
number of objects classified by this rule is used as a 
fitness value. The rules are selected, then they 
undergo crossover and mutation to form an 
offspring. The tournament selection, uniform 
crossover and average mutation are used. The 
genetic and heuristic approaches are applied with 
probability of 0,5. During the deleting procedure the 
rules with the lowest fitness are removed from the 
base. 
The number k of deleted or added rules depends 
on the current number of rules in the base and is 
calculated so that 5(k-1) < |S| <= 5k. If the number 
of rules in the base reaches the given maximum 
number, new rules are not added to it. 
The forming of a new population in the Pittsburg 
part includes the best offspring and parents into the 
new generation. 
4 EVOLUTIONARY 
ALGORITHM  
SELF-CONFIGURATION 
TECHNIQUE 
Self-configuration means setting the application 
probabilities of evolutionary operators based on the 
success of the operators. Self-configuration needs to 
be used as the algorithm efficiency highly depends 
on the operators used. 
The applied self-configuration method 
(Semenkin et al., 2012-1) is based on encouraging 
those operators which received the highest total 
fitness in the current generation. This approach has 
proved its efficiency in the solving of hard real 
world optimization problems (Semenkin et al., 2012-
2, Semenkin et al., 2014) and has been 
recommended for practical use.  
Let z be the number of different operators of i-th 
type. The starting probability values are set to 
p
i
=1/z. The success estimation for every type of 
operator is performed based on the averaged fitness 
values: 
1
1
, 1, 2,...,
1
i
i
n
ij
j
i
n
j
f
vgFit i z
 
where n
i
 is the number of offspring formed with i-th 
operator, f
ij
 is the fitness value of j-th offspring, 
obtained with i-th operator, AvgFit
i
 is the average 
fitness of the solutions, obtained with i-th operator. 
Then the probability of applying the operator, 
whose AvgFit
i
 value is the highest among all the 
operators of this type, is increased by (zK-K)/(zN), 
and the probabilities of applying other operators are 
decreased by K/(zN), where N is the number of 
evolutionary algorithm generations, K is the constant 
equal to 0,5. 
The probabilities of the selection operators, the 
mutation operators and the Michigan operators are 
adjusted during the algorithm operation. In the first 
generation equal probabilities are applied to all the 
operators. For example, for the Michigan operators, 
the probabilities of adding, deleting and replacement 
procedures are equal when the algorithm starts. 
5 ALGORITHM 
IMPLEMENTATION AND 
TESTING RESULTS 
One of the advantages of this algorithm is that for 
every rule in the base the compatibility grades for 
every variable, as well as the class number and 
weight, can be calculated only once and then 
updated only for those rules that changed during the 
algorithm run. This allows the sample to be used 
fewer times, that results in a better computation 
time. 
Six heterogeneous classification problems from 
the UCI repository (Asuncion et al., 2007) and the 
KEEL repository (Alcalá-Fdez et al., 2009) were 
chosen for the approach performance evaluation, 
namely: 
  Australian credit card problem, 690 instances, 14 
variables, 2 classes – Australian; 
  German bank client classification problem, 1000 
instances, 24 variables, 2 classes – German; 
  Image segments classification problem, 2310 
instances, 19 variables, 7 classes – Segment; 
  Text recognition sections classification problem, 
5472 instances, 10 variables, 5 classes – 
Pageblocks; 
  Nasal and oral sounds classification problem, 
5404 instances, 5 variables, 2 classes, – 
Phoneme; 
  Satellite image pixels classification problem, 
6435 instances, 36 variables, 6 classes, – 
Satimage. 
To measure the classification quality the 10-fold 
cross-validation procedure was used. In this method 
the sample is split into 10 parts, 9 of them are used 
as a learning sample, and the residual part as a test 
sample, and then the parts are exchanged with each 
other. The procedure is performed 10 times, so that 
ICINCO2014-11thInternationalConferenceonInformaticsinControl,AutomationandRobotics
320