for solving our problem of interest for the cases listed in Table 2: the accurate quantum-inspired evolutionary algorithm (AQiEA) and the fast quantum-inspired evolutionary algorithm (FQiEA). Table 4 gives the chosen hyper-parameters for each case study. Notice that the hyper-parameters are not necessarily the same for each case study.

4.1.3. Metrics

In order to compare and evaluate the performance of the methods, three metrics have been considered, which include optimality gap, execution time complexity and a quality metric. The optimality gap, denoted by α , is defined as
α = cos t computed by the algorithm optimal cos t optimal cos t .
When N = M , the Hungarian and the Simplex methods are guaranteed to produce an optimal solution; however, this guarantee is not the case when N < M . To obtain the optimal value for N < M , a suggested practice is adding M N virtual service agents whose assignment costs to task clusters are much greater than the actual service agents’. This way, a perfect matching problem is created, which we use to generate the optimal cost value for computing the optimality gap. Notice that adding virtual agents increases the computational complexity of the algorithms. The simulation results reported below for all the algorithms consider the actual matching cases when no virtual agent is added.
The execution time, measured in milliseconds (ms), is the time it took to run the algorithm. To unify both prior metrics and for the sake of the comparison, the quality metric Q was implemented in order to have a faster and easier way of comparing and discussing the algorithms. This metric is computed as
Q = 100 α execution time .

4.1.4. Simulation Results

The simulation results for the three aforementioned performance metrics are reported in Table 5, Table 6 and Table 7. Per definition (15), the best optimality result is when α = 0 . Thus, for a suboptimal solution, we desire an α closer to zero. For Case 1, as expected, the results in Table 5 show that the Hungarian and Simplex methods have zero optimality gap. Notice that in Case 1, AQiEA outperforms the greedy method in the optimality gap, while FQiEA delivers a close performance to that of the greedy algorithm. In the rest of the cases, the Hungarian and the Simplex methods also deliver a zero optimality gap, but as Table 6 shows, this comes with a high execution time, especially when the scale of the system grows. In Case 4, the Simplex algorithm failed to converge in a reasonable time, so no results are listed for this case in Table 5, Table 6 and Table 7. Per definition (16), the quality metric Q is designed to be 100 when the optimality gap is zero and the execution time is 1 ms. As the results in Table 7 show, both QiEA algorithms outperform the rest of the methods in terms of the quality metric.

5. Conclusions

This work showed how a quantum-inspired evolutionary algorithm could be used as a practical solution method to solve combinatorial optimisation problems such as an optimal service-matching coverage problem. Our numerical studies showed that the quantum approach presents better scalability and interesting properties that can be used in a wider class of assignment problems where the matching is not perfect. Our future work will apply our proposed quantum-inspired evolutionary algorithm framework in solving submodular maximisation problems, particularly the optimal welfare problem. We will also study the automated tuning of the algorithm hyper-parameters using a machine-learning approach.

Author Contributions

Conceptualization, J.V. and S.K; methodology, J.V.; software, J.V.; validation, S.K.; resources, S.K.; investigation, J.V. and S.K; writing—original draft preparation, J.V.; writing—review and editing, S.K.; supervision, S.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by a Balsells Fellowship grant and there was no APC.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
QiEAQuantum-inspired evolutionary algorithm
AQiEAAccurate quantum-inspired evolutionary algorithm
FQiEAFast quantum-inspired evolutionary algorithm
EAEvolutionary algorithm
APAssignment problem
KLDKullback–Leibler divergence
TCTarget cluster
UAVUnmanned aerial vehicle

References

  1. Chung, Y.; Kia, S.S. A distributed service-matching coverage via heterogeneous agents. IEEE Robot. Autom. Lett. 2022, 7, 4400–4407. [Google Scholar] [CrossRef]
  2. MacKay, D. Information Theory, Inference and Learning Algorithms; Cambridge University Press: Cambridge, UK, 2003; p. 34. [Google Scholar]
  3. Baybars, I. A Survey of exact algorithms for the simple assembly line balancing problem. Manag. Sci. 1986, 32, 909–932. [Google Scholar] [CrossRef]
  4. Sivasankaran, P.; Shahabudeen, P. Literature review of assembly line balancing problems. Int. J. Adv. Technol. 2014, 73, 1665–1694. [Google Scholar] [CrossRef]
  5. Simonetto, A.; Monteil, J.; Gambella, C. Real-time city-scale ridesharing via linear assignment problems. Transp. Res. Part C Emerg. Technol. 2019, 101, 208–232. [Google Scholar] [CrossRef]
  6. Siebert, H. The Assignment Problem. In Beiträge zur mikro- und zur makroökonomik; Berninghaus, S.K., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; Volume 1, pp. 439–448. [Google Scholar]
  7. Sviridenko, M. A note on maximizing a submodular set function subject to a knapsack constraint. Oper. Res. Lett. 2004, 32, 41–43. [Google Scholar] [CrossRef]
  8. Williamson, D.P.; Shmoys, D.B. The Design of Approximation Algorithms; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  9. Woit, P. Introduction. In Quantum Theory, Groups and Representations: An Introduction; Department of Mathematics, Columbia University: New York, NY, USA, 2022; pp. 1–12. [Google Scholar]
  10. Soloviev, V.P.; Bielza, C.; Larranaga, P. Quantum-inspired estimation Of distribution algorithm to solve the travelling salesman problem. In Proceedings of the IEEE Congress on Evolutionary Computation, Kraków, Poland, 28 June–1 July 2021; pp. 416–425. [Google Scholar]
  11. Khoshnoud, F.; de Silva, C.W.; Ibrahim, I. Quantum entanglement of autonomous vehicles for cyber-physical security. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Banff, AB, Canada, 5–8 October 2017; pp. 2655–2660. [Google Scholar]
  12. Xiao, J.; Yan, Y.; Zhang, J.; Tang, Y. A quantum-inspired genetic algorithm for k-means clustering. Expert Syst. Appl. 2010, 37, 4966–4973. [Google Scholar] [CrossRef]
  13. Li, Y.; Aghvami, A.H.; Dong, D. Intelligent trajectory planning in UAV-mounted wireless networks: A quantum-inspired reinforcement learning perspective. IEEE Wirel. Commun. Lett. 2021, 10, 1994–1998. [Google Scholar] [CrossRef]
  14. Chen, C.; Yang, P.; Zhou, X.; Dong, D. A Quantum-inspired Q-learning algorithm for indoor robot navigation. In Proceedings of the IEEE International Conference on Networking, Sensing and Control, Sanya, China, 6–8 April 2008; pp. 1599–1603. [Google Scholar]
  15. Rajesh, V.; Parameshwar, U.; Mohana, N. Quantum Convolutional neural networks (QCNN) using deep learning for computer vision applications. In Proceedings of the International Conference on Recent Trends on Electronics, Information, Communication and Technology, Bangalore, India, 27–28 August 2021; pp. 728–734. [Google Scholar]
  16. Han, K.; Kim, J. Quantum-inspired evolutionary algorithm for a class of combinatorial optimization. IEEE Trans. Evol. Comput. 2002, 6, 580–593. [Google Scholar] [CrossRef]
  17. Combarro, E.F. A Practical Introduction to Quantum Computing: From Qubits to Quantum Machine Learning and Beyond; CERN OpenLab: Geneva, Switzerland, 2020. [Google Scholar]
  18. Messiah, A. Quantum Mechanics; Dover Publications Inc.: Mineola, NY, USA, 1999; Volume 1, p. 296. [Google Scholar]
  19. Hershey, J.R.; Olsen, P.A. Approximating the Kullback Leibler divergence between Gaussian mixture models. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Honolulu, HI, USA, 15–20 April 2007; Volume 4, pp. 317–320. [Google Scholar]
  20. Streichert, F. Introduction to Evolutionary Algorithms. In Evolutionary Computation 1; CRC Press: Boca Raton, FL, USA; University of Tübingen: Tübingen, Germany, 2018; pp. 97–101. [Google Scholar]
  21. Chmiel, W.; Kwiecień, J. Quantum-inspired evolutionary approach for the quadratic assignment problem. Entorpy 2022, 20, 781. [Google Scholar] [CrossRef] [PubMed]
  22. Zhang, G. Quantum-inspired evolutionary algorithms: A survey and empirical study. J. Heuristics 2011, 17, 303–351. [Google Scholar] [CrossRef]
Figure 1. An optimal service-matching UAV deployment via AP formulation. c i , j indicates the level of similarity between agent Ai’s service distribution with the target cluster TCj’s distribution. The figure depicts a case that agent A1, A3, and A3 are assigned, respectively, to TC2, TC3 and TC4.
Figure 1. An optimal service-matching UAV deployment via AP formulation. c i , j indicates the level of similarity between agent Ai’s service distribution with the target cluster TCj’s distribution. The figure depicts a case that agent A1, A3, and A3 are assigned, respectively, to TC2, TC3 and TC4.
Information 13 00438 g001
Figure 2. Representation of a qbit: On the left, the Bloch Sphere, a spherical representation of a qbit. On the right, a circular representation of a qbit after all the assumptions.
Figure 2. Representation of a qbit: On the left, the Bloch Sphere, a spherical representation of a qbit. On the right, a circular representation of a qbit after all the assumptions.
Information 13 00438 g002
Figure 3. Scheme of the QiEA procedure considering K initial populations.
Figure 3. Scheme of the QiEA procedure considering K initial populations.
Information 13 00438 g003
Table 1. Evaluation cases to define rotation angle.
Table 1. Evaluation cases to define rotation angle.
Case Z i , j l ( t ) B local i , j l ( t 1 ) f ( Z l ( t ) ) f ( B local l ( t 1 ) ) θ i , j
100false0
200true0
301false δ π
401true0
510false δ π
610true0
711false0
811true0
Table 2. Case studies.
Table 2. Case studies.
CaseNumber of Service Agents
(N)
Number of Target Clusters
(M)
11010
258
328
490100
52100
Table 3. Hyper-parameters of and the assigned possible values for the grid search.
Table 3. Hyper-parameters of and the assigned possible values for the grid search.
HyperparametersPossible Values
Population size (K)2, 5, 10
Rotation angle ( δ π ) 0.0025 π , 0.01 π , 0.05 π
Epochs ( M A X _ G E N )10, 20, 50
Migration frequency 0.25 0.5 0.75
Table 4. Grid search results.
Table 4. Grid search results.
CaseTypePopulation Size (K)Rotation Angle ( δ π )Epochs
( MAX _ GEN )
Migration
Frequency
1Accurate2 0.05 π 200.5
Fast2 0.0025 π 200.5
2Accurate2 0.0025 π 500.5
Fast2 0.01 π 500.75
3Accurate2 0.0025 π 100.5
Fast2 0.01 π 500.75
4Accurate10 0.0025 π 200.75
Fast2 0.01 π 100.75
5Accurate2 0.05 π 200.25
Fast2 0.0025 π 500.75
Table 5. Optimality gap α for the case studies.
Table 5. Optimality gap α for the case studies.
CaseGreedyHungarianSimplexAQiEAFQiEA
10.4059000.21500.4579
20.2336000.18251.135
300004.910
40.629800.76220.9125
50.6365002.01783.007
Table 6. Execution time in ms for the case studies.
Table 6. Execution time in ms for the case studies.
CaseGreedyHungarianSimplexAQiEAFQiEA
110.0311.05537.94.5913.866
25.0007.970112.52.9102.464
34.5213.00026.622.3931.530
4552.9544.9-226.732.61
519.0427.90781.61.8451.418
Table 7. Quality metric for the case studies.
Table 7. Quality metric for the case studies.
CaseGreedyHungarianSimplexAQiEAFQiEA
19.9309.0500.185921.7325.75
219.9512.550.888934.3040.12
322.1233.333.75741.7962.15
40.17970.18350.43773.039
55.2523.5840.127952.5731.73
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Vendrell, J.; Kia, S. Quantum-Inspired Evolutionary Algorithm for Optimal Service-Matching Task Assignment. Information 2022, 13, 438. https://doi.org/10.3390/info13090438

AMA Style

Vendrell J, Kia S. Quantum-Inspired Evolutionary Algorithm for Optimal Service-Matching Task Assignment. Information. 2022; 13(9):438. https://doi.org/10.3390/info13090438

Chicago/Turabian Style

Vendrell, Joan, and Solmaz Kia. 2022. "Quantum-Inspired Evolutionary Algorithm for Optimal Service-Matching Task Assignment" Information 13, no. 9: 438. https://doi.org/10.3390/info13090438

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop