Next Article in Journal
Research on Advertising and Quality of Paid Apps, Considering the Effects of Reference Price and Goodwill
Next Article in Special Issue
Machine Learning Modeling of Aerobic Biodegradation for Azo Dyes and Hexavalent Chromium
Previous Article in Journal
Pricing European-Style Options in General Lévy Process with Stochastic Interest Rate
Previous Article in Special Issue
Improving the Accuracy of Convolutional Neural Networks by Identifying and Removing Outlier Images in Datasets Using t-SNE
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel and Simple Mathematical Transform Improves the Perfomance of Lernmatrix in Pattern Classification

by
José-Luis Velázquez-Rodríguez
1,
Yenny Villuendas-Rey
2,*,
Oscar Camacho-Nieto
2,* and
Cornelio Yáñez-Márquez
1,*
1
Centro de Investigación en Computación, Instituto Politécnico Nacional, CDMX 07738, Mexico
2
Centro de Innovación y Desarrollo Tecnológico en Cómputo, Instituto Politécnico Nacional, CDMX 07700, Mexico
*
Authors to whom correspondence should be addressed.
Mathematics 2020, 8(5), 732; https://doi.org/10.3390/math8050732
Submission received: 29 February 2020 / Revised: 27 April 2020 / Accepted: 29 April 2020 / Published: 6 May 2020
(This article belongs to the Special Issue Advances in Machine Learning Prediction Models)

Abstract

:
The Lernmatrix is a classic associative memory model. The Lernmatrix is capable of executing the pattern classification task, but its performance is not competitive when compared to state-of-the-art classifiers. The main contribution of this paper consists of the proposal of a simple mathematical transform, whose application eliminates the subtractive alterations between patterns. As a consequence, the Lernmatrix performance is significantly improved. To perform the experiments, we selected 20 datasets that are challenging for any classifier, as they exhibit class imbalance. The effectiveness of our proposal was compared against seven supervised classifiers of the most important approaches (Bayes, nearest neighbors, decision trees, logistic function, support vector machines, and neural networks). By choosing balanced accuracy as a performance measure, our proposal obtained the best results in 10 datasets. The elimination of subtractive alterations makes the new model competitive against the best classifiers, and sometimes beats them. After applying the Friedman test and the Holm post hoc test, we can conclude that within a 95% confidence, our proposal competes successfully with the most effective classifiers of the state of the art.

1. Introduction

The human being possesses an ability that has been useful for his survival since his appearance on planet Earth. The recognition of everyday things, living things, events and chains of events, allows man to take actions that give him tools to successfully face daily existence. It is pertinent to note that this ability, which is so natural and evident in humans, can become a very complex problem for a computational algorithm. Computer sciences has a specific area, called pattern recognition, whose field of study is precisely this type of concepts [1]. One of the purposes of pattern recognition is to generate computational algorithms that are capable of recognizing the everyday things, living things, events and chains of events that man so easily recognizes. In the computational context, the entities to be recognized are represented by patterns, which can be vectors, tuples or data arrays. At the same time, there is a set of disciplines whose fields of study have important coincidences with pattern recognition, because they include modeling and automatic recognition of objects and actions from different perspectives. Among these disciplines, we can mention as the most relevant: machine learning [2], artificial intelligence [3], and data mining [4].
In pattern recognition and related areas, systematic exploration of human ability to recognize patterns leads to the scientific study of four basic tasks: classification, recalling, regression, and clustering. The first three tasks (classification, regression and recalling) correspond to the supervised learning paradigm [5], while clustering is the emblematic task of the paradigm known as unsupervised learning [6].
In this article, we will only deal with the first two tasks of the supervised paradigm: classification and recalling. Regarding the classification of patterns, it should be noted that the classification algorithms place patterns in the class that corresponds to them, in a specific problem. For example, a classification algorithm (a classifier) will be able to correctly decide, with a certain percentage of success, whether a chest radiograph corresponds to a patient suffering from pneumonia, or corresponds to a healthy person. In this hypothetical problem, there are two classes (“healthy” and “sick with pneumonia”) and the patterns are chest radiographs [7]. The hit rate depends on several factors, including the complexity of the dataset and the quality of the classification algorithm (how good it is).
Every pattern recognition scientist who designs and creates a new pattern classifier algorithm hopes that their model does not fail when classifying patterns. In the previous example, it is desirable that when presenting any chest radiograph to the classifier, the correct answer is obtained at the exit, without error. That is, in the ideal case, it is expected that in all cases the answer given by the classifier (sick or healthy) is always correct, indicating that there were zero errors, or equivalent, 100% performance.
However, this ideal situation is unattainable: the best classifier does not exist. This strong statement is scientifically based on the No-Free-Lunch theorem that was initially (more than half a century ago) stated for optimization problems [8]. However, this disruptive theorem was later adapted to the pattern recognition area, specifically to the pattern classification task. The No-Free-Lunch theorem governs the effectiveness of pattern classification algorithms, and it is true for all classifiers and datasets, without exception [9].
The existence of the No-Free-Lunch theorem has led scientists to conclude that it is useless to search for the best classifier, and it is also useless to pretend that a given classifier achieves zero errors when trying to classify all the patterns of a given dataset. An immediate consequence of the No-Free-Lunch theorem is that the perspectives of scientists investigating in the area of pattern recognition have changed. They are no longer looking for the ideal classifier, the perfect one without mistakes. Now, researchers are trying to design, implement and apply new pattern classification algorithms, always seeking to minimize classification errors, or equivalently, trying to maximize the performance. This search in performance improvement is carried out in several ways, among which the treatment of data [10] and the search for new effective algorithms [11] stand out.
In this order of ideas, let us now consider the second of the basic pattern recognition tasks that we will cover in this paper: pattern recalling. The algorithms that perform the recalling task execute the retrieval of a pattern (for example, a phone number) from a specified pattern at the algorithm input (for example, a person). Associative memories are algorithms specialized in the pattern recalling task [12].
The pioneering associative model is the Lernmatrix, which was created in Germany, in 1961, by Karl Steinbuch [13]. Due to the nature of the patterns it works with, this model behaves like a pattern classifier. However, as will be exemplified in this paper, the original Lernmatrix model is not competitive as a pattern classifier against the state-of-the-art classifier algorithms.
The main contribution of this paper consists of the proposal of a simple mathematical transform, whose application in the data significantly improves the performance of the Lernmatrix in the supervised classification of patterns. That is, the error in the classification of patterns decreases with the application of the improved model of the Lernmatrix, making the new model competitive against the classifier algorithms of the state of the art.
The rest of the article is structured as follows. To adequately contextualize the research question and hence clarify the contribution of this paper, Section 2 includes some materials and methods. Section 2 is made up of five subsections. Section 2.1 includes a brief summary of some conceptual elements related to the pattern classification task in pattern recognition, in addition to the approaches and theoretical bases of some of the state-of-the-art classifier algorithms. Section 2.2 describes the original model of the Lernmatrix and exemplifies how it performs the task of pattern classification. Section 2.3 is crucial to our proposal, given that it presents a summary of the milestones in the efforts that have been made to rescue the Lernmatrix and turn it into a contemporary competitive model. Based on the historical facts described, Section 2.4 presents some theoretical advances that have allowed the original model of the Lernmatrix to evolve, and includes some definitions and theorems. To conclude with Section 2, in Section 2.5 we present a method called the Johnson–Möbius code, which will be part of the proposed methodology. The content of Section 2.4 serves as a solid basis for Section 3, where the main contribution of this paper is presented, which is a new mathematical transform. In this section, the new transform is defined, a theorem is stated and proved, and simple examples of its meaning for performance improvement in the Lernmatrix are presented. Taking as a starting point the mathematical transform proposed in Section 3 and the Johnson–Möbius code, in Section 4 the complete methodology is presented. The experimental results accompanied by the analysis and discussion are presented in Section 5, while Section 6 contains the conclusions and future work. Finally, references are included.

2. Materials and Methods

In this section, some materials and methods related to the main proposal of this research work are presented. First, Section 2.1 includes a brief summary of some conceptual elements related to the pattern classification task in pattern recognition, in addition to the approaches and theoretical bases of some of the state-of-the-art classifier algorithms. Section 2.2 describes the original model of the Lernmatrix and exemplifies how it performs the task of pattern classification. Section 2.3 is crucial to our proposal, given that it presents a summary of the milestones in the efforts that have been made worldwide to rescue the Lernmatrix and turn it into a contemporary competitive model. Based on the historical facts described, Section 2.4 presents some theoretical advances that have allowed the original model of the Lernmatrix to evolve, and includes some definitions and theorems. Finally, in Section 2.5, we present a method called the Johnson–Möbius code, which will be part of the proposed methodology.

2.1. About Attributes, Patterns, Datasets, Validation, Performance, and Main Approaches to Pattern Classification

When working in pattern classification, the first step is to select and understand the tiny area of the universe it is desired to analyze. Once this selection has been made, it is important to identify the useful attributes (also called features) that describe the phenomenon under study.
The raw material to work in pattern recognition and related disciplines are the data, which have specific values of the attributes. For example, the attribute “number of children” could correspond to specific data, or values, such as: 0, 1, 3, 12, 20, while the values 1.78, 1.56, 2.08, measured in meters, could be data from an attribute called “height”. These two attributes are numerical. On the other hand, there are also categorical attributes and missing values. The data associated with the “sex” attribute could be F and M, and the “temperature” attribute could have the following data as specific values: hot, warm, cold.
The next step is to convert those features into something the computer can understand, and at the same time it is appropriate to be handy. The most common and easy thing to do is to use a vector which is composed of numbers that represent real-valued features. For instance, the color of a leaf can be represented by numbers that indicate the intensity of the color, size, morphology, smell, among others. For categorical or mixed attributes, it is possible to use arrays of values. Those representing arrays are known as patterns.
Patterns with common attributes form classes, and these sets representing various classes of a phenomenon under study, when joined, form datasets. For example, the vector [5.4, 3.7, 1.5, 0.2] represents a flower, and the four attributes (in cm) correspond to the sepal length, sepal width, petal length, and petal width, in that order. This flower is a pattern that belongs to one of the three classes (Iris Setosa) contained in the famous Iris Dataset (https://archive.ics.uci.edu/ml/datasets/iris).
Given a phenomenon under study, it is of vital importance to select properly the attributes and data, to form the patterns that correspond to each of the classes. Typically, the choice of attributes (how many and of what type), the formation of patterns and the design of datasets are all creative processes where the active participation of experts in the specific area of application is required. Experts in the areas of application (for example, physicians to classify diseases, or economists to classify financial risks) join with experts in pattern recognition, machine learning, artificial intelligence, and data mining to create useful datasets to solve problems in different application areas [1,2,3,4].
There are many pattern classifiers that only work with numerical attributes. In these cases, preprocessing has to be applied to the data in order to convert the categorical data to numerical ones and to impute the missing values [14]. After preprocessing, there will only be numerical values.
The patterns dimension can be from 3 or 4 attributes, up to hundreds, thousands or even millions, as it happens with the patterns of the datasets that contain bioinformatics data. For their part, datasets vary in size and can have millions of patterns in the field of big data [15].
A very important aspect related to classes is balance or imbalance. The ideal case is that in a dataset, all classes have the same size. However, the most interesting datasets are far from the ideal case. For example, in the datasets used for the classification of diseases, typically the class “sick” is the minority class (which is desirable). From the computational point of view, the imbalance has consequences related to the way of measuring the performance of the classifiers [1].
Given a dataset, the imbalance is measured using the imbalance ratio (IR), which is calculated as follows [16]:
I R = | m a j o r i t y _ c l a s s | | min o r i t y _ c l a s s |
A dataset is considered imbalanced if it happens that I R > 1.5 .
There exist dataset repositories that have become important auxiliaries to those who develop algorithms and models in pattern recognition and related disciplines. Notable examples are the repositories powered by prestigious universities, of which two stand out. One of them is the repository http://archive.ics.uci.edu/ml/datasets.php, which was made available to research groups by the University of California Irvine, USA. The other repository is sponsored by the University of Granada in Spain: http://sci2s.ugr.es/keel/datasets.php. Recently, a dataset repository that runs contests has become very popular, where researchers test their pattern recognition algorithms on real-life datasets, with the chance to win cash prizes: https://www.kaggle.com/datasets.
The researchers in pattern recognition have certain software platforms at their disposal, where they can develop and test pattern classification algorithms. One of the most useful and famous platforms was developed by scientists from Waikato University in New Zealand: www.cs.waikato.ac.nz/ml/weka/. WEKA is an analysis environment platform written on Java. This platform contains a vast collection of algorithms for the analysis of data and predictive models that include methods that address problems of regression, classification, clustering, and feature selection. The software allows a dataset to be pre-processed, if required, and inserts it into a learning scheme in order to analyze the results and the performance of a selected classifier.
In the supervised paradigm, a classifier consists of two phases: learning and classification [17]. The classifier requires a training set to perform the learning. Already trained, the classifier runs the classification phase, where a class is assigned to testing pattern. A common practice is that given a dataset D, a partition is made into two subsets: L (learning or training) and T (test). The classifier learns with L and the patterns in T are used for testing (Figure 1).
Since it is a partition, the following must be true: L   T = D and L   T = .
The partition is obtained through a validation method, among which the leave-one-out method stands out as one of the most used in the world of pattern recognition research [18]. As illustrated in Figure 2, in each iteration, a single testing pattern (in T) is left, and the model learns with the patterns in L, which are precisely the rest of the patterns in D.
Leave-one-out is a particular case of a more general cross-validation method called stratified k-fold cross-validation. It consists of partitioning the dataset into k folds, where k is a positive integer (k = 5 and k = 10 are the most popular values in the current specialized literature), ensuring that all classes are represented proportionally in each fold [19].
The operation of the k-fold cross-validation is very similar to the schematic diagram in Figure 2, except that instead of a pattern, one of the k folds is taken. Note that leave-one-out is a particular case of k-fold cross-validation with k = N, where N is the total number of patterns in the dataset.
In the experimental section of this article, we used the 5-fold cross-validation procedure. The reason is that some leading authors recommend this validation method especially for imbalanced datasets [20]. Figure 3 and Figure 4 show schematic diagrams of the 5-fold stratified cross-validation method for a 3-class dataset.
For datasets that return a value much greater than 1.5 when applying Equation (1), it is recommended to use a variant of cross-validation [21]. This is the 5 × 2 cross-validation method, which consists of partitioning the dataset into 2 stratified folds and performing 5 iterations. The process is illustrated in Figure 5.
After applying a validation method to the dataset under study, the researcher has at his disposal the partition of dataset D in sets L and T. Now a relevant question arises: how is the performance of a classification algorithm measured?
Common sense indicates that calculating accuracy is a good way to decide how good a classifier is. Accuracy is the ratio of the number of patterns classified correctly, among the total patterns contained in the testing set T, expressed as a percentage. If N is the total number of patterns in the testing set, T and C are the number of patterns correctly classified, the value of accuracy is calculated using Equation (2):
A c c u r a c y = C N 100 %
Obviously, it is true that 0 C N , so that 0 A c c u r a c y 100 .
For example, consider a study where dataset D is balanced and the testing set T contains patterns of 100 patients, 48 healthy and 52 sick. If an A1 classification algorithm learns with L and when testing it with T correctly classifies 95 of the patients, the accuracy of A1 in D is said to be 95%. In general, values above 90% for performance are considered to indicate that it is a good classifier. Accuracy is a very easy measure of performance for classifiers, but it has a huge disadvantage: it is only useful for datasets that give a value less than 1.5 when applying Equation (1).
Now, we will illustrate with a hypothetical example what might happen when using accuracy as a performance measure on a severely imbalanced dataset. To do this, consider again the study of the previous example, but now with D severely imbalanced (IR much greater than 1.5). When applying a stratified validation method, the testing set T also consists of 100 patients, with the difference that there are now 95 healthy and 5 sick.
To describe the hypothetical example, we are going to invent a very bad A2 classification algorithm. This A2 algorithm consists of assigning the “healthy” class to any testing pattern, whatever it may be. This classifier is very bad because the decision made is totally arbitrary, without even considering the values of the attributes in the patterns. When A2 is tested with the new T, the number of patterns classified “correctly” is 95, as in the previous example, and therefore the accuracy value is 95%, although we know that the A2 classifier is a fake one.
This example illustrates that using accuracy as a measure of classifier performance on an imbalanced dataset can privilege the majority class. What is surprising is that the behavior of the A2 classifier is replicated in many of the state-of-the-art classifiers. That is, many of the classifiers used by researchers in pattern recognition override the minority class in imbalanced datasets when accuracy is used as a performance measure. Typically, in pattern recognition, the jargon of the medical sciences is applied, and the minority class of a imbalanced dataset is called the “positive” class, while the majority class is the “negative” class.
The solution to the problem previously described is the use of the confusion matrix [22]. Without loss of generality, a schematic diagram of a confusion matrix for two classes (positive and negative) is included in Figure 6.
where:
  • TP is the number of correct predictions that a pattern is positive.
  • FN is the number of incorrect predictions that a positive pattern is negative.
  • TN is the number of correct predictions that a pattern is negative.
  • FP is the number of incorrect predictions that a negative pattern is positive.
If we note that the total of patterns correctly classified is TP + TN and that the total of patterns in the set T is TP + TN + FP + FN, Equation (3) is the way to express Equation (2) in terms of the elements of the confusion matrix:
A c c u r a c y = T P + T N T P + T N + F P + F N 100 %
A possible confusion matrix with which an accuracy value of 95% is obtained in the first example is shown in Figure 7. There we can see that of the 48 “sick” (positive class), 47 were correctly classified as “sick” (TP), and only one of the “sick” was incorrectly classified (FN) as healthy (negative class). Furthermore, of the 52 “healthy” (negative class), 48 were classified correctly as “healthy” (TN), and 4 of them were incorrectly (FP) classified as sick (positive class).
According to Equation (3), the 95% value for accuracy is obtained by dividing the sum of the correctly classified patterns (TP + TN = 47 + 48 = 95) by the total of the pattern in the set T (TP + TN + FP + FN = 47 + 48 + 4 + 1 = 100), and multiplying the result by 100.
For the hypothetical second example, the confusion matrix is illustrated in Figure 8. The A2 classification algorithm classifies all the patterns in T as if they were of the negative class (“healthy”). Indeed, the accuracy value appears to be good (95%), but in reality it is a useless result because the “classifier” A2 was not able to detect any pattern of the positive class (“sick”).
Of course, it is difficult to find in the specialized literature any classification algorithm as bad as the A2 algorithm. The possibility of any state-of-the-art classifier giving zero as a result in FP or FN is practically null. Most classifiers behave “well” against datasets with severe imbalances. The purpose of any state-of-the-art classifier is, then, to minimize the values of FP, FN, the sum of FP and FN, or some performance measures derived from the confusion matrix.
Here is precisely the alternative to the problems caused by using accuracy as a performance measure on imbalanced datasets. The alternative is to define new performance measures that are derived from the confusion matrix.
There are a very large number of different performance measures that are derived from the confusion matrix [23]. However, here we will only mention the definitions of three: sensitivity, specificity and balanced accuracy, because these three performance measures will be used in the experimental section of this document [22].
In the confusion matrix of Figure 6, it can be easily seen that the total of patterns of the positive class is obtained with this sum: TP + FN. Also, it is evident that the total of patterns of the negative class is obtained with this sum: TN + FP.
The fraction of the number of positive patterns correctly classified with respect to the total of positive patterns in T is called sensitivity:
S e n s i t i v i t y = T P T P + F N
As the value of TP approaches the total of correctly classified positive patterns, FN tends to zero, and the value of sensitivity tends to 1. The ideal case is when FN = 0, so sensitivity = 1.
The undesirable extreme case is when TP = 0 and this means that the classifier failed to detect any positive pattern, as in Figure 8. In this case, sensitivity = 0.
The fraction of the number of negative patterns correctly classified with respect to the total of positive patterns in T is called specificity:
S p e c i f i c i t y = T N T N + F P
As the value of TN approaches the total of correctly classified negative patterns, FP tends to zero, and the value of specificity tends to 1. The ideal case is when FP = 0, so specificity = 1.
The undesirable extreme case is when TN = 0 and this means that the classifier failed to detect any negative pattern. In this case, specificity = 0.
It is not difficult to imagine that there is some parallelism between accuracy, sensitivity, and specificity, because these last two measures can be thought of as a local accuracy, by class. Sensitivity is a kind of accuracy for the positive class, while specificity is a kind of accuracy for the negative class. Therefore, it should not be strange that based on both measures, sensitivity and specificity, a performance measure is defined for imbalanced datasets, which takes both classes into account separately. This is balanced accuracy (BA), a measure that is defined as the average of sensitivity and specificity:
B A = B a l a n c e d   A c c u r a c y = S e n s i t i v i t y + S p e c i f i c i t y 2
From the values of the confusion matrix in Figure 7, we can calculate the performance measures of Equations (4)–(6). Sensitivity = 0.98, specificity = 0.92, and BA = 0.95, a value close to the ideal case. On the other hand, when performing the same calculations with the data from the confusion matrix in Figure 8, we obtain the following results: sensitivity = 0, specificity = 1, and finally BA = 0.5. Note how BA punishes the value 0 in the sensitivity that was obtained with the “classifier” A2.
So far we have talked about classification algorithms without specifying how these algorithms perform the classification of patterns in the context of pattern recognition. The time has come to comment on the theoretical foundations on which classifiers rest, and the different approaches to pattern classification derived from these scientific concepts.
The most important state-of-the-art approaches will be mentioned in this brief summary of pattern classification algorithms. For each approach, the philosophy of the approach will be described very concisely, in addition to the scientific ideas on which it rests. In addition, one of the algorithms representing that approach will be mentioned, which will be tested for comparison in the experimental section of this paper.
It must be emphasized that all the pattern classification algorithms against which our proposal will be compared in the experimental section of this paper are part of the state of the art [24]. Additionally, it is necessary to point out something important that shows the relevance and validity of the pattern classification algorithms used in this paper: each and every one of these algorithms is included in the WEKA platform. This is relevant because WEKA has become an indispensable auxiliary, at the world level, for researchers dedicated to pattern recognition [25].
In the state of the art, it is possible to find a great variety of conceptual bases that give theoretical support to the task of intelligent classification of patterns. One of the most important and well-known theoretical bases is the theory of probability and statistics, which gives rise to the probabilistic-statistical approach to pattern classification. The Bayes theorem is the cornerstone on which this approach to minimize classification errors rests, hence the classifiers are called Bayes classifiers [26]. It is an open research topic and researchers continue to search for new modalities that improve the algorithms of the Bayes classifiers. [27].
Metrics and their properties cannot be missing as the conceptual basis of one of the most important approaches of pattern recognition. In 1967, scientific research into pattern classification was greatly enriched when Cover and Hart created the NN (nearest neighbor) classifier [28]. The idea is so simple, that at first glance it seems futile to take it into account. Given a testing pattern, the NN rule is to assign it the class of the pattern that is closest in the attribute space, according to a specified metric (or a dissimilarity function). But the authors of the NN classifier demonstrated their theoretical support. Furthermore, the large number and quality of applications throughout these years show the effectiveness of the NN classifier and its great validity as a research topic [29]. The extension of the NN model led to the creation of k-NN, where the NN rule is generalized to the k nearest neighbors. In the k-NN model, the class is assigned to the test pattern by majority of the k closest learning set patterns [30]. Nowadays, k-NN classifiers are considered among the most important and useful approaches in pattern classification [31].
On the other hand, tree-based classifiers use the advanced theory of graphs and trees to try to keep the number of errors to a minimum when solving a classification problem [32]. In a decision tree, each of the internal nodes represents an attribute, and final nodes (leaves) constitute the classification result. All nodes are connected by branches representing simple if-then-else rules which are inferred from the data [33]. Decision trees are simple to understand because they can be depicted visually, data require little or no preparation at all, and it is able to handle both numerical and categorical data. The study of decision trees is a current topic of scientific research [34].
It is common for the logistic function to be present in the experimental section of many articles of pattern classification. In the specialized literature, the logistic regression classifier is mentioned, because the logistics function was originally designed to perform the regression task. However, as the name implies, the algorithm is a classifier [35]. This function is sigmoid (due to the shape of its graph) and its expression involves the exponential function whose base is the Euler’s constant or number e [36]. The argument to the input of the logistic function is a real number and to the output a real value is obtained in the open interval (0,1). Therefore, the logistic regression function is useful for classifying patterns on datasets of two classes [37].
Before the scientific revolution generated by the arrival of deep learning in 2012, the “enemy to be defeated” in comparative studies of pattern classifiers was a model known as support vector machines (SVM). This model originates from the famous statistical learning theory [38], and was unveiled in a famous article published a quarter of a century ago [39]. The optimization of analytical functions serves as a theoretical basis in the design and operation of SVM models, which attempts to find the maximum margin hyperplane to separate the classes in the attribute space. Although it is true that deep learning-based models obtain impressive results in patterns represented by digital images, it is also a fact that SVMs continue to occupy the first places in performance in classification problems where patterns are not digital images [40].
The “scientific revolution generated by the arrival of Deep Learning in 2012” mentioned in the previous paragraph began many years ago, in 1943, when McCulloch and Pitts presented the first mathematical model of human neuron to the world [41]. With this model began the study of the neuronal classifiers, which acquired great force in 1985–1986. In those years, several versions of an algorithm that allows training successfully neural networks were published [42,43]. This algorithm is called backpropagation, and two of the most important pioneers of the “Deep Learning era” participated in its creation: LeCun and Hinton [44]. Among the most relevant neural models with applications in many areas of human activity, the multi-layer perceptron (MLP) is one of those rated as excellent by the scientific community [45]. Therefore we have included it in the comparative study presented in the experimental section of this paper.
The last classifier that we have selected to be included in the experimental section of this paper does not belong to a different approach from those previously described. Rather, it is a set of classifiers from some of the approaches mentioned, which are grouped into an ensemble, where the classifiers operate in a collaborative environment [46]. Ensemble classifiers are methods which aggregate the predictions of a number of diverse base classifiers in order to produce a more accurate predictor, with the idea being that “many heads think better than one”. The ability to combine the outputs of multiple classifiers to improve upon the individual accuracy of each one has prompted much research and innovative ensemble construction proposals, such as bagging [47] and boosting [48]. Ensemble models have positioned themselves as valuable tools in pattern classification, routinely achieving excellent results on complex tasks. In this paper, we selected a boosting ensemble, the AdaBoost algorithm [49], using C4.5 as base classifier.

2.2. Lernmatix: The Original Model

The Lernmatrix is an associative memory [13]. Therefore, since an associative memory performs the task of pattern recall in pattern recognition, in principle the Lernmatrix receives patterns at the input and delivers patterns at the output. However, if the output patterns are chosen properly, the Lernmatrix can act as a pattern classifier. The Lernmatrix is an input-output system that accepts a binary pattern at the input. If there is no saturation, the Lernmatrix generates a one-hot pattern at the output. The saturation phenomenon will be amply illustrated in this subsection. A schematic diagram of the original Lernmatrix model is shown in Figure 9.
If M is a Lernmatrix and x 1 is an input pattern, an example of a 5-dimensional input pattern is:
x 1 = ( 1 0 1 0 1 )
In Expression (7) the superscript 1 indicates that this is the first input pattern. In general, if μ is a positive integer, the notation x μ indicates the μ-th input pattern. The j-th component of a pattern x μ is denoted as: x j μ .
The key to a Lernmatrix acting as a pattern classifier is found in the representation of the output patterns as one-hot vectors. It is assumed that in a pattern classification problem, there are p different classes, where p is a positive integer greater than 1. For the particular case in which p = 3, class 1 is represented by this one-hot vector:
y 1 = ( 1 0 0 )
while the representations of classes 2 and 3 are:
y 2 = ( 0 1 0 ) and y 3 = ( 0 0 1 )
In general, to represent the class k { 1 , 2 , , p } , 1 k p , the following values are assigned to the output binary pattern: y k k = 1 , and for j = 1 , 2 , , k 1 , k + 1 , , p , this value is assigned y j k = 0 .
The expressions for the learning and recalling phases were adapted from two articles published by Steinbuch: the 1961 article where he released his original model [13], and an article he published in 1965, co-authored with Widrow [50], who is the creator of one of the first neuronal models called ADALINE.
Learning phase for the Lernmatrix.
To start the learning phase of a Lernmatrix of p classes and with n-dimensional input binary patterns, a M p × n is created, with m i j = 0 , i , j .
M = ( m 11 m 1 n m p 1 m p n )
For each input pattern x μ and its corresponding output pattern y μ , each component m i j is updated according to the following rule: m i j = m i j + Δ m i j , with ε > 0 .
Δ m i j = { + ε ε 0 if   y i μ = 1 = x j μ   if   y i μ = 1   and   x j μ = 0   otherwise
Remark 1. 
The only restriction for the value of ε is that it be positive. Therefore, it is valid to choose the value of ε as 1. In all the examples in this paper, we will use the value ε = 1 .
Example 1.
Execute the learning phase of a Lernmatrix that has 3 classes, and 5-dimensional input patterns (one input pattern for each class):
x 1 = ( 1 0 1 0 1 ) , y 1 = ( 1 0 0 ) , x 2 = ( 1 1 0 0 1 ) , y 2 = ( 0 1 0 ) , x 3 = ( 1 0 1 1 0 ) , y 3 = ( 0 0 1 )
Initially, a 3 × 5 matrix is created with all its inputs set to zero. Then, the transpose of the first input pattern is placed on top, and the first class pattern to the left of the matrix. Then, the learning rule of Equation (11) is applied to each of the components of both patterns:
x 1 1 = 1 x 2 1 = 0 x 3 1 = 1 x 4 1 = 0 x 5 1 = 1
y 1 1 = 1 0+10−10+10−10+1
y 2 1 = 0 0+00+00+00+00+0
y 3 1 = 0 0+00+00+00+00+0
The Lernmatrix looks like this after learning the pattern association ( x 1 , y 1 ) :
x 1 1 = 1 x 2 1 = 0 x 3 1 = 1 x 4 1 = 0 x 5 1 = 1
y 1 1 = 1 1−11−11
y 2 1 = 0 00000
y 3 1 = 0 00000
Now, the learning rule of Equation (11) is applied to each of the components of both patterns of the second association ( x 2 , y 2 ) :
x 1 2 = 1 x 2 2 = 1 x 3 2 = 0 x 4 2 = 0 x 5 2 = 1
y 1 2 = 0 1−11−11
y 2 2 = 1 11−1−11
y 3 2 = 0 00000
When applying the learning rule of Equation (11) to each of the components of both patterns of the third association ( x 3 , y 3 ) , the matrix becomes:
x 1 3 = 1 x 2 3 = 0 x 3 3 = 1 x 4 3 = 1 x 5 3 = 0
y 1 3 = 0 1−11−11
y 2 3 = 0 11−1−11
y 3 3 = 1 1−111−1
Since the rule of Equation (11) has already been applied to all pattern associations, the learning phase has concluded, and finally the Lernmatrix is:
M = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 )
Recalling phase for the Lernmatrix.
If x ω is a n-dimensional input pattern whose class is unknown, the recalling phase consists of operating the Lernmatrix with that input pattern, trying to find the corresponding p-dimensional one-hot vector y ω (i.e., the class). The i-th coordinate y i ω is obtained according to the next expression, where ∨ is the maximum operator:
y i ω = { 1   if   j = 1 n m i j x j ω = h = 1 p [ j = 1 n m h j x j ω ] 0   otherwise  
Example 2.
Now we are going to apply Equation (14) to each of the input patterns of Expression 12, with the Lernmatrix of Expression 13.
M x 1 = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 1 0 1 0 1 ) = ( 3 1 1 )
For i = 1 we have: j = 1 5 m 1 j x j 1 = 3 ; for i = 2: j = 1 5 m 2 j x j 1 = 1 ; and for i = 3: j = 1 5 m 3 j x j 1 = 1 . According to Equation (14), the value 1 will be assigned to the coordinate that gives the greatest sum, and 0 to all the others.
y 1 = ( 1 0 0 )
This means that input pattern x 1 will be assigned the class vector y 1 , which is correct according to Expression 12. When doing the same with input vectors x 2 and x 3 , we have:
M x 2 = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 1 1 0 0 1 ) = ( 1 3 1 ) ( 0 1 0 ) = y 2
M x 3 = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 1 0 1 1 0 ) = ( 1 1 3 ) ( 0 0 1 ) = y 3
Example 3.
In Example 2, all input patterns were correctly assigned the class in the recalling phase. That is true, but an interesting question arises: what will happen to the recalling phase if there are more input patterns than classes? To find out the answer, we are going to add a new input pattern to class 1 of the Lernmatrix of Expression 13:
x 4 = ( 0 1 0 1 1 ) , y 4 = y 1 = ( 1 0 0 )
When applying the learning rule of Equation (11) to each of the components of both patterns of the association ( x 4 , y 4 ) , the matrix becomes:
x 1 4 = 0 x 2 4 = 1 x 3 4 = 0 x 4 4 = 1 x 5 4 = 1
y 1 4 = 1 1−1−1+11−1−1+11+1
y 2 4 = 0 11−1−11
y 3 4 = 0 1−111−1
M 4 i n p u t s = ( 0 0 0 0 2 1 1 1 1 1 1 1 1 1 1 )
It can be easily verified that if we apply Equation (14) to each of the input patterns of Expression 12 with the Lernmatrix of Expression 16, all three classes are correctly assigned by the Lernmatrix. What will happen to input pattern x 4 ?
M 4 i n p u t s x 4 = ( 0 0 0 0 2 1 1 1 1 1 1 1 1 1 1 ) ( 0 1 0 1 1 ) = ( 2 1 1 ) ( 1 0 0 ) = y 1
Again, all input patterns were correctly assigned the class in the recalling phase. Another interesting question arises: will the Lernmatrix correctly assign classes to all patterns every time a new input pattern is added? The answer is no. Example 4 will illustrate a disadvantage exhibited by the Lernmatrix: a phenomenon called saturation.
Example 4.
We are going to add a new input pattern to class 3 of the Lernmatrix of Expression 16:
x 5 = ( 0 0 1 0 1 ) , y 5 = y 3 = ( 0 0 1 )
When applying the learning rule of Equation (11) to each of the components of both patterns of the association ( x 5 , y 5 ) , the matrix becomes:
x 1 5 = 0 x 2 5 = 0 x 3 5 = 1 x 4 5 = 0 x 5 5 = 1
y 1 5 = 0 00002
y 2 5 = 0 11−1−11
y 3 5 = 1 1−1−1−11+11−1−1+1
M 5 i n p u t s = ( 0 0 0 0 2 1 1 1 1 1 0 2 2 0 0 )
It can be easily verified that if we apply Equation (14) to each of the input patterns x 2 , x 3 , and x 4 with the Lernmatrix of Expression 17, all three classes are correctly assigned by the Lernmatrix. Now we are going to verify what happens with input pattern x 1 .
M 5 i n p u t s x 1 = ( 0 0 0 0 2 1 1 1 1 1 0 2 2 0 0 ) ( 1 0 1 0 1 ) = ( 2 1 2 ) ( 1 0 1 )
Here is the Lernmatrix saturation phenomenon, because the output pattern is not one-hot, so there is ambiguity: what class should we assign to input pattern x 1 ?, Should we assign x 1 class 1 or class 3?
The reader could easily verify that something similar occurs with input pattern x 5 , where the saturation phenomenon also occurs and consequently there is ambiguity.
It is worth noting something that happened in the previous 4 examples. The Lernmatrix learned with 5 input patterns, and each of those same input patters was used as a testing pattern. This is contrary to the concepts illustrated in Figure 1, regarding the partition to be made to dataset D in two sets, one set L for learning and the other set T for testing. However, in the four previous examples, the following occurs: D = L = T. This strange procedure exists and has a technical name: it is called resubstitution error [51]. It is not an authentic method of validation, and is only used when we want to know the trend of a new classifier.
In the 4 examples mentioned, we have used 5 patterns out of the 32 available, since with 5 bits it is possible to form 2 5 = 32 different binary patterns. We will take advantage of the results of the 4 previous examples in order to exemplify the behavior of the Lernmatrix when there is a dataset D which is partitioned into L and T, as illustrated in Figure 1. It must be taken into account that due to its nature as associative memory, in the case of the Lernmatrix, the dataset D is made up of associations of two patterns, an input pattern and an output pattern, which represents the class. The same goes for L and T.
Example 5.
Specifically, we will assume that dataset D contains 8 associations, of which the first 5 of the previous 4 examples form learning set L and there are 3 more that form testing set T. That is, the learning set L = { ( x 1 , y 1 ) , ( x 2 , y 2 ) , ( x 3 , y 3 ) , ( x 4 , y 1 ) , ( x 5 , y 3 ) } and the testing set is T = { ( x 6 , y 1 ) , ( x 7 , y 2 ) , ( x 8 , y 3 ) } , where:
x 6 = ( 0 0 0 1 1 ) , y 1 = ( 1 0 0 ) , x 7 = ( 1 1 0 0 0 ) , y 2 = ( 0 1 0 ) , x 8 = ( 0 1 0 0 1 ) , y 3 = ( 0 0 1 )
After the learning phase where Expressions 10 and 11 were applied to the 5 patterns in set L, the Lernmatix is precisely the matrix of Expression 17:
M 5 i n p u t s = ( 0 0 0 0 2 1 1 1 1 1 0 2 2 0 0 )
During the recalling phase, the operations of Expression 14 are performed with the Lernmatrix M 5 i n p u t s and each of one of the testing patterns x 6 , x 7 , and x 8 .
M 5 i n p u t s x 6 = ( 0 0 0 0 2 1 1 1 1 1 0 2 2 0 0 ) ( 0 0 0 1 1 ) = ( 2 0 0 ) ( 1 0 0 ) = y 1
M 5 i n p u t s x 7 = ( 0 0 0 0 2 1 1 1 1 1 0 2 2 0 0 ) ( 1 1 0 0 0 ) = ( 0 2 2 ) ( 0 1 0 ) = y 2
M 5 i n p u t s x 8 = ( 0 0 0 0 2 1 1 1 1 1 0 2 2 0 0 ) ( 0 1 0 0 1 ) = ( 2 2 2 ) ( 1 1 0 ) y 3
Two of the three patterns of the testing set T were correctly classified, and the saturation appears in the testing pattern x 8 . If we use Expression 2 to calculate accuracy, we have:
A c c u r a c y = 2 3 100 = 66.66 %
Now that we have illustrated both phases of the Lernmatrix with very simple examples, it is worth investigating how good the Lernmatrix is as a pattern classifier in real datasets. Also, and since most real-life datasets do not contain only binary data, we must be clear about what we must do to apply the Lernmatrix on those datasets.
To illustrate how good the Lernamtrix is as a pattern classifier in real datasets, we will take the first dataset that we have included in the experimental section of this paper as an example. This is the ecoli-0_vs_1 dataset, which contains 220 patterns of 7 numerical attributes, and which can be downloaded from the website: http://www.keel.es/. The objective of this problem is to predict the localization site of proteins by employing two measures about the cell: cytoplasm (class 0) and inner membrane (class 1).
To apply the Lernmatrix, we must binarize the patterns. Since each pattern has 7 numerical attributes and each attribute requires 8 bits to represent it, then each pattern in the dataset consists of 56 binary attributes. As previously discussed, we decided to use the stratified 5-fold cross-validation method, and balance accuracy as a performance measure.
After each of the 5 learning phases, a 56 × 2 Lermatrix resulted. Table 1 includes the performance of the Lernamtrix and also presents the performance values of 7 state-of-the-art classifiers (the complete table is included in Section 5).
As can be seen, the Lernmatrix as a dataset classifier, is very far from the performance values given by the most important state of the art classifiers. However, the main contribution of this paper is the proposal of a novel and simple mathematical transform, which will make it possible to significantly increase the performance of the Lernmatrix, to the point of making this ancient and beautiful model a competitive classifier against the most relevant classifiers in the state of the art.
In the next subsection, we will explain the reasons why the authors of this paper have decided to try to rescue the Lernmatrix, despite the modest performance results in Table 1.

2.3. Milestones in the Rescue of the Lernmatix

The Lernmatrix constitutes a crucial antecedent in the development of the contemporary models of associative memories [13], and was one on the first successful attempts to codify information in grid arrangements known as crossbars [52].
Due to unclear reasons, the Lernmatrix was almost forgotten for more than four decades, with two honorable exceptions. First, the German academics Prinz and Hower proposed, in 1976, to use the Lernmatrix within a mathematical approach to the assessment of air pollution effects, with promising results [53]. However, it is pertinent to note that their work was harshly criticized [54], causing them to leave the topic, with a shy and fleeting return nine years later [55]. Thereafter, they no longer published anything related to the Lernmatrix.
The other notable exception involves the academic Robert Hecht-Nielsen, professor at the University of California, who investigates the subject of computational neurobiology. After thirty years of work, Hecht-Nielsen published his theory of cerebral cortex, at the ICONIP congress of 1998 [56]; there, he presented his cortronic neural network models of cortical function [57]. Based on the results of these two research papers, that same year Defense Advanced Research Projects Agency (DARPA) supported him with several million dollars for the development of cortronic neural networks. According to what Hecht-Nielsen declared at the press conference organized by DARPA, cortronic architectures consist of linked classical associative memory structures, and their theoretical foundation is found in the concepts of the original Lernmatrix model. He said: “Although Steinbuch’s ideas have never been fashionable, I’m pretty sure they’re not wrong” [58].
A year later, through his HNC company, Hecht-Nielsen obtained the 1999 United States Patent 6366897, whose title is: “Cortronic neural networks with distributed processing.” From there, the scientific community has made contributions to the theory and applications of the cortronic neural networks, and the topic is still developing [59].
In the Alpha-Beta research group (to which the authors of this article belong), Lernmatrix was known in 2000. The results found by Hecht-Nielsen serve as inspiration to work with the associative model called Lernmatrix. In addition, interest in the model grew by discovering a surprising fact: none of the researchers involved with the Lernmatrix, or even its author, attempted to develop the theoretical foundations of the model.
The year 2001 marked the beginning of the work of the Alpha-Beta group with the Lernmatrix. By merging this model with another well-known associative model, the linear associator, a new pattern classification algorithm was created: the CHAT (Clasificador Híbrido con Traslación, in Spanish) [60]. This algorithm is still in development and is currently the subject of publications in impact journals [61,62,63,64,65,66,67].
The simplicity, effectiveness and efficiency of the Lernmatrix prompted the members of the Alpha-Beta group to undertake the task of investigate about its theoretical foundations. The first results of these investigations (in Spanish) [68], and their advances [69], were published in a local journal in 2002 and 2004, respectively.
In 2005, two relevant publications on the theoretical framework for the Lernmatrix were generated [70,71]. Two years after this, a further step was taken, with a modification to the algorithm that caused a notable increase in the performance [72].
For several years, efforts to find interesting advances were unsuccessful. Until recently, after arduous work sessions, we found an idea that crystallized with the main contribution of the present paper. Based on previous results obtained by Alpha-Beta group, a new transform is proposed that allows us to increase the performance of the Lernmatrix.

2.4. Lernmatix: Theoretical Advances

One of the first research actions that the Alpha-Beta group undertook when the researchers decided to work with the Lernmatrix was to create a new framework. This new framework rests on two initial definitions.
These two initial definitions served as decisive support to facilitate the statement and demonstration of the lemmas and theorems that make up the theoretical foundation of the Lernmatrix [71].
Definition 1.
A Steinbuch function is any function f : with the property:
f ( 0 ) = 1 and f ( 1 ) = 1
Example 6.
The function f ( x ) = 2 x 1 is a Steinbuch function, because f ( 0 ) = 2 ( 0 ) 1 = 1 and f ( 1 ) = 2 ( 1 ) 1 = 1 , according to Definition 1.
Definition 2.
Let f : be a Steinbuch function. A Steinbuch vectorial function for f is any function F : n n with the following property:
F ( x ) = ( f ( x 1 ) f ( x 2 ) f ( x n ) )
In this paper, we have described the Lernmatrix as a pattern classifier, where its recalling phase is actually a classification phase in the supervised pattern classification paradigm. For this reason, we take into account what is exposed in Figure 1.
When designing a Lernmatrix, we assume that there is a dataset D, from which a partition is made in two subsets: L (learning or training) and T (testing). The Lernmatrix learns with L and the patterns in T are used for testing. In the case of the Lernmatrix, the set L is made up of associations of two patterns, an input pattern and an output pattern, which represents the class.
If we denote by m the number of associations that the learning set L contains, we can represent it with the following expression:
L = { ( x μ , y μ ) | μ = 1 , 2 , , m }
Learning phase for the Lernmatrix in the new framework.
Let L be a learning set, let f be a Steinbuch function, and let F be an Steinbuch vectorial function for f . The Lernmatrix M is built according to the next rule:
M = ε μ = 1 m y μ ( F ( x μ ) ) T
As previously discussed, the only restriction for the value of ε is that it be positive. In the spirit of simplifying expressions, henceforth we will assume that ε = 1 .
M = μ = 1 m y μ ( F ( x μ ) ) T
It can easily be verified that Expression 22 is equivalent to Expressions 10 and 11, which define the learning phase of the original Lernmatrix model. To illustrate this equivalence we will replicate the Example 1 (Expression 12) in the new framework.
Example 7.
Making μ = 1 in Expression 21, the first association in Example 1 generates this:
F ( x 1 ) = ( 1 1 1 1 1 ) , ( F ( x 1 ) ) T = ( 1 1 1 1 1 ) , and y 1 ( F ( x 1 ) ) T = ( 1 0 0 ) ( 1 1 1 1 1 ) = ( 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 )
Performing similar operations for the other two associations in Example 1, and applying Expression 22:
M = μ = 1 3 y μ ( F ( x μ ) ) T = y 1 ( F ( x 1 ) ) T + y 2 ( F ( x 2 ) ) T + y 3 ( F ( x 3 ) ) T = ( 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 ) + ( 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 ) + ( 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 ) = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 )
Note that this result coincides with Expression 13. We are going to perform the same operations for the fourth association ( x 4 , y 4 ) , to obtain the Lernmatrix M 4 i n p u t s (Expressions 15 and 16).
M 4 i n p u t s = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) + ( 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 ) = ( 0 0 0 0 2 1 1 1 1 1 1 1 1 1 1 )
The reader can easily verify that the result for the Lernmatrix M 5 i n p u t s coincides with Expression 17.
Recalling phase for the Lernmatrix in the new framework.
Let M be a Lernmatrix built using Expression 22, and let ( x ω , y ω ) be an association of patterns with attributes and dimensions as in Expression 20. The output pattern y ˜ ω is obtained by operating the Lermatrix M and pattern x ω , according to the operations specified by Equation (23):
z ω = M x ω y ˜ i ω = { 1 if   z i ω = h = 1 m z h ω 0 otherwise
If there is saturation, the output pattern y ˜ ω is not necessarily equal to y ω .
Definition 3.
If y ˜ ω = y ω , then the recalling is correct.
Example 8.
It can easily be verified that Expression 23 is equivalent to Expression 14, both defining the recalling phase of the original Lernmatrix model. To illustrate this equivalence, we will replicate the first case of Example 2 in the new framework.
z 1 = M x 1 = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 1 0 1 0 1 ) = ( 3 1 1 )
y ˜ ω = ( 1 0 0 ) = y ω
Something similar occurs with the remaining cases in Example 2, and with all the cases in Examples 3, 4 and 5.
According to [68], the original model of the Lernmatrix suffers from a big problem: saturation, which has been one of the enemies to beat by the Alpha-Beta group since 2001. Saturation, as illustrated in Example 4, is considered as the overtraining of a memory, to the extent that it is not possible to remember or recall, correctly, the patterns learned. In other words, the class obtained is not one of those established in the learning set L.
This fact, visualized in the recalling phase, generates another problem known as ambiguity. This problem is the inability to determine the class associated with a certain input pattern, because the Lernmatrix output pattern is not a one-hot pattern. Ambiguity can be caused by two reasons that have been clearly identified by the Alpha-Beta group: (1) due to memory saturation or (2) due to the structure inherent to the patterns belonging to dataset D.
Ambiguity is another of the enemies to be defeated by the Alpha-Beta group since 2001. Over almost two decades of research, we have proposed several partial solutions to these two problems. Before presenting some of these partial solutions that the Alpha-Beta group has published, it is necessary to previously define the alteration between patterns, and the corresponding notation.
Definition 4.
Two n-dimensional binary patterns x α , x β are equal (denoted by x α = x β ) if and only if:
x j α = x j β , j { 1 , , n }
Example 9.
In Example 8, the two 3-dimensional binary patterns y ˜ ω and y ω are equal, because they satisfy the condition of Definition 4. However, patterns x 6 and x 7 in Example 5 are not equal because for j = 1, it happens that x j 6 x j 7 .
Definition 5.
Let x α , x β be two n-dimensional binary patterns. The pattern x α in less than or equal to pattern x β (denoted by x α x β ) if and only if:
( x j α = 1 ) ( x j β = 1 ) , j { 1 , , n }
Example 10.
The pattern x 7 of Example 5 is less than or equal to pattern x 2 of Example 1 ( x 7 x 2 ), because every time it happens that x j 7 (in indices j = 1 and j = 2), it is also true that x j 2 , according to Definition 5.
x 7 = ( 1 1 0 0 0 ) x 2 = ( 1 1 0 0 1 )
Example 11.
When considering the pattern x 7 of Example 5 and the pattern x 3 of Example 1, the expression x 7 x 3 is false according to Definition 5. The reason is that x 2 7 = 1 but x 2 3 = 0 , which contradicts Definition 5, because the expression ( x 2 7 = 1 ) ( x 2 3 = 1 ) is false.
If x 7 = ( 1 1 0 0 0 ) and x 3 = ( 1 0 1 1 0 ) , this expression is   false : x 7 x 3
Definition 6.
Let x α , x β be two n-dimensional binary patterns such that x α x β from the Definition 5. If j { 1 , , n } such that x j α < x j β , then the pattern x α exhibits subtractive alteration with respect to the pattern x β . This is denoted by x α < x β .
Example 12.
From Example 10, x 7 x 2 . Also, the pattern x 7 exhibits subtractive alteration with respect to the pattern x 2 because x 5 7 < x 5 2 according to Definition 6. Thus, this expression is true: x 7 < x 2 .
Below is a brief anthology of the most important advances obtained by the Alpha-Beta group, in relation to the theoretical foundations of the Lernmatrix. These results serve as a solid basis for the proposal of the mathematical transform, which represents the main contribution of this paper. In turn, this novel and simple mathematical transform is the cornerstone of the methodology that gives rise to the new Lernmatrix, a model that is now competitive against the most important classifiers of the state of the art. All these results can be consulted in these papers: [68,69,70,71,73].
Definition 7.
Let x α be a n-dimensional binary pattern. The characteristic set of x α is defined by H α = { j | x j α = 1 } . The cardinality of the characteristic set | H α | is the number of ones in the pattern x α .
Example 13.
From Examples 1 and 5, it is possible to verify the following expressions: H 1 = { 1 , 3 , 5 } and | H 1 | = 3 ; H 2 = { 1 , 2 , 5 } and | H 2 | = 3 ; H 3 = { 1 , 3 , 4 } and | H 3 | = 3 ; H 6 = { 4 , 5 } and | H 6 | = 2 ; H 7 = { 1 , 2 } and | H 7 | = 2 ; H 8 = { 2 , 5 } and | H 8 | = 2 .
Lemma 1.
Let x α , x β be two n-dimensional binary patterns. Then x α < x β if and only if H α H β .
Proof. 
By Definition 6, x α < x β if and only x α x β and j { 1 , , n } such that x j α < x j β ; if and only if (Definition 5) ( x j α = 1 ) ( x j β = 1 ) , j { 1 , , n } and H α H β ; if and only if (Definition 7) ( j H α ) ( j H β ) , j { 1 , , n } and H α H β ; if and only if H α H β and H α H β ; if and only if H α H β . □
Remark 2. 
Hereinafter, the symbol □ will indicate the end of a proof.
The importance of Lemma 1 lies in showing that an order relationship between patterns implies an order relationship between their characteristic sets and vice versa.
Example 14.
From Example 10 x 7 x 2 , and from Example 13, we have | H 7 | | H 2 | .
Lemma 2.
Let M be a Lernmatrix which was built from the learning set L = { ( x μ , y μ ) | μ = 1 , 2 , , m } by applying Expression 22, fulfilling y α = y β if and only if α = β . Let x ω be a n-dimensional binary pattern and z ω = M x ω . Then the k-th component of z ω is obtained by the following expression: z k ω = 2 | H k H ω | | H ω | .
Proof. 
By Expression 22, M = μ = 1 m y μ ( F ( x μ ) ) T = y 1 ( F ( x 1 ) ) T + + y k ( F ( x k ) ) T + + y m ( F ( x m ) ) T . Since the patterns y μ are one-hot, the Lernmatrix M can be written as follows:
M = ( 1 0 0 ) ( f ( x 1 1 ) f ( x j 1 ) f ( x n 1 ) ) + + ( 0 1 0 ) ( f ( x 1 k ) f ( x j k ) f ( x n k ) ) + + ( 0 0 1 ) ( f ( x 1 m ) f ( x j m ) f ( x n m ) )
By performing the summation:
M = ( f ( x 1 1 ) f ( x j 1 ) f ( x n 1 ) f ( x 1 k ) f ( x j k ) f ( x n k ) f ( x 1 m ) f ( x j m ) f ( x n m ) )
By multiplying by x ω :
z ω = M x ω = ( f ( x 1 1 ) f ( x j 1 ) f ( x n 1 ) f ( x 1 k ) f ( x j k ) f ( x n k ) f ( x 1 m ) f ( x j m ) f ( x n m ) ) x ω = ( f ( x 1 1 ) f ( x j 1 ) f ( x n 1 ) f ( x 1 k ) f ( x j k ) f ( x n k ) f ( x 1 m ) f ( x j m ) f ( x n m ) ) ( x 1 ω x k ω x n ω ) = ( j = 1 n f ( x j 1 ) x j ω j = 1 n f ( x j k ) x j ω j = 1 n f ( x j m ) x j ω )
Hence, the k-th component is:
z k ω = j = 1 n f ( x j k ) x j ω
Only the components of x ω that are equal to 1 contribute to the sum, and by Definition 7 we have:
z k ω = j H ω f ( x j k )
This summation has exactly | H ω | terms, which may be 1 or −1 according to Definition 1.
If we know the number of terms with value 1 and the number of terms with value −1, the result of the summation 30 is calculated using elementary algebra. If we denote by o n e s the number of terms with value 1, and by m _ o n e s the number of terms with value −1, the result of the summation 30 is:
z k ω = j H ω f ( x j k ) = o n e s + ( 1 ) m _ o n e s
Since the summation has exactly | H ω | terms, the number of terms with value −1 is:
m _ o n e s = | H ω | o n e s
So Expression 31 becomes:
z k ω = j H ω f ( x j k ) = o n e s + ( 1 ) ( | H ω | o n e s ) = o n e s ( | H ω | o n e s ) = 2 o n e s | H ω |
We are going to analyze the application of Definitions 1 and 7 in Expression 30, in order to elucidate the meaning of the quantity o n e s . According to Definition 1, positions with value 1 in pattern x k remain in f ( x k ) with value 1, if f is a Steinbuch function. That is, the characteristic set of f ( x k ) is equal to H k , according to Definition 7. However, according to Expression 30, o n e s does not count all the values 1 of pattern x k , but is restricted to those positions of the characteristic set H ω , where pattern x ω has value 1 according to Definition 7. Thus, o n e s is equal to the cardinality of the intersection of both characteristic sets:
o n e s = | H k H ω |
So, by substituting 34 in Expression 33, we obtain the thesis: z k ω = 2 | H k H ω | | H ω | . □
Example 15.
When operating the Lernmatrix of Expression 13 with the second pattern of the learning set L, we have (Example 2) x ω = x 2 , H ω = { 1 , 2 , 5 } and | H ω | = 3 :
z ω = M x 2 = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 1 1 0 0 1 ) = ( 1 3 1 )
For k = 1, H 1 = | { 1 , 3 , 5 } | , and 2 | H 1 H ω | | H ω | = 2 | { 1 , 5 } | 3 = 4 3 = 1 = z 1 ω .
For k = 2, H 2 = | { 1 , 2 , 5 } | , and 2 | H 2 H ω | | H ω | = 2 | { 1 , 2 , 5 } | 3 = 6 3 = 3 = z 2 ω .
For k = 3, H 3 = | { 1 , 3 , 4 } | , and 2 | H 3 H ω | | H ω | = 2 | { 1 } | 3 = 2 3 = 1 = z 3 ω .
Example 16.
If we wanted to verify that Lemma 2 is fulfilled in the results of Example 3, it would not be possible, because the hypothesis is violated. In Example 3, there are two equal output patterns but whose indices are different: y 4 = y 1 .
Remark 3. 
By applying the methodology proposed in this paper, this problem disappears because in the associations of the learning set L all the output patterns are different. We have used this successful idea previously in [61].
Example 17.
A solution to the problem exposed in Example 16 is to modify the matrix of Expression 30, to create a new Lernmatrix by adding pattern 4. But the output pattern would no longer be y 1 , but a four-bit one-hot pattern y 4 , modifying the three output patterns of x 1 , x 2 , and x 3 to four bits. The new Lernmatrix is converted as a 4 × 5 matrix and now we can verify that Lemma 2 is fulfilled, with x ω = x 4 , H ω = { 2 , 4 , 5 } and | H ω | = 3 :
z 4 = M x 4 = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 0 1 0 1 1 ) = ( 1 1 1 3 )
For k = 1, H 1 = | { 1 , 3 , 5 } | , and 2 | H 1 H ω | | H ω | = 2 | { 5 } | 3 = 2 3 = 1 = z 1 ω .
For k = 2, H 2 = | { 1 , 2 , 5 } | , and 2 | H 2 H ω | | H ω | = 2 | { 2 , 5 } | 3 = 4 3 = 1 = z 2 ω .
For k = 3, H 3 = | { 1 , 3 , 4 } | , and 2 | H 3 H ω | | H ω | = 2 | { 4 } | 3 = 2 3 = 1 = z 3 ω .
For k = 3, H 4 = | { 2 , 4 , 5 } | , and 2 | H 4 H ω | | H ω | = 2 | { 2 , 4 , 5 } | 3 = 6 3 = 3 = z 4 ω .
Lemma 3.
Let M be a Lernmatrix which was built from the learning set L = { ( x μ , y μ ) | μ = 1 , 2 , , m } by applying Expression 22, fulfilling y α = y β if and only if α = β . Let x ω be a n-dimensional binary pattern. Then y α is the output pattern (for x ω ) of the Lernmatrix recalling phase with α { 1 , 2 , , m } , if and only if | H α H ω | > | H β H ω | , β { 1 , 2 , , m } , β α .
Proof. 
Since y α is a one-hot pattern, its components fulfill the following condition:
y α α = 1 , y j α α = 0
By Expressions 23 and 35, y α is the output pattern for x ω if and only if:
z α ω = h = 1 m z h ω
This occurs if and only if:
z α ω > z β ω
for any arbitrary index β , such that β { 1 , 2 , , m } , β α .
By Lemma 2:
z α ω = 2 | H α H ω | | H ω |   and   z β ω = 2 | H β H ω | | H ω |
So, by substituting 38 in Expression 37, we obtain the thesis:
| H α H ω | > | H β H ω | , β { 1 , 2 , , m } , β α
 □
Example 18.
We will illustrate Lemma 3 with the patterns of the learning set L of Example 1 and the Lermatrix obtained in Expression 13. We will obtain the output pattern for a pattern that does not belong to L.
This is the learning set L of Example 1:
x 1 = ( 1 0 1 0 1 ) , y 1 = ( 1 0 0 ) , x 2 = ( 1 1 0 0 1 ) , y 2 = ( 0 1 0 ) , x 3 = ( 1 0 1 1 0 ) , y 3 = ( 0 0 1 )
This is the Lermatrix obtained in Expression 13:
M = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 )
We will choose the pattern x ω not belonging to L as the input pattern to this Lernmatrix.
z ω = M x ω = ( 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 ) ( 0 1 1 1 0 ) = ( 1 1 2 ) ( 0 0 1 )
In this example, α = 3 , and we will verify the inequality of Lemma 2, with the values β = 1 and β = 2 . Also: H ω = | { 2 , 3 , 4 } | , and H α = H 3 = | { 1 , 3 , 4 } | and | H α H ω | = | { 3 , 4 } | = 2 .
For β = 1 , | H β H ω | = | { 3 } | = 1 . So that: | H α H ω | > | H β H ω | .
For β = 2 , | H β H ω | = | { 2 } | = 1 . So that: | H α H ω | > | H β H ω | .
Theorem 1.
Let M be a Lernmatrix which was built from the learning set L = { ( x μ , y μ ) | μ = 1 , 2 , , m } by applying Expression 22, fulfilling y α = y β if and only if α = β . Let x ω be a n-dimensional binary pattern which exhibits subtractive alteration with respect to the pattern x α ,for some α { 1 , 2 , , m } . Then y α is the output pattern (for x ω ) of the Lernmatrix recalling phase if and only if the expression x ω < x β (according to Definition 6) is false β { 1 , 2 , , m } , β α .
Proof. 
By Lemma 3, y α is the output pattern for x ω if and only if:
| H α H ω | > | H β H ω | , β { 1 , 2 , , m } , β α
By Definition 6, given that x ω is a n-dimensional binary pattern which exhibits subtractive alteration with respect to the pattern x α , for some α { 1 , 2 , , m } , we have x ω < x α , and by Lemma 1 this is true if and only if:
H ω H α
By elementary set theory, Expression 40 is true if and only if:
H α H ω = H ω
By substituting Expression 41 in Expression 39, we have:
| H ω | > | H β H ω | , β { 1 , 2 , , m } , β α
Expression 42 is equivalent to:
H ω H β   is   false   β { 1 , 2 , , m } , β α
By contradiction, we suppose that the negation of the proposition 43 is true:
β { 1 , 2 , , m } ,   β α   such   that   H ω H β
This proposition is equivalent to:
β { 1 , 2 , , m } ,   β α   such   that   H β H ω = H ω
By Expressions 44, 41, and 39, we have:
β { 1 , 2 , , m } ,   β α   such   that   | H ω | > | H ω |   which   is   a   contradiction
By Lemma 1, Expression 43 is true if and only if:
x α < x β   ( according   to   Definition   6 )   is   false   β { 1 , 2 , , m } ,   β α
 □
What is expressed in Theorem 1 is very relevant for the state of the art in the topic of associative memories, when these models convert the task of pattern recalling into the task of pattern classification. The relevance lies in that Theorem 1 provides necessary and sufficient conditions for the Lernmatrix to correctly classify a pattern x ω that does not belong to learning set L. The pattern x ω belongs to testing set T, and is characterized by exhibit subtractive alteration with respect to some pattern belonging to the learning set L, say x α .
However, to achieve the correct classification of the x ω pattern, the condition included in Theorem 1 is very strong. Theorem 1 requires this condition to be fulfilled: there must be no subtractive alteration of testing pattern x ω with respect to any of the patterns in the learning set L, different from x α .
As mentioned previously, saturation and ambiguity are two problems that the Alpha-Beta group has faced since almost twenty years ago. It is now obvious that both problems appear as a direct consequence of the strong condition of Theorem 1 not being fulfilled. This is evidenced in the poor results that the Lernmatrix shows in the dataset of Table 1.
During a recent Alpha-Beta group work session, a disruptive idea suddenly emerged: what would happen if we do something to modify the pattern data so that the patterns fulfill the strong condition of Theorem 1? From that moment on, we worked hard in the search for some transform that is capable of eliminating the subtractive alteration x ω < x β for all values of β different from α , assuming that the test pattern x ω exhibits subtractive alteration with respect to x α .
This is precisely the achievement made in this research work. Finally we have found the long-awaited transform, which is proposed in Section 3. With this new representation of the data, the strong condition of Theorem 1 is fulfilled.
Section 5 of this article shows that with this new representation of the data, the performance of the Lernmatrix increases ostensibly, to the degree of competing with the supervised classifiers of the state of the art. The methodology proposed in this work includes, as one of the relevant methodological steps, the new transform.

2.5. The Johnson-Möbius Code

This subsection may seem out of place. However, the content is relevant to this article, because here a method that will be part of the methodology proposed in Section 4 is presented. The method consists of a binary data transformation code called the Johnson–Möbius code, which we proposed in the Alpha-Beta group nineteen years ago. The Johnson-Möbius code was used in a research work where we predicted levels of environmental pollutants [74]. Notice that here we are not working with the code previously introduced in [75].
The Johnson–Möbius code allows us to convert a set of real numbers into binary representations by following these three steps:
  • Subtract the minimum (of the set of numbers) from each number, leaving only non-negative real numbers.
  • Scale up the numbers (truncating the remaining decimals if necessary) by multiplying all numbers by an appropriate power of 10, in order to leave only non-negative integer numbers.
  • Concatenate e m e j zeros with e j ones, where e m is the greatest non-negative integer number to be coded, and e j is the current non-negative integer number to be coded.
Example 19.
We will illustrate the Johnson–Möbius code with an example taken from [74].
We will use the Johnson–Möbius code to convert these 5 real numbers: 1.7, −0.1, 1.9, 0.2, and 0.6 into binary digit strings.
The first step is to subtract the minimum (which in this case is −0.1) from each number. The original 5 real numbers are transformed into 5 non-negative real numbers which are: 1.8, 0.0, 2.0, 0.3, and 0.7.
The second step is to multiply each number by 10, to get only non-negative integers: 18, 0, 20, 3, and 7. For this example e m = 20 , because it is the greatest non-negative integer number to be coded. When performing the concatenations of zeros and ones, the final conversion is:
1.7 00111111111111111111 0.1 00000000000000000000   1.9 11111111111111111111 0.2 00000000000000000111 0.6 00000000000001111111

3. Our Main Proposal: The τ [ 9 ] Transform

The meaning of 9 in the transform symbol τ [ 9 ] is related to the binary code of the decimal number 9 [ 1001 ] , which implicitly includes the two transformations: 1 [ 10 ] and 0 [ 01 ] .
Definition 8.
The τ [ 9 ] transform is defined in such a way that it has a binary digit as input and at the output it delivers a binary pattern of dimension 2, according to the following:
τ [ 9 ] ( 1 ) = ( 1 0 ) τ [ 9 ] ( 0 ) = ( 0 1 )
Notation 1.
The application of the novel τ [ 9 ] transform to each and every component of a n-dimensional binary vector x ω , is denoted by Γ [ 9 ] ( x ω ) .
This novel transform looks very simple. However, it must be emphasized that τ [ 9 ] is a powerful, yet simple, mathematical transform, as will be shown in Section 5 of this paper. This powerful simplicity goes hand in hand with the spirit that has guided the Alpha-Beta group in their scientific research activities. Since its creation in 2002, the Alpha-Beta research group has taken as inspiration ideas that highlight the simplicity of scientific or technological concepts. An example is the Ockham Razor (s. XIV), one of whose free interpretations reads as follows: “If you have two or more hypotheses for a fact, you should choose the simplest one” [76].
Theorem 2.
Let x α , x β be two n-dimensional binary patterns such thatthe pattern x α exhibits subtractive alteration with respect to the pattern x β , i.e., x α < x β according the Definition 6. Then, by applying the τ [ 9 ] transform to each and every one of the components of both vectors, the subtractive alteration is eliminated. That is, Γ [ 9 ] ( x α ) does not exhibit subtractive alteration with respect to Γ [ 9 ] ( x β ) , nor does Γ [ 9 ] ( x β ) exhibit subtractive alteration with respect to Τ [ 9 ] ( x α ) .
Proof. 
By Definitions 5 and 6, the hypothesis x α < x β is true if and only if the following two conditions are fulfilled simultaneously:
j { 1 , , n }   such   that   x j α < x j β
( x j α = 1 ) ( x j β = 1 ) , j { 1 , , n }
Since by the hypothesis x α and x β are binary patterns, the only possibility that the inequality 48 is true is that x j α = 0 and x j β = 1 . By Definition 8, when applying the transform, the result is:
τ [ 9 ] ( x j α ) = τ [ 9 ] ( 0 ) = ( 0 1 )
τ [ 9 ] ( x j β ) = τ [ 9 ] ( 1 ) = ( 1 0 )
while condition 48 persists in the first component of the new two-dimensional binary patterns, condition 49 has been eliminated. A brief analysis of the behavior of the second component in both two-dimensional binary patterns, allows us to conclude that condition 49 is false. This is easily evident because the antecedent of the conditional 49 is true, while the consequent is false. By elementary Boolean logic, this conditional is false. This short analysis is replicated for each index that originally fulfills condition 50. That is, Γ [ 9 ] ( x α ) does not exhibit subtractive alteration with respect to Γ [ 9 ] ( x β ) . By performing a similar analysis in reverse, we can see that condition 49 is eliminated in the first component of both two-dimensional binary patterns. Therefore, it is possible to conclude that Γ [ 9 ] ( x β ) does not exhibit subtractive alteration with respect to Γ [ 9 ] ( x α ) . □
Example 20.
We will illustrate Theorem 2 with the patterns from Examples 10 and 12.
x 7 = ( 1 1 0 0 0 ) , x 2 = ( 1 1 0 0 1 )
From Example 10, x 7 x 2 . Also, from Example 12, the pattern x 7 exhibits subtractive alteration with respect to the pattern x 2 because x 5 7 < x 5 2 according to Definition 6.
By applicating the τ [ 9 ] transform to both patterns:
Γ [ 9 ] ( x 7 ) = ( τ [ 9 ] ( 1 ) τ [ 9 ] ( 1 ) τ [ 9 ] ( 0 ) τ [ 9 ] ( 0 ) τ [ 9 ] ( 0 ) ) = ( 1 0 1 0 0 1 0 1 0 1 ) , Γ [ 9 ] ( x 2 ) = ( τ [ 9 ] ( 1 ) τ [ 9 ] ( 1 ) τ [ 9 ] ( 0 ) τ [ 9 ] ( 0 ) τ [ 9 ] ( 1 ) ) = ( 1 0 1 0 0 1 0 1 1 0 ) ,
By carrying out a brief analysis with the last two components of both binary patterns, it is possible to conclude that Γ [ 9 ] ( x 7 ) does not exhibit subtractive alteration with respect to Γ [ 9 ] ( x 2 ) . In addition, Γ [ 9 ] ( x 2 ) does not exhibit subtractive alteration with respect to Γ [ 9 ] ( x 7 ) .
Now we already have Theorem 2, which becomes a powerful tool that allows us to face the strong condition of Theorem 1.

4. Proposed Methodology

Although the new transform τ [ 9 ] is crucial for the success of the proposed methodology, this methodology includes concepts and algorithms that the Alpha-Beta group has published over the years. In the description of the proposed model, the references containing those concepts and algorithms will be indicated.
Let D be a dataset which is partitioned into c different sets representing the classes K 1 , K 2 , , K c where c is a positive integer. These c sets fulfill the following conditions:
i = 1 c K i = D K i K j = , i , j { 1 , 2 , , c }   such that i j
If necessary, preprocessing is applied to the data, in order to convert the categorical data to numerical ones and to impute the missing values.
When applying a stratified validation method, the dataset D is partitioned in two disjoint sets: the learning set L and testing set T. The sets L and T fulfill the following conditions:
L T = D L T =
In the learning set L, the proportion of the c classes K 1 , K 2 , , K c is maintained. The set of patterns in L that belong to class K i is denoted by K i L , and its cardinality is | K i L | . The c sets K i L fulfill the following condition:
i = 1 c | K i L | = | L |
Each of the c classes K i L contains | K i L | learning patterns in L, which are located in different positions within the set L. Therefore, the patterns in K i L correspond to | K i L | values of the m indices μ { 1 , 2 , , m } . We will denote the set of indices in L that correspond to the patterns belonging to class K i L , as follows:
I i = { j { 1 , 2 , , m } | x j K i L } , i { 1 , 2 , , c }
Each element of the learning set L is an association of two patterns. The first component of the association is a pattern x μ (input pattern) that belongs to D, and the second component is the corresponding class label y μ (output pattern). Assuming that L contains m patterns:
L = { ( x μ , y μ ) | μ = 1 , 2 , , m }
Taking into account that according to Expression 55 the cardinality of L is m, Expression 54 becomes:
i = 1 c | K i L | = | L | = m
The methodology for the proposed model, which we have named L M ( τ [ 9 ] ) , consists of two phases: learning phase and recalling phase.
The learning phase structure of the proposed model is outlined in the diagrams of Figure 10 and Figure 11, which were inspired by [77]. The diagram in Figure 10 includes a general outline for the learning phase of the proposed model.
The diagram in Figure 10 emphasizes a fact that is common to all associative memory models. In the learning phase, both input patterns x μ and output patterns y μ are used to create the model with specific operations described below, i.e., both types of patterns enter the diagram.
The diagram in Figure 11 is more detailed. Specific operations performed with input patterns x μ and output patterns y μ are included. The expressions of the description of the learning phase where the corresponding operations are explained in detail are specified.
Learning phase for the proposed model L M ( τ [ 9 ] ) .
  • Apply the Johnson–Möbius code to each and every one of the input patterns x μ of the learning set L [74], to obtain a p-dimensional binary pattern:
    JM ( x μ ) ,   μ { 1 , 2 , , m }
  • Apply the proposed transform to each pattern JM ( x μ ) , to obtain a 2p-dimensional binary pattern:
    Γ [ 9 ] ( JM ( x μ ) ) ,   μ { 1 , 2 , , m }
  • For each input pattern x μ of the learning set L, code the output pattern y μ as an one-hot pattern [61]:
    y μ o h μ ,   μ { 1 , 2 , , m }
    With this step, one of the conditions of the hypothesis of Theorem 1 is guaranteed: y α = y β if and only if α = β .
  • Build the new model L M ( τ [ 9 ] ) . This is achieved by training the Lernmatrix by applying Expression 22, using the new learning set { ( Γ [ 9 ] ( JM ( x μ ) ) , o h μ ) | μ = 1 , 2 , , m } , which was obtained in the three previous steps.
    L M ( τ [ 9 ] ) = μ = 1 m o h μ ( F ( Γ [ 9 ] ( JM ( x μ ) ) ) ) T
    If n = 2 p , the new model L M ( τ [ 9 ] ) is a m × n Lernmatrix.
    The recalling phase structure of the proposed model is outlined in the diagrams of Figure 12 and Figure 13, which were inspired by [77].
Note that the diagram in Figure 12 is different from the diagram in Figure 10. In the recalling phase, only the testing pattern x ω T enters the diagram. Inside the box that corresponds to the model, specific operations (which are described below) are performed that have as a result the generation of the class label for the testing pattern. Precisely the class label is located after the exit arrow.
The diagram in Figure 13 is more detailed. Specific operations performed with the testing pattern x ω T and the proposed model L M ( τ [ 9 ] ) are included. The expressions of the description of the recalling phase where the corresponding operations are explained in detail are specified.
Recalling phase for the proposed model L M ( τ [ 9 ] ) .
  • Let x ω T be a test pattern. Apply the Johnson–Möbius code to the pattern x ω , to obtain a p-dimensional binary pattern JM ( x ω ) .
  • Apply the proposed transform to the pattern JM ( x ω ) , to obtain a n-dimensional binary pattern Γ [ 9 ] ( JM ( x ω ) ) .
  • Using the first part of Expression 23, obtain a m-dimensional binary pattern by the product of the m × n Lernmatrix L M ( τ [ 9 ] ) and the n-dimensional binary pattern Γ [ 9 ] ( JM ( x ω ) ) :
    z ω = ( L M ( τ [ 9 ] ) ) ( Γ [ 9 ] ( JM ( x ω ) ) )
  • This last step of the recalling phase is extremely relevant, since in this step the class is assigned to the testing pattern x ω . To achieve this, we must first consider that the pattern z ω obtained in step 3 consists of m binary digits. Furthermore, it should be noted that in these m binary digits, all the c classes that were specified in Expressions 54 to 57 are represented. Due to its importance and the processes involved, this step consists of four sub-steps:
    4.1.
    Define the pattern of binary digits in the m-dimensional binary pattern z ω , which are found in positions corresponding to each class K i , i.e., in the set I i from Expression 55:
    K i z ω = { z j ω z ω | j I i } , i { 1 , 2 , , c }
    4.2.
    From Definition 7 and Expression 63, we will generate the characteristic set H i z ω of the pattern K i z ω . The characteristic set H i z ω contains all the components of pattern z ω with value 1, whose positions correspond to the class K i :
    H i z ω = { a K i z ω | a = 1 } , i { 1 , 2 , , c }
    4.3.
    Now, for each i { 1 , 2 , , c } we will calculate a positive real number E i , which represents the weighted expression of the class K i in the pattern z ω :
    E i = | H i z ω | | K i z ω | , i { 1 , 2 , , c }
    4.4.
    If E i = k = 1 c E k , the class label of K i is assigned to pattern z ω .
The weighted expression of classes technique described in step 4.3 has previously been used by the Alpha-Beta group in various research papers, the summaries of which are included in [78].

5. Results and Discussion

In this section, we detail the experimental results carried out in order to compare the proposed model L M ( τ [ 9 ] ) against the most important classifiers of the state of the art. We have been very careful in choosing datasets that reflect the different activities of the human being, and that are used by world scientists when trying new models of pattern classification. In Section 5.1, the 20 selected datasets will be described in detail. Regarding the classifiers, we selected in total seven algorithms: six supervised classifiers, from each family of algorithms detailed in Section 2.1, plus an algorithm that works with an ensemble of classifiers. Section 5.2 will describe the seven algorithms, their specifications and strengths. Section 5.3 is the culmination of the efforts described throughout the paper, because in this subsection the experimental results are presented, which show the competitiveness of the proposed model L M ( τ [ 9 ] ) . Firstly, the validation method used to partition the datasets is described. Then, the performance measure used and the reasons why we have chosen this performance measure are specified. Finally, the tables of results, the statistical tests of significance, and the discussion of these relevant results are presented.

5.1. Datasets

In Section 2.1, it was clearly specified that there exist dataset repositories that have become important auxiliaries to those who develop algorithms and models in pattern recognition and related disciplines. One of the best repositories is in the public domain, namely the KEEL repository, which is sponsored by the University of Granada in Spain [79]. This repository has been made available to researchers around the world: http://sci2s.ugr.es/keel/datasets.php.
We selected 20 datasets from the KEEL repository. The first criterion was to consider datasets whose patterns only contain numerical attributes. The number of attributes (all numerical) in the 20 selected datasets varies from four to 18, while the number of patterns ranges from 150 to 1484.
The second criterion that we took into account to carry out the selection was the number of classes [24]. As it is the most studied case, we have included in this selection datasets with only two classes, i.e., in Expression 52, c = 2 and in each dataset the only classes will be K 1 and K 2 .
The most important criterion to consider was to make sure that our proposed model faced a challenging problem. The main purpose of this paper is to leave evidence that the proposed novel model L M ( τ [ 9 ] ) is capable of contributing in a relevant way to the state of the art in pattern classification, by successfully facing a challenge.
We have found the challenge in the imbalance of classes [16,23]. In accordance with what was described in Section 2.1, the most interesting datasets are far from the ideal case, where the cardinalities of the classes are equal (or almost equal). The importance of datasets is normally reflected in their social impact, and the datasets used for the classification of diseases are a good example [7,34]. However, these are precisely the datasets that exhibit the challenge of imbalance. According to Expression 1, the imbalance ratio (IR) for the 20 selected datasets varies from 1.86 to 39.14.
Table 2 includes the specifications of the 20 selected datasets, in alphabetical order.
In addition to the criteria mentioned above, we have been very careful in choosing datasets that reflect the activities important to humans. The 20 selected datasets came from different scenarios (medical, agricultural, economical, speaking). Below are brief descriptions, which are adapted from http://sci2s.ugr.es/keel/datasets.php and http://archive.ics.uci.edu/ml/datasets.php:
(a)
Regarding the Ecoli dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but instead was obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original name of the dataset is “Protein Localization Sites”, and that it was created by Kenta Nakai from the Institute of Molecular and Cellular Biology, Osaka University. The patterns consist of seven numerical attributes: mcg: McGeoch’s method for signal sequence recognition; gvh: von Heijne’s method for signal sequence recognition; lip: von Heijne’s Signal Peptidase II consensus sequence score; chg: Presence of charge on N-terminus of predicted lipoproteins; aac: score of discriminant analysis of the amino acid content of outer membrane and periplasmic proteins; alm1: score of the ALOM membrane spanning region prediction program; and alm2: score of ALOM program after excluding putative cleavable signal regions from the sequence. Originally, there were eight classes: cp (cytoplasm), im (inner membrane without signal sequence), pp (perisplasm), imU (inner membrane, uncleavable signal sequence), om (outer membrane), omL (outer membrane lipoprotein), imL (inner membrane lipoprotein), and imS (inner membrane, cleavable signal sequence).
Using the Ecoli dataset as a base, the KEEL project generated the five imbalanced datasets of two classes that we included in our selection:
ecoli-0_vs_1: This dataset is an imbalanced version of the Ecoli dataset, where the positive examples belong to class im and the negative examples belong to the class cp.
ecoli-0-1-3-7_vs_2-6: This dataset is an imbalanced version of the Ecoli dataset, where the positive examples belong to classes pp and imL and the negative examples belong to classes cp, im, imU and imS.
ecoli1: This dataset is an imbalanced version of the Ecoli dataset, where the positive examples belong to class im and the negative examples belong to the rest.
ecoli2: This dataset is an imbalanced version of the Ecoli dataset, where the positive examples belong to class pp and the negative examples belong to the rest.
ecoli3: This dataset is an imbalanced version of the Ecoli dataset, where the positive examples belong to class imU and the negative examples belong to the rest.
(b)
The sixth selected dataset is an adaptation of the Iris Dataset, which originally consisted of three classes (https://archive.ics.uci.edu/ml/datasets/iris).
iris0: This is an imbalanced version of the well-known Iris data set. There are two classes defined: positive (the old iris-setosa class) and negative (the old iris-versicolor and iris-virginica classes).
(c)
Regarding the New Thyroid dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but instead was obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original dataset was donated by Stefan Aberhard from James Cook University, Australia. The dataset deals with diagnosing a patient thyroid function. It has 215 patterns which consist of five numerical attributes T3-resin uptake test, total serum thyroxin as measured by the isotopic displacement method, total serum tri-odothyronine as measured by radioimmuno assay, basal thyroid-stimulating hormone (TSH) as measured by radioimmuno assay, and maximal absolute difference of TSH value after injection of 200 μg of thyrotropin-releasing hormone as compared to the basal value. There are three classes of thyroid functions; normal, hyper and hypo functioning.
Using the New Thyroid dataset as a base, the KEEL project generated the two imbalanced datasets of two classes that we included in our selection:
new-thyroid1: This dataset is an imbalanced version of the New Thyroid dataset, where the positive examples belong to class 2 (hyperthyroidism) and the negative examples belong to the rest.
new-thyroid2: This dataset is an imbalanced version of the New Thyroid dataset, where the positive examples belong to class 3 (hypothyroidism) and the negative examples belong to the rest.
(d)
Regarding the Shuttle dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but instead was obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original dataset was donated by Jason Catlett from University of Sydney, Australia. This dataset was generated originally to extract comprehensible rules for determining the conditions under which an autolanding would be preferable to the manual control of a spacecraft. The patterns consist of nine numerical attributes and seven possible values for the class label: Rad Flow, Fpv Close, Fpv Open, High, Bypass, Bpv Close, and Bpv Open.
Using the Shuttle dataset as a base, the KEEL project generated the imbalanced dataset of two classes that we included in our selection:
shuttle-c2-vs-c4: This dataset is an imbalanced version of the Shuttle dataset, where the positive examples belong to class 2 (Fpv Close) and the negative examples belong to class 4 (High).
(e)
Regarding the Vehicle Silhouettes dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but instead was obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original dataset was donated by Pete Mowforth and Barry Shepherd from the Turing Institute, Glasgow, Scotland. The purpose is to classify a given silhouette as one of four types of vehicle, using a set of attributes extracted from the silhouette. The vehicle may be viewed from one of many different angles. The patterns consist of 18 numerical attributes and four possible values for the class label: van, saab, bus, opel.
Using the Vehicle Silhouettes dataset as a base, the KEEL project generated two imbalanced dataset of two classes that we included in our selection:
vehicle0: This dataset is an imbalanced version of the Vehicle Silhouettes dataset, where the positive examples belong to class 0 (van) and the negative examples belong to the rest.
vehicle2: This dataset is an imbalanced version of the Vehicle Silhouettes dataset, where the positive examples belong to class 2 (bus) and the negative examples belong to the rest.
(f)
Regarding the Vowel Recognition dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but was instead obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original dataset was donated by David Deterding, Mahesan Niranjan, and Tony Robinson from the University of Cambridge, UK. This dataset deals with speaker independent recognition of the eleven steady state vowels of British English. The patterns consist of 13 numerical attributes and 11 possible values for the class label.
Using the Vowel Recognition dataset as a base, the KEEL project generated the imbalanced dataset of two classes that we included in our selection:
vowel0: This dataset is an imbalanced version of the Vowel Recognition dataset, where the positive examples belong to class 0 and the negative examples belong to the rest.
(g)
Regarding the Wisconsin dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but instead was obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original dataset was donated by William H. Wolberg from the University of Wisconsin Hospitals, USA. The task is to determine if the detected tumor is benign or malignant. The patterns consist of 13 numerical attributes: Clump Thickness, Uniformity of Cell Size, Uniformity of Cell Shape, Marginal Adhesion, Single Epithelial Cell Size, Bare Nuclei, Bland Chromatin, Normal Nucleoli, and Mitoses. There are two possible values for the class label: benign and malignant.
Using the Wisconsin dataset as a base, the KEEL project generated the imbalanced dataset of two classes that we included in our selection:
wisconsin: This dataset is an imbalanced version of the Wisconsin dataset, where the classes have been renamed to positive and negative.
(h)
Regarding the Yeast dataset, the administrators of the KEEL repository note that this is not a native dataset from the KEEL project, but instead was obtained from the UCI machine learning repository: http://archive.ics.uci.edu/ml/datasets.php. In this website, it is specified that the original dataset was created by Kenta Nakai from the Institue of Molecular and Cellular Biology, Osaka University. This database contains information about a set of yeast cells. The patterns consist of eight numerical attributes: Mcg: McGeoch’s method for signal sequence recognition; Gvh: von Heijne’s method for signal sequence recognition; Alm: Score of the ALOM membrane spanning region prediction program; Mit: Score of discriminant analysis of the amino acid content of the N-terminal region (20 residues long) of mitochondrial and non-mitochondrial proteins; Erl: Presence of “HDEL” substring (thought to act as a signal for retention in the endoplasmic reticulum lumen); Pox: Peroxisomal targeting signal in the C-terminus; Vac: Score of discriminant analysis of the amino acid content of vacuolar and extracellular proteins, and Nuc: Score of discriminant analysis of nuclear localization signals of nuclear and non-nuclear proteins. The task is to determine the localization site of each cell among 10 possible alternatives: MIT, NUC, CYT, ME1, ME2, ME3, EXC, VAC, POX, ERL.
Using the Yeast dataset as a base, the KEEL project generated the seven imbalanced datasets of two classes that we included in our selection:
yeast1: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class NUC and the negative examples belong to the rest.
yeast-1_vs_7: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class VAC and the negative examples belong to the class NUC.
yeast-1-2-8-9_vs_7: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class VAC and the negative examples belong to classes NUC, CYT, POX, ERL.
yeast-1-4-5-8_vs_7: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class VAC and the negative examples belong to classes NUC, ME2, ME3, POX.
yeast-2_vs_4: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class CYT and the negative examples belong to the class ME2.
yeast-2_vs_8: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class CYT and the negative examples belong to the class POX.
Yeast4: This dataset is an imbalanced version of the Yeast dataset, where the positive examples belong to class ME2 and the negative examples belong to the rest.

5.2. Supervised Classification Algorithms under Comparison

We have taken special care in selecting the pattern classification algorithms against which we will compare the performance of the new model. After a serious analysis of the different approaches to the state of the art in pattern classification, we have chosen a representative algorithm of each approach, according to the detailed descriptions of the six approaches in Section 2.1. Additionally, we have chosen an ensemble of supervised classification algorithms [24].
All algorithms were executed using the WEKA platform [25]. With the exception of SVM, the default configuration was used in all other classifiers. We used a personal computer with Windows operating system, having Intel(R) Core (TM) 2 Duo CPU E6550 processor at 2.33GHz, with 2 Gb of RAM.
The first algorithm selected is a Bayes classifier. Although there are a large number of Bayes classifiers in the state of the art (in WEKA alone we can count almost ten of them) there is a model that stands out for its simplicity and effectiveness: it is the Naïve Bayes, which is currently applied in different areas of science and technology [80]. It is based on the Bayes theorem and assumes that attributes are independent given the value of the class label. This classifier is one of the simplest classification algorithms and has been selected for our experiments.
A glance at recent articles on pattern classification allows us to see that k-NN classifiers are always present in the experimental section. This occurs because the use of metrics and their properties provides conceptual support for k-NN classifiers, which are considered among the most important and useful approaches in pattern classification. [31]. For this reason, in this paper we have chosen 3-NN for the experimental section, because it was the one that yielded the best results of several k-NN that we tested.
The importance of the study of decision trees in contemporary specialized literature is undeniable [34]. However, there is an algorithm that cannot be missing in a pattern classification results table. This is the C4.5 algorithm, which is one of the most important classifiers of this approach [81]. That is the reason why we selected algorithm C4.5 to be included in the experimental section of this paper.
The algorithm based on the multinomial logistic regression function is very effective as a pattern classifier on datasets of two classes [35]. This efficient classifier with the popular name of logit was included in the experimental section of this paper [37].
In Section 2.1, the relevance of SVMs has been emphasized as one of the most appreciated classifiers by the international scientific community [40]. For this reason, we included a representative model of the SVM in the experimental section of this paper. The configuration in WEKA for the SVM that we have selected is: gamma = 1, Polinomial grade 3.
Due to its relevance and effectiveness, a neural network could not be missing. We included the MLP [45], with the default configuration in WEKA, as a representative of this approach. We also selected one of the most popular classifier assemblies. We included the AdaBoost algorithm [82], using the decision tree C4.5 as base classifier.

5.3. Tables of Results, Statistical Tests, and Discussion

In Section 5.1, we established three criteria that guided us in the selection of the 20 datasets. First, we decided that patterns only contain numerical attributes. This was done to avoid the imputation procedure and conversion of categorical to numerical attributes. The second criterion (only two classes) addresses the fact that pattern classification involving only two classes is the most studied case in contemporary literature.
The third criterion (imbalance of classes) is the most important in the context of this article, because it gives us the valuable opportunity to successfully face one of the great challenges of pattern classification. It allows our proposed model L M ( τ [ 9 ] ) to contribute positively to the state of the art in pattern classification. Obviously, the challenge of dealing with class imbalance has been in the scientific arena for a long time. Therefore, it is a fact that all the algorithms for classifying patterns in the state of the art have had the opportunity to face it successfully. The experimental results of this research work show that our proposal is successful in facing the challenge.
However, working with imbalanced datasets requires us to make two very relevant decisions. First, we must choose the validation method because not all of them are useful to classify imbalanced datasets. We decided to use the five-fold stratified cross-validation method, because this validation method is widely recommended for imbalanced datasets by prestigious researchers [16,20,23,63].
The second decision we must make is regarding the performance measure. In Section 2.1, the reasons why accuracy is no longer useful as a performance measure when classifying imbalanced datasets are extensively detailed. However, as also mentioned, there are several alternative performance measures, which derive from the confusion matrix [23].
Due to the benefits it exhibits, we have decided to use balanced accuracy (BA) as a performance measure. BA is a measure that does not take bias towards the majority class into account. BA is calculated as the average between sensitivity and specificity, according to Expressions 4, 5, and 6, which we replicate in Expression 66:
S e n s i t i v i t y = T P T P + F N , S p e c i f i c i t y = T N T N + F P B A = B a l a n c e d   A c c u r a c y = S e n s i t i v i t y + S p e c i f i c i t y 2
We tested the seven supervised classifiers from the literature (Naïve Bayes, 3-NN, C4.5, Logit, SVM, MLP, and AdaBoost), as well as the proposed model L M ( τ [ 9 ] ) .
The results of the BA performance measure are shown in Table 3. The best results are highlighted in bold.
As we have previously commented, these experimental results are the culmination of the efforts that led to the realization of the proposed model L M ( τ [ 9 ] ) . Analysis of Table 3 will show that the proposed model is competitive against the best classifiers in the state of the art.
The first important element in this analysis is to establish that the data in Table 3 provide evidence of the validity and certainty of No-Free-Lunch theorem [8,9], as previously described in the introduction to this paper. There it was made clear that the No-Free-Lunch theorem governs the effectiveness of pattern classification algorithms, and that it is useless to pretend that in all cases there are zero classification errors. In Table 3, there are very few cases (14 out of 160 cases) where a classifier obtained zero errors, which is equivalent to obtaining 1 in the BA value. None of the eight classifiers obtained zero errors in the 20 datasets, which is totally in accordance with the No-Free-Lunch theorem.
By counting the number of times that any of the classifiers obtained 1 in the balanced accuracy value, we realize that our proposed model L M ( τ [ 9 ] ) did so with five of the 20 datasets: iris0, new-thyroid1, new-thyroid2, shuttle-c2-vs-c4, and vowel0. None of the other seven classifiers scored 1 five times in BA. The closest are SVM and AdaBoost, which have two each. On the other hand, it is curious to note that each of the classifiers achieved a value of 1 in BA in at least one of the 20 datasets, and here is a fact that is pertinent to emphasize in favor of our proposed model: in none of the 20 datasets did it happen that when some classifier achieved the value 1 in BA, the model L M ( τ [ 9 ] ) had less than 1.
In the iris0 dataset, it happened that all the classifiers, with the exception of C4.5, achieved the value 1 in BA, which means that with this dataset, almost any classifier, no matter how bad it is, performs well. With the shuttle-c2-vs-c4 dataset, something similar happened, but to a lesser extent. Besides the model L M ( τ [ 9 ] ) , only two classifiers obtained the value 1 in BA: C4.5 and SVM. Note the contrast, because in this dataset the C4.5 beats five of the best classifiers, while in the iris0 dataset C4.5 was beaten by all the others. Furthermore, with the ecoli-0_vs_1 dataset, the C4.5 was the best of the eight algorithms, including the model L M ( τ [ 9 ] ) .
There are datasets that behave completely differently than the iris0 dataset, in which any classifier is successful. With the yeast-1-4-5-8_vs_7 dataset, all eight classifiers performed very poorly. Although the proposed model L M ( τ [ 9 ] ) obtained the best result, this is not something to be proud of, because the performance barely reached 0.56, which is a value very close to throwing a toss. However, the other classifiers had worse performances. There is even one of them, the 3-NN, where the performance is 0.49, a value that is below what would result from tossing a coin. This is considering that the 3-NN classifier is one of the best in the world, such that in Table 3 it looks like the best of all in six of the 20 datasets. These are real manifestations of the No-Free-Lunch theorem.
In some of the 20 datasets, the difference in performance is overwhelming. In the ecoli3 dataset, the best is the Naïve Bayes, with 0.86, while the closest is the MLP with 0.79. However, almost all the other classifiers are more than a tenth of a point (a very big difference), with the exception of SVM and the proposed model L M ( τ [ 9 ] ) .
However, there are also datasets in which the difference in performance between the classifiers is minimal. The ecoli-0_vs_1 dataset is a good example to illustrate this concept. It happens that the best value of BA corresponds to C4.5, whose performance is 0.98. By taking a closer look at what happens to the other classifiers, we can see that all of them exhibit a BA value of 0.97, which is only one hundredth of the best value. The exception is 3-NN, which is four hundredths. Here a valid question arises: considering that the five-fold cross-validation method includes a random step, is it possible that this minimal difference is due to this random step and does not indicate any superiority of C4.5 compared to the other classifiers?
One of the questions whose answer might seem very relevant when making value judgments about the supremacy of any of the classifiers in these datasets is the following: in how many of the 20 datasets was a classifying algorithm the best? The answer is in Table 4, which contains the number of datasets from Table 3 in which each algorithm obtained the best result of BA.
A quick look at Table 4 allows us to see that the proposed model L M ( τ [ 9 ] ) is the best in 10 of the 20 datasets, closely followed by the Naïve Bayes, which is the best in eight of the 20 datasets, and third is the MLP, which is the best in five of the 20 datasets. If we were forced to make a quick value judgment on the supremacy of any of the eight classifiers, perhaps we would be inclined to express that the proposed model L M ( τ [ 9 ] ) is the best, and that the second and third places are occupied by the Naïve Bayes and the MLP, respectively.
However, as we have detailed in the analysis of the previous paragraphs, the relationships between the data that of the performance of the classifiers are very varied. If in a certain dataset some classifier is the best, it turns out that the performances of that same classifier in other datasets is really bad.
For example, although it is indisputable that the proposed model L M ( τ [ 9 ] ) is the best in 10 of the 20 datasets, it is pertinent to ask: What are its BA values in the other datasets with respect to the best classifier? Looking at Table 3, we can verify that in most of the remaining 10 datasets, the proposed model L M ( τ [ 9 ] ) is very close to the best. However, an argument against giving the proposed model first place, would be that in the ecoli1 dataset the BA value it displays is the last, and that in the ecoli1 dataset, its BA value is far from the best (Naïve Bayes).
We should not neglect a relevant fact: the purpose of this comparative analysis is to find elements to decide how good a classifier is compared to others. This information is very useful at the moment when a certain researcher will have to decide which classifier of which approach would be convenient to use in his experiments.
Fortunately, there is a way to make a decision from this comparative analysis. The answer is found in statistical tests, which have been used in other areas of science and technology for many years. Some notable researchers have recommended using statistical tests to express the results of comparative statistical analyzes of a certain set of classifiers in a set of datasets [83,84].
There are several types of statistical test, in the comparison of multiple classifiers over multiple dataset. We focus on non-parametric, multiple comparisons tests for related samples, among which the Friedman test stands out [85,86]. The application of the Friedman test implies the creation of a block for each one of the analyzed subjects in such a way that blocks (for instance, datasets) contains observations coming from the application the different contrasts or treatments (for instance, algorithms). In terms of matrices, the blocks correspond to rows and treatments to columns.
Like every other comparison statistical test, the Friedman test works with two hypotheses: the null hypothesis H1 and alternative hypothesis H2. The null hypothesis establishes that the performances obtained by different treatments are equivalent, while the alternative hypothesis proposes that there is a difference between these performances, which would imply differences in the central tendency.
Let k be the number of treatments. Then, for each block a rank between 1 and k is assigned: 1 to the best result and k to the worst. In case of ties, the average rank is assigned. Next, the sum of the ranks of treatment j is assigned to variable R j , j = 1 , , k . If the performances obtained from different treatments are equivalent, then R i = R j for i j . Thus, following this process, it is possible to determine when an observed disparity between R j (for every j) is enough to reject the null hypothesis. Let n be the number of blocks, and k be the number of treatments. Then, the Friedman statistic (S) is given by:
S = 12 n k ( k + 1 ) ( j = 1 k R j 2 ) 3 n ( k + 1 )
Statistical tests are subject to a certain predetermined number of blocks and treatments to have the adequate power. If the number of samples (blocks) used in the experiments is small, statistical tests lack of power to determine the existence of statistically significant differences between the performances of the algorithms (treatments) [85]. The required number of samples to obtain satisfactory results is given by the expression n 2 k .
In this research, 20 datasets were used, which means that at most ten algorithms can be compared through the Friedman test, without losing statistical power. The condition is fulfilled because in our experiments we compare eight classifiers.
Taking the data from Table 3 as a base, a statistical test that is applied correctly can tell us if there are significant statistical differences in these data. To determine the existence or not of significant differences, we use hypothesis tests: null hypothesis H1 and alternative hypothesis H2:
Hypothesis 1 (H1).
there are no differences in the performance of the compared algorithms.
Hypothesis 2 (H2).
the proposed model L M ( τ [ 9 ] ) exhibits a better performance than the other seven supervised classification algorithms.
Due to the relationship between the number of classifiers and the number of datasets, we decided to use the non-parametric Friedman test [85,86]. There are two results from this test: a probability value (p-value) and a ranking of the classifiers involved in the experiment, where the lowest value is the best. It is common in this type of tests to set the value of statistical significance to 95%, which gives a value α = 0.05 .
If the result that the Friedman test gives us for the p-value is less than or equal to alpha, then the null hypothesis is rejected. The p-value obtained by the Friedman test in the data in Table 3 is 0.004989, which indicates that the Friedman test rejects the null hypothesis H1.
The results of the Friedman ranking are shown in Table 5. As shown, the proposed model L M ( τ [ 9 ] ) was the best ranked algorithm, according to Friedman test.
Since the Friedman test determined the existence of significant differences between the performances of the algorithms, a post hoc test is highly recommended to find in which of the compared algorithms those differences exist. Among several post hoc tests suggested [83], we chose the Holm test [87]. The Holm test was designed to reduce the Type I error, which occurs when the null hypothesis is rejected even if it is true. It is usual to analyze phenomena that include several hypotheses. In these cases, we seek to adjust the rejection criteria for each of the hypotheses.
The process begins with an upward sorting of p-values of each hypothesis. Once sorted, each one of those p-values is compared with the ratio of the significance level divided by the total number of hypotheses of which the p-value has not been compared. When a p-value greater than the ratio is found, all the null hypotheses associated to the p-values that had been compared are rejected.
Thus, let H 1 , H k be k hypotheses and p 1 , p k the corresponding p-values. When sorting the p-values upward, we have a new notation: p ( 1 ) , p ( k ) denote the sorted p-values and H ( 1 ) , H ( k ) for the hypothesis associated. If α is the significance level and j is the minimum index for which p ( j ) > α k j + 1 is true, then the null hypotheses H ( 1 ) , H ( j 1 ) are rejected.
To determine with respect to which algorithms the proposed model L M ( τ [ 9 ] ) (best ranked) has significant differences in performance, we use the Holm post hoc test [87], as shown in Table 6.
In this experiment, Holm’s procedure rejects those hypotheses that have an unadjusted p-value lower or equal than 0.025.
The Holm test rejects the null hypothesis for 3-NN, AdaBoost, SVM, Logit, and C4.5. In all cases, the unadjusted p-values were lower than 0.025. That is, we can assure that the proposed model L M ( τ [ 9 ] ) has a performance significantly better than the aforementioned classifiers.
For the MLP and Naïve Bayes algorithm, the test did not reject the null hypothesis, due to 0.47 and 0.38 being greater than 0.025. For now, we can conclude that, within 95% confidence, the proposed model L M ( τ [ 9 ] ) is better than the best state-of-the-art classifiers with which the comparison was made. This is in terms of the BA performance measure, and with the exception of these two classifiers: MLP and Naïve Bayes.

6. Conclusions and Future Work

The first conclusion that we will state is related to the way in which new ideas arise in science. Anecdotes abound in the history of science about the emergence of new ideas and concepts (Newton’s apple, Kekulé’s dream with snakes, among other interesting stories, which may or may not be real). In our case, keeping the proportions, the idea of the new transform emerged spontaneously in a daily work meeting with the Alpha-Beta group. For years, we had before us the overwhelming results of Theorem 1, which we arrived at thanks to the new framework that we created from 2001 onwards. There were many attempts by group members to improve the results of the Lernmatrix, but they were unsuccessful. Until that successful day when a disruptive idea emerged, the key question we asked ourselves was: what would happen if we do something to modify the pattern data so that the patterns fulfill the strong condition of Theorem 1? The point was to break the strong condition of Theorem 1, which marks the disruptive nature of the new investigation. From that moment on, we worked hard in the search for some transform that is capable of eliminating the subtractive alteration, until we found it. The rest is history: we recovered some concepts and algorithms from our work, and then we structured the proposed model described in detail in Section 4.
The second conclusion is related to the results of Table 3 and their interpretation. As discussed in Section 5, it is difficult from raw data to make decisions about classifier comparisons. From this reflection arises the need to make use of statistical tests, which give great support to decision-making. Our conclusion regarding this issue is that we must emphasize the importance of tests of statistical significance (like Friedman’s) and post hoc tests (like Holm’s). Table 5 and Table 6 are the clear result of the importance of this type of test in comparative experimental analyzes.
The experimental results allow us to conclude that the application of the new transform, together with the other concepts and included in the proposed model, result in a significant improvement in the performance of the Lernmatrix as a pattern classifier. This information is very useful at the moment when a certain researcher will have to decide which classifier of which approach would be convenient to use in his experiments. When reviewing the results in Table 3 and the corresponding statistical tests, some researchers will decide to use our proposed model. This is very useful for the Alpha-Beta group, because it gives us elements to continue with the research efforts, with the aim of increasing the performance of our models even more.
The relevant future work arises from a brief analysis of Theorem 1 and from a simple reflection. The theorem only considered patterns that exhibit subtractive alteration with respect to some pattern of the learning set. But what happens to the patterns that do not exhibit subtractive alteration but additive alterations with respect to some pattern of the learning set? The following case is even more interesting: what happens to patterns that exhibit mixed or mixed alterations with respect to some pattern of the learning set? These ideas are “like ground gold” for researchers who are interested in continuing this fruitful research work, in order to improve the performance of the Lernmatrix.

Author Contributions

Conceptualization, J.-L.V.-R. and Y.V.-R.; methodology, Y.V.-R. and C.Y.; software, J.-L.V.-R.; validation, Y.V.-R. and O.C.-N.; formal analysis, Y.V. and C.Y.-M.; investigation, O.C.-N.; writing—original draft preparation, Y.V.-R.; writing—review and editing, C.Y.-M.; visualization, O.C.-N. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors want to thank the Instituto Politécnico Nacional of Mexico (Secretaría Académica, CIC, SIP and CIDETEC), the CONACyT, and SNI for their support to develop this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lindberg, A. Developing Theory Through Integrating Human and Machine Pattern Recognition. J. Assoc. Inf. Syst. 2020, 21, 7. [Google Scholar] [CrossRef]
  2. Sharma, N.; Chawla, V.; Ram, N. Comparison of machine learning algorithms for the automatic programming of computer numerical control machine. Int. J. Data Netw. Sci. 2020, 4, 1–14. [Google Scholar] [CrossRef]
  3. Vasconcelos, F.F.; Sarmento, R.M.; Rebouças Filho, P.P.; de Albuquerque, V.H.C. Artificial intelligence techniques empowered edge-cloud architecture for brain CT image analysis. Eng. Appl. Artif. Intel. 2020, 91, 103585. [Google Scholar] [CrossRef]
  4. Cestnik, B. Revisiting the Optimal Probability Estimator from Small Samples for Data Mining. Int. J. Appl. Math. Comput. Sci. 2019, 29, 783–796. [Google Scholar] [CrossRef] [Green Version]
  5. Singh, P.; Komodakis, N. Improving recognition of complex aerial scenes using a deep weakly supervised learning paradigm. IEEE Geosci. Remote Sens. Lett. 2018, 15, 1932–1936. [Google Scholar] [CrossRef]
  6. Wang, Y.; Ye, H.; Zhang, T.; Zhang, H. A data mining method based on unsupervised learning and spatiotemporal analysis for sheath current monitoring. Neurocomputing 2019, 352, 54–63. [Google Scholar] [CrossRef]
  7. Guan, Q.; Huang, Y.; Zhong, Z.; Zheng, Z.; Zheng, L.; Yang, Y. Thorax disease classification with attention guided convolutional neural network. Patt. Recogn. Lett. 2020, 131, 38–45. [Google Scholar] [CrossRef]
  8. Wolpert, D.H.; Macready, W.G. No free lunch theorems for optimization. IEEE Trans. Evolut. Comput. 1997, 1, 67–82. [Google Scholar] [CrossRef] [Green Version]
  9. Adam, S.P.; Alexandropoulos, S.A.N.; Pardalos, P.M.; Vrahatis, M.N. No free lunch theorem: A review. In Approximation and Optimization; Demetriou, I., Pardalos, P., Eds.; Springer: Cham, Switzerland, 2019; Volume 145, pp. 57–82. [Google Scholar]
  10. Ruan, S.; Li, H.; Li, C.; Song, K. Class-Specific Deep Feature Weighting for Naïve Bayes Text Classifiers. IEEE Access. 2020, 8, 20151–20159. [Google Scholar] [CrossRef]
  11. Paranjape, P.; Dhabu, M.; Deshpande, P. A novel classifier for multivariate instance using graph class signatures. Front. Comput. Sci. 2020, 14, 1–16. [Google Scholar] [CrossRef]
  12. Starzyk, J.A.; Maciura, Ł.; Horzyk, A. Associative Memories with Synaptic Delays. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 331–344. [Google Scholar] [CrossRef] [PubMed]
  13. Steinbuch, K. Die Lernmatrix. Kybernetik 1961, 1, 36–45. [Google Scholar] [CrossRef]
  14. Raja, P.S.; Thangavel, K. Missing value imputation using unsupervised machine learning techniques. Soft Comput. 2020, 24, 4361–4392. [Google Scholar] [CrossRef]
  15. Hasanin, T.; Khoshgoftaar, T.M.; Leevy, J.L.; Bauder, R.A. Investigating class rarity in big data. J. Big Data 2020, 7, 1–17. [Google Scholar] [CrossRef]
  16. Fernández, A.; López, V.; Galar, M.; del Jesus, M.J.; Herrera, F. Analysing the classification of imbalanced data-sets with multiple classes: Binarization techniques and ad-hoc approaches. Knowl. Based Syst. 2013, 42, 97–110. [Google Scholar]
  17. Schwenker, F.; Trentin, E. Pattern classification and clustering: A review of partially supervised learning approaches. Patt. Recogn. Lett. 2014, 37, 4–14. [Google Scholar] [CrossRef]
  18. Stock, M.; Pahikkala, T.; Airola, A.; Waegeman, W.; De Baets, B. Algebraic shortcuts for leave-one-out cross-validation in supervised network inference. Brief. Bioinf. 2020, 21, 262–271. [Google Scholar] [CrossRef] [Green Version]
  19. Jiang, G.; Wang, W. Error estimation based on variance analysis of k-fold cross-validation. Patt. Recogn. 2017, 69, 94–106. [Google Scholar] [CrossRef]
  20. López, V.; Fernández, A.; García, S.; Palade, V.; Herrera, F. An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics. Inf. Sci. 2013, 250, 113–141. [Google Scholar]
  21. Dietterich, T.G. Approximate statistical tests for comparing supervised classification learning algorithms. Neural Comput. 1998, 10, 1895–1923. [Google Scholar] [CrossRef] [Green Version]
  22. Sokolova, M.; Lapalme, G. A systematic analysis of performance measures for classification tasks. Inf. Proces. Manag. 2009, 45, 427–437. [Google Scholar] [CrossRef]
  23. Soleymani, R.; Granger, E.; Fumera, G. F-measure curves: A tool to visualize classifier performance under imbalance. Patt. Recogn. 2020, 100, 107146. [Google Scholar] [CrossRef]
  24. Duda, R.O.; Hart, P.E.; Stork, D.G. Pattern Classification, 2nd ed.; John Wiley & Sons: New York, NY, USA, 2001; pp. 20–450. [Google Scholar]
  25. Soni, R.; Kumar, B.; Chand, S. Optimal feature and classifier selection for text region classification in natural scene images using WEKA tool. Multimed. Tools Appl. 2019, 78, 31757–31791. [Google Scholar] [CrossRef]
  26. Kurzyński, M.W. On the multistage Bayes classifier. Patt. Recogn. 1988, 21, 355–365. [Google Scholar] [CrossRef]
  27. Otneim, H.; Jullum, M.; Tjøstheim, D. Pairwise local Fisher and Naïve Bayes: Improving two standard discriminants. J. Economet. 2020, 216, 284–304. [Google Scholar] [CrossRef]
  28. Cover, T.; Hart, P. Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 1967, 13, 21–27. [Google Scholar] [CrossRef]
  29. Zubaedah, R.; Xaverius, F.; Jayawardana, H.; Hidayat, S.H. Comparing euclidean distance and nearest neighbor algorithm in an expert system for diagnosis of diabetes mellitus. Enfermería Clínica 2020, 30, 374–377. [Google Scholar] [CrossRef]
  30. Alkoot, F.M.; Kittler, J. Moderating k-NN classifiers. Patt. Anal. Appl. 2002, 5, 326–332. [Google Scholar] [CrossRef]
  31. Sonawane, P.M.; Kokate, P.S. Network traffic optimization using k-NN algorithm. Int. J. Adv. Sci. Technol. 2020, 29, 4313–4318. [Google Scholar]
  32. Quinlan, J.R. Improved use of continuous attributes in C4. 5. J. Artif. Intel. Res. 1996, 4, 77–90. [Google Scholar] [CrossRef] [Green Version]
  33. Ruggieri, S. Efficient C4. 5. IEEE Trans. Knowl. Data Eng. 2002, 14, 438–444. [Google Scholar] [CrossRef] [Green Version]
  34. Ghiasi, M.M.; Zendehboudi, S.; Mohsenipour, A.A. Decision tree-based diagnosis of coronary artery disease: CART model. Comput. Methods Prog. Biomed. 2020, 192, 105400. [Google Scholar] [CrossRef]
  35. de Souza, R.M.; Queiroz, D.C.; Cysneiros, F.J.A. Logistic regression-based pattern classifiers for symbolic interval data. Patt. Anal. Appl. 2011, 14, 273. [Google Scholar] [CrossRef]
  36. Le Cessie, S.; Van Houwelingen, J.C. Ridge estimators in logistic regression. J. R. Stat. Soc. Ser. C Appl. Stat. 1992, 41, 191–201. [Google Scholar]
  37. Wang, X.; You, S.; Wang, L. Classifying road network patterns using multinomial logit model. J. Transport. Geogr. 2017, 58, 104–112. [Google Scholar] [CrossRef] [Green Version]
  38. Vapnik, V.N. An overview of statistical learning theory. IEEE Trans. Neural Netw. 1999, 10, 988–999. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  39. Cortes, C.; Vapnik, V. Support vector networks. Mach. Learn. 1995, 20, 273–297. [Google Scholar] [CrossRef]
  40. Wei, P.; He, F.; Li, L.; Li, J. Research on sound classification based on SVM. Neural Comput. Appl. 2020, 32, 1593–1607. [Google Scholar] [CrossRef]
  41. McCulloch, W.S.; Pitts, W. A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 1943, 5, 115–133. [Google Scholar] [CrossRef]
  42. LeCun, Y. A Learning Scheme for Asymmetric Threshold Networks. In Proceedings of the Cognitiva 85, Paris, France, 4–7 June 1985; CESTA: Paris, France, 1985; pp. 599–604. [Google Scholar]
  43. Rumelhart, D.; Hinton, G.; Williams, R. Learning representations by back-propagating errors. Nature 1986, 323, 533–536. [Google Scholar] [CrossRef]
  44. LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef] [PubMed]
  45. Shen, Z.; Bi, Y.; Wang, Y.; Guo, C. MLP neural network-based recursive sliding mode dynamic surface control for trajectory tracking of fully actuated surface vessel subject to unknown dynamics and input saturation. Neurocomputing 2020, 377, 103–112. [Google Scholar] [CrossRef]
  46. Polikar, R. Ensemble based systems in decision making. IEEE Circ. Syst. Magaz. 2006, 6, 21–45. [Google Scholar] [CrossRef]
  47. Breiman, L. Bagging Predictors. Mach. Learn. 1996, 24, 123–140. [Google Scholar] [CrossRef] [Green Version]
  48. Freund, Y.; Schapire, R.E. A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting. J. Comput. Syst. Sci. 1997, 55, 119–139. [Google Scholar] [CrossRef] [Green Version]
  49. Steinbuch, K.; Widrow, B. A Critical Comparison of Two Kinds of Adaptive Classification Networks. IEEE Trans. Electron. Comput. 1965, EC-14, 737–740. [Google Scholar] [CrossRef] [Green Version]
  50. Witten, I.H.; Frank, E. Data mining: Practical machine learning tools and techniques with Java implementations. ACM Sigmod. Record 2002, 31, 76–77. [Google Scholar] [CrossRef]
  51. Zhou, J.; Kim, K.H.; Lu, W. Crossbar RRAM arrays: Selector device requirements during read operation. IEEE Trans. Electron. Dev. 2014, 61, 1369–1376. [Google Scholar] [CrossRef]
  52. Prinz, B.; Hower, J. The application of steinbuch’s “lernmatrix” as a new mathematical approach in the assessment of air pollution effects. Atmos. Environ. 1976, 10, 1133–1138. [Google Scholar] [CrossRef]
  53. Tauber, S. A note on: The application of steinbuch’s "lernmatrix" as a new mathematical approach in the assessment of air pollution effects. Atmos. Environ. 1977, 11, 664. [Google Scholar] [CrossRef]
  54. Prinz, B. Use of the Steinbuch learn matrix for the formation of a regression model with binary variables. DTW. Deutsche Tierarztliche Wochenschrift 1985, 92, 75. [Google Scholar] [PubMed]
  55. Hecht-Nielsen, R. A theory of the cerebral cortex. In Proceedings of the Fifth International Conference on Neural Information Processing (ICONIP’98), Kitakyushu, Japan, 21–23 October 1998; Usui, S., Omori, T., Eds.; IOS Press: Tokyo, Japan, 1998; pp. 1459–1464. [Google Scholar]
  56. Hecht-Nielsen, R. Cortronic Neural Network Models of Cortical Function. In Proceedings of the Fifth International Conference on Neural Information Processing (ICONIP’98), Kitakyushu, Japan, 21–23 October 1998; Usui, S., Omori, T., Eds.; IOS Press: Tokyo, Japan, 1998; p. 11. [Google Scholar]
  57. Jackson, W. DARPA Project Will Study Neural Network Processes, Produced 26 October 1998. Available online: https://gcn.com/articles/1998/10/26/darpa-project-will-study-neural-network-processes.aspx (accessed on 29 October 2019).
  58. Sagi, B.; Nemat-Nasser, S.C.; Kerr, R.; Hayek, R.; Downing, C.; Hecht-Nielsen, R. A biologically motivated solution to the cocktail party problem. Neural Comput. 2001, 13, 1575–1602. [Google Scholar] [CrossRef] [PubMed]
  59. Santiago Montero, R.; Díaz-de-León Santiago, J.L.; Yáñez Márquez, C. Clasificador híbrido de patrones basado en la Lernmatrix de Steinbuch y el Linear Associator de Anderson-Kohonen. Res. Comput. Sci. 2002, 1, 449–460. (In Spanish) [Google Scholar]
  60. Uriarte-Arcia, A.V.; López-Yáñez, I.; Yáñez-Márquez, C. One-hot vector hybrid associative classifier for medical data classification. PLoS ONE 2014, 9, e95715. [Google Scholar] [CrossRef] [Green Version]
  61. Cleofas-Sánchez, L.; García, V.; Marqués, A.I.; Sánchez, J.S. Financial distress prediction using the hybrid associative memory with translation. Appl. Soft Comput. 2016, 44, 144–152. [Google Scholar] [CrossRef] [Green Version]
  62. Cleofas-Sánchez, L.; Sánchez, J.S.; García, V.; Valdovinos, R.M. Associative learning on imbalanced environments: An empirical study. Expert Syst. Appl. 2016, 54, 387–397. [Google Scholar] [CrossRef] [Green Version]
  63. Villuendas-Rey, Y.; Rey-Benguría, C.F.; Ferreira-Santiago, Á.; Camacho-Nieto, O.; Yáñez-Márquez, C. The naïve associative classifier (NAC): A novel, simple, transparent, and accurate classification model evaluated on financial data. Neurocomputing 2017, 265, 105–115. [Google Scholar] [CrossRef]
  64. Cleofas-Sánchez, L.; Sánchez, J.S.; García, V. Gene selection and disease prediction from gene expression data using a two-stage hetero-associative memory. Prog. Artif. Intel. 2019, 8, 63–71. [Google Scholar] [CrossRef]
  65. Santiago-Montero, R.; Sergio Valadéz, G.; Sossa, H.; Hernández, D.A.G.; Ornerlas-Rodríguez, M. A study of the associative pattern classifier method for multi-class processes. J. Optoelectron. Adv. Mater. 2015, 17, 713–719. [Google Scholar]
  66. Santiago-Montero, R.; Sossa, H.; Gutiérrez-Hernández, D.A.; Zamudio, V.; Hernández-Bautista, I.; Valadez-Godínez, S. Novel mathematical model of breast cancer diagnostics using an associative pattern classification. Diagnostics 2020, 10, 136. [Google Scholar] [CrossRef] [Green Version]
  67. Sánchez-Garfias, F.A.; Díaz-de-León Santiago, J.L.; Yáñez Márquez, C. Lernmatrix de Steinbuch: Condiciones necesarias y suficientes para recuperación perfecta de patrones. Res. Comput. Sci. 2002, 1, 437–448. (In Spanish) [Google Scholar]
  68. Sánchez Garfias, F.A.; Díaz-de-León Santiago, J.L.; Yáñez Márquez, C. Steinbuch’s Lernmatrix: Theoretical Advances. Computación y Sistemas 2004, 7, 175–189. [Google Scholar]
  69. Argüelles, A.J.; Yáñez-Márquez, C.; Díaz-de-León Santiago, J.L.; Camacho, O. Pattern recognition and classification using weightless neural networks and Steinbuch Lernmatrix. In Proceedings of the Optics & Photonics 2005, San Diego, CA, USA, 31 July–4 August 2005; Astola, J.T., Tabus, I., Barrera, J., Eds.; SPIE: Washington, DC, USA, 2005; pp. 247–254. [Google Scholar]
  70. Sánchez-Garfias, F.A.; Díaz-de-León Santiago, J.L.; Yáñez-Márquez, C. A new theoretical framework for the Steinbuch’s Lernmatrix. In Proceedings of the Optics & Photonics 2005, San Diego, CA, USA, 31 July–4 August 2005; Astola, J.T., Tabus, I., Barrera, J., Eds.; SPIE: Washington, DC, USA, 2005; pp. 233–241. [Google Scholar]
  71. Román-Godínez, I.; López-Yáñez, I.; Yáñez-Márquez, C. Perfect Recall on the Lernmatrix. Lect. Notes Comput. Sci. 2007, 4492, 835–841. [Google Scholar]
  72. Sánchez-Garfias, F.A.; Díaz-de-León Santiago, J.L.; Yáñez-Márquez, C. New Results on the Lernmatrix Properties. In Proceedings of the XIII Congreso Internacional de Computación, Mexico City, México, 13–15 October 2004; pp. 1–13. [Google Scholar]
  73. López-Yáñez, I.; Argüelles-Cruz, A.J.; Camacho-Nieto, O.; Yáñez-Márquez, C. Pollutants time-series prediction using the Gamma classifier. Int. J. Comput. Intel. Syst. 2011, 4, 680–711. [Google Scholar]
  74. Papadomanolakis, K.S.; Kakarountas, A.P.; Sklavos, N.; Goutis, C.E. A Fast Johnson-Mobius Encoding Scheme for Fault Secure Binary Counters. In Proceedings of the Design, Automation and Test in Europe, Paris, France, 4–8 March 2002; p. 1. [Google Scholar]
  75. Jefferys, W.H.; Berger, J.O. Ockham’s razor and Bayesian analysis. Am. Sci. 1992, 80, 64–72. [Google Scholar]
  76. Kahaki, S.M.; Nordin, M.J.; Ahmad, N.S.; Arzoky, M.; Ismail, W. Deep convolutional neural network designed for age assessment based on orthopantomography data. Neural Comput. Appl. 2019, 1–12. [Google Scholar] [CrossRef]
  77. Yáñez-Márquez, C.; López-Yáñez, I.; Aldape-Pérez, M.; Camacho-Nieto, O.; Argüelles-Cruz, A.J.; Villuendas-Rey, Y. Theoretical Foundations for the Alpha-Beta Associative Memories: 10 Years of Derived Extensions, Models, and Applications. Neural Proces. Lett. 2018, 48, 811–847. [Google Scholar] [CrossRef]
  78. Alcalá-Fdez, J.; Fernández, A.; Luengo, J.; Derrac, J.; García, S.; Sánchez, L.; Herrera, F. Keel data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework. J. Mult. Valued Logic Soft Comput. 2011, 17, 255–287. [Google Scholar]
  79. He, W.; He, Y.; Li, B.; Zhang, C. A Naive-Bayes-based fault diagnosis approach for analog circuit by using image-oriented feature extraction and selection technique. IEEE Access. 2019, 8, 5065–5079. [Google Scholar] [CrossRef]
  80. Puspitarani, Y. Job Selection of the Infrastructure Section in Foundation X with C4. 5 Algorithm. Int. J. Psychosoc. Rehab. 2020, 24, 3222–3231. [Google Scholar]
  81. He, Y.L.; Zhao, Y.; Hu, X.; Yan, X.N.; Zhu, Q.X.; Xu, Y. Fault diagnosis using novel AdaBoost based discriminant locality preserving projection with resamples. Eng. Appl. Artif. Intel. 2020, 91, 103631. [Google Scholar] [CrossRef]
  82. Garcia, S.; Herrera, F. An extension on statistical comparisons of classifiers over multiple data sets for all pairwise comparisons. J. Mach. Learn. Res. 2008, 9, 2677–2694. [Google Scholar]
  83. Triguero, I.; González, S.; Moyano, J.M.; García López, S.; Alcalá Fernández, J.; Luengo, J.; Fernández, A.; del Jesús, M.J.; Sánchez, L.; Herrera, F. KEEL 3.0: An open source software for multi-stage analysis in data mining. Int. J. Comput. Intel. Syst. 2017, 10, 1238–1249. [Google Scholar] [CrossRef] [Green Version]
  84. Kohonen, T.; Lehtiö, P.; Rovamo, J.; Hyvärinen, J.; Bry, K.; Vainio, L. A principle of neural associative memory. Neuroscience 1977, 2, 1065–1076. [Google Scholar] [CrossRef]
  85. Friedman, M. The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J. Am. Stat. Assoc. 1937, 32, 675–701. [Google Scholar] [CrossRef]
  86. Friedman, M. A comparison of alternative tests of significance for the problem of m rankings. Ann. Math. Stat. 1940, 11, 86–92. [Google Scholar] [CrossRef]
  87. Holm, S. A simple sequentially rejective multiple test procedure. Scand. J. Stat. 1979, 6, 65–70. [Google Scholar]
Figure 1. Given a dataset D, a partition is made in two subsets: L (learning) and T (test).
Figure 1. Given a dataset D, a partition is made in two subsets: L (learning) and T (test).
Mathematics 08 00732 g001
Figure 2. Schematic diagram of the leave-one-out validation method for a dataset with N patterns.
Figure 2. Schematic diagram of the leave-one-out validation method for a dataset with N patterns.
Mathematics 08 00732 g002
Figure 3. Formation of folds in the 5-fold stratified cross validation method.
Figure 3. Formation of folds in the 5-fold stratified cross validation method.
Mathematics 08 00732 g003
Figure 4. Operation of the 5-fold stratified cross validation method. Testing: red, Learning: blue.
Figure 4. Operation of the 5-fold stratified cross validation method. Testing: red, Learning: blue.
Mathematics 08 00732 g004
Figure 5. Schematic diagram of the 5 × 2 cross-validation method.
Figure 5. Schematic diagram of the 5 × 2 cross-validation method.
Mathematics 08 00732 g005
Figure 6. Confusion matrix for a two class problem.
Figure 6. Confusion matrix for a two class problem.
Mathematics 08 00732 g006
Figure 7. Confusion matrix that reflects an accuracy value of 95% in the first example.
Figure 7. Confusion matrix that reflects an accuracy value of 95% in the first example.
Mathematics 08 00732 g007
Figure 8. Confusion matrix that reflects an accuracy value of 95% in the second example.
Figure 8. Confusion matrix that reflects an accuracy value of 95% in the second example.
Mathematics 08 00732 g008
Figure 9. Schematic diagram of the Lernmatrix (original model).
Figure 9. Schematic diagram of the Lernmatrix (original model).
Mathematics 08 00732 g009
Figure 10. General outline for the learning phase of the proposed model L M ( τ [ 9 ] ) .
Figure 10. General outline for the learning phase of the proposed model L M ( τ [ 9 ] ) .
Mathematics 08 00732 g010
Figure 11. Schematic diagram for the learning phase of the proposed model L M ( τ [ 9 ] ) .
Figure 11. Schematic diagram for the learning phase of the proposed model L M ( τ [ 9 ] ) .
Mathematics 08 00732 g011
Figure 12. General outline for the recalling phase of the proposed model L M ( τ [ 9 ] ) .
Figure 12. General outline for the recalling phase of the proposed model L M ( τ [ 9 ] ) .
Mathematics 08 00732 g012
Figure 13. Schematic diagram for the recalling phase of the proposed model L M ( τ [ 9 ] ) .
Figure 13. Schematic diagram for the recalling phase of the proposed model L M ( τ [ 9 ] ) .
Mathematics 08 00732 g013
Table 1. Balanced accuracy of the Lernmatrix and 7 classifiers of the state of the art (ecoli-0_vs_1 dataset).
Table 1. Balanced accuracy of the Lernmatrix and 7 classifiers of the state of the art (ecoli-0_vs_1 dataset).
DatasetSeven State-of-the-Art Pattern Classification AlgorithmsLernmatrix
ecoli-0_vs_1 0.970.940.970.980.970.970.970.81
Table 2. Datasets used in the experiments: number of attributes, number of patterns, and Imbalance Ratio.
Table 2. Datasets used in the experiments: number of attributes, number of patterns, and Imbalance Ratio.
DatasetsAttributes (All Numerical)PatternsIR
ecoli-0_vs_1 72201.86
ecoli-0-1-3-7_vs_2-6 728139.14
ecoli1 73363.36
ecoli2 73365.46
ecoli3 73368.6
iris0 41502
new-thyroid1 52155.14
new-thyroid2 52155.14
shuttle-c2-vs-c4 912920.5
vehicle0 188463.25
vehicle2 188462.88
vowel0 139889.98
wisconsin 96831.86
yeast1 814842.46
yeast-1_vs_7 845914.3
yeast-1-2-8-9_vs_7 894730.57
yeast-1-4-5-8_vs_7 869322.1
yeast-2_vs_4 85149.08
yeast-2_vs_8 848223.1
yeast4 8148428.1
Table 3. Results of the balanced accuracy (BA) measure for the 8 classifiers in the 20 datasets. The best results are highlighted in bold.
Table 3. Results of the balanced accuracy (BA) measure for the 8 classifiers in the 20 datasets. The best results are highlighted in bold.
DatasetsNaïveBayes [80]3-NN [31]C4.5 [81]Logit [37]SVM [40]MLP [45]Ada Boost [82] LM ( τ [ 9 ] )
ecoli-0_vs_1 0.970.940.980.970.970.970.970.97
ecoli-0-1-3-7_vs_2-6 0.780.840.740.840.780.840.740.84
ecoli1 0.860.880.860.840.850.860.870.82
ecoli2 0.900.930.860.780.800.890.870.89
ecoli3 0.860.700.720.730.770.790.730.77
iris0 1.001.000.991.001.001.001.001.00
new-thyroid1 0.980.960.940.960.960.951.001.00
new-thyroid2 0.980.920.940.980.980.950.971.00
shuttle-c2-vs-c4 0.900.951.000.941.000.940.951.00
vehicle0 0.730.890.920.950.960.950.810.94
vehicle2 0.720.940.940.950.960.970.900.95
vowel0 0.920.980.970.910.990.990.871.00
wisconsin 0.970.970.940.960.930.950.940.97
yeast1 0.680.630.660.630.590.680.670.65
yeast-1_vs_7 0.660.550.590.550.500.610.560.63
yeast-1-2-8-9_vs_7 0.610.510.610.540.500.530.570.55
yeast-1-4-5-8_vs_7 0.510.490.500.500.500.510.500.56
yeast-2_vs_4 0.880.840.830.800.830.850.750.84
yeast-2_vs_8 0.740.770.500.740.740.770.740.77
yeast4 0.680.590.590.560.500.660.600.68
Table 4. Number of datasets from Table 3 in which each algorithm obtained the best result of BA.
Table 4. Number of datasets from Table 3 in which each algorithm obtained the best result of BA.
NaïveBayes3-NNC4.5LogitSVMMLPAda Boost LM ( τ [ 9 ] )
Number of datasets in which the algorithm obtained the best BA863235210
Table 5. Rankings obtained by the Friedman test.
Table 5. Rankings obtained by the Friedman test.
AlgorithmRanking
LM ( τ [ 9 ] ) 3.000
MLP3.550
Naïve Bayes3.675
3-NN4.925
AdaBoost5.100
SVM5.125
Logit5.300
C4.55.325
Table 6. Post hoc comparison table for Holm test.
Table 6. Post hoc comparison table for Holm test.
IAlgorithmZP (unadjusted)Holm
7C4.53.0015620.0026860.007143
6Logit2.9692870.0029850.008333
5SVM2.7433630.0060810.010000
4AdaBoost2.7110880.0067060.012500
33-NN2.4851640.0129490.016667
2Naïve Bayes0.8714210.3835240.025000
1MLP0.7100470.4776750.050000

Share and Cite

MDPI and ACS Style

Velázquez-Rodríguez, J.-L.; Villuendas-Rey, Y.; Camacho-Nieto, O.; Yáñez-Márquez, C. A Novel and Simple Mathematical Transform Improves the Perfomance of Lernmatrix in Pattern Classification. Mathematics 2020, 8, 732. https://doi.org/10.3390/math8050732

AMA Style

Velázquez-Rodríguez J-L, Villuendas-Rey Y, Camacho-Nieto O, Yáñez-Márquez C. A Novel and Simple Mathematical Transform Improves the Perfomance of Lernmatrix in Pattern Classification. Mathematics. 2020; 8(5):732. https://doi.org/10.3390/math8050732

Chicago/Turabian Style

Velázquez-Rodríguez, José-Luis, Yenny Villuendas-Rey, Oscar Camacho-Nieto, and Cornelio Yáñez-Márquez. 2020. "A Novel and Simple Mathematical Transform Improves the Perfomance of Lernmatrix in Pattern Classification" Mathematics 8, no. 5: 732. https://doi.org/10.3390/math8050732

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop