Big Data: Conceptual Analysis and Applications 3030142973, 9783030142988, 9783030142971

https://www.springer.com/gp/book/9783030142971 The book is devoted to the analysis of big data in order to extract from

1,188 148 12MB

English Pages 298 Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

Big Data: Conceptual Analysis and Applications
 3030142973, 9783030142988, 9783030142971

Table of contents :
Front Matter ....Pages i-xxiii
The Cluster Analysis in Big Data Mining (Michael Z. Zgurovsky, Yuriy P. Zaychenko)....Pages 1-42
Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks in Big Data Analysis (Michael Z. Zgurovsky, Yuriy P. Zaychenko)....Pages 43-95
Pattern Recognition in Big Data Analysis (Michael Z. Zgurovsky, Yuriy P. Zaychenko)....Pages 97-139
Intellectual Analysis of Systemic World Conflicts and Global Forecast for the 21st Century (Michael Z. Zgurovsky, Yuriy P. Zaychenko)....Pages 141-277

Citation preview

Studies in Big Data 58

Michael Z. Zgurovsky Yuriy P. Zaychenko

Big Data: Conceptual Analysis and Applications

Studies in Big Data Volume 58

Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland

The series “Studies in Big Data” (SBD) publishes new developments and advances in the various areas of Big Data- quickly and with a high quality. The intent is to cover the theory, research, development, and applications of Big Data, as embedded in the fields of engineering, computer science, physics, economics and life sciences. The books of the series refer to the analysis and understanding of large, complex, and/or distributed data sets generated from recent digital sources coming from sensors or other physical instruments as well as simulations, crowd sourcing, social networks or other internet transactions, such as emails or video click streams and other. The series contains monographs, lecture notes and edited volumes in Big Data spanning the areas of computational intelligence including neural networks, evolutionary computation, soft computing, fuzzy systems, as well as artificial intelligence, data mining, modern statistics and Operations research, as well as self-organizing systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. ** Indexing: The books of this series are submitted to ISI Web of Science, DBLP, Ulrichs, MathSciNet, Current Mathematical Publications, Mathematical Reviews, Zentralblatt Math: MetaPress and Springerlink.

More information about this series at http://www.springer.com/series/11970

Michael Z. Zgurovsky Yuriy P. Zaychenko



Big Data: Conceptual Analysis and Applications

123

Michael Z. Zgurovsky National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Kyiv, Ukraine

Yuriy P. Zaychenko National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” Kyiv, Ukraine

ISSN 2197-6503 ISSN 2197-6511 (electronic) Studies in Big Data ISBN 978-3-030-14297-1 ISBN 978-3-030-14298-8 (eBook) https://doi.org/10.1007/978-3-030-14298-8 Library of Congress Control Number: 2019933181 © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition, large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe-Wolf solar activity cycles. Now we give a brief description of the main practical problems solved in this book related to the intellectual analysis of big data. First of all large dimensions of modern neural networks with applications for 3-D images recognition and automatic speech recognition demanded development of new efficient training methods called Deep Learning (DL). But the most serious drawback of deep learning networks is a problem of determination of its proper structure and how to choose adequate number of their layers. For solution of DL problems arising in BD novel approaches and methods are developed and presented based on the application method of self-organization, also known as the Group Method of Data Handling (GMDH). Several classes of hybrid GMDH— neuro-fuzzy networks are considered algorithms of their structure synthesis based on GMDH are suggested and analyzed. Training algorithms for hybrid deep networks are free from problem of gradient vanishing or explosion and besides, the application of GMDH enables to reduce dimensionality of training DN and accelerate the convergence of training. Secondly, the application of hybrid GMDH- neuro-fuzzy networks for at the stock markets is presented. Problems of images in 2-D and 3-D which also refer stock prices forecasting to sphere of BD analytics are considered. For its solution,

v

vi

Preface

last years convolutional neural networks (CNN) are widely applied. New class of hybrid fuzzy CNN network is suggested in which CNN VGG is used as informative features extractor and fuzzy neural network NEFClass is used as classifier. Besides, for cutting dimensionality of classification problem and reducing of number of feature principal component method (PCM) was applied and investigated. Hybrid FNN-CNN networks were successfully applied to classification of breast tumors in medical diagnostics. The results of FNN NEFClass for another problem human tumor classification and diagnostics are also presented demonstrating the efficiency of FNN. Thirdly, much attention in book are paid to system analysis of global conflicts, detecting hidden dependencies in world economy and forecasting on this base global conflict of the 21-st century. Data on global conflicts from 750 B.C. up to now were collected and analyzed and their general pattern is revealed. An attempt is made to foresee the next global conflict called the conflict of the 21st century. Its nature and main characteristics are analyzed. Main global threats are listed, and their impact on five groups of countries was determined using cluster analysis. The generalization and formalization of approaches to the recognition of global systemic conflicts (C-waves) using big historical data are performed and general concept of description and interpretation of these waves is proposed. Special attention is paid to the class of big C-waves, which cover super-long time intervals. Their pattern is invariant to the evolution of the nature of global conflicts. There has also been made an attempt to predict these processes in the 21st century by using a metric approach. The possible scenarios of the development of the conflict of the 21st century have been constructed and analyzed. The book is oriented, first of all, at specialists in the fields BD analysis, computational intelligence, data mining, system analysis of the world economy, information technologies in medical diagnostics and students of specialties data science, computational intelligence and system analysis, It will be useful also to all specialists who intend to learn new methods and approaches in BD analytics. Kyiv, Ukraine

Prof. Michael Z. Zgurovsky Prof. Yuriy P. Zaychenko

Contents

.. ..

1 1

. . . . . . .

. . . . . . .

2 4 5 5 7 9 9

. . . . . .

. . . . . .

11 12 13 14 14 15

..

16

..

19

.. .. ..

22 41 42

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks in Big Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Autoassociators. Autoencoders . . . . . . . . . . . . . . . . . . . . . . . . . .

43 43 44

1 The Cluster Analysis in Big Data Mining . . . . . . . . . . . . . . . . . . . 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Cluster Analysis, Problem Definition. Criteria of Quality and Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Classification of Algorithms of Cluster Analysis . . . . . . . . . . . 1.3.1 Hierarchical Algorithms. Agglomerative Algorithms . . 1.3.2 Divisional Algorithms . . . . . . . . . . . . . . . . . . . . . . . 1.3.3 Not Hierarchical Algorithms . . . . . . . . . . . . . . . . . . . 1.4 Fuzzy C-Means Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4.1 Algorithm of Fuzzy C-Means . . . . . . . . . . . . . . . . . . 1.4.2 Definition of Initial Location of the Centers of Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 Gustavson-Kessel’s Fuzzy Cluster Analysis Algorithm . . . . . . 1.5.1 Description of Gustavson-Kessel Algorithm . . . . . . . . 1.6 Adaptive Robust Clustering Algorithms . . . . . . . . . . . . . . . . . 1.6.1 Possibilistic Clustering Algorithm . . . . . . . . . . . . . . . 1.6.2 Recurrent Fuzzy Clustering Algorithms . . . . . . . . . . . 1.6.3 Robust Adaptive Algorithms of Probabilistic Fuzzy Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7 Robust Recursive Algorithm of Possibilistic Fuzzy Clustering for Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.8 Application of Fuzzy Clustering Methods in the Problems of Automatic Classification . . . . . . . . . . . . . . . . . . . . . . . . . . 1.9 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

vii

viii

Contents

2.3

Boltzmann Machines (BM) . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.1 Energetic Models . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2 Restricted Boltzmann Machine (RBM) . . . . . . . . . . 2.4 Training Method Contrastive Divergence (CD) . . . . . . . . . . . 2.4.1 Training Algorithm Contrastive Divergence (CD-k) . 2.4.2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.5 Stacked Autoassociators Networks . . . . . . . . . . . . . . . . . . . . 2.5.1 Stacked Autoencoder (SAE) . . . . . . . . . . . . . . . . . . 2.5.2 Stacked RBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6 Deep Networks Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6.1 Deep Network Pretraining . . . . . . . . . . . . . . . . . . . . 2.6.2 Fine-Tuning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7 Deep Learning Regularization . . . . . . . . . . . . . . . . . . . . . . . 2.7.1 Lp-Regularization of Linear Regression . . . . . . . . . . 2.7.2 Early Stopping . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7.3 Dropout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7.4 Bagging (Ensemble Method) . . . . . . . . . . . . . . . . . . 2.8 Cascade Neo-fuzzy Neural Networks Structure Synthesis and Learning with Application of GMDH . . . . . . . . . . . . . . 2.8.1 The Neo-fuzzy Neuron . . . . . . . . . . . . . . . . . . . . . . 2.8.2 The Neo-fuzzy Neuron Learning Algorithm . . . . . . . 2.8.3 The Neo-fuzzy Neural Network and Its Architecture Optimization Using the Group Method of Data Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.8.4 The Experimental Investigations of Forecasting with Neo-fuzzy Neural Network . . . . . . . . . . . . . . . 2.9 Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.9.1 Evolving GMDH-Neuro-fuzzy System Architecture . 2.9.2 Neuro-fuzzy Network with Small Number of Tuning Parameters as a Node of GMDH-System . 2.9.3 Computational Experiments . . . . . . . . . . . . . . . . . . 2.10 A Deep GMDH System Based on the Extended Neo-fuzzy Neuron and Its Training . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10.1 An Architecture of the Deep GMDH Neuro-fuzzy System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10.2 The Adjustment Procedures for All Parameters of the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.10.3 An Experimental Study . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . .

47 47 48 50 52 53 54 54 54 57 57 58 58 58 60 62 64

... ... ...

64 65 68

...

69

...

71

... ...

76 77

... ...

78 81

...

85

...

87

... ... ...

90 92 94

. . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . .

Contents

3 Pattern Recognition in Big Data Analysis . . . . . . . . . . . . . . . . . . . 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 FNN NEFClass. Architecture, Properties, the Algorithms of Learning of Base Rules and Membership Functions . . . . . . 3.3 Analysis NEFClass Properties. The Modified System NEFClassM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.1 The Modified Model NEFCLASS . . . . . . . . . . . . . . . 3.4 Experimental Studies. Comparative Analysis of FNN NEFClass and NEFClass-M in Classification Problems . . . . . . . . . . . . . . 3.5 Application of NEFClass in the Problem of Objects Recognition at Electro-Optical Images . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.1 Gradient Learning Algorithm for NEFClass . . . . . . . . 3.5.2 Genetic Method for Training System NEFClass . . . . . 3.5.3 Experiments on Objects Recognition on Optical Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6 Recognition of Images in Medical Diagnostics Using Fuzzy Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6.1 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 3.6.2 Training of NEFClass System . . . . . . . . . . . . . . . . . . 3.6.3 Experimental Investigations . . . . . . . . . . . . . . . . . . . 3.7 Medical Images of Breast Tumors Diagnostics with Application of Hybrid CNN–FNN Networks . . . . . . . . . . . . . . . . . . . . . . 3.7.1 State-of-Art Problem Analysis . . . . . . . . . . . . . . . . . . 3.7.2 Data Set Description . . . . . . . . . . . . . . . . . . . . . . . . . 3.7.3 Convolutional Neural Networks Brief Description . . . 3.7.4 CNN Model for Image Classification . . . . . . . . . . . . . 3.7.5 Experimental Investigations and Results Analysis . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Intellectual Analysis of Systemic World Conflicts and Global Forecast for the 21st Century . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Identifying the Regularity of the Emergence of Systemic World Conflicts, Based on the Analysis of Big Historical Data . . . . . 4.2.1 Fibonacci Pattern of the Emergence of Systemic World Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2.2 Conflict of the 21st Century and Analysis of Its Nature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2.3 Modeling the Total Impact of the Aggregate of 12 Global Threats on Different Countries and Groups of Countries . . . . . . . . . . . . . . . . . . . . . . 4.2.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

ix

.. ..

97 97

..

98

. . 102 . . 103 . . 105 . . 106 . . 107 . . 109 . . 110 . . . .

. . . .

119 120 120 123

. . . . . . .

. . . . . . .

127 127 129 131 134 134 137

. . 141 . . 141 . . 142 . . 142 . . 146

. . 158 . . 178

x

Contents

4.3

4.4

4.5

4.6

Interrelation Between Periodic Processes in the Global Economy and Systemic World Conflicts . . . . . . . . . . . . . . . . 4.3.1 Periodicity of Global Systemic Conflicts and Economic Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.2 Analysis of the Relationship Between Systemic World Conflicts and the Global Economy . . . . . . . . . 4.3.3 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Metric Aspects of Periodic Processes in Economy and Society . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.1 Initial Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.2 Structural Analysis of Global System Conflicts . . . . . 4.4.3 Confirmation of the F-Pattern by Other Independent Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.4 F-Principle as the Basis of a Metric Study of Global Civilization Processes . . . . . . . . . . . . . . . . 4.4.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Big Solar Spiral of Stirring up Global Systemic Conflicts . . . . 4.5.1 Synchronous Variation of Solar Activity and Formation of C-Waves of Global Systemic Conflicts . 4.5.2 Visualization of the Process of “Stirring Up” of the Family of fCK gK2Ið1;7Þ -Waves of Global Systemic Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . ðK Þ 4.5.3 Local “Stirring Up” by H W -Ensemble of Schwabe–Wolf Solar Cycles of Evolution Phases of Ck -Wave of Global Systemic Conflicts . . . . 4.5.4 Scenarios “XXI–2k” and “XXI–3k” of Global Civilizational Processes During the Seventh Systemic Global Conflict . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.5.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Influence of Global Threats on the Sustainable Development of Countries and Regions of the World . . . . . . . . . . . . . . . . . 4.6.1 The Methodology of Sustainable Development Evaluation in Terms of Quality and Security of the Human Life . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.2 Some Basic Definitions and Concepts . . . . . . . . . . . . 4.6.3 Synthesis of Topologies of BBNs . . . . . . . . . . . . . . . 4.6.4 Modelling the Influence of Global Threats on the Sustainable Development of Countries and Regions of the World with the Use of BBNs . . . . . . . . . . . . . 4.6.5 Interpretation of the Generalized Results of Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 178 . . 179 . . 180 . . 186 . . 187 . . 187 . . 188 . . 191 . . 193 . . 194 . . 194 . . 196

. . 202

. . 203

. . 205 . . 205 . . 210

. . 211 . . 216 . . 220

. . 222 . . 233

Contents

xi

4.6.6

Visualization of Data on Indicators of Sustainable Development for Countries and Regions of the World . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.6.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7 The General Concept of the Periodic Systemic World Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.7.1 Some Concepts and Definitions . . . . . . . . . . . . . . . . . 4.7.2 Geometric Images of CK -Waves and Ensemble of ðSWC Þa -Waves of Systemic World Conflicts . . . . . 4.7.3 Significant Features of SWC-Concept . . . . . . . . . . . . 4.7.4 Correlation of Processes of Evolutionary Development of Civilization PEd C and Development of C-Waves of Systemic World Conflicts pes swc ðLc ðm; nÞÞ . . . . . . . . 4.7.5 The Problem of Identification (Recognition) of C-Waves of Systemic World Conflicts for Big Historical Data . . . . . . . . . . . . . . . . . . . . . . . 4.7.6 Big C-Waves of Systemic World Conflicts . . . . . . . . 4.8 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . 234 . . 250 . . 250 . . 253 . . 256 . . 258

. . 259

. . . .

. . . .

261 263 274 275

Introduction

In the recent decades, due to the explosion of data accumulated and processed in all spheres of human activity, humanity has faced a new global problem (threat), which was called the “Information gap”. This gap is since now every 2 years mankind doubles the volume of data produced, but processes, analyzes and comprehends only a part of these data. Non-analyzed and unreasonable data can be interpreted as “black information holes”, which bring to humanity many unexpected, poorly explained events. These circumstances make the “Big Data” problem very urgent and necessitate the development of an effective theory and practical methods for storing, processing and analyzing these data. Big data (BD) is data sets that are so big and complex that traditional data-processing application software are inadequate to deal with them. Big data challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, information privacy and data source. There are a number of concepts associated with big data: originally there were three concepts volume, variety, velocity [1]. Other concepts later attributed with big data are veracity (i.e., how much noise is in the data) [2] and value [3]. Lately, the term “big data” tends to refer to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data, and seldom to a particular size of data set. “There is little doubt that the quantities of data now available are indeed large, but that’s not the most relevant characteristic of this new data ecosystem” [4]. Analysis of data sets can find new correlations to “spot business trends, prevent diseases, combat crime and so on” [5]. Scientists, business executives, practitioners of medicine, advertising and governments alike regularly meet difficulties with large data sets in areas including Internet search, fintech, urban informatics, and business informatics. Scientists encounter limitations in e-Science work, including meteorology, genomics [6], complex physics simulations, biology and environmental research [7]. Data sets grow rapidly—in part because they are increasingly gathered by cheap and numerous information-sensing Internet of things devices such as mobile devices, aerial (remote sensing), software logs, cameras, microphones, radio-frequency identification (RFID) readers and wireless sensor networks [8, 9]. xiii

xiv

Introduction

The world’s technological per-capita capacity to store information has roughly doubled every 40 months since the 1980s [10]; as of 2012, every day 2.5 exabytes (2.5  1018) of data are generated [11]. Based on an IDC report prediction, the global data volume was growing up exponentially from 4.4 zettabytes to 44 zettabytes between 2013 and 2020 [12]. By 2025, IDC predicts there will be 163 zettabytes of data [13]. One question for large enterprises is determining who should own big-data initiatives that affect the entire organization [14]. Relational database management systems and desktop statistics and software packages to visualize data often have difficulty handling big data. The work may require “massively parallel software running on tens, hundreds, or even thousands of servers” [15]. What counts as “big data” varies depending on the capabilities of the users and their tools, and expanding capabilities make big data a moving target. “For some organizations, facing hundreds of gigabytes of data for the first time may trigger a need to reconsider data management options. For others, it may take tens or hundreds of terabytes before data size becomes a significant consideration” [16]. Big data repositories have existed in many forms, often built by corporations with a special need. Commercial vendors historically offered parallel database management systems for big data beginning in the 1990s. For many years, WinterCorp published a largest database report [17]. Teradata Corporation in 1984 marketed the parallel processing DBC 1012 system. Teradata systems were the first to store and analyze 1 terabyte of data in 1992. Hard disk drives were 2.5 GB in 1991, so the definition of big data continuously evolves according to Kryder’s Law. Teradata installed the first petabyte class RDBMS-based system in 2007. As of 2017, there are a few dozen petabyte class Teradata relational databases installed, the largest of which exceeds 50 PB. Systems up until 2008 were 100% structured relational data. Since then, Teradata has added unstructured data types including XML, JSON, and Avro. CERN and other physics experiments have collected big data sets for many decades, usually analyzed via high performance computing (supercomputers) rather than the commodity map-reduce architectures usually meant by the current “big data” movement. In 2004, Google published a paper on a process called MapReduce that uses a similar architecture. The MapReduce concept provides a parallel processing model, and an associated implementation was released to process huge amounts of data. With MapReduce, queries are split and distributed across parallel nodes and processed in parallel (the Map step). The results are then gathered and delivered (the Reduce step). The framework was very successful [18], so others wanted to replicate the algorithm. Therefore, an implementation of the MapReduce framework was adopted by an Apache open-source project named Hadoop [19]. Apache Spark was developed in 2012 in response to limitations in the MapReduce paradigm, as it adds the ability to set up many operations (not just map followed by reduce). MIKE2.0 is an open approach to information management that acknowledges the need for revisions due to big data implications identified in an article titled “Big

Introduction

xv

Data Solution Offering” [20]. The methodology addresses handling big data in terms of useful permutations of data sources, complexity in interrelationships, and difficulty in deleting (or modifying) individual records [21]. Various studies since 2012 showed that a multiple-layer architecture is one option to address the issues that big data presents. A distributed parallel architecture distributes data across multiple servers; these parallel execution environments can dramatically improve data processing speeds. This type of architecture inserts data into a parallel DBMS, which implements the use of MapReduce and Hadoop frameworks. This type of framework looks to make the processing power transparent to the end user by using a front-end application server [22]. Big data analytics for manufacturing applications is marketed as a 5C architecture (connection, conversion, cyber, cognition, and configuration) [23]. Data lake allows an organization to shift its focus from centralized control to a shared model to respond to the changing dynamics of information management. This enables quick segregation of data into the data lake, thereby reducing the overhead time [24, 25]. Big data has increased the demand of information management specialists so much so that Software AG, Oracle Corporation, IBM, Microsoft, SAP, EMC, HP and Dellhave spent more than $15 billion on software firms specializing in data management and analytics. In 2010, this industry was worth more than $100 billion and was growing at almost 10% a year: about twice as fast as the software business as a whole [5]. Developed economies increasingly use data-intensive technologies. There are 4.6 billion mobile-phone subscriptions worldwide, and between 1 billion and 2 billion people accessing the Internet [5]. Between 1990 and 2005, more than 1 billion people worldwide entered the middle class, which means more people became more literate, which in turn led to information growth. The world’s effective capacity to exchange information through telecommunication networks was 281 petabytes in 1986, 471 petabytes in 1993, 2.2 exabytes in 2000, 65 exabytes in 2007 [10] and predictions put the amount of Internet traffic at 667 exabytes annually by 2014 [5]. According to one estimate, one-third of the globally stored information is in the form of alphanumeric text and still image data [26], which is the format most useful for most big data applications. This also shows the potential of yet unused data (i.e. in the form of video and audio content). Consider the main sources of Big Data.

Networking Ways of Communication Between People on the Planet As the development of modern means of communication between people, such as Mobile Communications, the Internet, Social Networks and other, volumes of data generated by people increase in an avalanche. According to the analytical studies

xvi

Introduction

of the International Labor Organization at the United Nations, these changes have the following features: – If the number of Internet devices in the world in 1984 was at the level of 1,000, now it has reached 15 billion, about 2.5 per every inhabitant of the Planet; – As of 1900, the amount of human knowledge doubled every 100 years. Now, due to global “digitalization”, they are doubled every 2 years. At the same rate, the volume of new data produced by mankind is growing; – This means that now for university students, the newest knowledge that they receive during the first year of training already in the third year becomes obsolete; – These changes are no longer linear in time. According to the UN, they are exponential, and the new digital world is called exponential.

Internet of Things (IoT) Big data and the IoT work in conjunction. Data extracted from IoT devices provides a mapping of device interconnectivity. Such mappings have been used by the media industry, companies and governments to more accurately target their audience and increase media efficiency. IoT is also increasingly adopted as a means of gathering sensory data, and this sensory data has been used in medical [27] and manufacturing [28] contexts. Kevin Ashton, digital innovation expert who is credited with coining the term [29], defines the Internet of Things in this quote: “If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best.”

Information Technology Especially since 2015, big data has come to prominence within Business Operations as a tool to help employees work more efficiently and streamline the collection and distribution of Information Technology (IT). The use of big data to resolve IT and data collection issues within an enterprise is called IT Operations Analytics (ITOA) [30]. By applying big data principles into the concepts of machine intelligence and deep computing, IT departments can predict potential issues and move to provide solutions before the problems even happen [30]. In this time, ITOA businesses were also beginning to play a major role in systems management by offering platforms that brought individual data silos together and generated insights from the whole of the system rather than from isolated pockets of data.

Introduction

xvii

• Walmart handles more than 1 million customer transactions every hour, which are imported into databases estimated to contain more than 2.5 petabytes (2560 terabytes) of data—the equivalent of 167 times the information contained in all the books in the US Library of Congress. • Windermere Real Estate uses location information from nearly 100 million drivers to help new home buyers determine their typical drive times to and from work throughout various times of the day [31]. • FICO Card Detection System protects accounts worldwide [32].

Science • The Large Hadron Collider experiments represent about 150 million sensors delivering data 40 million times per second. There are nearly 600 million collisions per second. After filtering and refraining from recording more than 99.99995% [33] of these streams, there are 100 collisions of interest per second [34–36]. As a result, only working with less than 0.001% of the sensor stream data, the data flow from all four LHC experiments represents 25 petabytes annual rate before replication (as of 2012). This becomes nearly 200 petabytes after replication. If all sensor data were recorded in LHC, the data flow would be extremely hard to work with. The data flow would exceed 150 million petabytes annual rate, or nearly 500 exabytes per day, before replication. To put the number in perspective, this is equivalent to 500 quintillion (5  1020) bytes per day, almost 200 times more than all the other sources combined in the world. • The Square Kilometre Array is a radio telescope built of thousands of antennas. It is expected to be operational by 2024. Collectively, these antennas are expected to gather 14 exabytes and store one petabyte per day [37, 38]. It is considered one of the most ambitious scientific projects ever undertaken [39]. • When the Sloan Digital Sky Survey (SDSS) began to collect astronomical data in 2000, it amassed more in its first few weeks than all data collected in the history of astronomy previously. Continuing at a rate of about 200 GB per night, SDSS has amassed more than 140 terabytes of information [40]. When the Large Synoptic Survey Telescope, successor to SDSS, comes online in 2020, its designers expect it to acquire that amount of data every five days [5]. • Decoding the human genome originally took 10 years to process; now it can be achieved in less than a day. The DNA sequencers have divided the sequencing cost by 10,000 in the last ten years, which is 100 times cheaper than the reduction in cost predicted by Moore’s Law [5]. • The NASA Center for Climate Simulation (NCCS) stores 32 petabytes of climate observations and simulations on the Discover supercomputing cluster [41, 42]. • Google’s DNAStack compiles and organizes DNA samples of genetic data from around the world to identify diseases and other medical defects. These fast and

xviii

Introduction

exact calculations eliminate any ‘friction points,’ or human errors that could be made by one of the numerous science and biology experts working with the DNA. DNAStack, a part of Google Genomics, allows scientists to use the vast sample of resources from Google’s search server to scale social experiments that would usually take years, instantly [43, 44]. • 23andme’s DNA database contains genetic information of over 1,000,000 people worldwide [45]. The company explores selling the “anonymous aggregated genetic data” to other researchers and pharmaceutical companies for research purposes if patients give their consent [46–50]. Ahmad Hariri, professor of psychology and neuroscience at Duke University who has been using 23andMe in his research since 2009 states that the most important aspect of the company’s new service is that it makes genetic research accessible and relatively cheap for scientists [51]. A study that identified 15 genome sites linked to depression in 23andMe’s database lead to a surge in demands to access the repository with 23andMe fielding nearly 20 requests to access the depression data in the 2 weeks after publication of the paper [52]. • Computational Fluid Dynamics (CFD) and hydrodynamic turbulence research generate massive datasets. The Johns Hopkins Turbulence Databases (JHTDB) contains over 350 terabytes of spatiotemporal fields from Direct Numerical simulations of various turbulent flows. Such data have been difficult to share using traditional methods such as downloading flat simulation output files. The data within JHTDB can be accessed using “virtual sensors” with various access modes ranging from direct web-browser queries, access through Matlab, Python, Fortran and C programs executing on clients’ platforms, to cut out services to download raw data. The data have been used in over 150 scientific publications.

Technology • eBay.com uses two data warehouses at 7.5 petabytes and 40 PB as well as a 40 PB Hadoop cluster for search, consumer recommendations, and merchandising [53]. • Amazon.com handles millions of back-end operations every day, as well as queries from more than half a million third-party sellers. The core technology that keeps Amazon running is Linux-based and as of 2005 they had the world’s three largest Linux databases, with capacities of 7.8 TB, 18.5 TB, and 24.7 TB [54]. • Facebook handles 50 billion photos from its user base [55]. • Google was handling roughly 100 billion searches per month since August 2012 [56]. In March 2012, The White House announced a national “Big Data Initiative” that consisted of six Federal departments and agencies committing more than $200 million to big data research projects [57].

Introduction

xix

The initiative included a National Science Foundation “Expeditions in Computing” grant of $10 million over 5 years to the AMPLab [58] at the University of California, Berkeley [59]. The AMPLab also received funds from DARPA, and over a dozen industrial sponsors and uses big data to attack a wide range of problems from predicting traffic congestion [60] to fighting cancer [61]. The White House Big Data Initiative also included a commitment by the Department of Energy to provide $25 million in funding over 5 years to establish the Scalable Data Management, Analysis and Visualization (SDAV) Institute [62], led by the Energy Department’s Lawrence Berkeley National Laboratory. The SDAV Institute aims to bring together the expertise of six national laboratories and seven universities to develop new tools to help scientists manage and visualize data on the Department’s supercomputers. The U.S. state of Massachusetts announced the Massachusetts Big Data Initiative in May 2012, which provides funding from the state government and private companies to a variety of research institutions [63]. The Massachusetts Institute of Technology hosts the Intel Science and Technology Center for Big Data in the MIT Computer Science and Artificial Intelligence Laboratory, combining government, corporate, and institutional funding and research efforts [64]. The European Commission is funding the 2-year-long Big Data Public Private Forum through their Seventh Framework Program to engage companies, academics and other stakeholders in discussing big data issues. The project aims to define a strategy in terms of research and innovation to guide supporting actions from the European Commission in the successful implementation of the big data economy. Outcomes of this project will be used as input for Horizon 2020, their next framework program [65]. Facing the challenges of BD the problems of development and implementation of adequate methods, techniques and software of BD analysis (BD Mining) are extremely important. It’s worth to notice that conventional methods and techniques of Data Mining are not adequate for this goal. The mankind have developed some fruitful approaches to deal with high dimension and large volumes of data. One of them widely used is clustering. Clustering enables to divide large data set into several groups of similar objects and replace the whole group by one representative object—center of cluster. Up to date many algorithms of cluster analysis were developed. But problem of clustering in real-time mode arises when new data are entering as stream data and demands new efficient methods and algorithms. Another approach of reducing volume of data set is hierarchy. Hierarchical organization of data enables to structuring initial data set into several subordinate levels which gives opportunity classify objects by feature set and easily find the searched object or small group of objects by its features. Last years due to demand of speed processing, prediction and classification of huge volumes of data Deep learning networks were developed with large number of neuron layers. With their appearance the new problem has arisen to develop efficient methods of learning such networks. Some novel approach to solution of fast

xx

Introduction

Deep learning is the application of so-called Group Method of Data Handling which represents very efficient tools for reducing dimensionality. The present book deals with some problems of BD analysis, considers and investigates as conventional tools of Data Mining and novel efficient methods and tools as well developed for this goal. In Chap. 1 methods of cluster analysis are considered. The crisp and fuzzy clustering methods are described and analyzed. New efficient possibilistic methods of clustering including robust clustering methods working under high noise level are considered. Special attention is played for development of new clustering methods which operate under data streams in on-line mode. The examples of application of clustering methods for some practical problems are presented. Chapter 2 is devoted to analysis, training of Deep learning (DL) networks and their applications to solution some BD tasks. At the beginning structure and conventional training methods of DL are considered, the problem of vanishing gradient while training is considered and several ways of its prevention are considered (so-called methods of regularization). The main attention in this chapter is played to development and presentation of so-called Hybrid GMDH-neo-fuzzy networks for solution computation intelligence task with BD. This new class of FNN turned to be efficient tools to overcome high dimensionality. In the chapter are presented several types of hybrid GMDH-FNNs and their application to the solution of real problems of prediction, classification and control. Chapter 3 deals with classification problems. The FNN NefClass is considered as efficient tools of classification under BD conditions. The structure, training algorithms of FNN NefClass are presented and analyzed. The application of FNN NefClass for solution of medical images analysis and recognition in the problems of medical diagnostics are presented. As it is known the new efficient tools for images processing and recognition are Convolutional neural networks (CNN). CNN are applied to find informative features of image which are fed into multilayered perceptron for further classification. In the chapter new hybrid CNN-FNN system for image recognition is described where CNN is used for finding features of image while FNN NEFClass is used for further classification. The investigations of the suggested hybrid network and comparison with known CNN systems are performed at the practical problem of recognition of breast cancer at the standard data set BreakHis. Chapter 4 of the book is devoted to the intellectual analysis of large historical data with the purpose of recognizing the laws of the origin and development of global systemic conflicts and with the purpose of analyzing the causes leading to these conflicts. The generalization and formalization of approaches to the recognition of C-waves of global systemic conflicts through big historical data have been carried out and general concept of description and interpretation of these waves has been proposed. Based on intellectual analysis of big data on the conflicts, taking place since 750 B.C. up to now, have been analyzed and their general pattern has been revealed. These have been tried to foresee the next global conflict called the conflict of the 21st century. Its nature and main characteristics have been analyzed.

Introduction

xxi

The hypotheses for a metric relation between the global periodic processes, namely between the sequence of 11-year cycles of solar activity, so called Kondratieff cycles of the development of the global economy, and the process of evolutionary structuration of the family of the C-waves of global systemic conflicts have been formulated. The problem of prediction of these processes in the 21st century by using a metric approach was considered. The possible scenarios of the development of the conflict of the 21st century have been constructed and analyzed. Ideas aimed to avoiding of undesirable consequences for humanity in the case of full or partial implementation of the predicted scenarios are proposed. On the whole, this chapter represents the wonderful example of application and development of general ideas and paradigms of Data Mining to detection of hidden laws in evolution of world economy and global conflicts and their systemic analysis.

References 1. D. Laney, 3D data management: controlling data volume, velocity and variety. META Group Res. Note 6(70) (2001) 2. P.B. Goes, Design science research in top information systems journals. MIS Q. Manag. Inf. Syst. 38(1) (2014) 3. B. Marr, Big data: The 5 Vs everyone must know (6 March 2014) 4. D. Boyd, K. Crawford, Six provocations for big data, in Social Science Research Network: A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, https://doi. org/10.2139/ssrn.1926431 (21 Sept 2011) 5. Data, data everywhere. The Economist. Retrieved 9 Dec 2012 (25 Feb 2010) 6. Community cleverness required. Nature 455(7209), 1 (4 Sept 2008), https://doi.org/10.1038/ 455001a 7. O.J. Reichman, M.B. Jones, M.P. Schildhauer, Challenges and opportunities of open data in ecology. Science 331(6018), 703–705 (2011), https://doi.org/10.1126/science.1197962 8. J. Hellerstein, Parallel programming in the age of big data. Gigaom Blog (9 Nov 2008) 9. T. Segaran, J. Hammerbacher, Beautiful Data: The Stories Behind Elegant Data Solutions (O’Reilly Media, 2009), p. 257. ISBN: 978-0-596-15711-1 10. M. Hilbert, P. López, The world’s technological capacity to store, communicate, and compute information. Science 332(6025), 60–65 (2011), https://doi.org/10.1126/science.1200970 11. IBM What is big data?—Bringing big data to the enterprise. www.ibm.com. Retrieved 26 Aug 2013 12. M. Sh. Hajirahimova, A.S. Aliyeva, About big data measurement methodologies and indicators. Int. J. Mod. Educ. Comput. Sci. 9(10), 1–9. https://doi.org/10.5815/ijmecs.2017. 10.01. 13. D. Reinsel, J. Gantz, J. Rydning, Data Age 2025: The Evolution of Data to Life-Critical (International Data Corporation, Framingham). Retrieved 2 Nov 2017 (13 April 2017) 14. Oracle and FSN, Mastering big data: CFO strategies to transform insight into opportunity, December 2012 15. A. Jacobs, The pathologies of big data. ACMQueue (6 July 2009) 16. R. Magoulas, B. Lorica, Introduction to big data. Release 2.0 (11) (O’Reilly Media, Sebastopol) (Feb 2009) 17. Survey: biggest databases approach 30 terabytes. Eweek.com. Retrieved 8 Oct 2017

xxii

Introduction

18. J. Bertolucci, Hadoop: from experiment to leading big data platform. Information Week. Retrieved on 14 Nov 2013 19. J. Webster, MapReduce: simplified data processing on large clusters. Search Storage. Retrieved on 25 Mar 2013 (2004) 20. Big data solution offering. MIKE2.0. Retrieved 8 Dec 2013 21. Big data definition. MIKE2.0. Retrieved 9 Mar 2013 22. C. Boja, A. Pocovnicu, L. Bătăgan, Distributed parallel architecture for big data. Informatica Economica 16(2), 116–127 (2012) 23. IMS_CPS—IMS Center. Imscenter.net. Retrieved 16 June 2016 24. Solving key business challenges with a big data lake. Hcltech.com. Retrieved 8 Oct 2017 (Aug 2014) 25. Method for testing the fault tolerance of MapReduce frameworks. Computer Networks (2015) 26. M. Hilbert, P. López, The world’s technological capacity to store, communicate, and compute information. Science 332(6025), 60–65 (2011), https://doi.org/10.1126/science.1200970 27. M. Hilbert, What is the content of the world’s technologically mediated information and communication capacity: how much text, image, audio, and video? Inf. Soc. 30(2), 127–143 (2014), https://doi.org/10.1080/01972243.2013.873748 28. QuiO named innovation champion of the Accenture healthtech innovation challenge. Businesswire.com. Retrieved 8 Oct 2017 (10 Jan 2017) 29. A software platform for operational technology innovation. Predix.com. Retrieved 8 Oct 2017 30. That internet of things thing 31. R. Solnik, The time has come: analytics delivers for IT operations. Data Cent. J. Retrieved 21 June 2016 32. N. Wingfield, Predicting commutes more accurately for would-be home buyers— NYTimes.com. Bits.blogs.nytimes.com. Retrieved 21 July 2013 (12 March 2013) 33. FICO® Falcon® Fraud Manager. Fico.com. Retrieved 21 July 2013 34. D. Alexandru, Prof. cds.cern.ch. CERN. Retrieved 24 March 2015 35. LHC Brochure, English version. A presentation of the largest and the most powerful particle accelerator in the world, the Large Hadron Collider (LHC), which started up in 2008. Its role, characteristics, technologies, etc. are explained for the general public. CERN-Brochure-2010-006-Eng. LHC Brochure, English version. CERN. Retrieved 20 Jan 2013 36. LHC Guide, English version. A collection of facts and figures about the Large Hadron Collider (LHC) in the form of questions and answers. CERN-Brochure-2008-001-Eng. LHC Guide, English version. CERN. Retrieved 20 Jan 2013 37. G. Brumfiel, High-energy physics: Down the petabyte highway. Nature 469, 282–283, https:// doi.org/10.1038/469282a (19 Jan 2011) 38. IBM Research—Zurich. Zurich.ibm.com. Retrieved 8 Oct 2017 39. Future telescope array drives development of Exabyte processing. Ars Technica. Retrieved 15 April 2015 40. Australia’s bid for the square kilometre array—an insider’s perspective. The Conversation. Retrieved 27 Sept 2016 (1 Feb 2012) 41. P. Delort, OECD ICCP technology foresight forum, 2012. Oecd.org. Retrieved 8 Oct 2017 42. NASA—NASA Goddard Introduces the NASA Center for Climate Simulation. Nasa.gov. Retrieved 13 April 2016 43. P. Webster, Supercomputing the climate: NASA’s big data mission. CSC World. Computer Sciences Corporation. Archived from the original on 4 January 2013. Retrieved 18 Jan 2013 44. These six great neuroscience ideas could make the leap from lab to market. The Globe and Mail. Retrieved 1 Oct 2016 (20 Nov 2014) 45. DNAstack tackles massive, complex DNA datasets with Google Genomics. Google Cloud Platform. Retrieved 1 Oct 2016 46. 23andMe—Ancestry. 23andme.com. Retrieved 29 Dec 2016

Introduction

xxiii

47. A. Potenza (13 July 2016), 23andMe wants researchers to use its kits, in a bid to expand its collection of genetic data. The Verge. Retrieved 29 Dec 2016 48. This startup will sequence your dna, so you can contribute to medical research. Fast Company. Retrieved 29 Dec 2016 (23 Dec 2016) 49. C. Seife, 23andMe Is terrifying, but not for the reasons the FDA thinks. Scientific American. Retrieved 29 Dec 2016 50. A. Zaleski, This biotech start-up is betting your genes will yield the next wonder drug. CNBC. Retrieved 29 Dec 2016 (22 June 2016) 51. A. Regalado, How 23andMe turned your DNA into a $1 billion drug discovery machine. MIT Technology Review. Retrieved 29 Dec 2016 52. 23andMe reports jump in requests for data in wake of Pfizer depression study|FierceBiotech. fiercebiotech.com. Retrieved 29 Dec 2016 53. L. Tay, Inside eBay’s 90PB data warehouse. ITNews. Retrieved 12 Feb 2016 54. J. Layton, Amazon technology. Money.howstuffworks.com. Retrieved 5 March 2013 55. Scaling Facebook to 500 million users and beyond. Facebook.com. Retrieved 21 July 2013 56. Google still doing at least 1 trillion searches per year. Search Engine Land. Retrieved 15 April 2015 (16 Jan 2015) 57. Obama administration unveils “big data” initiative: announces $200 million in new R&D investments. The White House. Archived from the original (PDF) on 1 Nov 2012 58. AMPLab at the University of California, Berkeley. Amplab.cs.berkeley.edu. Retrieved 5 March 2013 59. NSF leads federal efforts in big data. National Science Foundation (NSF). 29 March 2012 60. T. Hunter, T. Moldovan, M. Zaharia, J. Ma, M. Franklin, P. Abbeel, A. Bayen (October 2011), Scaling the mobile millennium system in the cloud 61. D. Patterson, Computer scientists may have what it takes to help cure cancer. The New York Times (5 Dec 2011) 62. Secretary Chu announces new institute to help scientists improve massive data set research on doe supercomputers. energy.gov. 63. Governor Patrick announces new initiative to strengthen Massachusetts’ position as a world leader in big data. Commonwealth of Massachusetts 64. Big Data @ CSAIL. Bigdata.csail.mit.edu. Retrieved 5 March 2013 (22 Feb 2013) 65. Big data public private forum. Cordis.europa.eu. Archived from the original on 20 May 2013. Retrieved 5 March 2013 (1 Sept 2012)

Chapter 1

The Cluster Analysis in Big Data Mining

1.1

Introduction

Methods of clustering represent a powerful tools for reducing dimensions of BD warehouses. Clustering enables to split the initial big data set into several groups of similar objects by features of similarity-difference using various distance metrics and replace the whole group by the most representative object locating in the cluster center. In this chapter different clustering methods and techniques are considered and their applications for practical problems solutions are presented Term cluster analysis (introduced by Tryon, 1939 for the first time) actually includes a set of various algorithms of classification without teacher [1]. The general question asked by researchers in many areas is how to organize observed data in evident structures, i.e. to develop taxonomy. The clustering is applied in the most various areas. For example, in the field of medicine the clustering of diseases, treatments of diseases or symptoms of diseases leads to widely used taxonomy. In the field of psychiatry the correct diagnostics of clusters of symptoms, such as paranoia, schizophrenia, etc., is decisive for successful therapy. In archeology by means of the cluster analysis researchers try to make taxonomy of stone tools, funeral objects, etc. Broad applications of the cluster analysis in market researches are well known. Generally, every time when it is necessary to classify “mountains” of information to groups, suitable for further processing, the cluster analysis is very useful and effective. In recent years the cluster analysis is widely used in the intellectual analysis of data (Data Mining), as one of the principal methods. The purpose of this chapter is the consideration of modern methods of the cluster analysis, crisp methods(a method of C-means, Ward’s method, the next neighbor, the most distant neighbor), and fuzzy methods, robust probabilistic and possibilistic clustering methods. Numerous results of pilot studies of fuzzy methods of a cluster analysis are presented in the Sect. 1.9 among them is a problem of UN countries clustering by indicators of sustainable development. © Springer Nature Switzerland AG 2020 M. Z. Zgurovsky and Y. P. Zaychenko, Big Data: Conceptual Analysis and Applications, Studies in Big Data 58, https://doi.org/10.1007/978-3-030-14298-8_1

1

2

1.2

1

The Cluster Analysis in Big Data Mining

Cluster Analysis, Problem Definition. Criteria of Quality and Metrics

Let the set of observations c1 be given, where Xi ¼ fxij g; j ¼ 1; N. It is required to divide a set X into not intersected K subsets—clusters S1 ; . . .; SK so that to provide extremum of some criterion (functional of quality), that is: to find such S ¼ ðS1 ; . . .; SK Þ that f ðSÞ ! minðmaxÞ. Different types of criteria (functional) of splitting are possible. It’s worth to note that this task is closely connected with definition of some metrics in a feature space. Consider the most widely used functionals of splitting quality [2]: 1. Coefficient of splitting F which is defined as follows: F¼

K X n w2 X ij j¼1 i¼1

n

;

ð1:1Þ

where wij 2 ½0; 1—some degree of membership of the i-th object to the j-th   cluster. Change range is F 2 1k ; 1 , where n—number of objects, K—number of clusters. 2. Non-fuzziness index: NFI ¼

KF  1 ; NFI 2 ½0; 1; k1

ð1:2Þ

where K—number of classes (clusters); F—splitting coefficient. 3. Entropy of splitting: H¼

K X n X wij lnðwij Þ ; H 2 ð0; ln KÞ: n j¼1 i¼1

ð1:3Þ

4. The normalized entropy of splitting: H1 ¼

H ; 1  K=n

H1 2

  n ln K 0; ; nK

ð1:4Þ

where n is a number of points. 5. The modified entropy: H2 ¼ 6. Second functional of Rubens:

H ; ln K

H2 2 ð0; 1Þ

ð1:5Þ

1.2 Cluster Analysis, Problem Definition. Criteria of Quality and Metrics

3

Table 1.1 Clustering metrics No.

Name of a metrics

Type of features

Formula for an assessment of a measure of proximity (metrics) !1=2 N  2 P dik ¼ xij  xkj

1

Euclidean distance

The quantitative

2

Measure of similarity of Hamming

Nominal (qualitative)

nik lH ij ¼ N , where nik —number of coinciding features in samples Xi and XK

3

Measure of similarity of Rogers-Tanimoto

Nominal scales

4

Manhattan metrics

The quantitative

¼ n00ik ðn0i þ n00k  n00ik Þ lRT ij where n00ik —number of coinciding unit features at samples Xi and XK ; n0i , n00k —total number of unit features at samples Xi and XK respectively N   P ð1Þ xij  xkj  dik ¼

5

Makhalonobis’s distance

The quantitative

6

Minkovsky’s metrics Lp

j¼1

j¼1

dikM ¼ ðxij  xkj ÞT W 1 ðxij  xkj Þ W—covariance matrix of sample X ¼ fX1 ; X2 ; . . .Xn g p 1p Pn    ;p1 Dðxk ; cj Þ ¼ i¼1 xk;i  cj;i

! n 1 1X F2 ¼ max Wij þ min max Wij ; i j 2 n i¼1 j   1 ;1 : F2 2 K

ð1:6Þ

7. Third functional of Rubens (second index of Non-fuzziness): NF2I ¼

KF2  1 ; NF2I 2 ð0; 1Þ: K1

ð1:7Þ

As initial information is set in the form of a matrix X, there is a metrics choice problem. Metrics choice—the most important factor influencing results of a cluster analysis. Depending on type of features various measures of distance (metrics) are used. Let be samples Xi and XK in N-dimensional feature space. The main metrics of clustering are given in the Table 1.1. There is a large number of clustering algorithms which use various metrics and criteria of splitting.

4

1.3

1

The Cluster Analysis in Big Data Mining

Classification of Algorithms of Cluster Analysis

When performing a clustering it is important to know, how many clusters contains an initial sample It is supposed that the clustering has to reveal natural local grouping of objects. Therefore the number of clusters is the parameter which is often significantly complicates an algorithm if it is supposed to be unknown and significantly influencing quality of result if it is known. The problem of a choice of clusters number is very nontrivial. It is enough to tell that for obtaining the satisfactory theoretical decision often it is required to make in advance very strong assumptions of properties of some family of distributions. But about what assumptions one can make when, especially at the beginning of research, of data practically it isn’t known? Therefore algorithms of a clustering usually are constructed as some way of search clusters number and determination of its optimum value in the course of search. The number of methods of splitting a set of objects into clusters is quite great. All of them can be subdivided on hierarchical and not hierarchical. In not hierarchical algorithms their work and conditions of stop need to be regulated in advance often with large number of parameters that is sometimes difficult, especially at the initial stage of investigation. But in such algorithms big flexibility in a variation of a clustering is reached and usually the number of clusters is defined. In not hierarchical algorithms a criterion of clustering is given and it should be optimized in result of splitting initial sample or set into clusters. On the other hand, when objects are characterized by a large number of features (parameters), a task of grouping features is important. Initial information contains in a square matrix of features interconnections, in particular, in a correlation matrix. Basis of the successful solution of a grouping task is the informal hypothesis of a small number of the hidden factors which define structure of an interconnection between features. In hierarchical algorithms one actually refuses to define a number of clusters, building a full tree of the enclosed clusters (so-called dendrogram). The number of clusters is defined from the assumptions, in principle, which aren’t relating to work of algorithms, for example on dynamics of change of a threshold of splitting (merge) of clusters. Difficulties of such algorithms are well studied: choice of measures of proximity of clusters, problem of inversions of indexation in the dendrograms, inflexibility of hierarchical classifications which is sometimes undesirable. Nevertheless, representation of a clustering in the form of a dendrogram allows to gain the most complete display of structure of clusters. Hierarchical algorithms are connected with dendrograms construction and divided on: 1. agglomerative, characterized by consecutive merge of initial elements and the corresponding reduction of number of clusters (creation of clusters from below to top);

1.3 Classification of Algorithms of Cluster Analysis

5

2. divisional (divided) in which the number of clusters increases, starting with one cluster therefore the sequence of the splitting groups is constructed (creation of clusters from top to down).

1.3.1

Hierarchical Algorithms. Agglomerative Algorithms

On the first step all the set of objects is represented as a set of clusters: c1 ¼ fi1 g; c2 ¼ fi2 g; . . .; cm ¼ fim g On the following step two closest one to another clusters are chosen (for example, cp and cq ) and unite in one joint cluster. The new set consisting already of m − 1 of clusters will be such: c1 ¼ fi1 g; c2 ¼ fi2 g; . . .; cp ¼ fip ; iq g; . . .; cp ¼ fim g Repeating process, we obtain step by step the consecutive sets consisting of (т − 2), (т − 3), (т − 4) and etc. clusters. At the end of procedure the cluster consisting of m of objects and coinciding with an initial set I will be obtained. For determination of distance between clusters it is possible to choose different metrics. Depending on it algorithms with various properties exist. There are some methods of recalculation of distances with use of old values of distances for the united clusters differing in coefficients in a formula:   drs ¼ ap dps þ aq dqs þ bdpq þ cdps  dqs  If clusters p and q unite in one cluster of r and it is required to calculate distance from a new cluster to cluster say, s, application of this or that method depends on a way of determination of distance between clusters, these methods differ with values of coefficients ap ; aq ; b; c. Coefficients of recalculation of distances between clusters ap ; aq ; b; c are specified in Table 1.2.

1.3.2

Divisional Algorithms

Divisional cluster algorithms, unlike agglomerative, on the first step represent all set of elements I as the only cluster. On each step of algorithm one of the existing clusters is recursively divided into two affiliated. Thus, clusters from top to down are iteratively formed. This approach isn’t so in detail described in literature devoted to

6

1

The Cluster Analysis in Big Data Mining

Table 1.2 Coefficients of recalculation distances between clusters Name of a method

ap

aq

b

c

Distance between the closest neighbours—the closest objects of clusters (Nearest neighbour) Distance between the farthest neighbours (Furthest neighbour) The method of medians—the same centroid method, but the centre of the integrated cluster is calculated as an average of all objects (Median clustering) Average distance between clusters (Between— groups linkage) Average distance between all objects of couple of clusters taking into account distances inside clusters (intra-groups linkage) Distance between centres clusters (Centroid clustering), or centroid method. A lack of this method is that the centre of the integrated cluster is calculated as an average of the centres of the united clusters, without their volume by Ward’s method. As distance between clusters the gain of the sum of squares of distances of objects to the centres of clusters received as a result of their association is calculated

1/2

1/2

0

1/2

1/2

0

−1/ 2 1/2

1/2

1/2

−1/4

0

1/2

1/2

0

0

kp kp þ kq

kq kp þ kq

0

0

kp kp þ kq

kp kp þ kq

kp kq kp þ kq

0

kr þ kp kr þ kq þ kp

kr þ kp kr þ kq þ kp

kr kr þ kq þ kp

0

the cluster analysis, as agglomerative algorithms. It is applied when it is necessary to divide all set of objects on rather small amount clusters. One of the first the divisional algorithms was offered by Smith Maknaoton in 1965 [2]. All elements are located on the first step in one cluster C1 ¼ I. Then the element, at which average value of distance from other elements in this cluster is the greatest is selected. Average value can be calculated, for example, by means of a formula DC1 ¼

XX 1  dðip ; iq Þ; NC1 ip iq

8ip ; iq 2 C

nC1 ðnC1  1Þ ; 2

nC1 ¼ jC1 j

Where NC1 ¼

The chosen element is removed from a cluster of C1 and becomes the first member of the second cluster C2. On each subsequent step an element in a cluster of C1 for which the difference between average distance to the elements which are in C2, and average distance to the elements remaining in C1 is the greatest is transferred to C2.. Transfer of

1.3 Classification of Algorithms of Cluster Analysis

7

elements from C1 in C2 proceed until the corresponding differences of averages become negative, i.e. so far there are elements located to elements of a cluster of C2 closer than to cluster elements of C1. As a result one cluster is divided into two affiliated ones which will be split at the following level of hierarchy. Each subsequent level procedure of division is applied to one of the clusters received at the previous level. The choice of cluster to be split can be carried out differently. In 1990 Kauffman and Rouzeuv suggested to choose at each level a cluster for splitting with the greatest diameter which is calculated on a formula [2] DC ¼ maxdðip ; iq Þ8ip ; iq 2 C Recursive division of clusters proceeds, so far all clusters or won’t become singleton (i.e. consisting of one object), or so far all members of one cluster won’t have zero difference from each other.

1.3.3

Not Hierarchical Algorithms

The great popularity at the solution of clustering problems was acquired by the algorithms based on search of splitting a data set into clusters (groups). In many tasks algorithms of splitting are used owing to the advantages. These algorithms try to group data (in clusters) so that criterion function of splitting algorithm reaches an extremum (minimum). We’ll consider three main algorithms of a clustering based on splitting methods. In these algorithms the following basic concepts are used: • the training set (an input set of data) of M on which splitting is based; • distance metrics: 2 dA2 ðmj ; cðiÞ Þ ¼ mj  cðiÞ ¼ ðmj  cðiÞ Þt Aðmj  cðiÞ Þ

• • • •

ð1:6Þ

where the matrix A defines a way of distance calculation. For example, for a singular matrix distance according to Euclid metrics is used; vector of the centers of clusters C; splitting matrix on clusters U; goal function J ¼ JðM; d; C; UÞ; set of restrictions.

Description of K-means Algorithm Basic definitions and concepts within this algorithm are following: • the training set M ¼ fmj gdj¼1 d—number of points (vectors) of data; • the distance metrics counted by a formula (1.6); • vector of the centers of clusters C ¼ fcðiÞ gci¼1

8

1

where

Pd c

ðiÞ

j¼1

¼ Pd

uij mj

j¼1

uij

The Cluster Analysis in Big Data Mining

;

1  i  c;

ð1:7Þ

• splitting matrix U ¼ fuij g.where

ðlÞ ðlÞ ðlÞ uij ¼ 1; if dðmj ; ci Þ ¼ min1  k  c dðmj ; ck Þ 0; otherwise Object function JðM; U; CÞ ¼

c X d X

uij dA2 ðmj ; cðiÞ Þ

ð1:8Þ

ð1:9Þ

i¼1 j¼1

• set of restrictions fuij g 2 f0; 1g;

c X

uij ¼ 1; 0\

i¼1

d X

uij \d

ð1:10Þ

j¼1

which defines that each vector of data can belong only to one cluster and doesn’t belong to the rest. Each cluster contains not less than one point, but less than a total number of points. Structurally the algorithm represents the following iterative procedure [1]. Step 1. To initialize initial splitting (for example, in a random way), to choose accuracy value d (it is used in a condition of end of an algorithm), to initialize a number of iteration l = 0. Step 2. To define the centers of clusters by the following formula: Pd c

ðiÞ

ðl1Þ

j¼1

¼ Pd

uij

mj

ðl1Þ j¼1 uij

;

1ic

ð1:11Þ

Step 3. To update a splitting matrix to minimize squares of errors, using a formula ðl1Þ

uij

¼

ðlÞ

ðlÞ

1; if dðmj ; ci Þ ¼ min1  k  c dðmj ; ck Þ 0; otherwise

ð1:12Þ

Step 4. To check a condition U ðlÞ  U ðl1Þ \d. If the condition is satisfied, finish process if it isn’t true then pass to a step 2 with number of iteration l ¼ l þ 1. The main shortcoming inherent to this algorithm owing to discrete character of elements of a splitting matrix is the big size of splitting space. One way to overcome this shortcoming is the choice of elements of a splitting matrix by numbers from a unit

1.3 Classification of Algorithms of Cluster Analysis

9

interval. That is, belonging of a data element to a cluster has to be defined by membership function—the element of data can belong to several clusters with various degree of membership. In that case we come to a problem of fuzzy clustering. This approach found the embodiment in algorithm of fuzzy clustering— fuzzy method of K-means (Fuzzy C-Means).

1.4

Fuzzy C-Means Method

Consider a neural network with self-organization where training is performed without a teacher. The algorithm of self-organization relates a vector x to the corresponding cluster of data which is presented by its center, using a competitive training. The basic form of algorithm of self-organization allows to find precisely position of the centers of the relevant groups (clusters) into which the output multidimensional space is split. These centers can be used further in hybrid algorithm of training of FNNs as initial values that considerably accelerates process of training and guarantees convergence to a global minimum [3].

1.4.1

Algorithm of Fuzzy C-Means

Let’s assume that in a network exists m fuzzy neurons with the centers in points cj ; ðj ¼ 1; 2; . . .; mÞ. Initial values of these centers can be chosen randomly from areas of admissible values of the corresponding components of vectors xk ; ðk ¼ 1; 2; . . .; NÞ used for training. Let function of a fuzzification be set in the form of the generalized Gauss function expressed by a formula (1.8). The vector entered in a network input xk will belong to various groups represented by the centers cj , with degree wkj , and 0\wkj \1, and total degree of membership to all groups, is obviously, equal 1. Therefore m X

wkj ¼ 1;

ð1:13Þ

j¼1

for all wkj ðk ¼ 1; 2; . . .; NÞ. The function of an error corresponding to such representation can be defined as the sum of individual errors of membership to the centers ci taking into account fuzziness degree b. Therefore, [4] E¼

m X N X j¼1 k¼1

2 wbkj cj  xk

ð1:14Þ

10

1

The Cluster Analysis in Big Data Mining

where b is a weight coefficient which accepts values from an interval ð1; 1Þ. The training goal of self-organization consists in such selection of the centers cj , that for the whole set of the training vectors xk —achievement of a minimum of function (1.14) at simultaneous fulfillment of conditions (1.13) is attained. Thus it is a problem of minimization of nonlinear function (1.14) with N constraints of type (1.13). The solution of this task can be transferred to minimization of Lagrange function defined by the form [4]. LE ¼

m X N X



wbkj cj

N m X 2 X  xk þ kk wkj  1

j¼1 k¼1

k¼1

! ð1:15Þ

j¼1

where kk ðk ¼ 1; 2; . . .; NÞ are Lagrange’s multipliers. In it is proved that the solution of a task (1.15) can be presented in the form PN k¼1

cj ¼ PN

wbkj xk

;

ð1:16Þ

1 1 ;  b1

ð1:17Þ

k¼1

wkj ¼

m P i¼1

wbkj

dkj2 dij2

where dkj —is Euclidean distance between the center cj and vector xk , dkj ¼ cj  xk . As exact values of the centers cj at the beginning of process aren’t known, the training algorithm has to be iterative. It can be formulated in the following way: 1. To execute random initialization of coefficients wkj , choosing their values from an interval [0, 1] so that the condition (1.13) be satisfied. 2. To define К centers cj , in accordance with (1.16). 3. To calculate value of the error function according to expression (1.14). If its value appears below the established threshold or if reduction of this error of previous iteration is negligible, to finish calculations. The last values of the centers represent the required decision. Otherwise, go to step 4 4. To calculate new values ukj in a formula (1.17) and to pass to step 2. Such procedure is called the fuzzy self-organization algorithm C-means. Repetition of iterative procedure leads to achievement of a minimum of function E which won’t be a global minimum. The quality of the found centers estimated by value of an error function E essentially depends on preliminary selection of values wkj and centers cj . As the best will be such placement of the centers at which they settle down in the areas containing the greatest number of the shown vectors xj . At such selection of the centers they will represent vectors of data xj with the smallest total error. Therefore the beginning of iterative procedure of calculation of optimum values of the centers has to be preceded by procedure of their initialization. Algorithms of

1.4 Fuzzy C-Means Method

11

peak and differential grouping of data belong to the most known algorithms of initialization.

1.4.2

Definition of Initial Location of the Centers of Clusters

Algorithm of Peak Grouping The algorithm of peak grouping was offered by Jager and Filev [4, 5]. When using N input vectors the special grid which evenly covers space of these vectors is constructed. Nodes of this grid are considered as potential centers #, for each of which peak function is calculated: N X

(

k#  xk k2b mð#Þ ¼ exp 2r2 k¼1

) ð1:18Þ

where r is some constant which is selected separately for each specific task. Value mð#Þ is considered as an assessment of height of peak function. It is proportional to quantity of vectors xj , which get to the vicinity of the potential center #. Great value mð#Þ testifies to that the center # locates in the area in which the greatest number of vectors is concentrated fxk g. The coefficient of r influences final proportions between mð#Þ and # slightly. After calculation of values mð#Þ for all potential centers the first center is selected c1 , which has the greatest value mð#Þ. For a choice of the following centers it is necessary to exclude c1 and nodes which are placed in close proximity to c1 . It can be done by redefinition of peak function at the expense of separation of Gauss function from it with the center in a point c1 . Having designated this new function through mnew ð#Þ, we receive: ( ) k#  c1 k2b mnew ð#Þ ¼ mð#Þ  mðc1 Þ exp ð1:19Þ 2r2 Note that this function has zero in a point c1 . Then the same procedure repeats value with the next center c2 , etc. Process of finding of the following centers c2 , c3 is realized consistently on the modified values mnew ð#Þ, which turn out at an exception of the next neighbors of the center which was found at the previous stage. It comes to an end at the moment of localization of all the centers. The method of peak grouping is effective at not really big dimension of a vector of X. Otherwise number of the potential centers increases as avalanche. Algorithm of Differential Grouping The algorithm of differential grouping is a modification of the previous algorithm, in which vectors xj are considered as the potential centers #. Peak function Dðxi Þ in this case takes the form [5]:

12

1

Dðxi Þ ¼

N X j¼1

The Cluster Analysis in Big Data Mining

( ) xi  xj 2b exp  ; ðra =2Þ2

ð1:20Þ

where value of coefficient ra defines the sphere of the neighborhood. On value Dðxi Þ considerably influence only vectors xj , which are inside this sphere. At the big density of points near xi function value Dðxi Þ is large. After calculation of values of peak function for each point xi , the vector x is found, for which density measure DðxÞ will appear to be the greatest. This point becomes the first center c1 . Choice of the following center c2 is performed after an exception of the previous center and all points which lie in its vicinity. As well as in the previous case peak function is redefined so ( Dnew ðxi Þ ¼ Dðxi Þ  Dðc1 Þ exp 

kxi  c1 k2b

)

ðrb =2Þ2

At new definition of function D coefficients rb designate new values of a constant which sets the sphere of the neighborhood of the following center. Usually a condition rb  ra is used. After modification of value of peak function a search of a new point x, for which Dnew ðxi Þ ! max is performed It becomes the new center. Process of finding of the next center is resumed after the exception of all already selected points. Initialization comes to an end at the time of fixing of all centers which are provided by entry conditions.

1.5

Gustavson-Kessel’s Fuzzy Cluster Analysis Algorithm

In classical algorithm fuzzy C = means elements of error function E are obtained by means of usual Euclid distance between a vector x and the center of a cluster c with: dðx; cÞ ¼ kx  ck ¼

qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ðx  cÞT ðx  cÞ

At such metrics of distance between two vectors the set of the points equidistant from the center represents a sphere with an identical scale on all axes. But if data form groups which form differs from spherical or if scales of separate coordinates of a vector strongly differ, such metrics becomes inadequate. In this case quality of a clustering can be increased considerably at the expense of the improved version of the self-organization algorithm which is called as Gustavson-Kessel’s algorithm [3, 4]. The main changes of basic algorithm fuzzy C-means consist in introduction to a metrics calculation formula of the scaling matrix A. At such scaling the distance between the center c and vectors x is defined by a formula:

1.5 Gustavson-Kessel’s Fuzzy Cluster Analysis Algorithm

qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi dðx; cÞ ¼ kx  ck ¼ ðx  cÞT Aðx  cÞ

13

ð1:21Þ

As scaling usually the positive-definite matrix is used, that is a matrix, at which all eigenvalues are real and positive. Similar to the basic algorithm C-means the training goal of Gustavson-Kessel algorithm lies in such placement of the centers at which the criterion E is minimized: E¼

XX

ð1:22Þ

j

k

1.5.1

wbkj d 2 ðxk ; cj Þ

Description of Gustavson-Kessel Algorithm

1. To carry out initial placement of the centers in data space. To create an elementary form of the scaling matrix A. 2. To create a matrix of membership coefficients of all vectors x to the centers by a formula: wkj ¼

m P

1 1  b1

i¼1

ð1:23Þ

dkj2 dij2

3. To calculate new placement of the centers according to a formula: PN k¼1

c j ¼ PN

wbkj xk

k¼1

wbkj

;

ð1:24Þ

4. To generate a covariance matrix for each vector: Sj ¼

N X

wbkj ðxk  cj Þðxk  cj ÞT

ð1:25Þ

k¼1

5. To calculate a new scaling matrix for each j-th centre by a formula: Aj ¼

qffiffiffiffiffiffiffiffiffiffiffiffiffiffi n detðSj ÞS1 j :

ð1:26Þ

6. If the last changes of centers and a covariance matrix are rather small in relation to the previous values (don’t exceed the set values), finish iterative process, otherwise go to step 2.

14

1.6 1.6.1

1

The Cluster Analysis in Big Data Mining

Adaptive Robust Clustering Algorithms Possibilistic Clustering Algorithm

Major drawbacks associated with a probabilistic approach (Fuzzy C-means algorithm)are connected with constraints (1.13). In the simplest case of two clusters ðm ¼ 2Þ is easy to see that the observation xk , equally owned by both clusters and observation xp , not belonging to any of them, may have the same levels of membership wðk;1Þ ¼ wðk;2Þ ¼ wðp;1Þ ¼ wðp;2Þ ¼ 0:5. Naturally, this fact decreasing the accuracy of classification, led to a possibilistic approach to the fuzzy classification [5]. In the possibilistic clustering algorithm goal function has the form ! m X N m N X X X b 2 b Eðwk;j ; cj Þ ¼ wk;j d ðxk ; cj Þ þ lj ð1  wk;j Þ ; ð1:27Þ j¼1 k¼1

j¼1

k¼1

where scalar parameter lj [ 0 determines the distance on which membership level takes the value 0.5, that is if d 2 ðxk ; cj Þ ¼ lj , then wk;j ¼ 0:5. Minimization (1.27) by wk;j , cj , lj gives evident solution 0 11 1 !b1 2 d ðx ; c Þ k j A ; wk;j ¼ @1 þ ð1:28Þ lj PN k¼1

c j ¼ PN

wbkj xk

k¼1

PN lj ¼

wbkj

;

wbk;j d 2 ðxk ; cj Þ ; PN b k¼1 wk;j

k¼1

ð1:29Þ

ð1:30Þ

It can be seen that the possibilistic and probabilistic algorithms are very similar and pass one into other by replacing the expression (1.27) to the formula (1.15), and vice versa. A common disadvantage of the considered algorithms is their computational complexity and the inability to work in real time. The algorithm (1.15)– (1.17) begins with the initial task (normal random) partitions matrix W 0 . On the basis of its values initial set of prototypes c0j is calculated which then is used to calculate a new matrix W 1 . Then this procedure is continued and sequence of solutions c1 W 2 ; . . .; W t ; ct W t þ 1 etc. is obtained until the difference W t þ 1  W t j

j

is less than a preassigned threshold e. Therefore, all available data sample is processed repeatedly. The solution obtained using a probabilistic algorithm, is recommended as the initial conditions for possibilistic algorithm (1.28)–(1.30) [5]. Parameter distance lj is initialized in accordance with (1.30) on the results of the probabilistic algorithm.

1.6 Adaptive Robust Clustering Algorithms

1.6.2

15

Recurrent Fuzzy Clustering Algorithms

Analysis of (1.15) shows that, for the calculation of membership levels wk;j instead of the Lagrangian (1.15) can be used its local modification: ! m m X X b 2 Lðwk;j ; cj ; kk Þ ¼ wk;j d ðxk ; cj Þ þ kk wk;j  1 ð1:31Þ j¼1

j¼1

Optimization of the expression (1.31) Arrow-Hurwicz-Uzawa leads to an algorithm

by

the

procedure

of

the

1

wk;j

d 2 ðxk ; ck;j Þb1 ¼P  1 b1 m 2 l¼1 d ðxk ; ck;l Þ

ck þ 1;j ¼ ck;j  gk rcj Lk ðwk;j ; ck;j ; kk Þ ¼ ck;j  gk wbk;j dðxk þ 1 ; ck;j Þrcj

ð1:32Þ

ð1:33Þ

Procedure (1.32), (1.33) is close to the learning algorithm Chang-Lee], and for b ¼ 2 coincides with the gradient procedure clustering Park-Degger [6]: wk;j

xk  ck;j 2 ¼ Pm xk  ck;l 2

ð1:34Þ

l¼1

ck þ 1;j ¼ ck;j  gk w2k;j ðxk þ 1  ck;j Þ

ð1:35Þ

Within the framework of possibilistic approach local criterion takes the form Ek ðwk;j ; cj Þ ¼

m X

wbk;j d 2 ðxk ; cj Þ þ

j¼1

m X

lj ð1  wk;j Þb

ð1:36Þ

j¼1

and the result of its optimization has the form 0 wk;j

d 2 ðxk ; ck;j Þ ¼ @1 þ lj

11 1 !b1 A

ck þ 1;j ¼ ck;j  gk wbk;j dðxk þ 1 ; ck;j Þrcj

ð1:37Þ ð1:38Þ

where the distance parameter lj initialized according to (1.30). In this case, N in Eq. (1.30) is a volume of data set used for initialization. In the quadratic case, the algorithm (1.37), (1.38) is converted into a rather simple procedure and optimization result is of the form

16

1

wk;j ¼

The Cluster Analysis in Big Data Mining

lj 2 lj þ xk  ck;j

ð1:39Þ

wherein lj is the distance parameter initialized by the results of the probabilistic clustering (for example, using an algorithm Fuzzy C-means (1.15)–(1.17) according to the equation: 2 PN 2 k¼1 wk;j xk  cj lj ¼ ; ð1:41Þ PN 2 k¼1 wk;j

1.6.3

Robust Adaptive Algorithms of Probabilistic Fuzzy Clustering

The considered above clustering methods can effectively solve the problem of classification with a substantial intersection of the clusters, however, it assumes that the data within each cluster are located compactly enough without sharp (abnormal) outliers. However, it should be noted that the actual data is usually distorted by outliers, the share of which according to some estimates [7], is up to 20% so that to speak of a compact placement of data is not always correct. In this regard, recently, much attention was paid to problems of fuzzy cluster analysis of the data, the density distribution of which differs from the normal by presence of “heavy tails” [8, 9]. Robust Recursive Algorithm for Probabilistic Fuzzy Clustering After standardization of feature vectors components so that all source vectors would belong to the unit hypercube ½0; 1n , the objective function is constructed Eðwk;j ; cj Þ ¼

m X N X

wbk;j Dðxk ; cj Þ

ð1:42Þ

j¼1 k¼1

under constraints m X

wk;j ¼ 1;

k ¼ 1; . . .; N;

ð1:43Þ

j¼1

0\

N X

wk;j  N;

j ¼ 1; . . .; m:

ð1:44Þ

k¼1

Here Dðxk ; cj Þ is a distance between xk and cj in adopted metric. The result of clustering is assumed to be N  m matrix W ¼ fwk;j g, called “matrix of fuzzy

1.6 Adaptive Robust Clustering Algorithms

17

decomposition.” Typically, as the distance function Dðxk ; cj Þ Minkowski metric Lp is applied Xn   1 xk;i  cj;i p p ; p  1; Dðxk ; cj Þ ¼ ð1:45Þ i¼1 where xk;i ; cj;i are the i-th components of ðn  1Þ—vectors xk ; cj correspondingly. Estimates relating to the quadratic objective functions are optimal when the data belong to the class of distributions with finite variance, the most famous member of which is a Gaussian. Varying parameter p allows to improve the properties of the robustness of clustering procedures, however, the quality of assessment is determined by the type of data distribution. Thus, the estimates with p = 1 are optimal for the Laplacian data distribution, but their construction involves great computational expense. Quite realistic is the class of approximate normal distributions [9]. Approximately normal distributions are mixture of Gaussian density and distribution of some arbitrary density, which distorts with outliers the normal distribution. The optimal objective function in this case is the quadratic-linear, and tends to linear type as the distance from the minimum grows. The most prominent representative of the approximate normal distribution density function is pðxi ; ci Þ ¼ Seðci ; si Þ ¼

1 xi  ci sec h2 ; 2si si

ð1:46Þ

where ci , si are parameters, determining a center and a width of the distribution. This function resembles a Gaussian in the vicinity of the center, however, has a more heavy tails. With the distribution (1.46) is associated an objective function fi ðxi ; ci Þ ¼ bi ln cosh

x i  ci ; bi

ð1:47Þ

where the parameter bi defines steepness of this function, while in the vicinity of the minimum this function is very close to the quadratic, tending with the growth of X to a linear one. Also interesting is the fact that the derivative of this function fi0 ðxi Þ ¼ /ðxi Þ ¼ tanh

xi ; bi

ð1:48Þ

is a standard activation function of artificial neural networks. Using as a metric the following structure DR ðxk ; cj Þ ¼

Xn

f ðx ; c Þ ¼ i¼1 i k;i j;i

n X i¼1

bi ln cosh

xk;i  cj;i ; bi

ð1:49Þ

18

1

The Cluster Analysis in Big Data Mining

is possible to introduce the objective function of robust classification [9] E R ðwk;j ; cj Þ ¼

N X m X

wbk;j D2 ðxk ; cj Þ

k¼1 j¼1

¼

N X m X

wbk;j

k¼1 j¼1

n X i¼1

ð1:50Þ

xk;i  cj;i bi ln cosh bi

and a corresponding Lagrangian L¼

N X m X k¼1 j¼1

wbk;j

n X i¼1

N m X xk;i  cj;i X bi ln cosh þ kk wk;j  1 bi j¼1 k¼1

! ð1:51Þ

where kk —is indefinite Lagrange multiplier, ensuring fulfillment of constraints (1.43), (1.44). The saddle point of the Lagrangian (1.51) can be found by solving the equations system of Kuhn-Tucker 8 @Lðw ;c ;k Þ k;j j k > ¼ 0; < @wk;j @Lðwk;j ;cj ;kk Þ ¼ 0; > @kk : rcj Lðwk;j ; cj ; kk Þ ¼ 0:

ð1:52Þ

Solutions of the first and second equations lead to well-known results 8 1 > DR ðx ;c Þ 1b > < wk;j ¼ Pðm k j Þ 1 ðDR ðxk ;cl ÞÞ1b l¼1

1b > 1 P > m R : kk ¼  1b l¼1 ðbD ðxk ; cl ÞÞ

ð1:53Þ

But the third equation rcj Lðwk;i ; cj ; kk Þ ¼

N X

wbk;j rcj DR ðxk ; cj Þ ¼ 0;

ð1:54Þ

k¼1

evidently has no analytic solution. The solution of Eq. (1.54) can be obtained with the help of local modification of Lagrangian and recurrent fuzzy clustering algorithm. Search of the Lagrangian local saddle point Lk ðwk;j ; cj ; kk Þ ¼

m X j¼1

wbk;j DR ðxk ; cj Þ þ kk

m X

! wk;j  1

j¼1

using procedures Arrow-Hurwitz-Udzawa leads to an algorithm

ð1:55Þ

1.6 Adaptive Robust Clustering Algorithms

8 > < > :

19 1

ðDR ðxk ;cj ÞÞ1b wpr 1 k;j ¼ Pm

ck þ 1;j;i ¼ ck;j;i 

ðDR ðxk ;cl ÞÞ1b l¼1 @Lðwk;j ;cj ;kk Þ gk ¼ ck;j;i þ gk wbk;j @cj;i

ð1:56Þ x c tanh k;i b k;j;i i

where gk is a parameter of learning rate, ck;j;i is the i-th component of the j-th prototype calculated at the k-th step. But despite low computational complexity this algorithm (1.56) has the disadvantage inherent to all probabilistic clustering algorithm.

1.7

Robust Recursive Algorithm of Possibilistic Fuzzy Clustering for Big Data

When the data sample is big (BD) and data enters into system sequentially (e.g. time series) then we may use recursive algorithms of possibilistic fuzzy clustering. For possibilistic fuzzy clustering algorithms the criterion is the following expression E R ðwk;j ; cj ; li Þ ¼

N X m X

wbk;j D2 ðxk ; cj Þ þ

k¼1 j¼1

m X

li

j¼1

N X

ð1  wk;j Þb

ð1:57Þ

k¼1

Minimization of (1.57) by parameters wk;j , cj and li leads to equations system 8 > >
> : R rcj E ðwk;j ; cj ; lj Þ ¼

ð1:58Þ 0:

The solution of the first two equations of (1.58) leads to the well-known result  8 R

1  1 D ðxk ;cj Þ b1 pos > > w ¼ 1 þ < k;j lj PN b R w D ðxk ;cj Þ > > PNk;j b : lj ¼ k¼1 k¼1

ð1:59Þ

wk;j

while the third one rcj E R ðwk;j ; cj ; lj Þ ¼

N X

wbk;j rcj DR ðxk ; cj Þ ¼ 0

k¼1

fully corresponds to (1.54). Introducing the local modification of (1.57)

ð1:60Þ

20

1

EkR ¼

m X

wbk;j DR ðxk ; cj Þ þ

j¼1

¼

m X

m X

The Cluster Analysis in Big Data Mining

lj ð1  wk;j Þb

j¼1

wbk;j

n X

j¼1

i¼1

m xk;i  cj;i X bi ln cosh þ lj ð1  wk;j Þb bi j¼1

ð1:61Þ

and optimizing it we obtain: 8 > < > :c

wpos k;j k þ 1;j;i

¼ ck;j;i 

 R

1 D ðxk ;cj Þ b1 ¼ 1þ l

@E R ðw ;c ;l Þ gk k @ck;jj;i j j

j

¼ ck;j;i þ gk wbk;j tanh

xk ck;j;i bi

ð1:62Þ

where the distance parameter lkj may be determined according to the second equation of the system (1.59) for k observations rather than the entire sample volume N. It should be noted that the last equation of system (1.52) and (1.58) are identical and are determined only by choice of metrics. This makes possible to use any suitable metric for a particular case, which will determine only the setup procedure of prototypes if the equation for calculating the weights still remains the same. Considered robust recursive methods may be used in a batch mode and in the on-line mode as well. In the last case the number of observation k represents a discrete time. Experiments with a repository of data, distorted by abnormal outliers (emissions), have shown high efficiency of the proposed algorithms in the processing of the information given in the form of tables “object-property” [7, 8] and in the form of time series [10]. In particular, the problem of data classification of specially artificially generated sample containing three-dimensional cluster of data was considered, whose observations are marked the symbols “o”, “x” and “+” [9] (see Fig. 1.1). Points in each cluster are distributed according to the density of Laplace distribution having “heavy tails” pðxi Þ ¼ rð1 þ ðxi  cÞ2 Þ1

ð1:63Þ

where r and c are width and center correspondingly. The sample includes 9000 observations (3000 in each cluster) and is divided into training (7200 cases) and testing (1800 cases) subsamples [10, 11]. It should be noted that some observations are very far away from the centers of the clusters (Fig. 1.1a). Prototypes of the clusters are located in the central region of the data as shown in Fig. 1.1b. In order to find the correct prototypes clustering algorithm should be insensitive to outliers. For all of the algorithms involved in the comparison, the procedure of the experiment was performed as follows. At the beginning of training a sample was clustered by appropriate algorithms and prototypes of clusters have been found.

1.7 Robust Recursive Algorithm of Possibilistic Fuzzy Clustering for Big Data

21

Fig. 1.1 Full sample (а) and its central part (b)

Table 1.3 Results of classification. Classification error

Algorithm

Training sample

Testing sample

Fuzzy C-means

17.1% (1229 obs.)

Robust probabilistic Robust possibilistic

15.6% (1127) obs.) 15.2% (1099 obs.)

16.6% (299 obs.) 15.6% (281 obs.) 14.6% (263 obs.)

Then, training and testing samples were classified according to the results of clustering. Observations belonging to each cluster in the classification process are calculated in accordance with Eqs. (1.17), (1.56) or (1.62) depending on the type of clustering algorithm. The cluster, to which the observation belongs with a maximum membership degree, defines the class of this observation. Classification and training is performed in the on-line mode of receiving observations, where b ¼ 2; b1 ¼ b2 ¼ b3 ¼ 1; gðkÞ ¼ 0:01. The results are shown in Table 1.3 [9].

22

1

The Cluster Analysis in Big Data Mining

Fig. 1.2 Prototypes of clusters

In the Fig. 1.2 it can be easily seen that the centers of the clusters (prototypes) produced by the algorithm «fuzzy C-means» by Bezdek, are shifted from the visual centers of the clusters, due to the presence of “heavy tails” of the data distribution density, in contrast to the robust methods with objective function (1.56) and (1.62) in which prototypes are found more precisely, which is confirmed by the less classification error (see Table 1.3). Continuous growth in the successful application of computational intelligence technologies in the areas of data analysis confirms the versatility of this approach. At the same time, real problems that arise in the processing of very large databases (Big Data), complicate the use of existing algorithms and tools and demand to be improved to meet the challenges of data mining in real time using the paradigms of CI and soft computing.

1.8

Application of Fuzzy Clustering Methods in the Problems of Automatic Classification

Example 1.1 Classification of the UN countries These UN Millennium Indicators are presented in the Table 1.4.

1.8 Application of Fuzzy Clustering Methods …

23

Table 1.4 UN Millenium Indicators for world countries

Afghanistan Albania Algeria Angola Argentina Armenia Azerbaijan Bahrain Bangladesh Belize Belarus Butane Benin Bolivia Bosnia Herzegovina Botswana Brazil Bulgaria Burundi Burkina Faso Cambodia Cameroon Verde’s cap It is central the African Republic Fumes Chile China Colombia Congo Costa Rica Côte d’Ivoire Croatia Cuba

Population percent below the poverty line

Percent of children for 5 years with an insufficient weight

Literacy

Gender equality. Percent of women among workers of the non-agricultural sphere

70 25.4 12.2 70 15 53.7 49.6 15 49.8 40 41.9 70 33 62.7 19.5

48 14.3 6 30.5 5.4 2.6 6.8 8.7 47.7 6.2 2 18.7 22.9 7.5 4.1

50 99.4 89.9 71.4 98.6 99.8 99.9 97 49.7 84.2 99.8 80 55.5 97.3 99.6

17.8 40.3 15.5 26.4 47.6 47 48.5 13.4 24.2 44.4 55.9 12 46 36.5 35.8

70 17.4 12.8 70 45.3 36.1 40.2 40 70

12.5 5.7 2 45.1 34.3 45.2 21 13.5 24.3

89.1 96.3 99.7 72.3 19.4 80.3 81.1 89.1 58.5

47 46.7 52.2 13.3 15.2 52.6 20.7 39.1 30.4

64 17 4.6 64 50 22 59 20 60

28.1 0.7 10 6.7 13.9 5.1 21.2 0.6 4.1

37.3 99 98.9 97.2 97.8 98.4 59.8 99.6 99.8

5.5 37.3 39.5 48.8 26.1 39.5 20.2 46.3 37.7 (continued)

24

1

The Cluster Analysis in Big Data Mining

Table 1.4 (continued)

Czech Republic Democratic republic of Congo Djibouti Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Fiji Gabon Gambia Georgia Ghana Guatemala Guinea Guinea-Bissau Guyana Haiti Honduras Hungary India Indonesia Iran Iraq Jamaica Jordan Kazakhstan Laos Kenya

Population percent below the poverty line

Percent of children for 5 years with an insufficient weight

Literacy

Gender equality. Percent of women among workers of the non-agricultural sphere

10

1

99.8

45.8

70

31.1

68.7

25.9

45.1 28.6

18.2 5.3

73.2 94

25 34.9

35 16.7 48.3 50

11.6 8.6 10.3 18.6

96.4 73.2 88.9 92.7

41.1 21.6 31.1 10.5

53 8.9 44.2 40 40 64 11.1 50 56.2 40 48.7 35 45 53 17.3 28.6 27.1 30 35 18.7 11.7 34.6 38.6 52

39.6 1 47.2 7.9 11.9 17 3.1 24.9 22.7 23.2 25 13.6 17.3 16.6 3 47 26.1 10.9 15.9 3.6 4.4 4.2 40 20.2

60.9 99.8 57.4 99.3 59 42.2 99.8 81.8 80.1 50 44.1 80 66.2 88.9 99.5 64.3 98 86.3 41 94.5 99.4 99.8 78.5 95.8

35 51.5 39.9 35.9 37.7 20.9 45.2 56.5 38.7 30.3 10.8 37.4 39.5 50.5 47.1 17.5 30.8 17.2 11.9 48 24.9 48.7 42.1 38.5 (continued)

1.8 Application of Fuzzy Clustering Methods …

25

Table 1.4 (continued)

Democratic People’s Republic of Korea Kuwait Kyrgyzstan Lebanon Lesotho Liberia Libya Madagascar Malawi Malaysia Maldives Mali Mauritania Mexico Mozambique Mongolia Morocco Nepal Nicaragua Niger Nigeria Pakistan Panama Papua New Guinea Paraguay Peru Philippines Poland Moldova Romania Russian Federation

Population percent below the poverty line

Percent of children for 5 years with an insufficient weight

Literacy

Gender equality. Percent of women among workers of the non-agricultural sphere

60

20.8

99.8

40.7

20 64.1 20 50 60 30 71.3 65.3 40 70 63.8 46.3 30 69.4 36.3 19 42 47.9 63 34.1 32.6 37.3 37.5

9.8 11 3 17.9 26.4 4.7 33.1 21.9 12.4 30.4 33.2 31.8 7.5 23.7 12.7 8.9 48.3 9.6 39.6 28.7 38 6.8 7

93.1 99.7 92.1 87.2 70.8 97 70.1 63.2 97.2 99.2 24.2 49.6 96.6 62.8 97.7 69.5 70.1 86.2 25.6 88.6 53.9 96.1 68.6

24.1 44.1 25.9 24.7 23.6 15 24.2 12.5 38 36.1 35.9 37 37.4 11.4 49.4 26.2 11.8 41.1 8.6 34 8.7 44 35.4

21.8 49 36.8 23.8 23.3 21.5 30.9

4.6 7.1 30.6 3 3.2 5.7 3

96.3 96.6 95.1 99.8 98.7 97.8 99.8

42 37.2 41.1 47.7 54.6 45.3 50.1 (continued)

26

1

The Cluster Analysis in Big Data Mining

Table 1.4 (continued)

Rwanda Senegal Sri Lanka Serbia and Montenegro Swaziland Thailand Trinidad and Tobago Turkey Turkmenistan Tunisia Uganda Ukraine United Arab Emirates Tanzania USA Uzbekistan Vietnam Yemen Zambia Zimbabwe

Population percent below the poverty line

Percent of children for 5 years with an insufficient weight

Literacy

Gender equality. Percent of women among workers of the non-agricultural sphere

51.2 33.4 25 30

27.2 22.7 29.4 1.9

76.5 51.5 97 99.8

14.6 25.7 43.2 44.9

40 13.1 21

10.3 18.6 5

88.1 98 99.8

31.3 46.9 41.3

25 30 7.6 44 31.7 20

8.3 12 4 22.8 3 14.4

95.5 99.8 94.3 80.2 99.9 91.4

20.6 20 25.3 35.6 53.6 14.4

35.7 5 27.5 50.9 41.8 72.9 34.9

29.4 1.4 7.9 33.1 45.6 28.1 13

91.6 99.1 99.7 94.1 67.9 81.2 97.6

28.5 48.8 41.5 51.8 6.1 29.4 21.8

In this experiment it was required to perform a clustering of the United Nations countries into 4 clusters by the above indicators. As a result of the clustering algorithm of Gustavson–Kessel application the following results were obtained centers of clusters are presented in Table 1.5. The matrix of belonging coefficients to different clusters (membership functions) are presented in Table 1.6. As can be seen from the table in the first cluster are countries with relatively high rates of all indicators (compared to other countries in the sample). These are the

1.8 Application of Fuzzy Clustering Methods … Table 1.5 The centers of the clusters

28.25 29.85 59.72 40.39

5.96 12.51 26.00 34.25

27 97.86 82.14 65.40 74.51

43.77 23.67 24.48 31.35

countries of CIS, Eastern and western Europe, USA, Canada, the Balkans and Latin America countries. In the second cluster are countries with smaller values of indicators, it’s countries of North Africa and Middle East. In this cluster, is the lowest level of gender equality. In the third cluster are the poorest countries with the lowest levels of literacy, as well as the low level of gender equality. Mainly it’s African countries. In the fourth cluster are poor countries with the most unfavorable conditions for the growth of children. Example 1.2 Classification of the United Nations countries on sustainable development indicators. Investigations of fuzzy clustering method C-means by indicators of sustainable development for the countries of the United Nations were carried out. For this, the data of the World Data Center in Ukraine (WDC) were used. As sustainable development indicators the following indices were taken: • • • •

Index GINI—GINI Ihd—index of health status Iql—standard of living index Isd—index of sustainable development.

As algorithm of initial centers placement the algorithm of differential grouping was applied. Clustering was carried out for a different number of clusters K = 3, 4, 5. Besides the value of optimized criterion the quality of splitting will be evaluated by the indicator of Hi-Beni: v¼

dav ; Dav

where dav is the average intra-cluster distance, Dav —average inter-cluster distance. This indicator should be minimized. Experiment 1. K = 3 (Tables 1.7 and 1.8) Let us analyze the results. The first cluster contains countries with the highest values of all parameters. These are the countries of Western Europe, as well as some other. Namely, Australia, Austria, Belgium, Great Britain, Hungary, Denmark, Iceland, Ireland, Israel, Italy, Cyprus, Latvia, Lithuania, Luxembourg,

28

1

The Cluster Analysis in Big Data Mining

Table 1.6 Membership coefficients to different clusters Afghanistan Albania Algeria Angola Argentina Armenia Azerbaijan Bahrain Bangladesh Belize Belarus Butane Benin Bolivia Bosnia Herzegovina Botswana Brazil Bulgaria Burundi Burkina Faso Cambodia Cameroon Verde’s cap It is central the African Republic Fumes Chile China Colombia Congo Costa Rica Côte d’Ivoire Croatia Cuba Czech Republic Democratic republic of Congo Djibouti Dominican Republic Ecuador

0.055 0.599 0.174 0.045 0.939 0.731 0.757 0.204 0.031 0.251 0.761 0.241 0.057 0.645 0.764 0.530 0.920 0.914 0.178 0.020 0.120 0.115 0.428 0.048 0.021 0.758 0.800 0.703 0.435 0.930 0.013 0.928 0.631 0.919 0.038 0.036 0.642 0.839

0.162 0.114 0.733 0.102 0.024 0.067 0.058 0.687 0.071 0.252 0.056 0.156 0.282 0.087 0.157 0.130 0.033 0.033 0.171 0.249 0.050 0.522 0.197 0.287 0.117 0.158 0.091 0.075 0.275 0.039 0.091 0.032 0.092 0.040 0.108 0.604 0.234 0.053

0.495 0.073 0.031 0.789 0.016 0.116 0.103 0.030 0.187 0.266 0.087 0.479 0.371 0.191 0.029 0.215 0.020 0.025 0.445 0.495 0.163 0.095 0.160 0.471 0.681 0.034 0.040 0.136 0.157 0.012 0.819 0.018 0.183 0.018 0.784 0.203 0.049 0.038

0.288 0.214 0.062 0.064 0.021 0.087 0.082 0.080 0.712 0.231 0.096 0.124 0.290 0.077 0.050 0.124 0.027 0.028 0.206 0.236 0.667 0.268 0.215 0.194 0.180 0.049 0.070 0.086 0.133 0.019 0.077 0.022 0.093 0.022 0.069 0.158 0.074 0.070 (continued)

1.8 Application of Fuzzy Clustering Methods …

29

Table 1.6 (continued) Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Fiji Gabon Gambia Georgia Ghana Guatemala Guinea Guinea-Bissau Guyana Haiti Honduras Hungary India Indonesia Iran Iraq Jamaica Jordan Kazakhstan Laos Kenya Democratic People’s Republic of Korea Kuwait Kyrgyzstan Lebanon Lesotho Liberia Libya Madagascar Malawi Malaysia Maldives Mali

0.065 0.389 0.347 0.035 0.909 0.048 0.716 0.038 0.035 0.934 0.180 0.100 0.020 0.021 0.126 0.040 0.368 0.961 0.087 0.220 0.106 0.034 0.815 0.322 0.920 0.057 0.375 0.293 0.232 0.609 0.240 0.276 0.013 0.302 0.051 0.044 0.725 0.203 0.027

0.791 0.243 0.331 0.076 0.037 0.060 0.130 0.428 0.200 0.032 0.107 0.143 0.401 0.193 0.435 0.353 0.122 0.017 0.070 0.099 0.785 0.306 0.077 0.588 0.024 0.029 0.131 0.128 0.689 0.093 0.656 0.360 0.056 0.489 0.111 0.120 0.100 0.133 0.438

0.068 0.219 0.140 0.246 0.026 0.174 0.067 0.351 0.509 0.015 0.264 0.577 0.397 0.572 0.206 0.366 0.275 0.010 0.098 0.077 0.035 0.464 0.051 0.029 0.025 0.086 0.318 0.451 0.023 0.213 0.040 0.204 0.893 0.069 0.764 0.715 0.069 0.557 0.231

0.076 0.148 0.182 0.642 0.028 0.718 0.087 0.183 0.256 0.020 0.448 0.181 0.182 0.214 0.233 0.241 0.235 0.013 0.745 0.604 0.074 0.196 0.057 0.061 0.031 0.828 0.177 0.127 0.055 0.085 0.063 0.160 0.038 0.141 0.074 0.120 0.106 0.108 0.304 (continued)

30

1

The Cluster Analysis in Big Data Mining

Table 1.6 (continued) Mauritania Mexico Mozambique Mongolia Morocco Nepal Nicaragua Niger Nigeria Pakistan Panama Papua New Guinea Paraguay Peru Philippines Poland Moldova Romania Russian Federation Rwanda Senegal Sri Lanka Serbia and Montenegro Swaziland Thailand Trinidad and Tobago Turkey Turkmenistan Tunisia Uganda Ukraine United Arab Emirates Tanzania USA Uzbekistan Vietnam Yemen Zambia Zimbabwe

0.028 0.900 0.050 0.648 0.055 0.108 0.299 0.020 0.096 0.065 0.930 0.066 0.930 0.748 0.119 0.966 0.873 0.979 0.924 0.138 0.027 0.186 0.921 0.293 0.550 0.931 0.133 0.197 0.369 0.089 0.867 0.255 0.151 0.905 0.889 0.190 0.117 0.147 0.249

0.206 0.054 0.117 0.068 0.757 0.079 0.206 0.170 0.040 0.172 0.023 0.411 0.036 0.081 0.045 0.013 0.038 0.009 0.023 0.315 0.466 0.058 0.031 0.433 0.094 0.035 0.806 0.656 0.537 0.145 0.036 0.584 0.072 0.043 0.046 0.077 0.106 0.125 0.585

0.350 0.017 0.721 0.107 0.101 0.110 0.290 0.533 0.052 0.163 0.021 0.334 0.014 0.100 0.096 0.009 0.041 0.005 0.024 0.240 0.322 0.099 0.021 0.125 0.106 0.013 0.018 0.037 0.035 0.241 0.044 0.039 0.070 0.025 0.023 0.308 0.118 0.659 0.046

0.415 0.029 0.112 0.177 0.086 0.703 0.204 0.276 0.813 0.600 0.025 0.189 0.020 0.070 0.740 0.012 0.048 0.007 0.029 0.308 0.185 0.657 0.027 0.150 0.250 0.021 0.043 0.110 0.059 0.525 0.053 0.122 0.706 0.027 0.042 0.426 0.659 0.069 0.120

1.8 Application of Fuzzy Clustering Methods …

31

Table 1.7 Indicators of the sustainable development 0.58387 0.56706 0.35296 0.65586 0.56994 0.68752 0.60008 0.65282 0.614967 0.498461 0.172206 0.548856 0.13233 0.216163 0.361631 0.380226 0.376477 0.62295 0.243463 0.437748 0.157988 0.271513 0.601288 0.962098 0.744175 0.761651 0.303631 0.294138 0.631237 0.331064 0.553215 0.676386 0.72688 0.619443 0.324594 0.441675 0.702424 0.588835

0.54820 0.48474 0.63011 0.51200 0.81968 0.72971 0.53918 0.21060 0.748405 0.178393 0.433633 0.534668 0.418817 0.518054 0.583907 0.23689 0.201684 0.77159 0.64134 0.463597 0.502915 0.557193 0.61875 0.678039 0.717602 0.747263 0.463597 0.512001 0.399777 0.457576 0.680678 0.101967 0.752941 0.754066 0.141861 0.516541 0.768379 0.73447

0.57383 0.26571 0.76377 0.33448 0.78295 0.80098 0.35928 0.20669 0.817869 0.334484 0.492253 0.492253 0.464936 0.626328 0.699515 0.157964 0.143939 0.72201 0.546863 0.384858 0.546863 0.600368 0.676009 0.600368 0.722017 0.743451 0.464936 0.600368 0.265716 0.437827 0.699515 0.143939 0.699515 0.817869 0.265716 0.411085 0.800988 0.743451

0.57353 0.35047 0.49466 0.47481 0.86663 0.8154 0.40572 0.17571 0.676777 0.208119 0.298884 0.354646 0.347845 0.60656 0.518325 0.204641 0.2182 0.84180 0.731782 0.332749 0.618515 0.724376 0.603607 0.681226 0.702571 0.816827 0.412767 0.403071 0.419674 0.504924 0.689583 0.201635 0.85815 0.794635 0.235642 0.47656 0.806349 0.517882 (continued)

32

1

The Cluster Analysis in Big Data Mining

Table 1.7 (continued) 0.219163 0.167474 0.64978 0.962098 0.536571 0.537406 0.588616 0.486303 0.552527 0.357959 0.759359 0.517332 0.655486 0.31728 0.641912 0.605705 0.558807 0.520474 0.962098 0.32533 0.490073 0.344576 0.248442 0.510835 0.542408 0.451213 0.356033 0.047323 0.324226 0.655107 0.549644 0.239314 0.40908 0.744654 0.619443 0.239162 0.245166 0.312213 0.386772 0.589972

0.316496 0.376757 0.67139 0.75068 0.265352 0.371083 0.778987 0.754066 0.733286 0.5014 0.767299 0.490799 0.540692 0.211616 0.759641 0.36826 0.621604 0.64134 0.73091 0.178393 0.138213 0.585379 0.594174 0.404146 0.402688 0.325741 0.080015 0.379606 0.172261 0.773727 0.79125 0.323085 0.167985 0.820582 0.232537 0.601457 0.429174 0.554201 0.426208 0.657887

0.437827 0.359283 0.763774 0.743451 0.225227 0.359283 0.743451 0.651581 0.782957 0.546863 0.800988 0.359283 0.265716 0.28762 0.743451 0.310566 0.699515 0.676009 0.546863 0.206696 0.28762 0.437827 0.651581 0.437827 0.334484 0.464936 0.206696 0.464936 0.28762 0.782957 0.833616 0.334484 0.157964 0.763774 0.130966 0.573832 0.546863 0.310566 0.310566 0.722017

0.325601 0.269843 0.663.185 0.87829 0.253416 0.268663 0.752281 0.644542 0.668513 0.405747 0.793311 0.445905 0.434827 0.234049 0.610841 0.317857 0.655443 0.6509 0.802207 0.19195 0.23739 0.527639 0.552042 0.336335 0.305619 0.427675 0.241402 0.449997 0.3035 0.775775 0.854503 0.315336 0.181214 0.851428 0.172761 0.600787 0.583011 0.522702 0.340265 0.625403 (continued)

1.8 Application of Fuzzy Clustering Methods …

33

Table 1.7 (continued) 0.501937 0.650353 0.42253 0.486509 0.744335 0.650353 0.166191 0.580784 0.464124 0.757052 0.600644 0.602294 0.520265 0.220891 0.463915 0.452668 0.47499 0.381611 0.716261 0.962098 0.55376 0.452668 0.419463 0.53824 0.397572 0.520474 0.264436 0.264436 GINI 0.63499 0.44656 0.38459 Criterion

0.657887 0.61875 0.548206 0.158067 0.688527 0.70137 0.366851 0.743814 0.456073 0.768379 0.756307 0.343272 0.147865 0.450068 0.573568 0.493827 0.487771 0.16714 0.534668 0.684616 0.72732 0.786202 0.615887 0.395423 0.513515 0.332429 0.145589 0.035073 Ihd 0.724 0.236 0.493 9.8738

0.782957 0.600368 0.310566 0.28762 0.651581 0.763774 0.464936 0.743451 0.359283 0.699515 0.722017 0.189316 0.225227 0.411085 0.464936 0.464936 0.492253 0.244906 0.464936 0.225227 0.800988 0.937406 0.743451 0.225227 0.265716 0.265716 0.310566 0.10799 Iql 0.73749 0.25218 0.45717 Hi-Beni

0.667165 0.547301 0.515363 0.195048 0.687639 0.673112 0.29966 0.724533 0.450402 0.874694 0.851068 0.253371 0.255087 0.400544 0.385968 0.492711 0.455756 0.22529 0.361609 0.51641 0.780447 0.805513 0.687183 0.17794 0.30664 0.317299 0.254877 0.1072 Isd 0.73457 0.24782 0.45412 0.438

34

1

The Cluster Analysis in Big Data Mining

Table 1.8 Degrees of membership to clusters 3 3 3 3 1 1 3 2 1 2 3 3 3 3 3 2 2 1 3 3 3 3 1 1 1 1 3 3 2 3 1 2 1 1 2 3 1 1 3

Albania Algeria Argentina Armenia Australia Austria Azerbaijan Bangladesh Belgium Benin Bolivia Bosnia and Herzegovina Botswana Brazil Bulgaria Cambodia Cameroon Canada Chile China Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dominican Republic Ecuador Egypt El Salvador Estonia Ethiopia Finland France Gambia Georgia Germany Greece Ґватемала

0.40165 0.08839 0.38845 0.17773 0.90018 0.95403 0.13099 0.04774 0.95258 0.017346 0.086566 0.1149 0.090011 0.21422 0.29843 0.015168 0.017754 0.94729 0.34211 0.04406 0.17747 0.33409 0.75759 0.68146 0.94321 0.92516 0.023839 0.08807 0.10324 0.021848 0.91918 0.063802 0.91557 0.95921 0.023284 0.023663 0.94903 0.74098 0.067026

0.10648 0.43869 0.11707 0.27465 0.02894 0.01378 0.24733 0.8121 0.01291 0.91288 0.27213 0.16889 0.27373 0.13172 0.10605 0.92082 0.91106 0.01499 0.1277 0.22574 0.15295 0.12403 0.052825 0.11573 0.016686 0.023355 0.05861 0.10437 0.48662 0.041038 0.018352 0.77286 0.025895 0.011702 0.87702 0.038418 0.015455 0.062566 0.40502

0.49186 0.47292 0.49448 0.54762 0.07086 0.03218 0.62168 0.14015 0.0345 0.069771 0.6413 0.71621 0.63626 0.65406 0.59552 0.064017 0.071185 0.03771 0.53019 0.7302 0.66959 0.54188 0.18958 0.2028 0.0401 0.051486 0.91755 0.80756 0.41014 0.93711 0.062473 0.16334 0.058533 0.029093 0.099697 0.93792 0.03551 0.19646 0.52795 (continued)

1.8 Application of Fuzzy Clustering Methods …

35

Table 1.8 (continued) 3 1 1 2 2 1 1 1 3 1 3 3 2 1 2 1 1 1 2 2 3 3 3 2 3 2 3 2 1 1 2 2 1 2 3 3 3 3 1 1 1

Honduras Hungary Iceland India Indonesia Ireland Israel Italy Jamaica Japan Yordaniya Kazakhstan Kenya Korea, Republic Kyrgyzstan Latvia Lithuania Luxembourg Madagascar Malawi Malaysia Mexico Moldova, Republic Mongolia Morocco Mozambique Namibia Nepal Niderlandi Zealand is new Nicaragua Niger Norway Pakistan Panama Paraguay Peru Philippines Poland Portugal Rumuniya

0.071116 0.95232 0.76693 0.012701 0.050291 0.97523 0.75846 0.93061 0.037423 0.92541 0.070166 0.16399 0.020158 0.91524 0.066312 0.82602 0.76748 0.6903 0.021309 0.014653 0.058977 0.23705 0.064556 0.057925 0.062452 0.029408 0.1218 0.025167 0.97497 0.8935 0.051662 0.017697 0.90361 0.044592 0.21163 0.12109 0.0764 0.043558 0.8745 0.83716 0.57831

0.45306 0.012626 0.084196 0.93374 0.64789 0.006589 0.049725 0.01727 0.05336 0.023439 0.17151 0.33124 0.8778 0.02221 0.62744 0.037702 0.046179 0.11288 0.89052 0.92942 0.05684 0.117 0.31673 0.56437 0.26329 0.86369 0.28352 0.84944 0.007208 0.030837 0.54775 0.91677 0.030465 0.82182 0.11324 0.13045 0.13887 0.41156 0.028966 0.037676 0.094633

0.47582 0.03505 0.14888 0.053564 0.30182 0.018182 0.19181 0.052117 0.90922 0.051152 0.75832 0.50477 0.10204 0.062547 0.30625 0.13627 0.18634 0.19682 0.088166 0.055931 0.88418 0.64595 0.61872 0.3777 0.67426 0.1069 0.59468 0.12539 0.017824 0.075666 0.40058 0.065531 0.065925 0.13359 0.67513 0.74846 0.78473 0.54488 0.096534 0.12517 0.32706 (continued)

36

1

The Cluster Analysis in Big Data Mining

Table 1.8 (continued) 3 2 1 1 3 1 3 1 1 2 2 3 3 3 3 2 3 1 1 1 1 2 3 2 2 2 Number

Russian Federation Senegal Slovakia Slovenia South Africa Spain Sri Lanka Sweden Switzerland Tajikistan Tanzania, Republic Thailand Trinidad і Tobago Tunisia Turkey Uganda Ukraine United Arab Emirates Great Britain USA Uruguay Uzbekistan Venezuela, Bolivar Republic Vietnam Zambia Zimbabwe of a cluster

0.076257 0.013131 0.89028 0.97281 0.08185 0.98221 0.043578 0.89026 0.93911 0.045867 0.015506 0.055589 0.059986 0.026507 0.039097 0.01028 0.23303 0.36305 0.94643 0.79335 0.666 0.043994 0.06372 0.028441 0.03963 0.061394 1

0.13511 0.93672 0.031444 0.007269 0.34815 0.004552 0.13993 0.034693 0.017102 0.78327 0.92838 0.17785 0.083263 0.033837 0.051998 0.94557 0.27103 0.28152 0.014397 0.060098 0.069556 0.77022 0.38883 0.81113 0.78231 0.75431 2

0.78863 0.050145 0.078275 0.019919 0.57 0.013235 0.8165 0.075048 0.043793 0.17087 0.056119 0.76656 0.85675 0.93966 0.90891 0.044149 0.49594 0.35543 0.039177 0.14655 0.26445 0.18578 0.54745 0.16043 0.17806 0.18429 3

Netherlands, New Zealand, Norway, Poland, Portugal. USA, Slovakia, Slovenia, Croatia, Czech Republic, Sweden, Switzerland, Uruguay. The second cluster contains countries with an average value of the index GINI, and minimum values of all other indicators. These are the countries of Africa and South-East Asia. These include: Bangladesh, Egypt, Zambia, Zimbabwe, India, Indonesia, Cambodia, Cameroon, Kyrgyzstan, Nicaragua, Niger, Pakistan, Uganda, Senegal, Tajikistan, Tanzania, and others. The third cluster contains countries with average values of all the indicators and the small value of the index GINI. It includes the CIS countries, Latin America and some of the most developed countries of Asia and Africa. Namely, Armenia,

1.8 Application of Fuzzy Clustering Methods …

37

Albania, Algeria, Argentina, Brazil, Bolivia, Bulgaria, Bosnia and Herzegovina, Venezuela, Honduras, Guatemala, Georgia, Jordan, Kazakhstan, China, Costa Rica, Colombia, Mexico, Moldova, Peru, Paraguay, Russian Federation, Trinidad and Tobago, Tunisia, Turkey, Ukraine, Chile, South Africa, Jamaica. Experiment 2. K = 4 (Table 1.9) It is interesting to analyse dynamics of changes of clusters after transition from K = 3 to K = 4. The countries with the greatest values of all indicators fall to the first cluster. The structure of this cluster practically didn’t change. In the second cluster there are countries with the minimum value of an index GINI and average values of all other indicators. Here are the countries of Latin America: Argentina, Brazil, Panama, Paraguay, Peru, Uruguay, etc. The countries with the minimum values of all indicators except GINI index fall to the third cluster. Here the countries from the second cluster of the previous clustering at K = 3 fall. Namely, Bangladesh, Benin, Zambia, Zimbabwe, India, Cambodia, Cameroon, Kenya, Mozambique, Nepal, Pakistan, Senegal, Tadzhikistan, Tanzania, Uzbekistan. The countries with average values of all indicators fall to the fourth cluster. Here the countries from the third cluster of the previous clustering fall, namely: Venezuela, Vietnam, Ukraine, the Russian Federation, Azerbaijan, Georgia, Indonesia, Jordan, Kyrgyzstan, Sri Lanka. Value of an indicator of Chi- Beni decreased from 0.438 to 0.39492. Experiment 3. К = 5 For this experiment we present only the average data for cluster centers (see below) Centers of clusters 0.52645 0.56042 0.41643 0.68519 0.27997 Criterion 1

0.45648 0.67078 0.18501 0.75586 0.47653 9.0011

0.35255 0.70818 0.23361 0.75276 0.48824 Hi Beni

0.37995 0.64717 0.22605 0.80007 0.45777 0.38816

Consider the dependence of the index Hi-Beni on the number of clusters K (Fig. 1.3) As the chart above shows, the value of Hi-Beni index significantly decreases when K = 2–4, then its value is changing slightly. Therefore, the optimal number of clusters lies in vicinity of K = 4. Determination the Number of Clusters in Cluster Analysis The main drawback of the most of clustering methods, including FCM and Gustavson-Kessel methods is that for their application the number of clusters

38

1

The Cluster Analysis in Big Data Mining

Table 1.9 Degrees of membership of the countries to clusters 4

Albania

0.28424

0.3116

0.072582

0.33157

4 2 4 1 1 4 3 1 3 2 4 2 2 2 3 3 1 2 4 2 2 1 1 1 1 2 2 4 2 1 3 1 1 3 4 1 1 2

Algeria Argentina Armenia Australia Austria Azerbaijan Bangladesh Belgium Benin Bolivia Bosnia and Herzegovina Botswana Brazil Bulgaria Cambodia Cameroon Canada Chile China Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dominican Republic Ecuador Egypt El Salvador Estonia Ethiopia Finland France Gambia Georgia Germany Greece Guatemala

0.027483 0.22755 0.070525 0.86029 0.94636 0.033017 0.042206 0.92169 0.017031 0.061197 0.057183 0.060793 0.068824 0.14689 0.009822 0.009908 0.92961 0.18624 0.019842 0.066882 0.16698 0.61489 0.57037 0.91329 0.90361 0.032441 0.040697 0.04537 0.03225 0.8311 0.050831 0.88749 0.94945 0.011694 0.038094 0.94112 0.60917 0.052387

0.071321 0.53851 0.11933 0.070031 0.0251 0.073697 0.084422 0.039019 0.046297 0.50498 0.1661 0.52973 0.80042 0.65894 0.028878 0.028354 0.034214 0.58983 0.10456 0.7671 0.6328 0.18965 0.14719 0.037491 0.042127 0.67082 0.79243 0.097315 0.70707 0.091463 0.094557 0.050062 0.024991 0.037745 0.26718 0.027184 0.19229 0.36066

0.10306 0.067084 0.091308 0.022093 0.008865 0.051201 0.63857 0.011551 0.82568 0.18867 0.071758 0.18418 0.041411 0.051013 0.90035 0.90497 0.010931 0.067466 0.078945 0.056491 0.060572 0.045698 0.085695 0.013955 0.016682 0.072181 0.045605 0.16448 0.054953 0.020293 0.63814 0.019109 0.007902 0.88941 0.053444 0.009862 0.051299 0.31644

0.79814 0.16686 0.71884 0.047588 0.019672 0.84209 0.2348 0.027739 0.111 0.24515 0.70496 0.22529 0.089343 0.14315 0.060951 0.056772 0.025244 0.15646 0.79666 0.10953 0.13965 0.14976 0.19675 0.03526 0.037581 0.22456 0.12127 0.69284 0.20573 0.057147 0.21647 0.043343 0.017653 0.061153 0.64128 0.021834 0.14724 0.27051 (continued)

1.8 Application of Fuzzy Clustering Methods …

39

Table 1.9 (continued) 4

Albania

0.28424

0.3116

0.072582

0.33157

3 1 1 3 4 1 1 1 2 1 4 4 3 1 4 1 1 1 3 3 2 2 4 4 4 3 2 3 1 1 3 3 1 3 2 2 2 4

Honduras Hungary Iceland India Indonesia Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Korea, Republic Kyrgyzstan Latvia Lithuania Luxembourg Madagascar Malawi Malaysia Mexico Moldova, Republic Mongolia Morocco Mozambique Namibia Nepal Netherlands New Zealand Nicaragua Niger Norway Pakistan Panama Paraguay Peru Philippines

0.054833 0.90577 0.68922 0.019765 0.030765 0.96099 0.61194 0.86916 0.038649 0.90616 0.009514 0.069722 0.013179 0.85087 0.03518 0.69365 0.61283 0.58655 0.010267 0.011209 0.049112 0.079655 0.024628 0.022514 0.048106 0.014971 0.075055 0.017185 0.9755 0.84821 0.042242 0.008523 0.87596 0.039064 0.067097 0.039361 0.065334 0.029716

0.31568 0.04526 0.12112 0.051379 0.093396 0.019763 0.22343 0.06992 0.71492 0.041501 0.034653 0.12096 0.047963 0.070721 0.085876 0.16621 0.2234 0.1471 0.031539 0.029699 0.71574 0.78924 0.095535 0.068667 0.2518 0.041838 0.54377 0.062621 0.011725 0.07761 0.23973 0.022791 0.055127 0.080179 0.81058 0.83131 0.46554 0.15589

0.35575 0.013551 0.063855 0.75142 0.26095 0.005589 0.041591 0.017282 0.050335 0.016386 0.018891 0.11663 0.85807 0.021213 0.22919 0.035339 0.040208 0.084004 0.90351 0.89214 0.043663 0.03832 0.092677 0.14794 0.17008 0.87376 0.17888 0.81948 0.003857 0.023867 0.4443 0.92278 0.021828 0.66428 0.034832 0.041076 0.10782 0.21217

0.27374 0.035419 0.12581 0.17743 0.61489 0.013659 0.12304 0.043638 0.19609 0.035957 0.93694 0.69268 0.080792 0.057195 0.64975 0.1048 0.12357 0.18234 0.054684 0.066953 0.19148 0.092786 0.78716 0.76088 0.53001 0.069428 0.20229 0.10071 0.008913 0.050316 0.27372 0.045911 0.047085 0.21648 0.087487 0.088257 0.3613 0.60223 (continued)

40

1

The Cluster Analysis in Big Data Mining

Table 1.9 (continued) 4

Albania

1 Poland 1 Portugal 1 Romania 4 Russian Federation 3 Senegal 1 Slovakia 1 Slovenia 2 South Africa 1 Spain 4 Sri Lanka 1 Sweden 1 Switzerland 3 Tajikistan 3 Tanzania 2 Thailand 4 Trinidad and Tobago 4 Tunisia 4 Turkey 3 Uganda 4 Ukraine 4 United Arab Emirates 1 Great Britain 1 USA 1 Uruguay 3 Uzbekistan 4 Venezuela 4 Vietnam 3 Zambia 3 Zimbabwe Number of a cluster Centers of clusters 0.64429 0.29515 0.419 0.51726 Criterion 1

0.73332 0.51657 0.19409 0.46924 9.4268

0.28424

0.3116

0.072582

0.33157

0.76646 0.71572 0.42991 0.058523 0.00987 0.82228 0.94376 0.060062 0.96064 0.015491 0.85291 0.91403 0.040625 0.013224 0.045151 0.052559 0.049968 0.050238 0.002341 0.11937 0.25172 0.91502 0.69788 0.48376 0.038792 0.039499 0.027619 0.026225 0.040152 1

0.12003 0.16448 0.22585 0.27694 0.026109 0.073597 0.027013 0.42837 0.020311 0.078825 0.064036 0.042608 0.091683 0.032817 0.57189 0.26387 0.38186 0.3103 0.00716 0.15783 0.18882 0.044743 0.16177 0.33651 0.098392 0.16547 0.082803 0.093996 0.099806 2

0.028969 0.033888 0.068687 0.090317 0.90456 0.027661 0.008162 0.25723 0.005394 0.040186 0.025878 0.013135 0.48922 0.87388 0.13572 0.06346 0.056285 0.058481 0.97664 0.11911 0.17458 0.012211 0.047239 0.051159 0.4853 0.19342 0.4324 0.75376 0.71609 3

0.084542 0.085911 0.27555 0.57422 0.059459 0.076458 0.02106 0.25433 0.013656 0.8655 0.057175 0.03023 0.37848 0.080083 0.24724 0.62011 0.51189 0.58098 0.013863 0.60369 0.38488 0.028022 0.093105 0.12857 0.37751 0.6016 0.45718 0.12602 0.14395 4

0.74677 0.53844 0.23834 0.3707 Hi-Beni

0.74678 0.51317 0.22998 0.39482 0.39492

1.8 Application of Fuzzy Clustering Methods …

41

Fig. 1.3 The dependence of the index Hi-Beni on the number of clusters K

should be given a priori. But usually it’s unknown for experts and the criteria of clustering quality such as Hi-Beni indicator and Dunn’s Index (DI) are monotonously decrease with number of clusters K. Therefore they can’t be used directly for determining optimal value of Kopt. For determining the proper number of clusters in practice may be used the following 2 P PN b approach. Assume the criterion of clustering be E ¼ m j¼1 k¼1 wkj cj  xk Solve the clustering problem with criterion E with different k and find E*(k). When the following condition DE(k)  έ or DE(K)/E(K)  d, holds where d and έ are accepted thresholds then stop. Usually value d may be chosen as follows d 2 [0.1–0.2].

1.9

Conclusions

Cluster analysis includes a set of different classification algorithms. In general, whenever it is necessary to classify the “mountains” of information to suitable for further processing groups, cluster analysis is very useful and effective. Cluster analysis is needed for the classification of information, it can be used in a certain way to structure the variables and to find out which variables should be combined in the first place, and which should be considered separately. A great advantage of the cluster analysis is that it allows to split the objects not only by one parameter but by a set of attributes as well. In addition, cluster analysis unlike most mathematical and statistical methods do not impose any restrictions on the form of these objects, and allows to treat a variety of raw data of almost arbitrary nature. This is important, for example, in the situation when indicators are diverse views, and it’s impossible to use traditional econometric approaches.

42

1

The Cluster Analysis in Big Data Mining

As any other method, cluster analysis has certain disadvantages and limitations: in particular, the content and the number of clusters depend on the criteria selected for partition. For the reduction of the original data set to a more compact form there may be some distortion, and characteristics of individual objects may be lost by replacing them with the characteristics of parameters of the cluster center. The main disadvantage of the considered methods of fuzzy clustering C-means and Gustavson-Kessel is that they can only be used when the number of clusters K is known. But usually, the number of clusters is unknown, and visual observations in the multidimensional case simply don’t lead to a success.

References 1. B. Durant, G. Smith, Cluster Analysis (Statistica, Moscow, 1987), 289 pp. (in Russian) 2. V. Dyuk, A. Samoilenko, Data Mining (Peter Publication, Saint-Petersburg, 2001), 366 pp. (in Russian) 3. Yu.P. Zaychenko, Fundamentals of Intellectual Systems Design (Kiev-Publishing house “Slovo”, 2004), 352 pp. (in Russian) 4. Yu.P. Zaychenko, Fuzzy Models and Methods in Intellectual Systems (Kiev-Publishing House “Slovo”, 2008), 354 pp. 5. R.R. Yager, D.P. Filev, Approximate clustering via the mountain method. IEEE Trans. Syst. Man Cybern 24, 1279–1284 (1994) 6. R. Krishnapuram, J. Keller, Fuzzy and possibilistic clustering methods for computer vision. IEEE Trans. Fuzzy Syst. 1, 98–110 (1993) 7. D.C. Park, I. Dagher, Gradient based fuzzy C-means (GBFCM) algorithm, in Proceedings of the IEEE International Conference On Neural Networks (1984), pp. 1626–1631 8. Ye. Bodyanskiy, Ye. Gorshkov, I. Kokshenev, V. Kolodyazhniy, Robust recursive fuzzy clustering algorithms, in Proceedings of the East West Fuzzy Colloquium 2005 (HS, Zittau/ Goerlitz, 2005), pp. 301–308 9. Ye. Bodyanskiy, Ye. Gorshkov, I. Kokshenev, V. Kolodyazhniy, Outlier resistant recursive fuzzy clustering algorithm, in Computational Intelligence: Theory and Applications, ed. by B. Reusch. Advances in Soft Computing, vol. 38 (Springer, Berlin, Heidelberg, 2006), pp. 647– 652 10. Ye. Bodyanskiy, Computational Intelligence Techniques for Data Analysis. Lecture Notes in Informatics, V. P-72 (GI, Bonn, 2005), pp. 15–36 11. Ye. Bodyanskiy, Ye. Gorshkov, I. Kokshenev, V. Kolodyazhniy, O. Shilo, Robust recursive fuzzy clustering-based segmentation of biomedical time series, in Proceedings of the 2006 International Symposium on Evolving Fuzzy Systems, Lancaster, UK (2006), pp. 101–105

Chapter 2

Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks in Big Data Analysis

2.1

Introduction

One of the modern and efficient tools for big data analytics are deep networks [1–4]. At present time theory and practice of machine learning live over real “deep revolution” inspired by successful application of deep learning networks which represent the third generation of neural networks. In difference from classic neuron networks (second generation) 80–90 years of 20-th century new training paradigms allowed to get rid of some problems which hindered successful application of traditional neural networks. Neural networks trained with deep learning algorithms not only overcame by accuracy best alternative approaches but in some cases displayed understanding of sense of input information (in image recognition, text analysis and other problems). The most successful industrial systems of computer vision and speech recognition are built on deep networks and giants of IT-industry such as Apple, Google, Facebook created large research teams dealing with deep learning. Term “deep network” means big neural network with many hidden layers of neurons [1, 2]. Deep learning represents a set of methods and techniques for training complex neural networks (NN) with many layers. For such networks traditional machine learning algorithms developed for conventional NN had become inadequate due to some drawbacks in particular problem of decay and explosion of gradient in back propagation algorithm [3, 4]. Therefore large dimensions of modern neural networks with applications for 3-D images recognition and automatic speech recognition demanded development of new efficient training methods called deep learning. But the most serious drawback of deep learning networks is a problem of determination of its proper structure, how to choose adequate number of their layers. To the present time the problem of choice of number of DN layers is based on knowledge and experience of an expert and refers to the art. The adequate solution to this problem is connected with new class of hybrid neural networks—so-called © Springer Nature Switzerland AG 2020 M. Z. Zgurovsky and Y. P. Zaychenko, Big Data: Conceptual Analysis and Applications, Studies in Big Data 58, https://doi.org/10.1007/978-3-030-14298-8_2

43

44

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

GMDH-neo-fuzzy networks representing a combination of self-organization method GMDH and fuzzy neural networks. Due to principle of self-organization and small number of tuning parameters GMDH enables to simplify and accelerate the training of DN. In this chapter in the Sects. 2.8–2.10 several variants of this class hybrid networks are considered and algorithms of their structure synthesis based on GMDH are suggested and analyzed. Training algorithms for hybrid deep networks are free from problem of gradient vanishing or explosion and besides the application of GMDH enables to reduce dimensionality of training DN and accelerate the convergence of training DN and by this solve some problems of BD.

2.2

Autoassociators. Autoencoders

Implementation of deep learning has led to development of the special learning structure based on application of so-called autoassociators [3]. The main task of autoassociator is to obtain at the output the most accurate mapping of the input vector (pattern). The first autoassociator (AA) was neo-cognitron suggested by Fukushima. Its schema is presented in Fig. 2.1. There are exist two types of AA: generating and synthesizing ones. As the first type are used restricted Boltzmann Machine, (RBM), as the second type—autoencoders (AE) are used.

Fig. 2.1 Neo-cognitron of Fukushima

2.2 Autoassociators. Autoencoders

45

Autoencoder One of the first deep learning algorithms is auto-encoder. It’s an algorithm of non-supervised learning whose output vector equals to input vector [5]. One of the most spread auto-encoder architectures is feedforward neural network containing input, hidden and output layers. Unlike perceptron output autoencoder layer has the same number of neurons as the input layer. The data at the input layer are compressed and restored so the hidden features are retrieved. The goal of autoencoder is to attain that NN output to be maximal close to input vector. That to make non-trivial solution of this problem the special constraints are set on network topology: (1) the number neurons of hidden layer should be less than the number of input neurons; (2) the number of non-active neurons in hidden layer should significantly exceed the number of active neurons. The first constraint enable to compress data while transfer input signal to network output. Such compression is possible if there are hidden interconnections in data, correlation among features. The second constraint—demand of great number of non-active neurons allows to obtain non-trivial results even when the number of neurons in hidden layer excesses the dimensionality of input data/ In other words the goal of autoencoder is to obtain the most significant features. Let consider a neuron be active if its activation is close to one, and non-active its activation is close to zero. These constraints force autoencoder to search correlations and generalization in input data and perform its compression. By this the network automatically learns to extract in input data general features which are encoded in network weights. Its necessary that mean value of transfer function of each hidden neuron to get the value maximal close to a given sparsity parameter about s = 0.05 for this in each neuron of hidden layer was introduced sparsity parameter p: ^J ¼ q

m h  i 1X ð2Þ aj xðiÞ : m i¼1

ð2:1Þ

It’s necessary that mean value of transfer function of each hidden neuron takes most close value to p: ^J ¼ p: q

ð2:2Þ

Introduce a penalty function: S¼

S2 X j¼1

KLðqj^ qJ Þ;

ð2:3Þ

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

46

where KLðqj^ qJ Þ ¼ p log

q 1q þ ð1  qÞ log ^J ^J 1q q

ð2:4Þ

Remarkable property of the penalty function is its derivative: @KLðqj^ qJ Þ q 1q ¼ þ ^J ^J @qj 1q q

ð2:5Þ

The example of encoder is presented in Fig. 2.2. Autoencoder tends to build function h(x) = x. In other words it tends to find such approximation of this function that the neural network output be equal to input vector. That to make the solution of this problem non-trivial the number of hidden layer neurons should be less than the dimensionality of input data (see Fig. 2.2). This allow to obtain data compressing by transfer of input signal to output. For example, if input vector presents a set of brightness levels of an image 10  10 pixels (all in all 100 features), the number of hidden later neurons is 50, the network is forced to learn to compress an image. Really, the demand h(x) = x means that on the base of activation levels of 50 neurons the output layer should restore 100 pixels of initial image. Such compression is possible if there is hidden interconnections, correlation in features, and in general a certain structure in data. In this way functions of autoencoder very resembles Principal Components Algorithm (PCA) in the sense of cutting dimensionality of input data. Fig. 2.2 Architecture of autoencoder

2.2 Autoassociators. Autoencoders

47

Fig. 2.3 Structure of denoising autoencoder

Later as sparsity idea has been stated so-called the sparse Autoencoder appeared and got wide application [5, 6]. Sparse autoencoder is an autoencoder with number of hidden neurons much greater than the dimensionality of input vector. Sparse activation means that the number of non-active neurons in the hidden layer exceeds significantly the number of active ones. If describe sparsity informal then a neuron is considered active if its transfer function is about 1. If the sigmoidal transfer function is used then for non-active neuron its value should be close to 0 (for tanh—close to −1). There is a variant of autoencoder called denoising autoencoder [5]. It’s the same autoencoder but its training is specific. While training randomly distorted data (several input values are changed to 0) is fed into input. By this for comparison with output are shown non-distorted values. In this way autoencoder is compelled to restore distorted input data (Fig. 2.3). Artificial feed-forward neural networks (ANN) with large number of layers are badly trained by conventional methods which are good for ANN with small number of hidden layers due to the problem of decaying gradient [4], the farther is layer from output the less are the values of gradient norm. This problem may be solved by correctly chosen initial weights. In this case it doesn’t need to change them significantly during the training process.

2.3 2.3.1

Boltzmann Machines (BM) Energetic Models

Boltzmann machines represent a special form of log-linear Markov’s field (MRF), i.e. its energy function is linear by parameters. Therefore let’s consider first energy-based models (EBM). EBM connect scalar energy with each configuration of variables. The training corresponds to modification of energy function so that its form obtain the desired properties. For example, we would like that the desired configurations have low energy. Probabilistic models energy-based determine the probability distribution so:

48

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

pðxÞ ¼

eEðxÞ z

ð2:6Þ

Normalizing multiplier Z is called statistical sum by analogy with physical systems X Z¼ eEðxÞ ð2:7Þ x

Energy-based model may be explored by using stochastic gradient descent at the empirical negative-logarithmic probability function of data. As for logistic regression we first determine logarithmic-likelihood function and then loss function as negative logarithmic-likelihood function. lðh; DÞ ¼

1X log pðxðiÞ Þ N ðiÞ

ð2:8Þ

x

lðh; DÞ ¼ Lðh; DÞ

2.3.2

Restricted Boltzmann Machine (RBM)

The history of developing RBM begun from recurrent neural (RNN). Representing the networks with backfeed which are difficult to train. Therefore scientists started to invent more restricted recurrent models for which more simple training algorithms may be applied. One of such models was Hopfield network, Hopfield introduced also energy concept after comparing neurodynamics with thermodynamics. The next step was usual Boltzmann machines which differ from Hopfield network by stochastic nature and its neurons are divided into two groups: which describe hidden and visible states. The restricted Boltzmann machines differs from usual one that there are no connections among neurons of the same layer (similar to hidden Markov models). In Fig. 2.4 the structure of RBM is presented. The property of this model is that at given state of one group of neurons the states of another group of neurons would be independent each of other. Now consider some theoretical results wherein this property plays a key role. RBM interpretation. RBM are interpreted like hidden Markov models. They have a layer of states which we can observe (visible neurons) and a layer of states Fig. 2.4 RBM structure

2.3 Boltzmann Machines (BM)

49

which are hidden and we can’t see them (hidden neuron). But we can make probabilistic inference concerning hidden states basing on visible ones. After training such model we also get opportunity to make conclusions about visible states knowing hidden ones (using Bayes theorem) and by this generate data from that probabilistic distribution on which model was trained. Therefore we can formulate RBM training goal: it’s necessary to tune model parameters so that restored vector would be maximal close to original. By restored vector we imply vector obtained by probabilistic inference from visible states. RBM Algorithm Often we are not interested to observe completely the instance X or we want to introduce some not-observed variables that to increase the model descriptive force. So let consider visible part of model (denote by X) and invisible part denoted as h. Then we can write: PðxÞ ¼

X

Pðx; hÞ ¼

h

X eEðx;hÞ Z

h

:

ð2:9Þ

Energy function E(v, h) of restricted Boltzmann machine is presented so: Eðv; hÞ ¼ b0 v  c0 h  h0 Wv

ð2:10Þ

where W are weights connecting visible and non-visible neurons, b, c—are biases of visible and hidden layers correspondingly. This is transferred directly to the following formula for free energy: F ðvÞ ¼ b0 v 

X

log

i

X

ehi ðci þ Wi vÞ :

ð2:11Þ

hi

Owing to specific RBM structure visible and non-visible are conditionally dependent each of other. Using this property we can write down: pðhjvÞ ¼

Y

pðhi jvÞ

i

pðvjhÞ ¼

Y

pðvj jhÞ:

ð2:12Þ

j

The network consists of stochastic neurons taking 0 or 1 (where vj and hi 2 f0; 1g). From formulas (2.10) and (2.11) obtain the probabilistic variant of usual neuron activation pðh ¼ 1jv; W; bh Þ ¼ rðW  v þ bh Þ;

ð2:13Þ

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

50

where v—is neuron input, W is weight vector (matrix 0, bh -bias, r(x)—sigmoidal function. This is basic variant for binary inputs (Bernoulli-Bernoulli RBM), there are also modifications for real inputs (Gaussian-Bernoulli RBM и дp.). Algorithm of RBM runs as follows. 1. Set initial values for input variables v: = x 2. Compute probabilities ph of change neuron states of the second layer (non-visible) ph ¼ rðv  W þ bv Þ; where W—weight matrix, bv —is bias vector of the first layer, r—activation function (sigmoid). Store the old values of input neurons v′: = v. 3. Determine the states of the second layer neurons h, assign to neurons states 0 or 1 with probability ph 4. Compute the probabilities pv of change states of the first layer neurons   pv := r h  W T þ bh ; where bh —bias vector of the second layer, r—activation function (sigmoid), and assign neurons states 1 with probabilities pv (or 0 with probabilities 1 − pv) 5. If v 6¼ v′ then repeat from step 2. Otherwise go to the next step. 6. Release result v. 7. End.

2.4

Training Method Contrastive Divergence (CD)

RBM training algorithm is called contrastive divergence and represent itself the modified gradient descent. As the estimation function to be optimized likelihood function L is used. Let search its maximum. Likelihood Function L for parameters ðW; bv ; bh Þ and pattern v is determined under given values of parameters W, h as 1 pðv; hÞ ¼ eEðv;hÞ z LðhjvÞ ¼ pðvjhÞ LðW; bv ; bh jvÞ ¼ pðvjW; bv ; bh Þ For simplicity of computations we’ll use logarithm:

ð2:14Þ

2.4 Training Method Contrastive Divergence (CD)

ln LðhjvÞ ¼ ln pðhjvÞ ¼ ln  ln

X

51

X 1X expðE ðv; hÞÞ ¼ ln expðEðv; hÞÞ z h h

expðE ðv; hÞÞ

ð2:15Þ

v;h

Under great number of visible and hidden neurons numerical methods like gradient ascend are usually applied for finding maximum this function logarithmic likelihood. Maximization of likelihood function is equivalent to minimization of weights as the weights arte linearly connected with energy function E (see (2.16)) E ðv; hÞ ¼ ðbv  v þ bh  h þ v  h  W Þ

ð2:16Þ

As it follows from (2.16) minimization of weights leads to minimization of energy function E. At each iteration of gradient ascend algorithm parameters are adjusted in dependence of likelihood function whose derivatives are presented below: X @ ln LðhjvÞ @ ¼ ln eEðv;hÞ @h @h h

!

X @ ln eEðv;hÞ  @h v;h

!

X X 1 @E ðv; hÞ 1 @E ðv; hÞ þ P Eðv;hÞ eEðv;hÞ eEðv;hÞ E ð v;h Þ @h @h e e h h;v h h;v X X @E ðv; hÞ @E ðv; hÞ þ : pðhjvÞ pðh; vÞ ¼ @h @h h h;v ¼ P

ð2:17Þ

Gradient of this function may be divided on three parts as follows: 8 @lnLðW; bv ; bh jvÞ > > ¼ rW ¼ ðv  hÞdata ðv  hÞmodel > > @W > > > < @lnLðW; b ; b jvÞ v h ¼ rbv ¼ ðvÞdata  ðvÞmodel > @b v > > > > > > : @lnLðW; bv ; bh jvÞ ¼ rbh ¼ ðhÞ data  ðhÞmodel @bh

ð2:18Þ

where () data—is values of layer states at the initial state of RBM, () model—is mathematical expectation of layer states. Mathematical expectation of neuron states are calculated by so-called sampling i.e. () model is layer state after some iterations (at practice for algorithm work it’s enough one step of sampling (one iteration). The weights are changed as follows 8 < W := e  ðrW þ l  DW Þ b := e  ðrbv þ l  Dbv Þ ; : v bh := e  ðrbh þ l  Dbh Þ

ð2:19Þ

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

52

where l is so-called moment parameter, e is training speed, DW; Dbv Dbh —are parameters change at the previous iteration. As stop criterion we’ll use MSE between input and output of BRM—Eðv0 ; vk Þ, this value should decrease to the established threshold Emin. Training algorithm consists of the following steps: 1. 2. 3. 4. 5. 6. 7. 8.

Initialize (by zeros) weight matrix W and bias vectors bv ; b;h Choose random mini-batch out of all training set (mini-batch) X; For all the examples in mini-batch assign initial values to first layer v: = x. Execute k cycles in network, determine initial and final states of layers cлoёв v0 ,h0 , vk , hk , (гдe k—пapaмeтp) Compute gradient according to (2.18) and adjust weights by (2.18). Calculate network MSE E; if E < Emin then go to 8, otherwise go to 2; end.

2.4.1

Training Algorithm Contrastive Divergence (CD-k)

This algorithm was developed by professor Hinton in 2002, and it differs by simplicity. The main idea lies in that the mathematical expectation are replaced by certain values The concept of sampling is introduced (Gibbs sampling). Algorithm CD-k runs as follows: 1. States of visible neurons are set equal to input pattern; 2. The probabilities of hidden layer neurons are calculated; 3. Each neuron of hidden layer the state “1” is assigned with probability equal to its current state; 4. The probabilities of states of visible layer are determined basing at the states of hidden layer; 5. If number of current iteration is less than k, return to step 2; 6. The probabilities neuron states of hidden layer are obtained The work of corresponding algorithm is presented in Fig. 2.5. The longer we make sampling the more accurate works CD-algorithm.

Fig. 2.5 Training algorithm CD-k

2.4 Training Method Contrastive Divergence (CD)

2.4.2

53

Example

Consider the implementation of above presented model. At the start in the memory are stored several images of Latin letters. After then to system are shown another alike patterns distorted and using them the original patterns should be restored. Training set is presented below

Results of algorithm work

54

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Flow charts of training error are presented in Fig. 2.6a, b in Fig. 2.7 weight maps of hidden layer are presented.

2.5 2.5.1

Stacked Autoassociators Networks Stacked Autoencoder (SAE)

For retrieving high-level abstractions out of input set autoassociators are stacked in network. In Fig. 2.8 the structure schema of stacked autoencoder is shown which in a whole represent deep learning network with weights initialized by stacked Autoencoder.

2.5.2

Stacked RBM

In Fig. 2.9 structure schema of stacked restricted Boltzmann (SRBM) and neural network are presented which represents Deep neural network with weights initialized by SRBM.

2.5 Stacked Autoassociators Networks

55

Fig. 2.6 a Flow chart of error versus number of iterations (1–136). b Flow chart of error versus number of iterations (137–272)

Fig. 2.7 Weights map by number of the second (hidden layer)

56

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Fig. 2.8 Deep network with SAE structure

Fig. 2.9 Structure of DN SRBM

2.5 Stacked Autoassociators Networks

57

Structures of deep networks are shown just in such a way underlining that information is retrieved upward (from bottom to top).

2.6

Deep Networks Learning

Process of learning deep networks is split in two stages [5–7]: 1. Pretraining; 2. Weights fine-tuning.

2.6.1

Deep Network Pretraining

At the first stage auto-associative network (SAE или SRBM) is non-supervised trained at an array of not-marked data after that neurons of MLP hidden layer are initialized with weights obtained after training. In Fig. 2.9 this process of training and transfer is shown. After training of the first AE/RBM weights of hidden layer neurons become inputs of the second layer and so on. By this more and more general information about structure of data (line, contour etc.) is retrieved out of data. Let’s consider the pretraining procedure more detail. Pretraining represents the following procedure: we take pairs of neighbor layers of deep learning network beginning from the first layer and construct from this pair autoencoder, by adding output layer identical to input one. This procedure is repeated sequentially for all network layers. This procedure may be described as follows. 1. 2. 3. 4. 5. 6. 7. 8.

Load a training data set X0; Determine a network parameters—a number (N) and size of layers; Set the number of current layer i = 0; Build autoencoder for layers i, i + 1; Train autoencoder at the set Xi; Take away auxiliary (output) layer of autoencoder; Preserve connection weights of layers i, i + 1; If there are still pair of layers to be processed (i < N − 2), then go to the next step, otherwise go to step 10. 9. Generate data set Xi+1 for next autoencoder for this propagate through pair of layers i, i + 1 data set Xi, and go to step 3; 10. End of work. After this procedure the network is trained as a whole by one of the gradient methods. Besides, for deep networks with number of hidden layers more than three D. Hinton suggested to perform fine tuning also in two stages. At the first stage train only two upper layers and only after than to train the whole network. It worth to note that with non-supervised learning SRBM gives less stable results than SAE.

58

2.6.2

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Fine-Tuning

At the second stage fine-tuning of MLP weights (training with teacher) is performed by known methods. It was proved practically that such initialization set weights of neurons of MLP hidden layers in the region of global minimum and next fine-tuning is performed for very short time. Fine-tuning is a process of weights small changes for improving or optimization of results. As a rule it is aimed to increase process efficiency. Fine-tuning may be executed by a number of methods which are dependent on optimized processes which include gradient methods of first order, gradient methods of second order: Newton and quasi-Newton methods and other.

2.7

Deep Learning Regularization

In problem of neural networks training exists two types of errors: (1) so-called training error etr and generalization error egen . Training error is the error at the training sample while generalization error is error at test sample. These two errors are functions of the number of training iterations n and display different behavior: etr monotonous decrease with n, while generalization error egen first decrease then attains minimum and then begins to rise with increase of n (this phenomenon is called overfitting). The goal of training lies in minimization of generalization error. Regularization is any modification of training algorithm aimed to decrease generalization error at the expense of certain increase of training error. Regularization refers to one of the central problems in machine learning competing by its significance with problem of optimization. Due to the theorem of costless breakfast the best algorithm of machine training doesn’t exists in particularly, there is no the best method of regularization. Instead we need choose the regularization form which fits well to our problem to be solved. Philosophy of deep learning in a whole lies therein wide range of problems (such as all the intelligent problems) can be efficiently solved with application of general forms (methods) of regularization. Consider the most popular regularization methods and their models.

2.7.1

Lp-Regularization of Linear Regression

Consider the classic linear regression model t¼

d X j¼1

  wj xðjÞ þ e; e  N 0; r2 :

ð2:20Þ

2.7 Deep Learning Regularization

59

Fig. 2.10 Graffic illustration of linear regression

Search of weights w by maximization of likelihood function of sample in this model is equivalent to LSM method: N X n¼1

" tn 

d X

#2 wj xn

¼ kt  w1 x1      wd xd k2 ¼ kt  Xwk2 ! min : w

j¼1

ð2:21Þ

where xi 2 RN is a value of i-th feature for all objects in the sample X = [x1,…, xd]. Note that introduced here denotation xi differs from standard when by xi is implied i-th sample object. Here and further the sample is assumed normalized. Problem (2.21) has simple geometric interpretation—search a projection of vector t onto hyperplane with direction vectors [x1, x2, …, xd] (see Fig. 2.10). This problem can be solved analytically:  1  1 w ¼ X T X X T t; tpr ¼ Xw ¼ X X T X X T t:

ð2:22Þ

The solution for w corresponds to pseudo-solution of system of linear equations Xw = t. That to prevent to overfitting of linear regression it’s necessary to set constraints on the variability of decision. This may be done by introduce of constraint on the norm of weight vector w: kt  Xwk2 ! min;

ð2:23Þ

kwkpLp  b:

ð2:24Þ

w

Traditionally instead of solving problem (2.23) the problem of optimization of the following regularized functional is considered kt  Xwk2 þ kkwkpLp ! min; k  0: w

ð2:25Þ

60

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

It’s easy to show that optimization problems (2.23), (2.24) и (2.25) are equivalent under condition p  1, i.e. when all the considered functions are convex.   Introduce Lagrangian Lðw; kÞ ¼ ktXwk2 þ k kwkpLp b :

ð2:26Þ

Then due to variant Kuhn-Tacker theorem for convex functions necessary and ^ in the problem (2.23), (2.24) is sufficient conditions for existence of solution w existence of k  0, for which the following conditions will be true: ^ ; kÞ ¼ minw Lðw; kÞ, that is, rL 1. Principle of minimum: Lðw  ðw; kÞ ¼ 0: p 2. Condition of complementary non-fixedness: k kwkLp b ¼ 0: Note that for sufficiency of 1 and 2 it’s demanded also the fulfillment of so-called “Slater condition”, i.e. existence such solution w: kwkpLp \b: It’s clear that this condition holds when b > 0. Optimization problem (2.25) is equivalent to condition 1. Consider the condition 2. This condition is equivalent to occurrence one of two events: k ¼ 0 or kwkpLp ¼ b: ^ lies inside the region kwkpLp \b: Consequently If k ¼ 0, then optimal point w constraint kwkpLp  b becomes obvious and optimization problem (2.23) transforms into optimization problem without constraints that is equivalent to the problem (2.25) under k ¼ 0: ∇ Let be k [ 0; kwkpLp ¼ b: The accomplishment of this constraint is easy to obtain in the problem (2.25), just simply denote by b the value of vector w norm, optimal referring for problem (2.25). Consider optimal solution of problem (2.23), (2.24) under different p. It’s can be shown that in case of p  1 optimal solution has sparsity property, i.e. a portion of weights are exactly equal to zero. In case p > 1 strictly zero weights in optimal solution are practically impossible. Note that situation p = 1 is distinguished, as in this case optimized functional (2.25) is convex and optimal solution is sparse. Method of adjustment weights in linear regression by solving problem (2.24) or (2.25) with L1-norm was called LASSO (abbr. from Least Absolute Shrinkage and Selection Operator).

2.7.2

Early Stopping

Early stopping assumes the division or training process on stages of indeed training and validation. In stead of training network on the restricted number of iterations we train network until its performance begins to fall. In fact this prevent to network to

2.7 Deep Learning Regularization

61

Fig. 2.11 Possible stop points

Fig. 2.12 Possible ways of network behavior

simple remembering patterns. Below in Fig. 2.11 two possible stop points are shown: Figure 2.12 shows the performance and degree of overfitting after stop at these points (a, b): Regularization penalize network for use of complicated structure. Complexity in this case is measured by network size and weights. It established by addition of interval to loss function which is tied to size and weight. ¼b

Pt X  p¼1

tp  Op

2

þa

n X

v2j

j¼1

where n—is a number of loads (weights) in a neural network. The parameters a and b control a level after which under-fitting or overfitting take place. The corresponding values for them can be found by optimization or Bayes analysis (Fig. 2.13).

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

62

Fig. 2.13 Possible variants for parameters a and b

2.7.3

Dropout

The main idea of Dropout is instead of training one DNN to train an ensemble of several DNN and then to average the obtained results [3, 4]. Networks for training are obtained by excluding from a network (dropping out) neurons with probability p, so that the probability that neuron will remain in the network is equal q = 1 − p. “Dropout” of a neuron means that under any input data it return value 0. Excluded neurons don’t contribute in training process at all stages of algorithm backpropagation; therefore dropout even one neuron is equivalent to training new neural network. The probabilities of dropout each of neurons are equal. It means the following. Using conditions, that: • h(x) = xW + b is linear projection of input vector X in the space of dimension di on dh-dimensional space of output variables; • a(h) is activation function, the application of Dropout to this projection at the training stage is possible to present as a modified activation function:

2.7 Deep Learning Regularization

63

f ðhÞ ¼ D aðhÞ; where D ¼ ðx1; x2; . . .xdh Þ − dh-dimensional vector of random variables Xi , distributed by Bernoulli law. Then Xi has the following probability distribution:  p; if k ¼ 1; f ðk; pÞ ¼ 1  p; if k ¼ 0; where k are all possible output values. It’s evident that this random variable ideally matches to Dropout procedure, applied to one neuron. Indeed, a neuron is switched off with probability p ¼ Pðk ¼ 1Þ, otherwise it remains switched on. Consider the application of Dropout to i-th neuron: Oi ¼ Xi a

di X k¼1

! w k xk þ b

8   di < P ¼ a k¼1 wk xk þ b ; if Xi ¼ 1 : 0; if Xi ¼ 0:

ð2:27Þ

where PðXi ¼ 0Þ ¼ p: As at the training stage a neuron remains switched on with probability q, at the test stage we need emulate the behavior of ensemble of neurons which used was at the training stage. For that it was suggested at the test stage to multiply activation function at a coefficient q. So, we have At training stage : Oi ¼ Xi a

di X

! wk xk þ b

ð2:28Þ

k¼1

At test stage : Oi ¼ qa

di X

! w k xk þ b

k¼1

It’s possible to use other approach—so-called back Dropout. In this case we multiply activation function at the proper coefficient not at the test stage but at the training stage. This coefficient is equal to the inverse value of probability that 1 ¼ 1q, neuron remains in a network switched on: 1p In this case output of the ith hidden neuron is equal: P  di w x þ b At the training stage: At the training stage : Oi ¼ 1q Xi a k k k¼1 P  di At the test stage: At the test stage : Oi ¼ a w x þ b k k k¼1 In the case of direct Dropout we are compelled to change a neural network for testing as without multiply q a neuron will return the signal higher than those which

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

64

next neurons are waiting to get: therefore implementation of inverse Dropout is used more often.

2.7.4

Bagging (Ensemble Method)

One of ways to get ensemble of networks is application training by different training samples which are obtained as a result of random process so called bagging. Bagging (short for bootstrap aggregating)—is a method of decrease of generalization error by aggregating several models [4]. The idea lies in that to train several different models separately and then all models vote at output at test sample. This is an example of general strategy of machine learning called averaging model. Methods using this strategy are known as ensemble methods. The cause to use averaging lies that usually different models make different errors in test sample. Consider for instance a set of k regression models. Assume that each model make error i for each

pattern i obtained from multivariate normal distribution with variances E 2i ¼ v and covariance E i j ¼ c: P Then the averaged prediction error made by whole ensemble is equal я − 1k ci . i

And mean squared error of ensemble is: 2

1X ci E4 k i

!2 3 " !# X X 1 1 k1 2 5¼ E c i þ i j ¼ vþ 2 k k k j6¼1

ð2:29Þ

In the case when all errors completely correlated and c = v, MSE is equal to v, therefore the averaging of models doesn’t help at all. But in case when errors of different models are non-correlated c = 0, MSE of ensemble is equal 1k v: This means that MSE of ensemble linearly decreases with the size of ensemble. In other words in average the ensemble will behave at least not worse as any of its members and if all members make independent errors the ensemble will behave much better than its members.

2.8

Cascade Neo-fuzzy Neural Networks Structure Synthesis and Learning with Application of GMDH

Introduction Last years the problem of stock prices and market indexes forecasting is of great importance. For its solution various approaches were applied. The most prospective methods of forecasting at markets are neural networks, especially fuzzy neural

2.8 Cascade Neo-fuzzy Neural Networks Structure …

65

networks and the GMDH. Earlier it was proved that neural networks are universal approximators [4] and have some remarkable properties, such as parallel processing of information, ability to work with incomplete noisy input data, and learning possibilities to achieve the desired response (output). The GMDH, from the other side, uses the principle of self-organization that allows to construct an optimal structure of the forecasting model during the algorithm operation [8–12]. It’s very promising to combine advantages of these both approaches for the solution of the problem—constructing an efficient model for the financial markets forecasting under BD conditions. In the following presentation synthesis algorithm of the Neo-Fuzzy deep network using the GMDH is considered and its application for financial processes forecasting at stock markets is described. Experimental investigations of the efficiency of the proposed approach and its comparison with application of Neo-Fuzzy Neural Network with constant architecture are also presented.

2.8.1

The Neo-fuzzy Neuron

The architecture of the neo-fuzzy neuron (NFN) was proposed by Takeshi Yamakawa and co-authors in [13–15]. The authors of the NFN admit among its most important advantages, the high rate of learning, computational simplicity, the possibility of finding the global minimum of the learning criterion in real time and also that it is characterized by fuzzy linguistic “if-then” rules. The neo-fuzzy neuron is a nonlinear multi-input single-output system shown in Fig. 2.14. It realizes the following mapping: ^y ¼

n X

fi ðxi Þ;

ð2:30Þ

i¼1

where xi is the i-th input (i = 1, 2, …, n), ^y is a system output. Structural blocks of neo-fuzzy neuron are nonlinear synapses NSi which perform transformation of i-th input signal in the from fi ðxi Þ ¼

h X

wji lji ðxi Þ

j¼1

and realize fuzzy inference IF xi IS xji THEN THE OUTPUT IS wji where xji is a fuzzy set which membership function is lji , wji is a singleton (synaptic weight) in consequent. As it can be readily seen nonlinear synapse in fact realizes Takagi-Sugeno fuzzy inference of zero order [16, 17].

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

66

x1

μ11

w11

μ21

w21

+ . . .

Σ

f1(x1)

+

. . .

μh1

x2

+

wh1

μ12

w12

μ22

w22

+ . . .

+

f2(x2)

Σ



+

. . .

μh2

Σ

wh2

. . . μ1n

w1n

+ xn

μ2n . . .

μhn

w2n . . .

+

Σ +

fn(xn)

whn

Fig. 2.14 The neo-fuzzy neuron

Conventionally the membership functions lji ðxi Þ in the antecedent are complementary triangular functions as shown in Fig. 2.15. For preliminary normalized input variables xi (usually 0  xi  1), membership functions can be expressed in the form: 8 xi cj1;i < cji cj1;i ; x 2 ½cj1;i ; cji ; xi lji ðxi Þ ¼ ccj þ 1;ic ; x 2 ½cji ; cj þ 1;i ; : j þ 1;i ji 0  otherwise; where cji are arbitrarily selected centers of corresponding membership functions. Usually they are equally spaced on interval [0, 1]. This contributes to simplify the fuzzy inference process. That is, an input signal xi activates only two neighboring

2.8 Cascade Neo-fuzzy Neural Networks Structure …

67

μji (xi )

1

xi C1i =0

C2i

C 3i

C h-1,i

C hi

Fig. 2.15 Triangular membership functions

membership functions simultaneously and the sum of the grades of these two membership functions equals to unity (so-called Ruspini partitioning), i.e. lji ðxi Þ þ lj þ 1;i ðxi Þ ¼ 1:

ð2:31Þ

Thus, the fuzzy inference result produced by the Center-of-Gravity defuzzification method can be given in the very simple form fi ðxi Þ ¼ wji lji ðxi Þ þ wj þ 1;i lj þ 1;i ðxi Þ: By summing up fi ðxi Þ, the output ^y of Eq. (2.1) is produced. It should be noticed that triangular activation functions provide only piecewise-linear approximation and this fact can in most of the cases can lead to decreasing of the received results accuracy. To minimize its negative effect we can increase number of membership functions. But it results in increasing of synaptic weight coefficients quantity and therefore complexity of our architecture is rising as well as time required for its learning. To avoid this disadvantage we propose to use the cubic-spline membership functions (2.32) that can be written down in the following form:  8  3  > 2xxi xi1 2xxi xi1 > ; x 2 ½xi1 ; xi ; < 0:25 2 þ 3 xi xi1  xi xi1  lðxÞ ¼  3  > 2xxi þ 1 xi i þ 1 xi > : 0:25 2  3 2xx ; x 2 ðxi ; xi þ 1 : xi þ 1 xi þ xi þ 1 xi and shown in Fig. 2.16.

ð2:32Þ

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

68

Fig. 2.16 Cubic-spline activation functions

The cubic-spline activation functions (2.32) satisfy all requirements of the Ruspini partitioning (2.31) and it is considerably contributes to simplify the fuzzy inference process. On the other hand, usage of the cubic spline activation functions provides smooth polynomial approximation instead of piecewise-linear approximation and makes possible to perform a high quality modeling of significantly nonlinear non-stationary signals and processes. When a vector signal xðkÞ ¼ ðx1 ðkÞ; x2 ðkÞ; . . .; xn ðkÞÞT (here k ¼ 1; 2; . . . is a discrete time) is fed to the input of the neo-fuzzy neuron, the output of this neuron is determined by both the membership functions lji ðxi ðkÞÞ and tunable synaptic weights wji ðk  1Þ, which have been obtained at the previous training epoch: ^yðkÞ ¼

n X i¼1

fi ðxi ðkÞÞ ¼

n X h X

wji ðk  1Þlji ðxi ðkÞÞ

i¼1 j¼1

and thereby neo-fuzzy neuron contains h * n synaptic weights which should be determined.

2.8.2

The Neo-fuzzy Neuron Learning Algorithm

The learning criterion (goal function) is the standard local quadratic error function: n X h X 1 1 1 yðkÞ  wji lji ðxi ðkÞÞ EðkÞ ¼ ðyðkÞ  ^yðkÞÞ2 ¼ eðkÞ2 ¼ 2 2 2 i¼1 j¼1

!2 ð2:33Þ

It is minimized via the conventional gradient stepwise algorithm. And as a result the following weight update procedure is obtained:

2.8 Cascade Neo-fuzzy Neural Networks Structure …

wji ðk þ 1Þ ¼ wji ðkÞ þ geðk þ 1Þlji ðxi ðk þ 1ÞÞ ¼ wji ðkÞ þ g yðk þ 1Þ 

n X h X

69

!

wji ðkÞlji ðxi ðk þ 1ÞÞ lji ðxi ðk þ 1ÞÞ;

i¼1 j¼1

where yðkÞ is the target value of the output, g is the scalar learning rate parameter which determines the speed of convergence and is chosen empirically. For the purpose of increasing training speed Kaczmarz-Widrow-Hoff optimal one-step algorithm [10, 11] is applied wðk þ 1Þ ¼ wðkÞ þ

yðk þ 1Þ  wT ðkÞlðxðk þ 1ÞÞ klðxðk þ 1ÞÞk2

lðxðk þ 1ÞÞ;

where lðxðk þ 1ÞÞ ¼ ðl11 ðx1 ðk þ 1ÞÞ; . . .; lh1 ðx1 ðk þ 1ÞÞ; . . .; lh2 ðx2 ðk þ 1ÞÞ; . . .; ; lhn ðxn ðk þ 1ÞÞÞT ;  T  wðkÞ ¼ w11 ðkÞ; . . .; wh1 ðkÞ; . . .; wh2 ðkÞ; . . .; wji ðkÞ; . . .; whn ðkÞ

ðhnÞ  1vectors, generated by the corresponding variables, and its exponentially weighted modification 

wðk þ 1Þ ¼ wðkÞ þ r 1 ðk þ 1Þðyðk þ 1Þ  wT ðkÞlðxðk þ 1ÞÞÞlðxðk þ 1ÞÞ; rðk þ 1Þ ¼ arðkÞ þ klðxðk þ 1ÞÞk2 ; 0  a  1; ð2:34Þ

which possesses both smoothing and filtering properties. In case we have priori defined data set training process can be performed in a batch mode for one epoch using conventional least squares estimation. The neo-fuzzy neuron can be used as an elementary node of the architecture called the Neo-Fuzzy Neural Network.

2.8.3

The Neo-fuzzy Neural Network and Its Architecture Optimization Using the Group Method of Data Handling

The Neo-Fuzzy Neural Network is a multilayer feedforward architecture that consists of neo-fuzzy neurons. 3-layers Neo-Fuzzy Neural Network [11] with n inputs and m outputs is shown of Fig. 2.17. Given architecture is completely coincide with the structure of the 3-layer perceptron, except that the neo-fuzzy neurons are used here as an elementary nodes instead of Rosenblatt perceptrons. Therefore, for the adjustment of the weight

70

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Fig. 2.17 The neo-fuzzy neural network general structure

coefficients of such architecture it is necessary to use backpropagation algorithms. As it generally known, such algorithms are quite complex from the computational point of view and they operate slowly especially in Deep Neural networks with many layers. If we use neo-fuzzy neurons that have only two inputs, the GMDH can be applied for the synthesis of the Neo-Fuzzy Neural Network with optimal architecture. The main idea of the GMDH algorithm lay in successive synthesis of the neuron layers until the external criterion begins to increase. Algorithm description [11]: (1) Form pairs from the neo-fuzzy neuron outputs of the current layer (at the first iteration we use the set of input signals). Each pair is fed to the corresponding neo-fuzzy neuron. (2) Using the learning subsample adjust synaptic weight coefficient of each neo-fuzzy neuron. (3) Using the test subsample calculate the value of the external criterion (regularity) for each neo-fuzzy neuron:

e½s

p ¼

Ntest  2 1 X yðiÞ  ^y½s

p ðiÞ Ntest i¼1

ð2:35Þ

where Ntest is a size of the test subsample, s is the layer number, p is a neuron ½s

number in the current layer p ¼ 1; ns , ^yp ðiÞ is the p-th neuron of the s-th layer response signal for the i-th input vector.

2.8 Cascade Neo-fuzzy Neural Networks Structure …

71

(4) Find the minimal value of the external criteria for all neo-fuzzy neurons of the current layer e½s ¼ min e½s

p : p

Check the condition e½s  e½s1

ð2:36Þ

where e½s ; e½s1 are the criterion values for the best neurons of the and s-th and (s − 1)-th layers correspondingly. If the condition (2.36) is true then return to the previous layer and find the best neuron that has minimal value of the criterion (2.35). Otherwise, select F best neurons according to the criterion (2.35) value and go to the step 1 to construct the next layer of neurons. (5) Determine the final structure of the network. Moving backward from the best neuron of the (m − 1)-th layer along the input connections and passing successively all the layers of neurons, preserve in the final structure only such neurons that are used in the next layer. After the GMDH stops it can be said that the final optimal structure of the Neo-Fuzzy Neural Network is synthesized. As it can be readily seen we obtain not only optimal structure, but also trained neural network that is ready to process new data. One of the most important advantages of GMDH application for the Deep neural networks architecture synthesis is a capability to use simple but very quick learning procedures for the neo-fuzzy neuron weights adjustment because network is trained layer-by-layer.

2.8.4

The Experimental Investigations of Forecasting with Neo-fuzzy Neural Network

The experimental investigations of neo-fuzzy neural network in the problem of forecasting were carried out [11]. The goal contained in RTS index forecasting on the base of current stock prices of the leading Russian companies. Input data: daily stock prices and the value of RTS index in the period from 5 of February till 5 of May 2009. The output is RTS index on the next day. Sample size was 100 values. Forecast criteria were the following: 1. mean squared error (MSE); 2. mean absolute percentage error (MAPE).

72

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Types of experiments for Neo-fuzzy neural network: (1) (2) (3) (4) (5)

Variation of ratio learning/ test samples in the range: 25:75, 50:50, 75:25; Change the number of layers: 1-3-5; Change the number of iterations: 1000, 10,000, 100,000; Variation of a number of points to be forecasted: 1-3-5; Change of maximal error—the condition of stop: 0.01 тa 0.09;

Some of the obtained experimental results are presented below. Experiment A) ratio 75:25, MSE = 0.050158. The results are presented on Fig. 2.18. Experiment B) ratio 50:50 MSE = 0.053562 Experiment C) ratio learning/test—25:75. The results are presented on Fig. 2.19. MSE = 0.068489 Experiment Type 2. Variation of Layers Number Comparison of algorithm work when number of layers is varied: 1-3-5-7 while forecast at 1 point under ratio learning/test sample 75:25

Fig. 2.18 Forecasted results under ratio learning/test sample 75:25

Fig. 2.19 Forecasted results under ratio learning/test sample 25:75

2.8 Cascade Neo-fuzzy Neural Networks Structure …

73

Fig. 2.20 Forecasted results with one layer

Experiment Fig. 2.20. Experiment Experiment Experiment

A) layers number—1 MSE = 0.04662. The results are presented on B) layers number—3, MSE = 0.0381 C) layers number—5, MSE = 0.0446 D) layers number—7, MSE = 0.0544

Experiments Type 3. Variation of Iterations Number: 1000, 10,000, 100,000 Experiment B) iterations number—10,000, MSE = 0.0575 Experiment C) iterations number—100,000, MSE = 0.0525 Experiments Type 4. Variation of Number of Forecasted Points Comparison of algorithm forecasting accuracy when varying a number of forecasted points 1-3-5, using ratio learning/test sample 75:25 Experiment A) a number of forecasted points—1 MSE = 0.0495 Experiment B) a number of forecasted points—3, MSE = 0.4469 Experiment C) a number of forecasted points—5, MSE = 1.0418 Conclusions on Experimental Results After having carried out the series of experiments with neo-fuzzy neural network of full structure and of optimal structure constructed by GMDH the following results were obtained which are presented in Table 2.1. The best results are highlighted with the grey color. As it can be readily seen the Neo-Fuzzy Neural Network with optimal structure constructed by GMDH gives better results than the conventional network with full structure (full network). This may be explained by the utilization of self-organization mechanism for constructing not full network. But at the same time there are some disadvantages of this approach—the rate of convergence is slower in comparison with full network. But taking into account the better criterion values this disadvantage may be neglected. For better estimation of the suggested approach the forecasting error obtained at the experiments is presented on Figs. 2.21 and 2.22. These are the charts of MAPE obtained by Neo-fuzzy neural network constructed by GMDH.

74

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Table 2.1 Comparison of the neo-fuzzy neural network with full structure and structure constructed by the GMDH Type of the experiment

Experiment parameters

CNFNN synthesized by GMDH

Full structure CNFNN

Variation of ratio training/ testing sample

75%:25% 50%:50% 25%:75% 1 3 5 1000 10,000 100,000 1 3 5

0.0484 0.0532 0.0608 0.0628 0.0381 0.0434 0.0588 0.0479 0.0459 0.0495 0.4469 1.0418

0.0501 0.0536 0.0684 0.0626 0.0544 0.0652 0.0674 0.0485 0.0482 0.0587 1.0844 1.3901

Number of layers variation

Iterations number

Number of forecasted points

Fig. 2.21 The curves of error (MAPE) while forecasting 1, 3 or 5 points

As we may see while forecasting 1 point ahead we obtain rather high precision— less than 15%. In case of increase the number of points forecasted the accuracy drops—the error lies in the range 15–45%. Analyzing the presented curves we conclude that the Neo-Fuzzy Neural Network with one hidden layer error is also not high but is not uniformly distributed and may exceed 30%. For 5 hidden layers the MAPE increases and may reach 35%. And finally with 7 layers MAPE reaches 60%. Thus the maximal precision we obtain with 3 hidden layers.

2.8 Cascade Neo-fuzzy Neural Networks Structure …

75

Fig. 2.22 Forecasting error (MAPE) versus number of layers (1, 3, 5, 7) of neo-fuzzy network

Besides, in process of experimental investigations were found the optimal parameters for algorithms for full and constructed by GMDH neo-fuzzy networks [11]: • • • • •

The The The The The

ideal ratio of learning and test samples—75%:25%. best number of layers—3. best result at 100,000 iterations best result with 1 forecasted point. best result with maximal error (threshold of algorithm stop)—0.01.

Solving of the Classification Problem Using the Neo-Fuzzy Neural Network We have applied proposed Neo-Fuzzy Neural Network synthesized by the GMDH to solve the ‘breast cancer in Wisconsin’ benchmark classification problem [11]. Dataset containing 699 points have been used for this purpose (ftp://cs.wisc.edu/ math-prog/cpo-dataset/machine-learn/cancer/cancer1/datacum). 16 points had parameters with missed values so they have been eliminated from the dataset and remaining 683 points have been separated on training set—478 points (70%) and test set—205 points (30%). Each point has 9-dimensional feature vector and 1 class parameter which should be determined and identifies either benign or malignant tumor has current examined patient. Features values have been normalized on interval [−1; 1]. For comparison the same classification problem was solved using the conventional Neo-Fuzzy Neural Network with full 3-layer structure: 10 NFNs in the first layer, 5 in the seconds, and 1 output NFN. Obtained results of classifications can be found in Table 2.2. Table 2.2 Comparison of the neo-fuzzy neural network with full structure and structure constructed by the GMDH for the ‘breast cancer in Wisconsin’ benchmark classification problem ANN Architecture

Accuracy on training set/points outside the ‘belief zone’

Accuracy on testing set/points outside the ‘belief zone’

Network constructed by the GMDH Full network

99.8%/1

98%/4

98%/3

94%/15

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

76

Fig. 2.23 The architecture of the neo-fuzzy neural network for solving the ‘breast cancer in Wisconsin’ benchmark classification problem synthesized by the GMDH

When output signal be found within the range [0.3; 0.7] it is lesser probability that classification was correct. We quantify and marked out such classified samples as points outside the ‘belief zone’. We can see that the Neo-Fuzzy Neural Network with architecture synthesized by the GMDH shows very good results of classification and sufficiently exceeds in the classification quality as compared with the full network, especially on the testing set. It can be explained by fact, that full network is a more complex model and as generally known, complexness of the model leads to generalization loss and therefore classification accuracy decreases. The GMDH allows to synthesis the optimal structure that neglects inputs which are not significant. In Fig. 2.23 the architecture of the Neo-Fuzzy Neural Network constructed by the GMDH is shown. It is considerably simpler, than the full network, but in spite of this it allows to achieve higher classification quality.

2.9

Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters

Introduction Nowadays artificial neural networks (ANNs) and neuro-fuzzy systems (NFSs) are widely used for solving different Data Mining tasks, presented either in the form of “object—property” tables or in the form of multidimensional time series, often produced by stochastic or chaotic non-stationary nonlinear systems. The advantages of these computational intelligence systems derive, first of all, from their universal approximating capabilities, learning possibility, transparency and interpretability (in case of the NFSs) of the results.

2.9 Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters

77

Conventionally “learning” is defined as a process of adjusting synaptic weights using an optimization of a given learning criterion. The quality of this process can be significantly improved by adjusting not only its synaptic weights but also the architecture of the ANNs and NFSs. This idea is the foundation of evolving computational intelligence systems (ECIS), that are used more widely in the recent years [18, 19]. It should be noticed that the multilayered neuro-fuzzy systems of TSK- or ANFIS-type [16, 17, 20–22] are the base of the majority of the known ECIS. At the same time, speaking of evolving systems, we should mention the Group Method of Data Handling (GMDH) [12, 23–26], which is a powerful approach of the information processing system of self-organization. It can synthesize sufficiently simple and effective computational architectures. It is clear that this approach attracted the attention of the computational intelligence experts. The GMDH-neural networks having active neurons [26–28], N-adalines [29], R-neurons [30, 31], Q-neurons [3] as nodes were developed; in the area integrating fuzzy GMDH [32] and neural networks the GMDH-neuro-fuzzy systems [31, 33] and GMDH-neo-fuzzy systems (see previous section) [11] were developed; GMDH-wavelet-neuro-fuzzy systems [8, 10, 34] and GMDH-fuzzy-spiking neural network [9] were also elaborated. These systems demonstrated their efficiency in solving a wide range of tasks, however they lost the main advantages of the original GMDH, namely small number of tuning parameters in each node. It should be noted that initially elementary regression models with two inputs and three estimated coefficients were developed on the basis of GMDH. These properties of GMDH are especially important for deep neural networks with multiple hidden layers. Due to this problem, it seems reasonable to develop a GMDH-system, that combines advantages of the traditional GMDH, hybrid systems of the computational intelligence and that is trained with simple learning procedures, used in regression analysis and linear identification theory. The developed approach to this problem solution is considered below.

2.9.1

Evolving GMDH-Neuro-fuzzy System Architecture

The architecture of the evolving GMDH-system is shown in Fig. 2.24. To the input layer of the system ðn  1Þ-dimensional vector of input signals x ¼ ðx1 ; x2 ; . . .; xn ÞT

Fig. 2.24 Evolving GMDH-system

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

78

is fed. Then this signal is fed to the first hidden layer, that contains n1 ¼ c2n nodes-neurons, each of which has only two inputs. At the node outputs N ½1 of the ½1

first hidden layer the output signals ^yl , l ¼ 1; 2; . . .; 0; 5nðn  1Þ ¼ c2n are formed. Then these signals are fed to the selection block of the first hidden layer SB½1 , that ½1

selects among the output signals ^yl n1  best signals (n1   n, where n1  ¼ F is so called Freedom of choice) most precise by accepted criterion (mostly by the mean squared error r2½1 ). yl

½1

From these n1  best outputs of the first hidden layer ^yl  n2 pairwise combinations

½1

^yl ; ^y½p1  ½2

are formed, that are fed to the second hidden layer, formed by ½2

neurons N . Among the signals of this layer ^yl the selection block SB½2 selects F best neurons by accuracy (e.g. by r2½2 ) if the best signal of the second layer is better yl

½1

than the best one of the first hidden layer ^y1  : Other hidden layers forms signals similarly to the second hidden layer. The system evolution process continues until the best signal of the selection block SB½s þ 1Þ would be worse than the best signal of the previous (s) layer, that is r2½s þ 1 [ r2½s . Then we return to the previous layer and yl ½s

yl

choose its best node neuron N in order to form the system output signal ^y½s . It should be stressed that we obtain not only optimal network structure but well-trained network as well due to GMDH algorithm. Besides, since the training is performed sequentially layer by layer the problems of high dimensionality as well as decaying or exploding gradient vanish. This is very important for deep learning networks. As it was already mentioned, as nodes of GMDH-systems we can use different types of neurons, e.g. N-Adalines [29], active [26, 27, 35], R-[30, 36], Q-[34], spiking-[9], wavelet-[8, 10, 34], neo-fuzzy-neurons [11] and other similar computational intelligence systems units, that has the required approximating capabilities and learning capacities. However, the main advantage of the original GMDH may be lost, namely the ability to work with small training sets (short samples). Therefore in the next section NFN network with small number of tuning parameters is considered.

2.9.2

Neuro-fuzzy Network with Small Number of Tuning Parameters as a Node of GMDH-System

Let us consider the node architecture, shown in Fig. 2.25 and proposed as a neuron of the suggested evolving GMDH-system. This architecture is in fact a Wang– Mendel neuro-fuzzy system [22, 37] with only two inputs xi and xj , and one output  T ^yl . To the node input a two-dimensional vector of signals xðkÞ ¼ xi ðkÞ; xj ðkÞ is

2.9 Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters

79

Fig. 2.25 GMDH-neuro-fuzzy system node

fed, where k ¼ 1; 2; . . .; N is either the observation number in training set or the current discrete time.   The first layer of a node contains 2h membership functions lpi ðxi ðkÞÞ, lpj xj ðkÞ , p ¼ 1; 2; . . .; h and provides fuzzification of input variables. The bell-shaped constructions with nonstrictly local receptive support are usually used as membership functions. It allows to avoid appearing of “gaps” in the fuzzified space while using scatter partitioning of input space [35]. Usually the Gaussians are used as membership functions of the first layer 

xi ðkÞ  cpi lpi ðxi ðkÞÞ ¼ exp  2r2i

2 !

 2 !   xj ðkÞ  cpj ; lpj xj ðkÞ ¼ exp  ; 2r2j ð2:37Þ

where cpi , cpj are parameters, that define the centers of the membership functions, ri , rj are width parameters of these functions. The second layer provides aggregation of the membership levels. It consists of h multiplication units and forms two-dimensional radial basis activation functions   ~xp ðkÞ ¼ lpi ðxi ðkÞÞlpj xj ðkÞ ;

ð2:38Þ

and for Gaussians with the same values ri ¼ rj ¼ r we can write ! xðkÞ  cp 2 ~xp ðkÞ ¼ exp  2r2

ð2:39Þ

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

80

 T (here cp ¼ cpi ; cpj ), i.e. the elements of the first and the second layers process the input signal similarly to the R-neurons of the radial basis function neural networks. The third layer is one of synaptic weights that are adjusted during learning process. The outputs of this layer are values   wijlp lpi ðxi ðkÞÞlpj xj ðkÞ ¼ wijlp~xp ðkÞ;

ð2:40Þ

The fourth layer is formed by two summation units and computes the sums of output signals of the second and the third hidden layers h X

h h h X   X   X ~xp ðkÞ; wijlp lpi ðxi ðkÞÞlpj xj ðkÞ ¼ wijlp~xp ðkÞ; lpi ðxi ðkÞÞlpj xj ðkÞ ¼

p¼1

p¼1

p¼1

p¼1

ð2:41Þ And finally in the fifth layer of the neuron normalization is realized, as a result the node output signal ^yl is formed:   ij p¼1 wlp lpi ðxi ðkÞÞlpj xj ðkÞ   Ph p¼1 lpi ðxi ðkÞÞlpj xj ðkÞ

Ph ^yl ðkÞ ¼ ¼

h X

Ph p¼1

¼ Ph

 T wijlp uijp ðxðkÞÞ ¼ wijl uij ðxðkÞÞ

wijlp~xp ðkÞ

xp ðkÞ p¼1 ~ ð 6Þ

p¼1

 T wijl ¼ wijl1 ; . . .; wijlp ; . . .; wijlh ,  Ph  1 l ð x ðkÞ Þl x ðkÞ , uijp ðxðkÞÞ ¼ lpi ðxi ðkÞÞlpj xj ðkÞ pj j p¼1 pi i  T uij ðxðkÞÞ ¼ uij1 ðxðkÞÞ; . . .; uijp ðxðkÞÞ; . . .; uijp ðxðkÞÞ :

where

It is easy to see that the node implements nonlinear mapping of input signals to output signal like normalized radial basis function neural network, however the NFS contains significantly lower number h of adjusted parameters comparing with the neural network. Using introduced notation and writing transformations in every node of the standard GMDH in the form ^yl ðkÞ ¼ wijl0 þ wijl1 xi ðkÞ þ wijl2 xj ðkÞ;

ð2:42Þ

that contains three unknown parameters, it is easy to see that with three membership functions being on the each input of the proposed node we get the same three synaptic weights that should be adjusted. In the simplest case the estimation of these synaptic weights can be realized with the conventional least squares method (LSM), traditionally used in the GMDH. If the entire training set is presented, we can use the LSM in its batch form

2.9 Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters

wijl ðNÞ

¼

N X



u ðxðkÞÞ u ðxðkÞÞ ij

ij

k¼1

T



N X

uij ðxðkÞÞyðkÞ

81

ð2:43Þ

k¼1

(here yðkÞ—external reference signal). If training samples are fed sequentially in on-line mode, the recurrent form of the LSM is used 8   T ij ij ÞÞ uij ðxðkÞÞ uij ðxðkÞÞ > < wij ðkÞ ¼ wij ðk  1Þ þ P ðk1Þ yðkÞðwl ðk1 ; l l 1 þ ðuij ðxðkÞÞÞT Pij ðk1Þuij ðxðkÞÞ ð2:44Þ T ij ij ij ij > : Pij ðkÞ ¼ Pij ðk  1Þ  P ðk1Þuij ðxðkÞÞTðuij ðxðkÞÞÞ ijP ðk1Þ : ð9Þ 1 þ ðu ðxðkÞÞÞ P ðk1Þu ðxðkÞÞ

2.9.3

Computational Experiments

The efficiency of the proposed approach was demonstrated by solving the problem of the forecasting at the stock exchange. The experimental investigations for stock prices forecasting were carried out. As a forecasted variable the RTS index in 2013 with time step one week was chosen. As external regressors (inputs) stock prices of the leading companies were used. Total sample had 55 points that was used while searching the optimal partial description in the GMDH. At each layer we selected 6 best models (freedom choice F = 6). The mathematical model had the general form y ¼ f ðx1 ; x2 ; x3 ; x4 Þ. As the quality criteria of the obtained models MAPE and RMSE were used. The flow charts of real and simulated values of the RTS index are presented in Fig. 2.26

Fig. 2.26 GMDH-neuro-fuzzy network (50%—training sample size, Freedom choice = 6, N = 2)

82

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Table 2.3 Dependence of forecasting accuracy (MAPE and RMSE) on number of inputs Maximum number of membership functions

MAPE

RMSE

2 3 4 5 6 7 8 9

0.07085 0.05692 0.05505 0.05796 0.05606 0.04921 0.04534 0.06061

11.2743 9.48098 9.29596 9.76549 9.30073 8.31249 7.83328 15.1446

Fig. 2.27 Flow chart of MAPE versus number of inputs N

for N = 2 (here N is a number of fuzzy inputs). The results of experiments are presented in Table 2.3. The flow charts of criteria values are presented in Figs. 2.27 and 2.28. As one can see, with number of inputs increasing the error values first fall down, but then begin to grow. So increasing the number of inputs until the error value starts to grow we can obtain the optimal inputs number (Figs. 2.27 and 2.28).

Fig. 2.28 Flow chart of RMSE values versus number of inputs

2.9 Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters

83

Fig. 2.29 Flow charts of real and predicted values of the RTS index using GMDH

Table 2.4 MAPE criterion for GMDH-NFN and full cascade NFN Fuzzification inputs number

MAPE for GMDH-NFN

MAPE for full cascade NFN

2 4 6 8 10 12

0.040376 0.039496 0.039979 0.042479 0.049349 0.040835

0.060309 0.051411 0.044253 0.043964 0.051706 0.044645

For a comparison models using classical GMDH with linear partial descriptions and cascade neuro-fuzzy network were constructed. The following parameters for models construction were set: – classical GMDH, 50% is training sample size, freedom choice—best 6 models; – cascade neuro-fuzzy network with different inputs number. The simulation results for the classical GMDH are presented in Fig. 2.29. The MAPE value is 0.09845, the RMSE value is 15.1446. Now let’s construct the model using full cascade neuro-fuzzy network with different inputs number. The MAPE values for GMDH-neuro-fuzzy network and for full cascade NFN are presented in Table 2.4. The flow charts of MAPE for these networks are presented in Fig. 2.30. As one can see, the GMDH-neuro-fuzzy network showed much better results than the full cascade neuro-fuzzy network due to more optimal network structure. Also GMDH-neuro-fuzzy network showed better results comparing with classical GMDH. The MAPE value for classical GMDH is 0.09845, while the best GMDH-neuro-fuzzy model has MAPE value 0.039496.

84

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Fig. 2.30 MAPE values for GMDH-neuro-fuzzy network and full cascade neuro-fuzzy network versus the number of inputs

The further experiments were carried out. We added to the inputs several output values in the prehistory. The other models parameters are the same. The model is presented in form yðkÞ ¼ f ðx1 ðkÞ; x2 ðkÞ; x3 ðkÞ; yðk  1Þ; yðk  2ÞÞ. Number of inputs is 5. The MAPE value is 0.02040, the RMSE value is 3.59614. As one can see, after adding the values of the RTS index to inputs prehistory the model quality has increased. Let’s consider the prediction quality of the GMDH-neuro-fuzzy model using another sample. As input sample the stock prices of Microsoft corp. since 01.11.14 to 29.12.14 were used. The sample size is 64 points. A model is constructed using 62 points. The forecast is made for 4 steps ahead, the first two steps are checked with available data. Autoregression model with number of lags 5 is used. As a result we obtained a GMDH-neuro-fuzzy network with 6 fuzzy inputs. The obtained results are presented in Tables 2.5 and 2.6.

Table 2.5 Forecasting results for two steps ahead Date

Real value

Predicted value

Absolute error

Relative error (%)

26.12.14 24.12.14

18,030.21 18,053.71

17,971.63 17,991.94

58.57668 61.77189

0.324881 0.342156

Table 2.6 Forecasting results for different neuro-fuzzy networks and GMDH Real value

GMDH-neuro-fuzzy network

GMDH system

Cascade-neuro-fuzzy network

48.14 47.88

48.44502 48.89899 48.76889 49.07061 49.33117

48.71953 48.80680 48.88288 48.92689 48.92077

46.50050 46.66598 46.49011 46.43442 46.42505

– –

2.9 Evolving GMDH-Neuro-fuzzy Network with Small Number of Tuning Parameters

85

Table 2.7 Training time for different fuzzy neural models Inputs number

Time for GMDH-neuro-fuzzy network (s)

Time for full cascade network (s)

2 4 6 8 10

0.004 0.009 0.013 0.021 0.030

0.015 0.021 0.037 0.048 0.053

As one can see, the GMDH-neuro-fuzzy network shows more accurate forecast than the classical GMDH and the cascade neuro-fuzzy network. Its MAPE value doesn’t exceed 1% (0.32 and 0.34% while forecasting for 1 and 2 steps ahead). As the final experiment let’s compare the training time for GMDH-neuro-fuzzy model and full cascade model. In Table 2.7 the training time in seconds for GMDH-neuro-fuzzy network and full cascade neuro-fuzzy network is presented. As an initial sample we used Microsoft stock prices in the period since 01.11.14 to 29.12.14, a sample size is 64 points. Conclusion In this section the elementary neuro-fuzzy networks with scatter partitioning of input space and small number of tuning parameters are proposed as nodes of the GMDH-system. The system architecture can evolve in on-line mode as the synaptic weights of the proposed neuro-fuzzy nodes-neurons are adjusted. The distinguishing feature of the proposed approach is the ability to work with very small training sets. The experimental investigations of the neuro-fuzzy network in the problem of stock prices forecasting were carried out. After investigations results analysis the following conclusions were made: – the variation of inputs number in GMDH-neuro-fuzzy network influences the model quality: as a number of inputs increases the error first falls down, and then begins to grow; it enables to choose the optimal inputs number; – the application of the proposed approach for optimal structure search allows to decrease training time and to increase the forecasting quality of the model comparing with full-cascade deep fuzzy network.

2.10

A Deep GMDH System Based on the Extended Neo-fuzzy Neuron and Its Training

Introduction During the last few years, evolving intelligent systems have become widely spread and popular for handling any sort of dynamic modeling and training requirements

86

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

in real-world (online) applications, especially under conditions of a growing effect of the dynamic data context, sequential video analysis, and web mining. This demand is justified by the growing dynamic and complexity of current problems as well as the ascending volumes of data bases (BD), which lead to the fact that traditional batch training is not possible any more to be applied within some reasonable time period and tolerable accuracy [1–4]. The evolving incremental learning systems should process huge amounts of data, analyze the data rapidly and extract data features on the fly. Since the data is transforming permanently, these systems must be capable of adapting their topology. From the algorithmic point of view, the evolving system should be able to carry out some parametric adaptation. Stated another way, it has to be contributed by a set of parameters along with adaptation of the required tweaks to be implemented effectively [20, 21, 26–28, 35]. It’s well-known that deep neural networks (DNNs) [1–4] have gained a high impact on data processing recently. Although this class of networks is quite bulky when speaking of the computational implementation. And there’s a high possibility that the overfitting problem takes a place while dealing with a short training data set. As an alternative view, it is also reasonable to generate DNN architectures on the grounds of the Group Method of Data Handling (GMDH) [8–12, 23–25]. In this connection, various systems from the area of Computational Intelligence usually enhance automatically a number of their structure layers for information handling in order to obtain the precision on demand for results. That’s a great deal of sense to separate an initial space somehow into a suite of subspaces in lower dimensions and combine the results obtained. The Group Method of Data Handling (GMDH) possesses an apparent benefit from a computational point of view. But its huge drawback is its rather poor adaptation for an online mode. That is a rather smart decision to apply GMDH characteristics to evolving cascade neural networks [8– 11, 34], although some of these systems might freeze their parameter values. A specifically new subject of interest is a combination of hybrid systems of computational intelligence and the GMDH concepts with the general aim of new computational and theoretical results especially for Big Data Mining and Data Stream Mining [38, 39]. The GMDH-ANN topologies have been considered in [5] in terms of using specific two-input N-Adalines as structural elements. A main purpose of this topological element was to guarantee a quadratic approximation for recovering a non-linear mapping. Meanwhile, estimating the achieved quality could lead to a substantial quantity of hidden layers. In the previous sections cascade GMDH-neo-fuzzy network and evolving GMDH-neuro-fuzzy networks and their training algorithms were considered which showed high operating speed and high approximating abilities as main performance indicators. Although both its parameters and framework are being adjusted in an online mode, but it still claims long enough training data sets. That’s a very challenging task when there’s an obvious lack of incoming data (a short data set), and the system is not capable of tuning its parameters. In this regard, it’s highly important to offer a hybrid neuro-fuzzy system to be trained in an online fashion and to be able of optimizing its topology while being

2.10

A Deep GMDH System Based on the Extended Neo-fuzzy Neuron and Its Training

87

trained. That’s also very topical to introduce the system that keeps in possession an appreciably lower number of attributes to be tweaked in comparison with other well-known compatible systems.

2.10.1 An Architecture of the Deep GMDH Neuro-fuzzy System A structure of the deep GMDH neuro-fuzzy system is given in Fig. 2.31. The receptive (zero) layer of the system contains a ðn  1Þ-dimensional vector of input signals xðkÞ ¼ ðx1 ðkÞ; x2 ðkÞ; . . .; xn ðkÞÞT (k ¼ 1; 2; . . .; N denotes in this case either an observation in a training set or an index of the current discrete time). This vector is subsequently addressed to the first hidden layer that comprises n1 ¼ c2n elements (every element owns only two inputs). There is a special type of elements (the selection block) that accounts for choosing the best node in the strict sense of precision (in terms of an accepted criterion). For instance, the selection block in the first layer SB½1 selects n1 ðn1  nÞ signals with the highest accuracy among the output signals ^y½m1 ðkÞ ðm ¼ 1; 2; . . .; 0; 5nðn  1Þ ¼ c2n Þ of the first layer nodes N ½1 . ½1 

Afterwards, n2 pairwise combinations ^yl ðkÞ; ^y½p1  ðkÞ are composed (in most cases, n  n2  2n) among the mentioned above n1 best outputs. The signals obtained are later propagated to the second hidden layer composed by nodes N ½2 in a similar manner to the neurons N ½1 . The selection block of the second hidden layer ½1  SB½2 takes only signals which are better than ^y1 ðkÞ in accuracy among output signals ^y½m2 ðkÞ in the second hidden layer. The system’s evolution goes on until only ½s1 

½s1 

ðkÞ and ^y2 ðkÞ are being obtained at the SB½s1 outputs. two best signals ^y1 These two signals are then sent to the output node N ½s that calculates the system’s output signal ^y½s ðkÞ.

Fig. 2.31 A structure of the deep GMDH neuro-fuzzy system

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

88

2.10.1.1

The Extended Neo-fuzzy Neuron

A model of the extended NFN was put forward in [40] as a further development and evolution of an ordinary neo-fuzzy neuron submitted by Yamakawa, Miki and Uchino [13–15]. A traditional version of the neo-fuzzy neuron is a MISO (multiple inputs and a single output) non-linear system that accounts for the permutation ^y ¼

n X

fi ðxi Þ

i¼1

where xi signifies an i component in the input vector x ¼ ðx1 ; . . .; xi ; . . .; xn ÞT 2 Rn (of the dimensionality n), ^y marks a scalar output of the neo-fuzzy neuron. In its usual form, NFN embodies multiple (non-linear) synapses NSi . Their purpose is to modify the ith vector element in xi into fi ðxi Þ ¼

h X

wli lli ðxi Þ

l¼1

where h is the number of membership functions, wli defines a synaptic weight l in the ith non-linear synapse, l ¼ 1; 2; . . .; h, i ¼ 1; 2; . . .; n; lli ðxi Þ describes the lth membership function in the non-linear synapse i that makes a great impact on fuzzification of a crisp element xi . By such manners, the permutation ensured by the NFN could be noted down like ^y ¼

n X h X

wli lli ðxi Þ

i¼1 l¼1

The NFN provides the fuzzy inference rule put into action in the form IF xi IS Xli THEN THE OUTPUT IS wli ; l ¼ 1; 2; . . .; h which consequently infers that the synapse truthfully endows the 0th order fuzzy inference by Takagi-Sugeno [16, 17]. As mentioned previously, the NFN’s synapse NSi covers the 0-order inference by Takagi-Sugeno only producing the simplest Wang-Mendel neuro-fuzzy system [41, 42]. It seems quite valid to expand approximating capabilities of this computational node by introducing a specified topological element to have been called an “extended nonlinear synapse” [40] ðENSi Þ and to develop the “extended neo-fuzzy neuron” (ENFN) that embraces ENSi units instead of conventional synapses NSi .

2.10

A Deep GMDH System Based on the Extended Neo-fuzzy Neuron and Its Training

89

Considering in detail additional parameter values   uli ðxi Þ ¼ lli ðxi Þ w0li þ w1li xi þ w2li x2i þ    þ wpli xpi ; f i ð xi Þ ¼

h X

  lli ðxi Þ w0li þ w1li xi þ w2li x2i þ    þ wpli xpi

l¼1

¼ w01i l1i ðxi Þ þ w11i xi l1i ðxi Þ þ . . . þ wp1i xpi l1i ðxi Þ þ w02i l2i ðxi Þ þ    þ wp2i xpi l2i ðxi Þ þ    þ wphi xpi lhi ðxi Þ;  T wi ¼ w01i ; w11i ; . . .; wp1i ; w02i ; . . .; wp2i ; . . .; wphi ; ~i ðxi Þ ¼ ðl1i ðxi Þ; xi l1i ðxi Þ; . . .; xpi l1i ðxi Þ; l T

l2i ðxi Þ; . . .; xpi l2i ðxi Þ; . . .; xpi lhi ðxi ÞÞ ; present them in the following abridged form ~i ðxi Þ; fi ðxi Þ ¼ wTi l ^y ¼

n X i¼1

f i ð xi Þ ¼

n X

~ Tl ~ ð xi Þ ¼ w ~ ð xÞ wTi l

i¼1

 T T ~Ti ðxi Þ; . . .; l ~Tn ðxn Þ , ~ðxÞ ¼ l ~1 ðx1 Þ; . . .; l where l  T ~ T ¼ wT1 ; . . .; wTi ; . . .; wTn : w It can be noted easily that the ENFN holds ðp þ 1Þhn parameters (synaptic weights) to be adapted and the fuzzy inference realized by each ENSi is IF xi IS Xli THEN THE OUTPUT IS w0li þ w1li xi þ . . . þ wpli xpi ;

l ¼ 1; 2; . . .; h

which ties up to the Takagi-Sugeno inference of the pth order. The ENFN’s framework is not so complicated in comparison with the conventional neuro-fuzzy system. The architecture of the extended neo-fuzzy neuron and the extended neo-fuzzy synapse are given in Figs. 2.32 and 2.33. The usage of the scatter partitioning of the input space [21] can cause the appearing of “gaps” in the fuzzified space. To avoid this problem one can use the bell-shaped constructions with non-strictly local receptive support as membership functions. Mostly the Gaussians are used as membership functions of the first layer

90

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

Fig. 2.32 An extended neo-fuzzy neuron

Fig. 2.33 An extended neo-fuzzy synapse

ðxi ðkÞ  cli ðkÞÞ2 lli ðxi ðkÞÞ ¼ exp  2r2li ðkÞ

! ð2:45Þ

where cli ðkÞ is the parameter that defines the center of the membership function, rli ðkÞ is the width parameter of this function.

2.10.2 The Adjustment Procedures for All Parameters of the System ½1

With regard to the fact that the reference signal ^ys ðkÞ in every system node is in linear dependence on the configurable synaptic weights wli , one can make use of both either the established least squares method or its recurrent fashion to tune them. If the data to be trained is not stationary, it is feasible enough to apply the

2.10

A Deep GMDH System Based on the Extended Neo-fuzzy Neuron and Its Training

91

exponentially weighted recurrent least squares algorithm to adjust the weights as represented by 8   T > > ~ ~ ~ðxðkÞÞ P ð k  1 Þ yðkÞ  ð w ð k  1 Þ Þ l ð xðkÞ Þ l > > > ~ ðkÞ ¼ w ~ ð k  1Þ þ ;

> ~ðxðkÞÞÞT Pðk  1Þ lðxðkÞÞðl > PðkÞ ¼ 1 Pðk  1Þ  Pðk  1Þ~ > > a : ~ðxðkÞÞÞT Pðk  1Þ~ a þ ðl lðxðkÞÞ (where 0\a  1 denotes a forgetting feature, and yðkÞ implies the reference signal) or the exponentially weighted gradient learning procedure 8 > < > :

 ~ ðkÞ ¼ w ~ ð k  1Þ þ w

 ~ ð k  1Þ Þ T l ~ðxðkÞÞ l ~ðxðkÞÞ yðkÞ  ðw

bðkÞ ~ðxðkÞÞk2 ; 0  a  1: bðkÞ ¼ abðk  1Þ þ kl

;

ð2:47Þ

A process of tuning both parameters of the centers and the synaptic weights may be implemented by means of the gradient procedures for minimization of the learning criterion 2 1 1 ~ ðkÞÞT l ~ðxðkÞÞ yðkÞ  ðw EðkÞ ¼ ðyðkÞ  ^yðkÞÞ2 ¼ 2 2

ð2:48Þ

in the form of 8 @EðkÞ > > ; < cri ðkÞ ¼ cri ðk  1Þ  gc @cri @EðkÞ > > ~2ri ðk  1Þ  gr ~2ri ðkÞ ¼ r :r @~ r2ri

ð2:49Þ

where r ¼ 1; 2; . . .; h; gc , gr signify learning rates for the centers’ and the widths’ ~2ri ðkÞ ¼ 0; 5r2 parameters are denoted correspondingly, r ri ðkÞ. Based on the previous expressions, the following expressions are obtained 8   @f ðx ðkÞÞ i i > @EðkÞ > ~ ðkÞÞT l ~ðxðkÞÞ  yðkÞ ; < @cri ¼ ðw @c   @f ðx riðkÞÞ i i > @EðkÞ > ~ ðkÞÞT l ~ðxðkÞÞ  yðkÞ : : @~r2 ¼ ðw ri @~ r2ri Following on from (2.50), the derivatives presented in the form:

ð2:50Þ

@fi ðxi ðkÞÞ @fi ðxi ðkÞÞ and could be @cri @~ r2ri

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

92

8 p @fi ðxi ðkÞÞ @uri ðxi ðkÞÞ X t t @lri ðxi ðkÞÞ > > ¼ ¼ wri xi ; > < @cri @cri @cri t¼0 p > @fi ðxi ðkÞÞ @uri ðxi ðkÞÞ X t t @lri ðxi ðkÞÞ > > ¼ ¼ wri xi ; : @~ r2ri @~ r2ri @~ r2ri t¼0 Basing on (2.45), the derivatives

@lri ðxi ðkÞÞ @cri

and

@lri ðxi ðkÞÞ @~ r2ri

ð2:51Þ

can be presented as

! 8 2 > @l ð x ðkÞ Þ x ðkÞ  c ðkÞ ð x ðkÞ  c ðkÞ Þ i i ri i ri > ri > ¼ exp  ; > < @cri r2ri ðkÞ 2r2ri ðkÞ ! 2 > @l ð x ðkÞ Þ ð x ðkÞ  c ðkÞ Þ > i i ri > > ri 2 ¼ ðxi ðkÞ  cri ðkÞÞ2 exp  : : @~ rri 2r2ri ðkÞ

ð2:52Þ

In this way, all the system nodes’ parameters (synaptic weights, centers and width parameters for the membership functions) may be adjusted. Concerning the successive layers, the nodes’ parameters are usually tuned quite the same way as the nodes in the first hidden layer. It’s worth to note that inputs of the s-th layer are a pairwise combination of the ½s1  ½s1  signals ^yl ; ^yp formed by the selection block SB½s1 . The reference signal yðkÞ is the same one for all the blocks of the evolving complex system. The algorithm operates until the stopping criterion holds—MSE of the best node of current layer s starts to rise. Then the best neuron of the previous layer determines optimal deep network structure.

2.10.3 An Experimental Study The Darwin sea level pressure data set was chosen from the Data Market data storage to showcase a advantage of the offered deep GMDH system and its learning schemes. It was mainly used for non-stationary signals’ prediction. The data set presents chiefly a monthly sea level pressure for a period of more than a century (1882–1998). A general size of this data sample is 1400 observations. The system used 1100 observations to get trained and 300 observations to get tested. To Table 2.8 Experimental results A system

A learning error

A test error

Training time (s)

The proposed deep GMDH system MLP ANFIS RBFNN

0.0146 0.0150 0.0157 0.0172

0.0156 0.0168 0.0165 0.0224

0.2067 0.2500 0.2031 0.2391

2.10

A Deep GMDH System Based on the Extended Neo-fuzzy Neuron and Its Training

93

Fig. 2.34 Prediction results

estimate the efficiency of the proposed neuro-fuzzy system is, we also considered a multilayer perceptron, a radial-basis function neural network, and ANFIS for solving the same task. The results obtained were estimated according to the MSE criterion. Table 2.8 gives a demonstration of the systems’ performance. The proposed deep GMDH system illustrated quite good results while handling the prediction task. It is worth mentioning that its training time was short enough compared to analogues. At the same time, its forecasting results were the best ones for this data set. Figure 2.34 demonstrates a fragment of the learning process. Conclusion In this chapter new class of neural networks—Deep networks are considered and their learning algorithms are presented and discussed. For deep learning implementation encoders-decoders, restricted Boltzman machines (RBM) and stacked RBM are used. The main problems connected with Deep learning—vanishing and exploding gradient are considered and methods of their solution are presented and discussed. New approach to Deep learning based on application of GMDH to synthesis and learning of neuro-fuzzy networks is suggested and developed in this chapter. The deep evolving neuro-fuzzy system presented here doesn’t require any high data volumes to get trained. The hybrid system is grounded on both the Group Method of Data Handling and the concept of evolving systems that makes it possible to define both optimal parameter values and the best structure in every specific case. Adjusting parameters in a parallel fashion gives an option of increasing a processing speed of data handling. The system’s architecture may be evolving in an online mode as the synaptic weights, centers and widths’ parameters of the proposed neuro-fuzzy nodes are being tuned. This approach enables to overcome some problems of Big Data dimensionality in practical tasks of forecasting, classification and pattern recognition.

94

2 Deep Neural Networks and Hybrid GMDH-Neuro-fuzzy Networks …

References 1. G. Hinton, S. Osindero, Y.-W. Teh, A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527–1554 (2006) 2. I. Goodfellow, Y. Bengio, A. Courville, Deep Learning (MIT Press, 2016) 3. Y. Bengio, Y. LeCun, G. Hinton, Deep learning. Nature 521, 436–444 (2015) 4. J. Schmidhuber, Deep learning in neural networks: an overview. Neural Netw. 61 5. E. Lughofer, Evolving Fuzzy Systems—Methodologies, Advanced Concepts and Applications (Springer, Berlin, 2011, 2015), pp. 85–117 6. Z. Hu, Y.V. Bodyanskiy, O.K. Tyshchenko, A cascade deep neuro-fuzzy system for high-dimensional online possibilistic fuzzy clustering, in Proceedings of the XI-th International Scientific and Technical Conference “Computer Science and Information Technologies” (CSIT 2016) (2016), pp. 119–122. https://doi.org/10.1109/stc-csit.2016. 7589884 7. P. Angelov, D. Filev, N. Kasabov, Evolving Intelligent Systems: Methodology and Applications (Willey, 2010) 8. Y.V. Bodyanskiy, O.A. Vynokurova, A.I. Dolotov, Self-learning cascade spiking neural network for fuzzy clustering based on group method of data handling. J. Autom. Inform. Sci. 45(3), 23–33 (2013) 9. Y. Bodyanskiy, O. Vynokurova, A. Dolotov, O. Kharchenko, Wavelet-neuro-fuzzy network structure optimization using GMDH for the solving forecasting tasks, in Proceedings of the 4th International Conference on Inductive Modelling ICIM 2013, Kyiv (2013), pp. 61–67 10. Y. Bodyanskiy, O. Vynokurova, N. Teslenko, Cascade GMDH-wavelet-neuro-fuzzy network, in Proceedings of the 4th International Workshop on Inductive Modeling «IWIM 2011» , Kyiv, Ukraine (2011), pp. 22–30 11. Y. Bodyanskiy, Y. Zaychenko, E. Pavlikovskaya, M. Samarina, Y. Viktorov, The neo-fuzzy neural network structure optimization using the GMDH for the solving forecasting and classification problems, in Proceedings of the International Workshop on Inductive Modeling, Krynica, Poland (2009), pp. 77–89 12. A.G. Ivakhnenko, Heuristic self-organization in problems of engineering cybernetics. Automatica 6(2), 207–219 (1970) 13. T. Yamakawa, E. Uchino, T. Miki, H. Kusanagi, A neo fuzzy neuron and its applications to system identification and prediction of the system behavior, in Proceedings of the 2nd International Conference on Fuzzy Logic and Neural Networks (1992), pp. 477–483 14. E. Uchino, T. Yamakawa, Soft computing based signal prediction, restoration and filtering, in Intelligent Hybrid Systems: Fuzzy Logic, Neural Networks and Genetic Algorithms (Kluwer Academic Publisher, Boston, 1997), pp. 331–349 15. T. Miki, T. Yamakawa, Analog implementation of neo-fuzzy neuron and its on-board learning, in Computational Intelligence and Applications (WSES Press, Piraeus, 1999), pp. 144–149 16. M. Sugeno, G.T. Kang, Structure identification of fuzzy model. Fuzzy Sets Syst. 28, 15–33 (1998) 17. T. Takagi, M. Sugeno, Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 15, 116–132 (1985) 18. N. Kasabov, Evolving Connectionist Systems (Springer, London, 2003) 19. E. Lughofer, Evolving Fuzzy Systems—Methodologies, Advanced Concepts and Applications (Springer, Berlin, 2011) 20. R.J.-S. Jang, ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans. Syst. Man Cybern. 23, 665–685 (1993) 21. R.J.-S. Jang, C.-T. Sun, E. Mizutani, Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence (Prentice Hall, Upper Saddle River, 1997) 22. S. Osowski, Sieci neuronowe do przetwarzania informacji (Oficyna Wydawnicza Politechniki Warszawskiej, Warszawa, 2006)

References

95

23. A.G. Ivakhnenko, Long-Term Forecasting and Control of Complex Systems (Technica, Kiev, 1975) 24. A.G. Ivakhnenko, Polynomial theory of complex systems. IEEE Trans. Syst. Man. Cybern. 1 (4), 364–378 (1971) 25. A.G. Ivakhnenko, Self-Learning Systems of Recognition and Automatic Control (Technica, Kiev, 1969) 26. A.G. Ivakhnenko, D. Wuensch, G.A. Ivakhnenko, Inductive sorting-out GMDH algorithms with polynomial complexity for active neurons of neural networks. Neural Netw. 2, 1169– 1173 (1999) 27. A.G. Ivakhnenko, G.A. Ivakhnenko, J.A. Mueller, Self-organization of the neural networks with active neurons. Pattern Recognit. Image Anal. 4(2), 177–188 (1994) 28. G.A. Ivakhnenko, Self-organization of neuronet with active neurons for effects of nuclear test explosions forecasting. Syst. Anal. Model. Simul. 20, 107–116 (1995) 29. K.S. Narendra, K. Parthasarathy, Identification and control of dynamical systems using neural networks. IEEE Trans. Neural Netw. 1, 4–26 (1990) 30. T. Kondo, Identification of radial basis function networks by using revised GMDH-type neural networks with a feedback loop, in Proceedings of the SICE Annual Conference, Tokyo, Japan (2002), pp. 2882–2887 31. T. Ohtani, Automatic variable selection in RBF network and its application to neurofuzzy GMDH, in Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, vol. 2 (2000), pp. 840–843 32. Yu. Zaychenko, The fuzzy group method of data handling and its application for economical processes forecasting. Sci. Inq. 7(1), 83–96 (2006) 33. T. Ohtani, H. Ichihashi, T. Miyoshi, K. Nagasaka, Y. Kanaumi, Structural learning of neurofuzzy GMDH with Minkowski norm, in Proceedings of the 1998 Second International Conference on Knowledge-Based Intelligent Electronic Systems, vol. 2 (1998), pp. 100–107 34. Y. Bodyanskiy, O. Vynokurova, I. Pliss, Hybrid GMDH-neural network of computational intelligence, in Proceedings of the 3rd International Workshop on Inductive Modeling, Krynica, Poland (2009), pp. 100–107 35. A.G. Ivakhnenko, V.S. Stepashko, Disturbance Tolerance of Modeling (Naukova Dumka, Kiev, 1985) 36. Y. Bodyanskiy, N. Teslenko, P. Grimm, Hybrid evolving neural network using kernel activation functions, in Proceedings 17th Zittau East-West Fuzzy Colloquium, Zittau/Goerlitz, HS (2010), pp. 39–46 37. D.T. Pham, X. Liu, Neural Networks for Identification, Prediction and Control (Springer, London, 1995) 38. A. Bifet, Adaptive Stream Mining: Pattern Learning and Mining from Evolving Data Streams (IOS Press, Amsterdam, 2010) 39. C.C. Aggarwal, Data Streams: Models and Algorithms (Advances in Database Systems) (Springer, New York, 2007) 40. Y. Bodyanskiy, O. Tyshchenko, D. Kopaliani, An extended neo-fuzzy neuron and its adaptive learning algorithm. Int. J. Intell. Syst. Appl. (IJISA) 7(2), 21–26 (2015) 41. L.-X. Wang, Adaptive Fuzzy Systems and Control. Design and Statistical Analysis (Prentice Hall, Upper Saddle River, 1994) 42. L.-X. Wang, J.M. Mendel, Fuzzy basis functions, universal approximation, and orthogonal least-squares learning. IEEE Trans. Neural Netw. 3(5), 807–814 (1992)

Chapter 3

Pattern Recognition in Big Data Analysis

3.1

Introduction

Data classification and pattern recognition substitute one of the widely used class of problems in Data Mining. Up to date many methods and algorithms were developed for pattern recognition in different spheres of science and technology. Most of the modern methods of classification may be divided into following classes: (1) methods based on statistical decision-making theory, incl. Bayesian methods based on application of conditional probability distributions; (2) methods of discriminant analysis, incl. well-known SVM method and its derivatives; (3) algebraic and linguistic methods; (4) neural networks; (5) fuzzy logic systems and fuzzy neural networks (FNN); (6) special methods. But for solution of classification problems with BD it’s extremely important is the development of new adequate methods or further improvement of existing methods which take into account the high dimension of BD warehouses. Most of them use various approaches and algorithms of dimensionality reduction, e.g. Principal component method (PCM) and similar techniques. Another constructive approach for BD dimensionality reduction is hierarchical organization of data. In this chapter classification method based FNN is considered and some algorithms of classification problems dimensionality reduction are presented and discussed. In the Sect. 3.2 FNN NEFClass is considered Its architecture and training algorithm is presented and investigated. In the Sect. 3.3 modified FNN NEFClass M is described free of some drawbacks of basic FNN NEFCLass its training algorithms are described and analyzed.

© Springer Nature Switzerland AG 2020 M. Z. Zgurovsky and Y. P. Zaychenko, Big Data: Conceptual Analysis and Applications, Studies in Big Data 58, https://doi.org/10.1007/978-3-030-14298-8_3

97

98

3 Pattern Recognition in Big Data Analysis

In Sect. 3.5 application of FNN NEFClass M for optical images recognition obtained with multi spectral system is presented and analyzed. In the Sect. 3.6 implementation of FNN for medical images of uterus classification in the problem of express diagnostics is considered. In the Sect. 3.7 the hybrid CNN-FNN network is considered which was suggested for medical images of breast tumor recognition in the problem of medical diagnostics. The experimental of the suggested approach are presented and its practical implementation for medical images classification and is described. The reduction of features dimensionality in his problem was considered and for its solution Principal components method was suggested and its efficiency was estimated. The suggested approach may be used for solution BD classification problems.

3.2

FNN NEFClass. Architecture, Properties, the Algorithms of Learning of Base Rules and Membership Functions

A classification problem is one of the most actual spheres of application of the computational intelligence systems. For its decision different approaches and methods were suggested, among which popular solutions were offered, combining neural networks and fuzzy inference systems. One of such decisions is the system NEFClass (NEuro-Fuzzy CLASSifier), based on the generalized architecture of fuzzy perceptron and suggested by D. Nauck and R. Kruse in [1–3]. Both original and modified model of NEFClass are derivative from the general model of fuzzy perceptron [4]. A model purpose is a development of fuzzy rules from a set of data which can be divided into the several non-overlapping classes. The fuzziness arises up due to the imperfect or incomplete measuring of properties of objects, subject to classification. Fuzzy rules, describing expert information, have the following form: if is l1i and x2 is l2i and … and xn is lni , then pattern ðx1 ; x2 ; . . .; xn Þ belongs to the class of i, where l1i ; . . .; lni ; are MF of fuzzy sets. The goal of NEFClass is to define these rules, as well as parameters of membership functions for fuzzy sets. It was assumed here, that intersection of two different sets is empty. The system NEFClass has 3-layer successive architecture (see Fig. 3.1). The first layer U1 contains inputs neurons which inputs patterns are fed in. Activating of these neurons does not change usually input values. The hidden layer U2 contains fuzzy rules, and the third layer U3 consists of output neurons (classifiers).

3.2 FNN NEFClass. Architecture, Properties, the Algorithms …

99

Fig. 3.1 Structure of FNN NEFCLASS

Activations of rule neurons and neurons of output layer with the pattern of p are calculated so: n o ðpÞ aR ¼ min Wðx; RÞðaðpÞ x Þ ; x2U1

ðpÞ

aC ¼

X

ðpÞ

Wðc; RÞ  aR Þ;

ð3:1Þ ð3:2Þ

R2U2

or alternatively n o ðpÞ ðpÞ aC ¼ max aR ; R2U2

ð3:3Þ

where Wðx; rÞ is a fuzzy weight of connection of input neuron x with a rule neuron R, and WðR; cÞ—fuzzy weight of connection of a rule neuron R with the neuron c of output layer. Instead of application of operations of maximum and minimum it is possible to use other functions of so-called “t-norm” and “t-co-norm” accordingly [1]. A rule base is approximation of unknown function and describes a classification task /ðxÞ, such, that ci ¼ 1; cj ¼ 0 ðj ¼ 1; . . .; m; 8 j 6¼ iÞ, if pattern x belongs to the class Ci . Every fuzzy set is marked a linguistic term, such as «large», «small», «middle» et cetera. Fuzzy sets and linguistic rules present approximation of classifying

100

3 Pattern Recognition in Big Data Analysis

function and determine the result of the system NEFClass. They are obtained from a sample by learning. It’s necessary, that for every linguistic value (for example, «x1 is positive and large») there should be only one presentation of fuzzy set. Learning in the System NEFClass The system NEFClass can be built on partial knowledge about patterns. An user must define the amount of initial fuzzy sets for each of object features (number of terms) and set the value kmax that is a maximal number of rule nodes, which can be created in the hidden layer. For learning triangular MF are used. Consider the system of NEFClass with n input neurons x1 ; . . .; xn ; k ðk  kmax Þ rule neurons and m output neurons c1 ; . . .; cm ;. The learning sample of patterns is also given: L ¼ fðp1 ; t1 Þ; . . .; ðps ; ts Þg, each of which consists of input pattern p 2 Rn and desired pattern t 2 f0; 1gm . A learning algorithm consists of two stages. Stage 1. Generation of rule base. The first stage whose purpose is to create rule neurons of the system NEFClass consists of the followings steps [1–3]: 1. Choose a next pattern ðp; tÞ from sample L. 2. For every input neuron xi 2 U1 find such membership liJi that

ðiÞ

ðiÞ

lJi ¼ max flji ðpi Þg; j21;::q1

ð3:4Þ

where xi ¼ pi 3. If a number of rule nodes k is less than kmax and there is no rule node R such, that

Wðx1 ; RÞ ¼ lJ1 ; . . .; Wðxn ; RÞ ¼ lJn then create such node and connect it with an output node ci , if ti ¼ 1, and connect it with all input neurons and assign the corresponding weights liJi to connections. 4. If there are still not-processed patterns in L and k\kmax , then go to the step 1 and continue learning using next pattern, and otherwise stop. 5. Determine a rule base by one of three procedures: a. “Simple” rules learning: we leave the first k rules only (stop creation of rules, if it was created k ¼ kmax rules). b. The “best” learning rules: we process patterns in L and accumulate activating of every rule neuron for every class of patterns which were entered into system NEFClass. If rule neuron R shows the greater accumulation of activating for a class Cj than for a class CR, which was specified initially for

3.2 FNN NEFClass. Architecture, Properties, the Algorithms …

101

this rule, then change implication of rule R from CR to Cj, that means connect R with the output neuron cj. We continue processing of patterns in L farther and calculate for every rule neuron the activation function: VR ¼

X

ðpÞ

aR  e p

ð3:5Þ

p2L

where  ep ¼

1; if pattern p is classified correctly 1; otherwise

We leave k rule neurons with the greatest values of VR and delete other rule neurons from the system NEFClass. c. The “best for every class” algorithm of learning: we operate   as in the previous case, but leave for each class Cj only those best mk rules, the consequences of which relate to the class Cj (where ½ x is integer part from x). Learning of Fuzzy Sets MF Stage 2 On the second stage learning of parameters of membership functions (MF) of fuzzy sets is performed. A learning algorithm with teacher of the system NEFClass must adapt MF of fuzzy sets. The algorithm cyclic runs through all learning patterns of the sample L, executing the following steps, until one of stop criteria will be fulfilled [1–3]. Steps: 1. Choose a next pattern (p, t) from sample L, enter it into FNN NEFclass and determine an output vector c. 2. For every output neuron ci calculate the value dCi d Ci ¼ t i  a Ci ; where ti is a desired output, aci is an real output of neuron ci . 3. For every rule neuron R, for which output is aR [ 0 execute: a. determine a value dR , equal d R ¼ aR  ð 1  aR Þ 

X C2U3

b. Find such x0 , that

W ðR; C ÞdC

ð3:6Þ

102

3 Pattern Recognition in Big Data Analysis

  Wðx0 ; RÞðax0 Þ ¼ min Wðx; RÞðax Þ : x2U1

ð3:7Þ

c. For fuzzy sets Wðx0 ; RÞ determine displacement (shift) of parameters of MF Da ; Db ; Dc , using learning speed r [ 0:

Db ¼ r  dR  ðc  aÞ  sgnðax0  bÞ;

ð3:8Þ

Da ¼ r  dR  ðc  aÞ þ Db ;

ð3:9Þ

Dc ¼ r  dR  ðc  aÞ þ Db :

ð3:10Þ

and execute the changes of Wðx0 ; RÞ. d. Calculate an rule error:

E ¼ aR  ð 1  aR Þ 

X

ð2  WðR; cÞ  1Þ  jdc j:

ð3:11Þ

c2U3

End of iteration. Repeat the described iterations until condition of stop will be fulfilled. It is possible to use as criteria of stop, for example, such: 1. An error has not decreased during n iterations. 2. Stop learning after achievement of the defined (desirably close to the zero) error value.

3.3

Analysis NEFClass Properties. The Modified System NEFClassM

FNN NEFClass has several obvious advantages, distinguishing it among the other classification systems. The most important are: easiness of implementation, high-speed algorithms of learning, as well as that is the most important, high accuracy of data classification—at the level of the best systems in this area. However, the basic system NEFClass has some shortcomings: 1. formulas used for parameters learning are empirical in nature, in addition, 2. it is not clear how to choose in the learning algorithm the learning speed parameter r. Therefore, these shortcomings were deleted in the modification of basic system – so-called system NEFClass-M (modified) developed in [5].

3.3 Analysis NEFClass Properties. The Modified System NEFClassM

103

Randomization and careful selection rate constants learning r are inherent properties of the system NEFCLASS-M. These properties have been designed to mitigate the impact some of the shortcomings the original model and have made it possible to achieve a significant improvement in the quality of classification. Randomization. Because of the nature of the training algorithm “simple” rules base and learning algorithm of fuzzy sets, the outcome of the training network for these algorithms are highly dependent on order, in which samples are represented in a learning sample. If, for example, the samples will be sorted by classes, the system will better classify the patterns of one class and substantially worse—the patterns of the other class. Ideally, the patterns in the training sample must be randomly mixed, in order to avoid the negative effect. Implementation of the system NEFClassM [5] avoids this complexity by “randomization of patterns order in a learning sample after its boot. Moreover, such “randomization” occurs before each iteration of learning algorithm. As further experiments had shown, this allows to achieve a more stable and, often, the better classification results, which do not depend on the order in which patterns in a learning sample has been submitted by a user. Choice of speed training. In the learning algorithm of fuzzy sets in the model NEFCLASS is used parameter training speed r. As experiments had shown, carried out in the course of developing the NEFClass M, this parameter plays a vital role in the success of the training. The experiments had shown that, under other parameters being equal, for each specific task training there exists a certain value r, which ensures a minimum percentage of erroneous classification after the training. Unfortunately, to obtain analytical dependence for optimal parameter value is very difficult because learning algorithm NEFCLASS as a whole is empirical; however, using search and try method it was found that for many tasks optimal value r lies in the narrow range [0.06–0.1], in particular it may be equal to 0.07. This value has been set for the program which implements a modified model NEFClass M [5].

3.3.1

The Modified Model NEFCLASS

Consider the basic shortcomings in the NEFCLass learning algorithm. The analysis of the drawbacks of NEFCLASS has shown that their principal cause lies mostly in an empirical learning algorithm of fuzzy sets. Therefore, a natural approach, aimed to correct the situation, was the replacement of empirical learning algorithm by the strict optimization algorithm with all the ensuing consequences for network architecture and algorithms. Both the original and modified model NEFCLASS are based on the architecture of a fuzzy perceptron [1, 5, 6]. Architectural differences of the original and the modified model lie in the form of membership functions of fuzzy sets, function

104

3 Pattern Recognition in Big Data Analysis

t-norm for calculation rules activations of neurons, as well as aggregating function (t-conorms), determining the activation of output neurons. The application of numerical optimization methods requires differentiability of the membership functions of fuzzy sets—condition to which the triangular membership functions don’t satisfy. Therefore the modified model of fuzzy sets uses the Gaussian membership functions, described as (

) ðx  aÞ2 lðxÞ ¼ exp  : 2b2 This membership function is defined by two parameters—a and b. The requirement of differentiability also dictates the choice of t-norms (intersections) for calculating neuron activation rules. In the system NEFCLASS for this operation is used minimum; in the modified system NEFCLASS-M -product of the corresponding values. Finally, the kind of aggregate function (t-conorm) for modified model is limited only by the weighted sum. The reason consists in the fact that the maximum function which is used in the original system also does not satisfy the condition of differentiability. The main change is obviously relates to a learning algorithm of fuzzy sets. The objective function in the modified system NEFClass is minimization of the mean squared error on the training sample by analogy with the classical (clear) neural networks: minE ¼

N   1X aðpÞ  aðpÞ 2 c c N p¼1 ðpÞ

where the N—number of patterns in the training sample, ac is an activation vector ðpÞ of neurons in the output layer for the next training sample p, ac is a target value of this vector for the pattern p. The components of the target vector for the pattern p are equal: ðpÞ

aij

 ¼

0; i 6¼ j 1; i ¼ j

where j is a index of the true class to which this pattern p belongs, i is classification of pattern p by NEFClass. The argument of numerical optimization aimed at reducing MSE for the training set is the aggregate vector of parameters a and b of FNN. As a specific training method can be used any method unconstrained optimization such as the gradient method or the conjugate gradient method, these both methods were implemented in this investigation.

3.4 Experimental Studies. Comparative Analysis of FNN NEFClass …

3.4

105

Experimental Studies. Comparative Analysis of FNN NEFClass and NEFClass-M in Classification Problems

Experiments were conducted on the classification of the two sets of data IRIS and WBC [5, 6]. Selection of IRIS and WBC test kits was dictated by two considerations: firstly, these sets can be considered standard for classification problems, and secondly, in the original works of authors NEFCLASS model was tested on these data sets [1–3]. This allows to compare the results of the base system NEFCLASS with a modified NEFCLASS_M and estimate the effect of introduced improvements. IRIS Data Set IRIS set contains 150 samples belonging to three different classes (Iris Setosa, Iris Versicolour, and Iris Virginica), 50 samples of each class. Each sample is characterized by four properties. IRIS is the only one set by classification simplicity for which even a simple strategy of rules selection gives good results. In the first experiment, in a modified model NEFClass-M “simple” rules learning algorithm was used, and their number was limited to 10 with 3 fuzzy sets per variable (all other parameters were set to the default values). As a result, the system has created 10 rules and achieved only 4 classification errors of the 150 (i.e. 97.3% correct) patterns. The best result, which was managed to achieve with the “simple” rules learning algorithm is three rules with two essential variables, x3 and x4 , and the same order of misclassification (4 errors) [5]: R1: IF (any, any, large, large) THEN Class 3 R2: IF (any, any, medium, medium) THEN Class 2 R3: IF (any, any, small, small) THEN Class 1 The same result was achieved for the “better” and “best in class” rules learning algorithms. However, for the last two algorithms it’s possible further reduction in the number of fuzzy sets for variable x3 and x4 under the following rules (6 erroneous classification): R1: IF (any, any, small, small) THEN Class 1 R2: IF (any, any, large, small) THEN Class 2 R3: IF (any, any, large, large) THEN Class 3 The authors model NEFCLASS obtained the similar results, except that in their experiments, they used three fuzzy sets (linguistic values) for x3 and x4 [1, 2]. Thus, for a set of data IRIS it was managed to achieve better results than in the original works—exclusively simple set rules of two variables with only two decomposing sets for each variable. Dataset WBC The next test sample for classification was standard data sample Wisconsin Breast Cancer (WBC). When processing sample Wisconsin Breast Cancer using system

106

3 Pattern Recognition in Big Data Analysis

NEFClass-M interesting results were obtained which didn’t always coincide with the results of the basic model NEFCLASS. Following the course of the experiments by the authors of NEFCLASS [1, 2] for system training rule base learning algorithm with the “best in the class” (three sets in the variable). was used with maximum 4 rules. The resulting error of misclassification obtained for the system NEFClass-M was 28 patterns of 663 (95.7% correct) [7]. Very interesting is the fact that for model NEFClass for similar parameters correct classification value was only 80.4% (135 misclassification). This is a significant advantage of the modified system NEFClass-M which can be explained by suggested modifications that distinguish this model from basic NEFCLASS model, namely, the use of randomization algorithm, the choice of learning rate and application of numerical algorithm of optimization (gradient method for MF learning. The best result that was managed to obtain for the data set WBC is the rule base of 8 rules with five essential variables x1 ; x2 ; x4 ; x6 and x9 (misclassification—19 errors) [5]: R1: R2: R3: R4: R5: R6: R7: R8:

IF IF IF IF IF IF IF IF

(small, small, any, small, any, small, any, any, small) THEN Class 1 (small, small, any, large, any, small, any, any, small) THEN Class 1 (small, small, any, small, any, small, any, any, large) THEN Class 1 (large, large, any, small, any, large, any, any, small) THEN Class 2 (large, large, any, large, any, small, any, any, small) THEN Class 2 (small, large, any, small, any, large, any, any, small) THEN Class 2 (large, small, any, small, any, small, any, any, small) THEN Class 2 (large, small, any, small, any, small, any, any, large) THEN Class 2

Comparable results (24 misclassification) were obtained with the use of a maximum of 2 rules (“the best in the class”) with all the important variables, except x5 and x7 : R1: IF (small, small, small, small, any, small, any, small, small) THEN Class 1 R2: IF (large, large, large, small, any, large, any, large, small) THEN Class 2 Thus, the results obtained by NEFCLASS-M are superior over basic model NEFCLASS both in number of rules/significant variables and classification accuracy. This confirms the efficiency of the modifications made to the model NEFClass: randomization, the correct choice of speed training and application of numerical optimization algorithms.

3.5

Application of NEFClass in the Problem of Objects Recognition at Electro-Optical Images

Using multi-spectral electro system operating in three ranges—red, green and blue images were obtained of the ocean and the coastal surface. It was required to recognize objects in the form of geometric shapes on water surface and on the sand

3.5 Application of NEFClass in the Problem of Objects …

107

[8, 9]. For these purposes, accounting the complexity of the problem as well as a large level of noise it was suggested to use fuzzy neural networks, in particular NEFClass. In order to organize the training of FNN NEFClass a number of learning algorithms were developed—gradient, conjugate gradient and genetic ones and their efficiency was investigated and compared to the basic training algorithm of the system NEFClass [1, 2].

3.5.1

Gradient Learning Algorithm for NEFClass

For the first stage of the algorithm—learning rule base the first phase of the basic algorithm NEFClass is used. The second stage uses a gradient algorithm for training the feedforward neural network, which is described below [5, 8]. Let the criterion of training fuzzy neural network, which has 3 layers (one hidden layer), be as follows: eðWÞ ¼

M X

ðti  NETi ðWÞÞ2 ! min

ð3:12Þ

i¼1

where ti —the desired value of the i-th output of neural network; NETi ðWÞ—the actual value of the i-th neural network output for the weight matrix   W ¼ W I ; W 0 ; W I ¼ Wðx; RÞ ¼ lj ðxÞ; W O ¼ WðR; CÞ:

Let activation function for the hidden layer neurons (neurons of rules) be such: OR ¼

N Y

ðiÞ

lji ðxi Þ; j ¼ 1; . . .; qi ;

ð3:13Þ

i¼1

where lji ðxÞ—membership function, which has the form (Gaussian): ðiÞ lji ðxÞ

¼e



ðxaji Þ2 b2 ji

;

ð3:14Þ

and the activation function of neurons in the output layer (weighted sum): P OC ¼

WðR; CÞ  OR P ; WðR; CÞ

R2U2

R2U2

ð3:15Þ

108

3 Pattern Recognition in Big Data Analysis

or maximum function: OC ¼ maxWðR; CÞ  OR :

ð3:16Þ

Consider the gradient learning algorithm of fuzzy perceptron. 1. Let WðnÞ—be the current value of the weights matrix. The algorithm has the following form: Wðn þ 1Þ ¼ WðnÞ  cn þ 1 rw eðWðnÞÞ;

ð3:17Þ

where cn —the step size at n-th iteration; rw eðWðnÞÞ—gradient (direction), which reduces the criterion (3.12). 2. At each iteration, we first train (adjust) the input weight W, which depend on the parameters a and b (see the expression 3.14) aji ðn þ 1Þ ¼ aji ðnÞ  cn þ 1

@eðWÞ ; @aji

ð3:18Þ

bji ðn þ 1Þ ¼ bji ðnÞ  c0n þ 1

@eðWÞ ; @bji

ð3:19Þ

where c0n þ 1 —step size for parameter b. M X @eðWÞ ðx  aji Þ ¼ 2 ððtk  NETk ðwÞÞ  WðR; CÞÞ  OR  ; @aji b2ji k¼1

ð3:20Þ

M X @eðWÞ ðx  aji Þ2 ¼ 2 ððtk  NETk ðwÞÞ  WðR; CÞÞ  OR  : @bji b3ji k¼1

ð3:21Þ

3. We find (train) output weight:

@eðW O Þ ¼ ðtk  NET k ðW O ÞÞ OR ; @WðR; Ck Þ WkO ðn þ 1Þ ¼ WkO ðnÞ  c00n þ 1 4. n :¼ n þ 1 and go to the next iteration.

@eðW O Þ : @WðR; Ck Þ

ð3:22Þ ð3:23Þ

3.5 Application of NEFClass in the Problem of Objects …

109

The gradient method is the first proposed learning algorithm, it is easy to implement, but has the disadvantages: 1. converges slowly; 2. only finds a local extremum. Conjugate Gradient Method for the System NEFClass Conjugate gradient algorithm, as well as more general algorithm of conjugate directions, was used in the field of optimization thanks to a wide class of problems for which it ensures the convergence to the optimal solution for a finite number of steps. Its description is considered in [9] and isn’t described here.

3.5.2

Genetic Method for Training System NEFClass

Consider the implementation of a genetic algorithm to train NEFCLASS. This algorithm is a global optimization algorithm. It uses the following mechanisms [9]: 1. crossing-over pairs of parents and generation of descendants; 2. mutation (random effects of the action); 3. the natural selection of the best (selection). The purpose of training—to minimize the mean square error: EðWÞ ¼

M 1X ðtk  NETk ðWÞÞ2 ; M k¼1

ð3:30Þ

where M is the number of classes; tk is the desired classification; NETk ðWÞ—classification result of NEFCLASS;W ¼ ½WI ; WO ,         WI ¼ wIij  are inputs weights, WO ¼ wO ij —output weights. Any individual (specimen) is described by the appropriate vector of weights W. Set the initial population of N individuals ½WI ð0Þ; . . .; Wi ð0Þ; . . .; WN ð0Þ. Calculate the index of fitness (FI), and evaluate the quality of recognition: FIðWi Þ ¼ C  EðWi Þ ! max;

ð3:31Þ

where C—a constant. Next step is the crossing of parental pairs. When selecting parents a probabilistic mechanism is used. Let Pi be the probability of selecting the i-th parent

110

3 Pattern Recognition in Big Data Analysis

Pi ¼

FIðWi ð0ÞÞ ; N P FIðWi ð0ÞÞ

ð3:32Þ

i¼1

Then the crossing of selected pairs is performed. It’s possible to apply different mechanisms of crossing. For example: for the first offspring even components of the vector of the first parent and the odd components of the vector of the other parent are taken, and for the second on the contrary: Wi ð0Þ  Wk ð0Þ ¼ Wi ð1Þ þ Wk ð1Þ  wij ð1Þ ¼

ð3:33Þ

wij ð0Þ; if j ¼ 2m

wkj ð0Þ; if j ¼ 2m  1  wkj ð0Þ; if j ¼ 2m wkj ð1Þ ¼ wij ð0Þ; if j ¼ 2m  1

ð3:34Þ

  where Wi ¼ wij j¼1;R , m  R=2. Choose N2 pairs of parents and generate N descendants. After generating offsprings, the mutation acts on the new population: w0ij ðnÞ ¼ wij ðnÞ þ nðnÞ

ð3:35Þ

where a ¼ const 2 ½1; þ 1; nðnÞ ¼ aean ; a—mutation rate of extinction; a—is selected randomly from the interval [0, 1]. Then, after the effect of mutation selection procedure is performed in a population, which allows to choose the “fittest” individuals. Different mechanisms of selection may be used. 1. Complete replacement of the old to the new population. 2. Selecting the best N of all existing species Npar þ Nch by the criterion of maximum FI After the crossing, mutation and selection of the current iteration ends. The iterations are repeated until one of the stop criteria will be fulfilled.

3.5.3

Experiments on Objects Recognition on Optical Images

For images processing the electro-optical imaging system ENVI was used and its ability to map, that is, to combine the images of the check points, obtained from the

3.5 Application of NEFClass in the Problem of Objects …

111

Fig. 3.2 Initial data

different spectral cameras [8]. This enables to get a multispectral image. In the Fig. 3.2 initial data for mapping are shown. After selecting the 15 control points in the images in different spectrum (this function is not automated) images are merged and we get the so-called multispectral cube. The result is shown in Fig. 3.3. On the images there were nine different types of surfaces that need to be classified. For analysis and processing, so-called ROI (Region of Interest) on images were used. On the image homogeneous region was determined, for example, sand, water, foam, target red target white color and so on. The result of this detection can be seen in Fig. 3.4. Next, using a processing system the mean value and the variance of the selected region were received. The data obtained were later tabulated. Fig. 3.3 Multispectral image

112

3 Pattern Recognition in Big Data Analysis

Fig. 3.4 Image of ROI

These data characterize the nine classes of surface areas [8]: • white target; red target; green target; blue target; yellow target; foam; water; dry sand; wet sand. For classification of objects it was suggested to use FNN NEFClass_M [8]. These types of surfaces correspond to nine output nodes in the system NEFClass_M. The total number of features used to classify the kinds of surfaces is four, namely: • • • •

the brightness in the brightness in the brightness in brightness in the

the red spectrum (RS); the blue spectrum (BS); the green spectrum (GS); infrared spectrum (IS).

The total number of data is 99, 11 for each class. Present the main statistical characteristics of the data set obtained by multispectral system «Mantis» (Tables 3.1 and 3.2) [8]. To explore the effectiveness of various learning algorithms in the problem of electro-optical image recognition using NEFClass software kit was developed named NEFClass- BGCGG (Basic, Gradient, Conjugate Gradient, Genetic) [8, 9]. Further experiments were carried out with the software kit NEFClass-BGCGG. According to the basic principle of model investigation experiments were carried out by changing only one parameter each time. Of the available 99 patterns 54 patterns served as a training sample. The other 45 patterns were used for testing. The values of the basic parameters of the simulation algorithm were set to the starting positions (see Table 3.3): During the process of training 15 rules was generated presented in the Table 3.4.

3.5 Application of NEFClass in the Problem of Objects …

113

Table 3.1 Statistical characteristics of multispectral system “Mantis” Evidence

Minimum

Maximum

Average

Pattern deviation

The correlation between the symptoms and the class

Brightness in the RS Brightness in the BS Brightness in the GS Brightness in the IS

28.81

255.00

165.40

76.14

−0.46

72.93

255.00

165.43

68.62

−0.32

44.34

254.89

121.57

57.64

−0.52

17.03

255.00

140.84

81.58

−0.49

Table 3.2 The correlation between the features

Brightness the RS Brightness the BS Brightness the GS Brightness the IS

in

Brightness in the RS

Brightness in the BS

Brightness in the GS

Brightness in the IS

1

0.7

0.58

0.95

1

0.77

0.7

1

0.59

in in in

1

Table 3.3 The values of the parameters for the program Parameter

Value

Algorithm generation rules The learning algorithm

The best for the class Classic, gradient, Genetic, CG Maximum Weighted sum 5 for all ra = 0.1 rb = 0.1 rc = 0.1 r = 0.1

Number of generating rules The aggregation function The number of terms (values) for each feature Speed training for weight coefficients between the input nodes and the rule nodes Speed training for weight coefficients between the rules layer and the output layer The maximum number of epochs

50

114

3 Pattern Recognition in Big Data Analysis

Table 3.4 The rule base of a fuzzy classifier № of rule

№ Feature 1 value

№ Feature 2 value

Feature 3 value

№ Feature 4 value

Class №

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

4 4 4 4 2 1 4 3 3 4 0 3 1 1 1

4 0 0 1 3 0 4 4 3 4 0 2 0 1 0

4 1 0 0 1 1 1 3 2 3 0 1 0 0 0

4 4 4 4 1 0 4 3 3 3 0 2 1 1 0

0 1 1 1 2 3 4 5 5 5 6 7 8 8 8

The dependence of the quality of training on the number of rules that are generated in the first stage was investigated. For an objective assessment of the results testing on the test sample was performed. For this purpose we varied the number of rules, starting from 9 to 14. The results are shown in the Table 3.5. The obtained result is natural, the more rules, the better the results of the test classification. We have investigated the effect of the terms number in features on the quality of classification. Comparative table is given below (see Table 3.6) Very interesting result was obtained in this series of experiments [8]. From the Table 3.6 it follows that there exists an optimal number of terms that can be used to describe a collection of data during training. When the number of terms exceeds this value the number of misclassified samples increases, that is, by increasing the complexity of the model error increases.

Table 3.5 The dependence of the quality of classification on the number of rules

Number of rules

MSE

True classification (%)

9 10 11 12 13 14 15

13.071009 9.545608 9.910701 9.705482 4.769655 4.739224 4.751657

24 15 15 15 4 4 4

3.5 Application of NEFClass in the Problem of Objects …

115

Table 3.6 The dependence of the quality of classification on the number of terms Number of terms

MSE

True classification (%)

4 5 6 7 8 9 10

5.928639 4.626252 4.957257 5.228448 5.633563 6.797175 7.897521

4 4 4 4 4 4 7

System training using classical algorithm with the optimal number of terms in the features was performed. Forms of membership functions for each feature are shown in Fig. 3.5. The total sum of squared errors was 2.852081, the number of erroneous classifications—zero in the training set, while for the test sample MSE was equal to 4.6252, which is not bad result.

Fig. 3.5 The result of a classic learning algorithm

116

3 Pattern Recognition in Big Data Analysis

Fig. 3.6 Results of the gradient method

Experiments with the gradient algorithm. The results are shown in Fig. 3.6 (MF of fuzzy sets for each of the four features). An error at the end of the training was 2.042015, that a little bit better than for classical method. When testing MSE was 3.786005, and the portion of misclassification was 4%. Further, the option automatic speed adjustment of MF parameters was included, that is, we used the algorithm “golden section” for step value optimization. The results are shown below (Fig. 3.7). The same experiments were carried out with a conjugate gradient algorithm. The results are shown in Fig. 3.8. Further the method of golden section was added to training algorithm. The results can be seen in Fig. 3.9. Finally, experiments with a genetic algorithm with different MF—triangular and Gaussian were carried out [8]. The results of learning using different algorithms are presented in the comparative charts (Fig. 3.10) and Table 3.7. Note that for the training sample excellent results by the criterion of the percentage of misclassification were obtained for all algorithms.

3.5 Application of NEFClass in the Problem of Objects …

Fig. 3.7 The result of the gradient algorithm in tandem with the “golden section” algorithm

Fig. 3.8 The result of training by the conjugate gradient

117

118

3 Pattern Recognition in Big Data Analysis

Fig. 3.9 The result of training by conjugate gradient method with the selection step by “golden section” algorithm

Fig. 3.10 Comparative curves of the convergence rate to the optimal classification of different learning algorithms

3.5 Application of NEFClass in the Problem of Objects …

119

Table 3.7 Comparison table for different learning algorithms The learning algorithm of weighting coefficients

Training training MSE Misclassification (%)

Testing testing MSE Misclassification (%)

Classic Gradient Conjugate gradient Genetic with triangular membership functions (MF) Genetic with Gaussian MF

6.650668 5.9893 1.132871 11.110936

0 0 0 0

7.285827 6.829068 3.314763 13.677424

4 4 4 4

3.204446

0

4.568338

4

For all algorithms, this criterion is zero. However, on the test sample, the results were worse: at least two samples were misclassified. Also the sum of squared error (MSE) for all, without exception, learning algorithms increased. For ease of comparison, the number of iterations (epochs) has been limited to 50. As can be seen, the results are satisfactory, the level of correct classification on the test sample is 96%. These results may be improved by forming a more representative sample. Analyzing the curves in the Fig. 3.10 it can be clearly seen that the best method for the rate of convergence is the conjugate gradient method. Then the next is a genetic algorithm with Gaussian function. Less effective is the gradient method. Next by rate of convergence is classical algorithm used in the system NEFClass. And at the end of row the least effective is genetic method with a triangular membership function. However, the MSE criterion by which the curves were plotted, displays ambiguously classification quality. An important criterion for evaluation of methods efficiency is the minimum number of misclassified samples. From Table 3.7 one can see that all algorithms show the same results with respect to this criterion.

3.6

Recognition of Images in Medical Diagnostics Using Fuzzy Neural Networks

Introduction An important application sphere of pattern recognition systems is the problem of classification of optical medical images and diagnostics in medicine. Especially it relates to state recognition of human organs tissue and early detection of possible cancer. One of such tasks is cervix epithelium state analysis and diagnostics using optical images obtained with colposcope (a method of survey of a mucous

120

3 Pattern Recognition in Big Data Analysis

membrane of part of a neck of a uterus in the conditions of additional lighting and optical increase with the help of a colposcope) [10]. As a result of carrying out a colposcopy by the doctor the increased pictures of images with preliminary splitting into classes of diseases are provided. The problem of classification cervix epithelium state using images obtained with colposcope was considered in [10, 11] where for its solution was suggested the application of crisp neural networks Back propagation, neural networks with radial basis functions (RBFNN) and cascade RBFNN and their efficiency investigated. The goal of this presentation is the investigation of fuzzy neural network NEFClass for recognition of state of cervix epithelium in medical diagnostics and comparison of its efficiency with conventional RBF network.

3.6.1

Problem Statement

The problem consists in classification of obtained medical images using special medical tools: computer tomography, magneto-resonance tomography, colposcope etc. In medical images values of the color model RGB represent components of input vector and based on this information it’s needed to define, which class it should be referred to. The classifier thus refers object to one of classes according to a certain splitting of N-dimensional space which is called as input space, and dimension of this space is a number of vector components. For the solution of cervix epithelium state analysis and diagnostics problem using optical images theNefClass network with Gaussian membership function was suggested

3.6.2

Training of NEFClass System

The NEFClass system can be constructed on partial knowledge of samples. The user has to define quantity of initial fuzzy sets for each of object feature, and set value kmax —the maximum number of nodes rules which can be created in the hidden layer. Membership functions of Gauss and gradient algorithm of training of fuzzy sets are used for training. Let’s consider stages of recognition process. 1. Work with data. Construct a database of examples, characteristic for this task. Split all data set into two sets: training and test in the following ratio: • • • •

training training training training

50%, 60%, 70%, 80%,

test test test test

50%; 40%; 30%; 20%;

3.6 Recognition of Images in Medical Diagnostics Using Fuzzy Neural Networks

121

• training 90%, test 10%; 2. Preliminary processing. Choose system of features, characteristic for this task, and transform data appropriately that is to be fed into network inputs. As a result it is desirable to receive linearly separated space of a set of samples. As input data medical images of benign processes, are used namely: • • • • •

inflammatory processes in the form of branching of vessels; cervical erosion; traumatic deformation; large cervical ectropion. small cervical ectropion.

Each of these diseases is presented by a number of features which is to be classified by a neural network and are shown in the Figs. 3.11, 3.12, 3.13, 3.14, 3.15 and 3.16. 3. Designing, training and assessment of a network work quality. At this stage the number of rules, quantity of fuzzy sets and percentage ratio of training and testing samples are determined. 4. Choosing algorithm of a network training. As a training algorithm the gradient method was used. At this stage it is necessary to specify the accuracy, the steps size for all variables and a number of iterations. 5. Application and diagnosing. At the last stage we receive result of application of the neural NefClass network to a problem of medical diagnostics. We observe splitting images into RGB to the color scheme and a class to which the sample initially belonged. Also we obtain the result of recognition—a class to which the sample after training of a neural network belongs. The amount of misclassifications and an average error on sample are determined.

Fig. 3.11 Inflammatory processes

122 Fig. 3.12 Inflammatory processes

Fig. 3.13 Cervical erosion

Fig. 3.14 Traumatic deformation

3 Pattern Recognition in Big Data Analysis

3.6 Recognition of Images in Medical Diagnostics Using Fuzzy Neural Networks

123

Fig. 3.15 Large cervical ectropion

3.6.3

Experimental Investigations

The experimental investigations were carried out on real images of cervix uterus. Sample size consisted of 70 elements which contained 5 classifications of diseases. In process of experiments the training/test sample ratio, number of fuzzy sets of linguistic variables and number of rules were varied. The results of classification after training at training and test samples for various training/test samples ratio, number of fuzzy sets are presented in the Table 3.8 [12]. Figures 3.17, 3.18, 3.19 and 3.20 shows the dependence of ratio training/testing samples on the mean squared error and misclassification % (MAPE) for different number of fuzzy sets for each variable (feature). The next step in experiments was determination of results change due to variation of the rules number. For each number of fuzzy sets (3, 6, 7, and 11) training/ test sample ratio was used. It should be noted there is a number of rules, after which there is no change in the classification of samples and in the mean square error. The results are shown in Table 3.9 [12]. Comparison of the fuzzy neural network NefClass efficiency with the neural network RBF was performed. The results of RBF are shown in Table 3.10. Conclusions 1. The problem of recognition of objects on medical images in medical diagnostics is considered. The investigations were performed on the cervix uterus images obtained using colposcope. 70 images were selected which contained 5 classifications of diseases. 2. Fuzzy neural network NefClass and non- fuzzy neural network RBF were used for classification. Experiments were carried out on training/test samples in the ratios: 50/50, 60/40, 70/30, 80/20 and 90/10.

124

3 Pattern Recognition in Big Data Analysis

Fig. 3.16 Small cervical ectropion

Table 3.8 Performance results of NEFClass # of sets

Number of patterns training/ test

3

35–35

50–50

13

16

0.559

0.588

45.12

42–28

60–40

17

12

0.588

0.551

42.1

49–21

70–30

20

9

0.570

0.549

42.85

6

7

11

Ratio training/ test sample (%)

Misclassified patterns training

Misclassified patterns testing

MSE training

MSE testing

% Misclassification

56–14

80–20

23

6

0.562

0.540

42.857

63–7

90–10

25

4

0.551

0.562

57.14

35–35

50–50

2

9

0.1697

0.336

25.71

42–28

60–40

2

9

0.1699

0.330

32.14

49–21

70–30

3

6

0.167

0.306

28.57

56–14

80–20

2

2

0.1495

0.254

14.28 0

63–7

90–10

2

0

0.154

0.197

35–35

50–50

2

9

0.116

0.314

25.71

42–28

60–40

4

8

0.118

0.341

28.57

49–21

70–30

3

8

0.108

0.407

38.09

56–14

80–20

3

3

0.109

0.335

21.42

63–7

90–10

2

2

0.127

0.263

28.5

35–35

50–50

3

11

0.091

0.440

31.42

42–28

60–40

1

7

0.055

0.466

25

49–21

70–30

1

8

0.0434

0.550

38.09

56–14

80–20

2

4

0.054

0.377

28.57

63–7

90–10

1

1

0.064

0.221

14.28

3.6 Recognition of Images in Medical Diagnostics Using Fuzzy Neural Networks

Fig. 3.17 MSE for 3 sets

Fig. 3.18 MSE for 6 sets

Fig. 3.19 MSE for 7 sets

125

126

3 Pattern Recognition in Big Data Analysis

Fig. 3.20 MSE for 11 sets

Table 3.9 Results of FNN NEFClass versus number of rules Number of sets

3

6

Number of rules

For all rules

7

15

50

7

7 15

50

7

11 15

50

Sample (%)

90/10

80/20

80/ 20

80/ 20

80/ 20

80/20

80/20

70/ 30

70/ 30

70/ 30

Mismatch training

23

23

3

2

15

5

3

13

3

1

Mismatch testing

4

3

0

0

7

6

3

14

9

8

MSE training

0.550

0.426

0.163

0.154

0.335

0.170

0.109

MSE testing

0.536

0.344

0.214

0.197

0.492

0.442

0.335

%, misclassification

57.142%

42.85%

0%

0%

50%

42.85%

21.42%

Table 3.10 Results of RBF network Training/test (%)

50–50

60–40

70–30

80–20

90–10

Number of coincidences Number of non coincidences % misclassification

20 15 42.9

16 12 42.9

17 3 19

10 4 28.6

6 1 14.3

In process of experiment with NefClass number of fuzzy sets varied 3, 6, 7 and 11, the number of rules—50, for each sample the value of MSE (training and testing) was calculated. The best result was obtained for samples ratio 90/10, for which in the case of 6 sets were correctly classified all the patterns, while with 11 sets 6 patterns were correctly classified, 1 was classified incorrectly. The worst results were with 3 and 7 sets.

3.6 Recognition of Images in Medical Diagnostics Using Fuzzy Neural Networks

127

3. While changing the number of rules it was found that there exists an optimal number of rules after which the recognition error of the sample does not change. 4. The experiments with non-fuzzy RBF neural network had shown the best result was obtained for training/test sample ratio 90–10, with an error of classification 14.3%. The results of the fuzzy neural network proved to be much better than the RBFN. Additionally, for NefClass FNN it is possible to change the number of fuzzy sets and the number of rules.

3.7 3.7.1

Medical Images of Breast Tumors Diagnostics with Application of Hybrid CNN–FNN Networks State-of-Art Problem Analysis

In medical diagnostics problems substantial amount of problem constitute the features extraction for further processing and the choice features classification method. With development and wide dissemination of decision-support systems the demands to training algorithms are increasing. Reliability and simplicity of application influence on speed and quality of decision-making which is very important for express medical diagnostics. The advantages of medical diagnostics systems are speed, automation and stability of work which make them very comfortable tools for express medical diagnostics. Despite young age of medical informatics which don’t exceed 30 years information technologies in a whole are fast penetrating in various spheres of medicine and health defence. (family medicine, insurance medicine, building unified information space, integration in European medical space, etc.) Nowadays, in practice, at every stage of diagnostics information technologies are utilized. The main goal of medical automated systems are extension of spheres practical tasks which may be solved with computers aid, raise of level intellectual decision support of doctors in particularly in process of express diagnostics based on processing and analysis of medical images of human tissue obtained by different source (MRT, CT, etc). Now cancer constitute the great problem for health defence all over the world. Basing the on data of IARC (International Agency of Cancer Research) 8.2 million death cases were registered in year 2012, 27 million new cases of illness are expected till 2030 [13]. Among the different types of cancer breast cancer takes the second place by its occurrence in women. Besides, mortality of it very high as compared with other cancer diseases [14]. Despite of progress which was achieved by diagnostics technologies final diagnosis of breast cancer including classification of tumors and diagnosis still is performed by pathologo-anatomists which use visual analysis of histological patterns by microscope. The latest achievements in images processing technologies and machine learning enable to construct systems of automatic detection and

128

3 Pattern Recognition in Big Data Analysis

diagnostics (CAD/CADx) that may help pathologo-anatomists to make true diagnosis and accelerate his work. Classification of images histopathology on different patterns which corresponds to cancer and not-cancer states of tissue is often first rank goal in images analysis systems for automatic cancer diagnostics. The main problem in such systems lies therein they deal with complex histopathologic patterns. Up to date several models and methods were developed for breast cancer detection using various machine learning algorithms. Using such methods and technologies of AI as neuron networks and SVM accuracy of diagnostics from 76 to 94% was attained at data set with 92 images. Zhang et al. [15] suggested cascade approach. At the first cascade level the classifiers reject easy cases (those which evidently don’t pass test) and the others are transferred to the second level which uses more complex classification system and so on. This method was applied to data base of Israel technological Institute consisting of 361 images and accuracy results was 97%. The most of last papers refers to field of breast cancer classification oriented on integer image [16–19]. But wide implementation of BIC and other forms of digital pathology faces with such disturbances as high cost of implementation, insufficient productivity for huge amount of clinic procedures, interior technologic problems non- solved regulator questions and opposition from pathologo-anatomists side. Till now the most of works based on histologic breast cancer analysis were performed on not large datasets. Some improvement presents data set with 7909 breast images obtained from 82 patients [19]. In this research the authors estimated various texture descriptors and various classifiers and carried out the experiments with accuracy from 82 to 85%. Based on results presented in [19] one can conclude that texture descriptors may propose good solution for images processing. The alternative to this approach based on application of texture descriptors is the application of CNN for medical images processing and diagnostics, which is considered and developed in the present research. It was shown that CNN is able to overcome the conventional texture descriptors. Besides traditional approach to detection of features based on descriptors demands much efforts and high level knowledge of experts and usually is specific for every task that prevents its direct application for another similar tasks. CNN, which firstly was developed by LeCun in [20] is widely applied now for achievement high results in different images recognition problems, with microscope and macroscope texture. The set of experiments with data set BreaKHis presented in [19] testifies that CNN achieves better results than the best results which were attained by other models which were trained using alternative approach based on texture scenarios. But the best results may be attained by combining CNN with other models. Therefore in our research we suggested to use CNN for feature detection in medical images of breast tissue and developed hybrid CNN-FNN classification system in which CNN is utilized to extract informative features of images and FNN NEFClass is applied for classification of detected tumors on images in two classes: benign and malicious ones.

3.7 Medical Images of Breast Tumors Diagnostics …

129

The main goal of following section is the presentation and investigation of algorithmic and software tools for fast analysis of breast tissue images, detection of tumors and their classification into classes: benign or malignant one. This will enable to provide express analysis of images and raise the quality medical diagnostics

3.7.2

Data Set Description

Data set BreaKHis [19] contains microscope biopsies from benign and malign tumors of breast. The images were obtained in clinic research since January 2014 till December 2014. BreaKHis consists of 7909 clinically representative microscopic images of breast tumors received from 82 patients with different scale augmentation (40, 100, 200, 400). All patients during this period were investigated in R&D medical lab with clinical conclusion of breast cancer were invited to take part in this investigation. All data were anonymized. The patterns are generated of biopsy breast slides colored with hematoxylin and eosin (HE). The patterns are collected by surgery biopsy prepared for histologic research and marked by pathologists anatomists of R&D lab. The main goal was to preserve original structure of tissue and molecular composition which allows to observe it with optical microscope. For investigation all images were split into slides of size 3 mkm. The final conclusion of each case was made by experienced pathologists anatomists which was confirmed by additional investigation such as immune histo-chemistry (IHC). The microscope system Olympus BX-50 with augmentation 3.3 connected with digital camera Samsung SCC- 131AN, is used for obtaining digitized images of breast tissue. Images were obtained in 3-channels color space True color (24 bits value, 8 bits color channels RGB) with magnification coefficients 40, 100, 200, and 400. In the Fig. 3.21, 3.22, 3.23 and 3.24 four images are presents with four magnification coefficients (a) 40, (b) 100, (c) 200 i (d) 400—obtained from one

Fig. 3.21 Slide of malign tumor with magnification 40

130 Fig. 3.22 Slide of malign tumor with magnification 100

Fig. 3.23 Slide of malign tumor with magnification 200

Fig. 3.24 Slide of malign tumor with magnification 400

3 Pattern Recognition in Big Data Analysis

3.7 Medical Images of Breast Tumors Diagnostics …

131

Fig. 3.25 Slide of benign tumor with magnification 100

Table 3.11 Distribution of images by augmentation factor and class

Magnification

Benign

Malignant

Total

40 100 200 400 Total Number of patients

625 644 623 588 2480 24

1370 1437 1390 1232 5429 58

1995 2081 2013 1820 7909 82

slide of breast tumor which contains malign tumor (breast cancer) Separated rectangular (added by hand for illustrative aims)—region of interest (ROI) which was chosen by pathologist-anatomist. Up to date dataset BreakHis consists of 7909 images, divided into benign and malign tumors (Fig. 3.25) Table 3.11 presents the distribution of images by classes [19].

3.7.3

Convolutional Neural Networks Brief Description

A CNN is a state-of-the-art method that has been largely utilized for image processing. A CNN model has the ability to extract global features in a hierarchical manner that ensures local connectivity as well as the weight-sharing property. It consists of the following layers [20, 21]. • Convolutional Layer: The Convolutional layer is considered as the main working ingredient in a CNN model and plays a vital determining part of this model. A kernel (filter), which is basically an n  n matrix successively goes through all the pixels and extracts the information from them.

132

3 Pattern Recognition in Big Data Analysis

• Stride and Padding: The number of pixels a kernel will move in a step is determined by the stride size; conventionally, the size of the stride keeps to 1. Figure 3.26a shows an input data matrix of size 5  5, which is scanned with a 3  3 kernel. The light-green image shows the output with stride size 1, and the green image represents the output with stride size 2. When we use a 3  3 kernel, and stride size 1, then the convolved output is a 3  3 matrix; however, when we use stride size 2, the convolved output is 2  2. Interestingly, if we use a 5  5 kernel on the above input matrix with stride 1, the output will be a 1  1 matrix. Thus, the size of the output image changes with both the size of the stride and the size of the kernel. To overcome this issue, we can utilize extra rows and columns at the end of the matrices that contain 0 s. This adding of rows and columns that contain only zero values is known as zero padding. For example, Fig. 3.26b shows how two extra rows have been added at the top as well as the bottom of the original 5  5 matrix. Similarly, two extra columns have been added at the beginning as well as the end of the original 5  5 matrix. Now, the olive-green image of Fig. 3.26b shows a convolved image where we have utilized a kernel of size 3  3, stride size 1 and padding size zero. The convolved image is also a 5  5 matrix, which is the same as the original data size. Thus, by adding the proper amount of zero padding, we can reduce the loss of information that lies at the border. • Nonlinear Performance: Each layer of the NN produces linear output, and by definition adding two linear functions will also produce another linear output. Due to the linear nature of the output, adding more NN layers will show the same behavior as a single NN layer. To overcome this issue, a rectifier function, such as Rectified Linear Unit (ReLU), Leaky ReLU, TanH, Sigmoid, etc., had been introduced to make the output nonlinear. • Pooling Operation: A CNN model produces a large amount of feature information. To reduce the feature dimensionality, a down-sampling method named a pooling operation has been performed. A few pooling operation methods are well known such as

(a)

(b)

kernel = 3×3, stride=1,

kernel= 3×3, stride=2,

kernel 3x3, kernel= 3×3, stride=1, Padding=0, stride =2 Padding=0

0 0

0

0

0 0

0

0

0 0

0

0

0 0

0

0

0 0

0

0

0 0

0

0

0 0

0

0

0 0

0

0

0

0

kKernel e 1,

0

0

0

0

0

0

kernel= 3×3, stride=1, Padding=2

0 0

0

0

0

0

0

kernel= 3×3

Fig. 3.26 The effects of kernel size, the size stride and zero padding in a convolutional operation

3.7 Medical Images of Breast Tumors Diagnostics …

133

– Max Pooling, – Average Pooling. For our analysis, we have utilized the Max Pooling operation that selects the maximum values within a particular patch. • Drop-Out: Due to the over training of the model, it shows very poor performance on the test dataset, which is known as over-fitting. These over-fitting issues have been controlled by removing some of the neurons from the network, which is known as Drop-Out (it was considered in detail in the chapter 2). Decision Layer: For the classification decision, at the end of a CNN model, a decision layer is introduced. Normally, a Softmax layer or a SVM layer is introduced for this purpose. This layer contains a normalized exponential function and calculates the loss function for the data classification. Figure 3.27 shows the work flow of a generalized CNN model that can be used for image classification. Before the decision layer, there must be at least one immediate dense layer available in a CNN model. Utilizing the Softmax layer, the output of the end layer can be represented as  exp Hdend Yd ¼ Pm end d¼1 expðHd Þ

ð3:35Þ

where Yend ¼ rðWend  Hend1 þ Bend Þ: Here, kend−1 represents the kth neuron at the (end − 1)th layer, and r represents the nonlinear function. For binary classification, the number of classes is equal m = 2. Let d = 1 represent the Benign class and else it represents the Malignant class.  d can be calculated as The cross-entropy loss of Y  Ld ¼  lnðYdÞ

ð3:36Þ

Sub-Sampling

Y

Dense Layer

x Re LU

SoŌmax Layer Benign

ConvoluƟon

ConvoluƟon

ConvoluƟon

Fig. 3.27 Work flow of a Convolutional Neural Network

ConvoluƟon

134

3 Pattern Recognition in Big Data Analysis

Fig. 3.28 Convolutional neural network VGG-16

As we have a two-class classification problem, then only the L1 and L2 values are possible, and the output will be benign when L1 < L2, else the output will be malignant.

3.7.4

CNN Model for Image Classification

In the next Fig. 3.28 the architecture of VGG-16 is presented which was used in our work as detector of informative features. It was trained by different algorithms: stochastic gradient descent (SCD), basin hopping [22] and differential evolution. As classifier of obtained features in our research was suggested to use FNN Nef Class. In the next section results of classification by suggested hybrid CNN-Nefclass are presented and compared with results obtained by other researches which used as classifiers SVM machine, Random forests and other classification methods.

3.7.5

Experimental Investigations and Results Analysis

As it was already mentioned in our investigation pretrained CNN VGG 16 was used. Method of training transfer was applied for this purpose. Training transfer method as it goes from its name means the transfer of knowledge obtained during

3.7 Medical Images of Breast Tumors Diagnostics …

135

training one CNN to another neural network applied for solution of similar or connected problems. There are two main training scenarios: (1) Features extraction. In this case the last full-connected layer is deleted and the rest part of CNN is used as extractor for new data sets. (2) Fine tuning. In this case new data set is used for fine training of previously pretrained neural network. In our research CNN VGG 16 was used for features extraction in medical images of breast tumors. After that the detected features were fed as input data to FNN NEFClass described in the previous section. As algorithms of training FNN three algorithms were used: basin hopping [22], stochastic gradient descent and differential evolution. The series of experiments were carried out and the results were compared with works of predecessors [24]. In the following Tables 3.12 and 3.13 the results of classification with different parameters are presented. All sample was divided into training and testing subsamples with ratio 80%/20%. From this table on can readily see that beginning from 6 fuzzy sets per variable and 6 rules the accuracy doesn’t increase but complexity of training raises. As it follows from table for two classes the best values of parameters are 4 fuzzy sets per variable and 6 rules. For comparison take the results of previous works obtained with different classifiers for the same problem [23] (see Table 3.13). In the first experiment we varied the number of linguistic variables (terms) and rules that to determine the best parameters values [24]. As we can see from the

Table 3.12 Classification results of FNN NEFClass Initial number of fuzzy sets (linguistic terms)/ number of rules

40 (%)

100 (%)

200 (%)

400 (%)

2/2 4/2 6/2 8/2 2/4 4/4 6/4 8/4 2/6 4/6 6//6 8/6 4/8 6/8 8/8

73 75.3 678.2 76 75 78.3 82 82.2 75.4 90 89 90.3 89.3 89.2 88

74 74.8 79 75.4 74 76.3 83 81.5 73.8 91 89.7 90.5 89.8 88 87.2

74.2 75.7 78.4 76.5 73.8 75.7 82.4 81.5 74.4 90.5 90.2 92 89.7 89.4 87.2

73.5 75.4 78 75.8 73 75.4 83.2 83.8 73.2 90 89.5 91.2 89.3 88.4 87

136

3 Pattern Recognition in Big Data Analysis

Table 3.13 Comparison of results different classifiers Linear svm Polynomial svm Random forest Nefclass

40 (%)

100 (%)

200 (%)

400 (%)

89 88 89.18 90

89 90 88 91

88 89 87.74 90.5

88 85 80 90

Table 3.13 FNN NEFClass shows better results than previous classifiers: SVM machine and Random forest [23]. In our work for training of FNN NEFClass were applied three algorithms, namely, basin hopping, stochastic gradient descent and differential evolution. Using algorithms basin hopping and stochastic gradient descent we obtained approximately equal results that may mean the true optimal results while the training results of differential evolution appeared to be much worse. It’s worth to note that in this problem the number of features extracted by CNN VGG16 was very large—4096 features. Therefore it was decided to cut the number of features. For this principal components method [25] was applied. In the Table 3.14 the results of such reduction are presented. From the Table 3.14 it follows that the results of reduction with 250 principal components is most acceptable as the complexity of training increases approximately proportional to number of input data. Due to lack of time the next experiments were performed using data with 100 magnificence factor (2081 images). In the next Table 3.15 the accuracy of classification is presented with different parameters. In the Table 3.16 the dependence of classification accuracy versus number of features is presented. one can see from this table that accuracy decreased only by some percent due such features reduction. But by this reduction we substantially cut the training time. Table 3.14 The dependence of total variance on number of components and approximate training time Number of principal components

Variation

Approximate training time (in h)

100 200 250 500

0.840587 0.89736 0.91232 0.95486

*2 *3 *4 *9

Table 3.15 Classification accuracy with 250 features

Number of FS/number of rules

100 (%)

4/4 4/6 4/8

80.64 87.24 88.18

3.7 Medical Images of Breast Tumors Diagnostics …

137

Table 3.16 Classification accuracy with different number of features Number of linguistic terms, number of rules/number of features

100 (%)

250 (%)

4096 (%)

4/4 4/6 4/8

75.23 83.34 84.21

80.64 87.24 88.18

76.3 91 89.8

From this table one can readily see that the accuracy drops with decrease of features number but insignificant by 3–5% if compare 100 and 250 features. For comparison use the full set of features 4096 and we can see that with decrease features number in 20 times the accuracy falls 2–3% in means. This conclusion testify in favour of application of PCM method for reduction of dimension of medical images classification problems. Conclusion 1. The problem of analysis of breast tissue medical images and classification of detected tumor in two classes: benign and malignant is considered an discussed. 2. For pattern recognition of breast tumors hybrid CNN- FNN network is suggested in which the CNN VGG 16 is used for informative features extraction while FNN NEFClass is used for classification of detected tumors. 3. For training FNN NEFClass algorithms basin hopping, stochastic gradient descent and differential evolution were suggested and their efficiency investigated. 4. The experimental investigations of suggested hybrid CNN-FNN network in the problem of classification real images of breast tumors in dataset BreakHis were carried out. 5. The comparison of classification accuracy of the suggested hybrid CNN-FNN network with known works based on use of classification algorithms SVM and Random forest was performed which confirmed the efficiency of the suggested approach. 6. The problem of reducing number of features in medical images classification problem using PCM method was investigated and its efficiency for BD classification problems was explored.

References 1. D. Nauck, R. Kruse, Generating classification rules with the neuro-fuzzy system NEFCLASS, in Proceedings of the Biennial Conference of the North American Fuzzy Information Processing Society (NAFIPS’96), Berkeley (1996) 2. D. Nauck, R. Kruse, New learning strategies for NEFCLASS, in Proceedings of the Seventh International Fuzzy Systems Association World Congress IFSA’97, vol. IV (Academia Prague, 1997), pp. 50–55

138

3 Pattern Recognition in Big Data Analysis

3. D. Nauck, R. Kruse, What are neuro-fuzzy classifiers?, in Proceedings of the Seventh International Fuzzy Systems Association World Congress IFSA’97, vol. IV (Academia Prague, 1997), pp. 228–233 4. D. Nauck, Building neural fuzzy controllers with NEFCON-I, in Fuzzy Systems in Computer Science, Artificial Intelligence, ed. by Rudolf Kruse, Jorg Gebhardt, Rainer Palm (Vieweg, Wiesbaden, 1994), pp. 141–151 5. Yu.P. Zaychenko, F. Sevaee, A.V. Matsak, Fuzzy neural networks for economic data classification, in Vestnik of National Technical University of Ukraine “KPI”, section Informatic, Control and Computer Engineering, vol. 42 (2004), pp. 121–133 (in Russian) 6. Yu.P. Zaychenko, Fuzzy Models and Methods in Intellectual Systems (Kiev-Publishing House “Slovo”, 2008) 354 pp. 7. A. Krizhevsky, I. Sutskever, G.E. Hinton, Imagenet classification with deep convolutional neural networks, in Proceedings of 26th Annual Conference on Neural Information Processing Systems 2012 (NIPS), ed. by P.L. Bartlett, F.C.N. Pereira, C.J.C. Burges, L. Bottou, K.Q. Weinberger, Dec 2012, pp. 1106–1114, http://papers.nips.cc/paper/4824imagenet-classification-with-deep-convolutional-neural-networks 8. Yu.P. Zaychenko, I.M. Petrosyuk, M.S. Jaroshenko, The investigations of fuzzy neural networks in the problems of electro-optical images recognition, in System Research and Information Technologies № 4 (2009), pp. 61–76 (in Russian) 9. M. Zgurovsky, Yu. Zaychenko, The Fundamentals of Computational Intelligence: System Approach (Springer International Publishing AG, Switzerland, 2016), 308 pp. 10. E.H. Maлышeвcкaя, Aнaлиз иcпoльзoвaния нeйpoнныx ceтeй для диaгнocтики paкa шeйки мaтки пo мyльтиcпeктpaльнoмy изoбpaжeнию/ E.H. Maлышeвcкaя// Cиcтeмнi дocлiджeння тa iнфopмaцiйнi тexнoлoгiї. – 2010. – №2 –C. 64–71 11. K. Malyshevska, The analysis of neural networks’ performance for medical image classification. Int. J. Inf. Content Process. 1(2), 194–199 (2014) 12. Y. Zaychenko, V. Huskova, Recognition of objects on optical images in medical diagnostics using fuzzy neural network NEFClass. Int. J. Inf. Models Anal. 4(1), 13–22 (2015) 13. P. Boyle, B. Levin (eds.), World Cancer Report 2012 (IARC, Lyon, 2012), http://www.iarc. fr/en/publications/pdfs-online/wcr/2008/wcr_2012.pdf 14. S.R. Lakhani, I.O. Ellis, S. Schnitt, P. Tan, M. van de Vijver, WHO Classification of Tumours of the Breast, 4th edn. (WHO Press, Lyon, 2012) 15. Y. Zhang, B. Zhang, F. Coenen, W. Lu, Breast cancer diagnosis from biopsy images with highly reliable random subspace classifier ensembles. Mach. Vis. Appl. 24(7), 1405–1420 (2013) 16. Y. Zhang, B. Zhang, F. Coenen, J. Xiau, W. Lu, One-class kernel subspace ensemble for medical image classification. EURASIP J. Adv. Signal Process. 2014(17), 1–13 (2014) 17. S. Doyle, S. Agner, A. Madabhushi, M. Feldman, J. Tomaszewski, Automated grading of breast cancer histopathology using spectral clustering with textural and architectural image features, in Proceedings of the 5th IEEE International Symposium on Biomedical Imaging (ISBI): From Nano to Macro, vol. 61 (IEEE, 2008), pp. 496–499 18. A.J. Evans, E.A. Krupinski, R.S. Weinstein, L. Pantanowitz, 2014 american telemedicine association clinical guidelines for telepathology: another important step in support of increased adoption of telepathology for patient care. J. Pathol. Inform. 6 (2015) 19. F. Spanhol, L.S. Oliveira, C. Petitjean, L. Heutte, A dataset for breast cancer histopathological image classification. IEEE Trans. Biomed. Eng. (2016) 20. A. Krizhevsky, I. Sutskever, G.E. Hinton, Imagenet classification with deep convolutional neural networks, in Advances in Neural Information Processing Systems, vol. 25 (2012), pp. 1097–1105 21. Y. LeCun, B. Boser, J.S. Denker, D. Henderson, R.E. Howard, W. Hubbard, L.D. Jackel, Backpropagation applied to handwritten zip code recognition. Neural Comput. 1(4), 541–551 (1989)

References

139

22. B. Olson, I. Hashmi, K. Molloy, A. Shehu1, Basin hopping as a general and versatile optimization framework for the characterization of biological macromolecules. Adv. Artif. Intell. 2012(Article ID 674832) (2012) 23. A. Singh, H. Mansourifar, H. Bilgrami, N. Makkar, T. Shah, Classifying Biological Images Using Pre-trained CNNs, https://docs.google.com/document/d/1H7xVK7nwXcv11CYh7hl 5F6pM0m218FQloAXQODP-Hsg/edit?usp=sharing 24. Yu. Zaychenko, G. Hamidov, I. Varga, Medical images of breast tumors diagnostics with application of hybrid CNN–FNN network in System Analysis and Information Technologies, № 4 (2018) 25. N. Jindal, V. Kumar, Enhanced face recognition algorithm using PCA with artificial neural networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 864–872 (2013)

Chapter 4

Intellectual Analysis of Systemic World Conflicts and Global Forecast for the 21st Century

4.1

Introduction

Data on global conflicts took place from 750 B.C. up to now are analyzed and their general pattern is revealed. An attempt is made to foresee the next global conflict called the conflict of the 21st century. Its nature and main characteristics are analyzed. Main global threats are listed, and their impact on five groups of countries is determined using cluster analysis. Based on the consideration of evolutionary development of the civilization as a holistic process determined by a harmonious interaction of its components, patterns of Kondratieff cycles of the development of the global economy and C-waves of global systemic conflicts are compared and an attempt is made to predict these processes in the 21st century using a metric approach. The next part of the study is based on the Fibonacci pattern of global systemic conflicts (Ñ-waves) which allowed us to formulate the hypotheses about a metric relation between two global periodic processes, namely, between the sequence of 11-year cycles of solar activity and the process of evolutionary structurization of the family of Ñ-waves of global systemic conflicts covering large and super-large time intervals and having a variable structural configuration. The structural analysis is performed for Cn-waves of global systemic conflicts based on their empirical sequence, and metric approaches are proposed to study and forecast these processes. Global systemic conflicts and great Kondratieff waves of the development of the world economy are proved to correspond to a number of additional conditions, namely, to the modern concept on the acceleration of historical time, to the law of structural harmony, and to global forecasts for the 21st century. Bayesian Belief Networks are used to establish qualitative causal relations between global threats and indicators of sustainable development. The method of belief network synthesis and a method of generalization of final results are

© Springer Nature Switzerland AG 2020 M. Z. Zgurovsky and Y. P. Zaychenko, Big Data: Conceptual Analysis and Applications, Studies in Big Data 58, https://doi.org/10.1007/978-3-030-14298-8_4

141

142

4 Intellectual Analysis of Systemic World Conflicts and Global …

proposed. This made it possible to obtain a holistic understanding of effects of global threats on the sustainable development of countries and regions of the world. The generalization and formalization of approaches to the recognition of C-waves of global systemic conflicts using big historical data are performed and general concept of description and interpretation of these waves is proposed. Special attention is paid to the class of big C-waves, which cover super-long time intervals. Their pattern is invariant to the evolution of the nature of global conflicts. There has also been made an attempt to predict these processes in the 21st century by using a metric approach. The possible scenarios of the development of the conflict of the 21st century have been constructed and analyzed.

4.2

Identifying the Regularity of the Emergence of Systemic World Conflicts, Based on the Analysis of Big Historical Data

An analysis of the complete list of global conflicts [1] occurred since 2500 B.C. up to now shows that, beginning with the 7th century B.C., these conflicts did not follow any regular pattern, reminding a random process such as white noise. Historic facts about constant conflicts at early stages of the development of human civilization as a natural form of its existence confirm this. A certain periodic pattern can only be revealed in a series of global conflicts only after higher forms of society organization appear. This periodic pattern was revealed and studied in [2]. With this pattern, it becomes possible to foresee the next system conflict, to analyze the set of threats giving rise to it, to determine the effect of these threats on its course, and to construct scenarios of possible development of society during and after the conflict. Pessimistic predictions are necessary from the scientific point of view to avoid possible negative outcome, although naturally everyone would prefer to be wrong in such predictions.

4.2.1

Fibonacci Pattern of the Emergence of Systemic World Conflicts

The paper [1] analyzes the series of global conflicts over a period from 705 B.C. till now with the following time quantization: Dn ¼ 50years5years  n;

n ¼ 0; 1; 2; . . .;

The number of global conflicts for each quantization interval Dn has been determined as the arithmetic mean of the number of all conflicts on this time

4.2 Identifying the Regularity of the Emergence …

143

Fig. 4.1 Structural portrait of Cn-waves of global system conflicts

interval. For D9 ¼ 5years ðnmin ¼ 9Þ, six consecutive evolutionary groups (waves) fCn g, n = 1, 2, …, 6, of global conflicts (Cn -waves) has become apparent (Fig. 4.1). (Let Cn be the predicted wave, the essence of which will be revealed later). These waves are periodic (Table 4.1) and have the following characteristic features: (i) The lifeof each Cn -wave generates five sequential evolutionary phases  (stages) Cn;i , i ¼ 1; . . .; 5: {Cn,i}, i = 1, …, 5: Cn,1 (origin) ! Cn,2 (growth) ! Cn,3 (culmination) ! Cn,4 (decrease) ! Cn,5 (decay). (ii) The life duration T ðCn Þ of each subsequent Cn -wave is uniquely determined by the life duration of two previous waves, namely, T ðCn Þ ¼ T ðCn2 Þ  T ðCn1 Þ:

ð4:1Þ

(iii) Conflict intensity I ðCn Þ ¼ N ðCn Þ=T ðCn Þ for Cn -waves, n = 1, 2, 3, …, 6, increases, where N ðCn Þ is the number of conflicts that form the Cn -wave: I ðCn þ 1 Þ [ I ðCn Þ, which is because of the technological progress of mankind. Global conflicts defined by these features are called Cn-waves of global systemic conflicts or Cn -waves. As we see, six Cn -waves can be identified over the period from 705 B.C. until now.

4 Intellectual Analysis of Systemic World Conflicts and Global …

144

Table 4.1 Main characteristics of Cn -waves of conflicts Cn -waves

Time interval of the Cn wave, year

Life duration T ðCn Þ for the Cn wave, year

Number of conflicts N ðCn Þ that form the Cn wave

Conflict intensity I ðCn Þ in the Cn wave

Correspondence of Cn -waves to Fibonacci numbers ðFs Þ

C1

705 B.C.–401 A.D. 402–1074 1075–1497 1498–1749 1750–1919 1920–2007 2008–2092

1106

1218

1.101

F7 = 13

674 422 252 170 87 85

756 1680 1543 1485 1035 >1400

1.122 3.981 6.123 8.735 11.897 >16

F6 = 8 F5 = 5 F4= 3 F3 = 2 F2 = 1 F1 = 1

C2 C3 C4 C5 C6 C7 (predicted)

Table 4.2 Coefficients of the golden section T(Cn)/T(Cn+1), Fibonacci numbers {Fs}, and periods of global conflicts T(Cn) for the sequence {Cn}, n = 1, 2, 3, 4, 5, 6, 7 {Cn}

C1

C2

C3

C4

C5

C6

C7

T(Cn), years T(Cn)/T(Cn+1) Fs, s = 8 − n Fs/Fs − 1

1106 1.641 13 1.625

674 1. 597 8 1.6

422 1.675 5 1.667

252 1.482 3 1.5

170 1.954 2 2

87 1.023 1 1

85 – 1* –

Table 4.2 presents the ratios: T ðCn Þ=T ðCn þ 1 Þ; n ¼ 1; 2; . . .; 6;

ð4:2Þ

which vary around the golden Sect. (1.618). Let us represent the sequence fT ðCn Þg; n ¼ 1; . . .; 7 (Table 4.2) as a series T ðC1 Þ ¼ 13  kc ; T ðC2 Þ ¼ 8  kc ; T ðC3 Þ ¼ 5  kc ; T ðC4 Þ ¼ 3  kc ; T ðC5 Þ ¼ 2  kc ; T ðC6 Þ ¼ 1  kc ; T ðC7 Þ ¼ 1  kc ;

ð4:3Þ

where kc ¼ 85 years is the greatest common divisor for all the values of life duration TðCn Þ: The number series: Fs ¼ f13; 8; 5; 3; 2; 1; 1 g

ð4:4Þ

4.2 Identifying the Regularity of the Emergence …

145

Fig. 4.2 Real I(Cn) and approximated I  ðCn Þ intensities of global system conflicts and their durations T(Cn) for the sequence {Cn} (n = 1, 2, 3, 4, 5, 6, 7) sequence {Cn} (n = 1, 2, 3, 4, 5, 6, 7)

is a sequence of Fibonacci numbers, where 1* pertains to the predicted wave C7 of this sequence. The conflict intensity I  ðCn Þ depends on the level of technological progress of society and increases in time hyperbolically (Fig. 4.2): n o I  ðCn Þ ¼ N ðCn Þ  T ðCn Þ1 ¼ N ðCn Þ  ðF8n  kc Þ1 ;

ð4:5Þ

whence the intensity of the seventh (predicted) conflict follows: I  ðC7 Þ [ 16

ð4:6Þ

Since six members of the sequence TðC1 Þ; . . .; TðC6 Þ obey the law of variation of elements in the Fibonacci series, the paper [2] advances a hypothesis that it is this pattern that describes the course of global systemic conflicts. Hence, the seventh (predicted) element of the sequence should be TðC7 Þ ¼ TðC5 Þ  TðC6 Þ ¼ 1  kc  85 years. We will call this seventh wave of global systemic conflicts ðC7 Þ the conflict of the 21st century. It has the time range 2010–2096 with the following probable phases: • • • • •

2010s (origin); beginning of the 2020s to the end of the 2040 (growth); 2050s (culmination, I  ðC7 Þ [ 16); beginning of the 2060s to the end of the 2070s (decrease); 2080s (decay).

146

4 Intellectual Analysis of Systemic World Conflicts and Global …

Thus, the revealed patterns describe the course of global systemic conflicts in terms of the durations T ðCn Þ of these conflicts, their intensity I  ðCn Þ, and Fibonacci numbers ðFs Þ [2].

4.2.2

Conflict of the 21st Century and Analysis of Its Nature

Let us consider the Top 12 global threats to the sustainable development to be those determined in the beginning of the XXI century by such recognized international organizations as United Nations Organization (UNO), World Health Organization (WHO), World Economic Forum, Transparency International, Global Footprint Network, International Energy Agency, World Resources Institute, British Petroleum company and others. The analysis of every threat will give the possibility to determine the vulnerability level of different countries of the world to the influence of these aggregated threats. Let us analyze each of the 12 global threats separately. Threat 1. Global Decrease in Energy Security (ES) For the first part of the XXI century one of the main critical challenges to the mankind is the rapid decrease in organic fuel resources that are extracted from entrails of the earth, and the increase in consumption of such resources, first of all, by large developing countries. In the beginning of the 30-ies of the current century, the curves of energy consumption and production of energy from oil will be crossed [3]. In other words, the “production-consumption” balance of energy, produced from oil, will change its value from positive to negative. The similar phenomena will occur for “production-consumption” balances of energy, made from gas in the beginning of 40-ies and for the energy generated from uranium-235 in the 50-ies– 60-ies, accordingly (Fig. 4.3).

Fig. 4.3 Changes the balance “production–consumption” from positive to negative for energy, produced from oil, gas, and uranium-235, accordingly

4.2 Identifying the Regularity of the Emergence …

147

Thus, until the mankind invents the energy resources that could fully replace the organic types of fuel and nuclear energy, the energy security of a country in particular and the world in general, will decrease. In order to quantitatively estimate the energy security of different countries of the world let us introduce the energy security index (Energy Security Index, ES) that will be calculated by the formula: Exhaustablesi þ Renewablesi ; i 2 fcountriesg; 2 NuclearRi þ CoalRi þ OilRi þ GasRi Exhaustablesi ¼ ; max ½NuclearRj þ CoalRj þ OilRj þ GasRj  ESi ¼

8j2fcountriesg

Renewablesi ¼

ð4:7Þ

RenewablesUsedi ; max RenewablesUsedj

8j2fcountriesg

where: • ES 2 ½0;1; {countries}—set of explored countries; • Exhaustables is the component that characterizes the dynamics of resource deflation; • Renewables is the component that characterizes the volumes of usage of renewable sources in national energetic; • NuclearR, CoalR, OilR, GasR—resources of uranium-235, coal, oil and gas (Nation Master, n.d.); • Renewables Used—part of renewable energy produced and consumed by the country (at the expense of use of the energy of water, sun, wind, geothermal heat, biomass and rubbish burning) in percents from total energy consumption [4]. To evaluate the reduction in the reserves of organic fuel for various countries in the subsequent simulation, we will use the index of “Consumption of traditional fuels in percentage of the total energy needs of the country” [4]. Threat 2. The Imbalance Between Biological Capacity of the Earth and Human Needs in Biosphere (FB) In early 2018, the world’s population reached 7.6 billion people living on the total area 510,072,000 km2. The daily growth of Earth population exceeds 162 thousand people [5]. According to the method of arithmetic extrapolation the Earth population will have been 9.75 billion people by the year 2050. That is why the first threat appears being related to the fact that the Earth will be inhabited by the number of people that will exceed its abilities to sustain on the basis of the present natural resources. The japanese experts believe that the real problems for the mankind will be connected with the catastrophic shortage of water, energy, foodstuff that can cause new conflicts on the Earth [6]. Nature can satisfy human requirements for business activity and only while this activity remains within the biosphere renewable capacity on the populated part of the planet. The calculation of ecologically disturbed area (Ecological Footprint) [5]

148

4 Intellectual Analysis of Systemic World Conflicts and Global …

gives the possibility to establish some limit according to which the ecological requirements to the world economics are within or exceed the biosphere abilities (Biocapacity) to supply the people with goods and services. This limit helps people, organizations and government to create strategies, establish the goals and provide the process according to the requirements of the sustainable development. Ecologically disturbed territory (Ecological Footprint) determines which its part is necessary to preserve present population according to the present level of consumption, level of technological development and usage efficiency of natural wealth. The unit of measurement of this dimension is average (global on the whole Earth) hectare. The most substantial component of the Ecological Footprint is the territory of the Earth used for foodstuff production, forest area, biofuel amount, ocean (seas) territory, used for fishing and the most important element is the Earth area, necessary to support the life of plants absorbing the emissions of CO2 as a result of organic fuel burning. Ecological Footprint envisages that in world economy the people use resources and ecological services from all over the world. Thus, the indicator for a country may exceed its actual biological possibilities. On the basis of it, the essence of Ecological Footprint for a country is the extent of its consumption and global impact on environment. The same methodology can be used for calculation (in the same values) of biological abilities of the Earth, biological productivity of its territory. In 2017 biological abilities of the Earth were approximately 11.2 billion or 1.8 global hectares per capita (non-human species were not considered). Now the human need in biosphere, i.e. its global Ecological Footprint is 18.1 billion global hectares or 2.3 global hectares per capita. That is why, today global Ecological Footprint exceeds biological abilities of the Earth by 0.5 global hectares per capita. This means that vital resources of the planet disappear faster than the nature can renew (Fig. 4.4). This threat has substantial correlation degree with demographic structure change of the planet population. For example, according to Human Development Report

Fig. 4.4 Misbalances between biocapacity of the Earth and total consumption (ecological footprint)

4.2 Identifying the Regularity of the Emergence …

149

2017 the biggest growth of population over a period of the following 50 years is expected in the poorest regions of the world: in Africa it will increase in 2 times, In Latin America and Caribbean basin will increase in 1.5 time, at the same time in Europe it will decrease in 0.8 times [4]. Essential threat is also uncontrolled increase in the urban population in underdeveloped countries. By the year 2050 it will have been doubled approximating to 10 billion people. It will lead to intensification of transport, ecological and social problems, an increase in criminality and other consequences of chaotic urbanization. The important tendency of the nearest decades is rapid change in the structure of religious groups of the Earth population. So, from 1980 to 2015 the number of Muslins will increase from 16.5 to 30%, the number of Christians will decrease from 33.3 to 31%, the number of Hindus will decrease from 13.3 to 10%, the number of Buddhists will decrease from 6.3 to 5%. The number of representatives of other religious groups will also decrease from 31.1 to 25% (Japan Vision 2050. Principles of Strategic Science and Technology Policy Toward 2020. Science). Science Council of Japan, 2005). These changes will cause the necessity of searching new methods of tolerance coexistence of people on the Earth. For estimation of increasing threats, connected with imbalance between biological capability of the Earth and human requirements in biosphere, in terms of demographic structure change of the world we will use the indicator which is ecological reserve (“+”) or deficit (“−”) in global hectares per capita for a country (Global Footprint Network, http://www.footprintnetwork.org/en/index.php/GFN/) [6]. Threat 3. Growing Inequality Between People and Countries on the Earth (GINI) According to the World Bank, the difference in profits between the richest and poorest countries was 44:1 in 1973 and is now 72:1. Three richest persons have a capital that exceeds the property of 47 poor countries, 475 richest people hold a capital that exceeds the property of half of the mankind. The ratio between one fifth of the rich part of the world population and one fifth of the poorest population has achieved 1:75. The benefits of civilization remain unaccessible for the poorest group. Its representatives live for less than two dollars per day. Seven hundred million of them live in Asia, 400 million in Africa, and 150 million in Latin America. The difference between the richest and poorest groups in the standard of living has increased almost ten times over the last twenty years. The threat is rather hazardous from the standpoint of increasing number of conflicts in the world, growth of corruption, terrorism, and criminality, environmental degradation, impaired education and medical service. To asses quantitatively the disparity of the distribution of economic and social benefits for each of the countries under study, we will use the Gini index [7], which reflects these characteristics. Threat 4. The Spread of Global Diseases (GD) The World Health Organization considers such diseases as cancer, cardio ischemia, cerebrovascular disease (paralysis), chest troubles, diarrhea, AIDS, tuberculosis,

150

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.5 Comparison of mortality factors, 2004–2030, resource: (http://www.plosmedicine.org/ article/info%3Adoi%2F10.1371%2)

malaria, diabetes to be the most dangerous for mankind as they may not only have bad consequences but also globally spread all over the world [8]. During the next 20 years the sufficient increase in mortality caused by all noninfectious global diseases and decrease in mortality caused by AIDS, tuberculosis and malaria are expected (Fig. 4.5). Such diseases as cardio ischemia, cerebrovascular disease, lung cancer and diabetes will become main global diseases during this period. At the same time the rate of total mortality from tobacco consumption will increase from 5.8 million people in the year 2009 to 8.3 million in the year 2030. Thus, tobacco is expected to kill by 50% people more than AIDS. Total human mortality on the Earth will be by 10% predetermined by the tobacco consumption. According to the UNAIDS international organization, the number of HIV-infected people on the Earth increased from 36.9 million in 2004 to 45 million in 2015. This general tendency (with minor oscillations) is traced in all regions of the world. Despite the success in tuberculosis control, eight million new diseases occur annually in the world, which cause two million lethal outcomes. In the countries with high prevalence of HIV/AIDS, the number of tuberculosis diseases has increased 3–4 times over the last 15 years (www.who.int/gb), 80% of them in Africa, South-East Asia, and western part of the Pacific Ocean. Malaria is traditionally most spread in Africa and Latin America. For the last five years, morbidity has increased 2–3 times in Afghanistan, Ghana, Papua New Guinea, Pakistan, and Uganda and 30 times in Mozambique and Democratic Republic of the Congo; menacing rates of growth of morbidity (70 times increase) are observed in Mali. In other countries where malaria is revealed, the number of diseased changes within the limits of ±50% for the last five years.

4.2 Identifying the Regularity of the Emergence …

151

The spread of global diseases (GD) is measured in the total number of people (millions per year) who died from these diseases. For the subsequent simulation, we take data on these diseases from the World Health Organization [8]. Threat 5. Information Gap (IG) Information Gap is formed by two determinants of the modern information society: 1. Humanity is constantly generating gigantic volumes of new data and information. Its total volume will reach 35 ZB by 2020 (1 ZB = 1021 B). At the same time, mankind is capable of comprehending, systematizing, processing and documenting significantly smaller volumes of new data and information (until 2020, only 15 ZB). Thus, by 2020, up to 20 ZB will accumulate unthinkable and unprocessed information, a sort of “Information black hole.” This information uncertainty explains the unpredictable and unconscious phenomenon (Fukushima catastrophe in 2011 as a result of the unpredictable earthquake and tsunami, the disintegration process of the European Union in 2016 as a result of the British referendum, and many others). This component of the Information Gap will be measured using the ICT Development Index (IDI, http://www.itu. int/net4/ITU-D/idi/2016/). 2. The vulnerability of one or another country, territory or world to the action of cyber attacks. This component of the IG will be measured using the Global Cybersecurity Index (GCI, http://www.itu.int/en/ITU-D/Cybersecurity/Pages/ GCI-2017.aspx). Both IDI and GSI indexes are annually formed by International Telecommunication Union. The resulting index of IG will be calculated from the formula: IG ¼ 0:4 IDA þ 0:6 GCI

ð4:8Þ

Threat 6. Corruption Perception (CP) Corruption is the biggest obstacle to the economic and social development of society. It endangers every change. Corruption has become not only one of the main reasons of poverty but also a source which prevents its overcoming. Although corruption had existed for a long time it became more widely spread in the process of globalization at the end of the 20th at the beginning of 21st centuries. Corruption in one country had negative impact on the development of other countries which means that countries with the high level of corruption are not limited to the Third World. The process of liberalization in the former socialist countries was accompanied by unprecedented position abuses in 90-ies. Thus, Financial Times proclaimed 1995 to be “the year of corruption”. The following years were marked with the spread of this phenomenon almost throughout all countries of the world and corruption itself became of global and international character. Wellbeing did not become the prerequisite of successful elimination of corruption. The analysis of long-term tendencies revealed by the international organization «Transparency International» showed that during last 15 years the

152

4 Intellectual Analysis of Systemic World Conflicts and Global …

level of corruption has decreased in such countries as Estonia, Columbia, Bulgaria. Nevertheless, the growth of corruption occurs in such developed countries as Canada USA and Ireland. Such factors of risks as opacity of state authorities, excessive influence of separate oligarchic groups, violation in financing of political parties, etc. exist both in poor and rich countries and unfortunately, tendencies in increase of corruption scale are the same. Usually, the structure of corruption is different in different countries of the world. To estimate the influence of corruption on socio-economical and cultural development of different countries of the world we will use “the Index of corruption perception” established by the international organization “Transparency International” [9] (https://www.transparency.org/country). Threat 7. Limited Access to Drinking Water (WA) According to the data of the World Health Organization (WHO) and the UNICEF [10] the world is under the threat of reduced the access to drinking (potable) water and to sanitary facilities. The fifth part of all mankind (1.4 billion people) does not have access to drinking water and 2.4 billion of people do not have minimal sanitary facilities. That is why 2003 was proclaimed as year of drinking water by the General Assembly of UNO. The period of 2005–2015 starting from the International Day of Water Recourses (22nd of March, 2005) was proclaimed as International decade of actions “Water for life”. An especially severe situation is observed in urban areas of underdeveloped countries, where the fast growth of population aggravates promptly this problem. The above-mentioned factors especially affect children’s health. By the estimates of the World Health Organization, 1.6 million children under five annually died (on the average, 4500 children daily) of using unsafe water and lack of proper hygiene. As the world population grows, especially in underdeveloped countries, the struggle for control of the resources of fresh water will aggravate, which is the next global threat for mankind. As the world’s population grows, especially in underdeveloped countries, the struggle for control over the remnants of drinking water resources increases. This phenomenon gives rise to the next, growing in time, threat to humanity. The limited access to the drinking-water will be estimated by the inversed magnitude to the indicator of the access to drinking water [10]. Threat 8. Global Warming [GW] Global warming is the process of gradual increase in the average annual temperature of the Earth and World Ocean. According to conclusions of the International Expert Group in Climate Control (UNICEF Joint Monitoring Programme for Water Supply and Sanitation, n.d.) and National Academies of Sciences of the Group of Eight [11], from the end of 19th century the average temperature of the Earth has risen by 1 °C and “the major part of warming observed during the last 50 years had been caused by human activities” preliminary by gas emissions which cause green-house effect (carbon dioxide, CO2) and methane (CH4).

4.2 Identifying the Regularity of the Emergence …

153

Estimates obtained with the climate models and cited by the International Expert Group in Climate Control show that the average temperature of the Earth can increase from one to several °C (in different regions of the world or in the Earth in average) in 1990–2080 years. The warming is expected to cause other climate changes such as an increase in the level of Word Ocean by 0.1–5 m. (probably, in 30–40 years), the appearance of new viruses and also the change of atmospheric condensation and their distribution. This may result in an increase in such natural disasters as floods, draughts, hurricanes etc.; a decrease in harvests of agricultural crops, the emergence of new epidemic diseases and the extinction of many biological species. As a result of the control over decreasing natural resources the struggle not only between countries but also between separate groups of population can exacerbate. This process will cause new global conflicts. It is necessary to accept that influence of carbon dioxide emissions on the global warming is much higher than the corresponding influence of methane. That is why the danger of global warming could be estimated by the amount of carbon dioxide emissions CO2 in metric tons [5, 11]. Threat 9. The State Fragility [SF] After the end of Cold War and Soviet Union collapse (1991) the world has entered the era of new dramatic geopolitical processes. The following 18 years were marked with the blistering growth of globalization. Technical revolution in the field of information-communication technologies has made the world policy more transparent and led to an increase in changes influence which occurred in one region and affected the other parts of the planet. Due to these new qualities of the globalized world it became clear that new geopolitical system is full of unstable, unsuccessful and weak countries. The weakening of retaining mechanisms peculiar to bipolar world and conflict exacerbation between fundamental values of different countries caused a new wave of oppositions, terrorism, violence, territorial claims and irregular development. Uncontrolled spread of nuclear, chemical and biological weapon, rebuilding of nuclear energetics in such unstable, unbalanced world significantly increases the threat for sustainable development and global security of mankind. Under such conditions the stabilization of world development becomes possible due to the international cooperation, investments and support to the weak countries and planet regions by the progress of new paradigms of “harmonious coexistence” or “tolerant, peaceful world”. In order to accomplish such global, stabilizing policy the recognized international organizations and scientific centers began to develop analytical instruments for the estimation of new developing tendencies of the world since the beginning of this century. The first attempt to control the tendencies of the global development was a series of reports “The world and the conflict” which were published in the University of Maryland State (USA) in 2001. Reports devoted to the global tendencies of world development were also published in many countries such as Spain, Canada, and Germany etc.

154

4 Intellectual Analysis of Systemic World Conflicts and Global …

The final aim of the development of new analytical instruments was the attempt to estimate the ability of different countries to act in such important dimensions as conflict, state administration, economic and social development. Among all these instruments “The index of ability of the peaceful society development” that belongs to the series of reports “The world and conflict”, “Indicators of the world management” developed by the World Bank and “Index of unsuccessfulness of the countries” developed by The Fund of Peace can be mentioned. For the quantitative estimation of the sustainable development threat in our research the Fragile States Index (FSI) produced by The Fund for Peace (FFP) is used (http://ffp.statesindex.org). This index is based on the twelve indicators that cover a wide range of state failure risk elements such as extensive corruption and criminal behavior, inability to collect taxes or otherwise draw on citizen support, large-scale involuntary dislocation of the population, sharp economic decline, group-based inequality, institutionalized persecution or discrimination, severe demographic pressures, brain drain, and environmental decay. Data concerning these values are given in the paper [12]. Threat 10. Natural Disasters (ND) Natural disasters are the threat which is not so directly dependent on the human activity comparing to the other threats mentioned above. But, taking into account the reports of the international organizations on climate changes (World Economic Forum, 2010–2017) we cannot state that a human being is beside the point of the dynamics of the natural disasters. Experts of UNO and World Data Center for “Geoinformatics and Sustainable Development” (http://wdc.org.ua/en) determined 6 major natural disasters (in the order of danger decrease): draughts, floods, hurricanes, extreme temperatures, earthquakes and tsunami (http://www.un.org/russian/ga/undp/). Index is calculated as follows: 1. The summarized total of people suffered from the natural cataclysms in a year in a country is calculated: DisastersAffectedyear; state ¼ DroughtAffectedyear; state þ FloodAffectedyear; state þ StormAffectedyear; state þ ExtremeTemperatureAffectedyear; state þ EarthquakeAffectedyear; state þ TsunamiAffectedyear; state ; 8year; state

ð4:9Þ 2. Then the summarized total of people affected Disasters Affected is divided by the amount of population in the country and in the given year: 0 DisastersAffectedyear; state ¼

DisastersAffectedyear; state ; 8year; state: Populationyear; state

4.2 Identifying the Regularity of the Emergence …

155

3. After that the obtained data are normalized by the logistic norm: " #1 DisastersAffected 0 M ½DisastersAffected 0    year year; state    s½DisastersAffected 0  0 year ; DisastersAffectedyear; state  ¼ 1 þ e

where M[.], s[.]—are approximate average and standard deviation values respectively per year in all countries. As consequences of the natural disasters usually make a long-term influence on the country, gradually disappearing only with time, the final value of vulnerability index on the natural disasters will be defined as Exponential Weighted Moving Average (EWMA), which has the potential smoothing factor a ¼ 0; 25   X   0 NDyear;state ¼ 1  a  ð1  aÞt1  DisastersAffectedyeart;state : 1  t  Tmax

The value of the coefficient a was chosen by the experts on the basis of the estimation of the average time and level of the impact of disasters on the country. For convenience of calculations only the last significant Tmax = 25 years will be considered. At the same time the significance of time series will amount to e ¼ eTmax  lnð1aÞ ¼ 0:0007525  10E3. For the quantitative estimation of the degree of vulnerability of the world countries to the natural disasters the index of vulnerability to natural cataclysms was developed. The data of the International Disasters Database (http://www.emdat.be/) and the Centre for Research on the Epidemiology of Disasters (http://www.cred.be/) of the World Health Organization are used for its calculation. The values of vulnerability index for the countries to the natural disasters during 1995–2017 were calculated according to the given methodology. Threat 11. Conflict Intensity (CI) The next global threat is the accruing quantity of conflicts in the world, both in the separate countries, and between the sovereign states and groups of such states. In our research we will consider a conflicts between interstate, intrastate, substate, and transstate ones. Whereas interstate conflicts only involve internationally recognized state actors, intrastate conflicts involve both state actors and non-state actors. Substate conflicts are carried out solely among non-state actors. Transstate conflicts involve both state and non-state actors and meet the criteria of political conflict for at least two sovereign states. Considered conflicts we will characterise their intensity. We will distinguish five levels of intensity of conflicts: dispute, non-violent crisis, violent crisis, limited war, and war. To each of these levels we will appoint following quantity of points: • dispute—1 point; • non-violent crisis—2 points; • violent crisis—3 points;

156

4 Intellectual Analysis of Systemic World Conflicts and Global …

• limited war—4 points; • war—5 points. The last three levels constitute the category of violent conflicts, in contrast to the non-violent conflicts (dispute and non-violent crisis). Whereas a dispute is a political conflict carried out without resorting to violence, in a non-violent crisis one of the actors threatens to use violence. This includes violence against objects without taking the risk to harm persons, the refusal of arms surrender, pointing weapon systems against each other and sanctions. Quantitative data about intensity of conflicts we will take from a global resource: Heidelberg Institute for International Conflict Research (http://www.hiik.de/en/ konfliktbarometer/pdf/ConflictBarometer_2016.pdf) [4]. Threat 12. Proliferation (NI) “Proliferation” is a global threat of the debarment of the nuclear war, terrorism, the increasing of total number of weapons. It is a complex conception which is declared by many states and certainly is the part of modern policy. The level of the threat is opposite to value of Nonproliferation index defines degree of military nonproliferation and covers four categories of policy: Nonproliferation Index defines degree of military proliferation and covers four categories of policy: 1. 2. 3. 4.

Demilitarization or disarmament; Scientific Research; State’s Development; Level of Nonproliferation for Neighbor States.

Each of these categories is formed using one or two levels of indicators. These indicators, as well as the methodology for calculating the Nonproliferation index, have been developed by World Data Center for Geoinformatics and Sustainable Development [4]. Nonproliferation index is presented in a hierarchy discrete model, which shows the factors of direct or indirect influence. This index shows the level of nonproliferation in terms of state’s possibility to adhere the nonproliferation concept in a wide sense. Lets consider each of these categories of policy The first one is Disarmament. The importance of this category is underlined by Albert Einstein words: “I do not know with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.” Therefore, it is necessary to control the weapons usage and decrease the number of these. Also the military expenditures could describe this category. This category is very specific, so the hypothesis about indicators should be improved by the existence of data in open sources or by indirect information. This category includes information about nuclear and uranium production, because it is necessary to keep in mind the possibility of nuclear weapons creation. It is necessary to define the influence of indicators to the disarmament. Taking into consideration that it is a process, which have some changes in time, probably

4.2 Identifying the Regularity of the Emergence …

157

the differential quotient is the best way to describe the changes. So for all non-binary indicators we can use the formula: I¼

Indicatorcurrent period  Indicatorpreveous period : Dtime

Therefore, this formula shows the dynamic of each process. It is necessary to mention that the final algorithm of indicators chosen consists of two stages: finding all possible variants and choosing the group of necessary indicators by mathematical methods. In such a way we ignore the experts’ opinions by the open information limitation. This algorithm also shares to other categories. The second category is Scientific Research. It has three main directions: Education, Science and Innovations: • The education indicators describe the quality of education and the level of knowledge through the financing and the enrolment of students. Participation in Olympiads can show the level of knowledge in comparison with other countries. • The second direction is Science. It includes such indicators as Scientific and technical journal articles, Researchers in R&D (per million people), Research and development expenditure (% of GDP). • The last direction—Innovations—includes indicators Patent applications, residents, High-technology exports (current US$). As a result, 9 indicators represent the category Scientific Research. The third category is State’s Development. This category includes the following indicators: • • • • •

Life expectancy at birth (years); Gross national income (GNI) per capita (PPP $); Inflation, GDP deflator (annual %); Energy use (kg of oil equivalent per capita); Sectorial structure of economy.

The last category is Level of Nonproliferation in Neighbor States. This category shows the risk to be engaged into some other states activities. The first indicator of this group is a conflict barometer for neighboring states. This indicator is calculated by Heidelberg Institute for International Conflict Research [4] and published in annual reports. It is necessary to find a quantitate measurement for relations between countries. It is clear that if historically country has some conflicts with neighbors, it restrains the nonproliferation. This indicator could be calculating in such way: first of all, it could be 0 or 1 for each state. And the total sum of the values will represent the historical factor of relations. The time horizon must be limited, for example, by the newest history (from XX century). It seems that this indicator partly crosses with the previous one. But the conflict barometer should describe only the current situation.

158

4.2.3

4 Intellectual Analysis of Systemic World Conflicts and Global …

Modeling the Total Impact of the Aggregate of 12 Global Threats on Different Countries and Groups of Countries

Let’s determine the vulnerability of different countries and groups of countries to the impact of a set of 12 major threats (discussed in Sect. 4.2.2). Quantitative data on each of the 12 threats will be obtained from the global databases specified in the description of these threats in Sect. 4.2.2. To determine the groups of countries with close values of vulnerabilities to the impact of the 12 main threats, we use the hierarchical Ward’s algorithm of clustering [4]: [http://www.cse.iitb.ac.in/dbms/Data/Courses/CS632/1999/clustering/dbms.html]. Let’s associate each country j with a vector TrJ : TrJ ¼ ðES; FB; GINI; GD; IG; CP; WA; GW; SF; ND; CI; NIÞ; elements of which characterize the degree of manifestation of corresponding 12 threats (Sect. 4.2.2), presented in Table 4.3. Most initial data on each threat (Table 4.3) are taken from the World Data Center “Geoinformatics and a Sustainable Development” (http://wdc.org.ua/en) [4]. Considering the fact that all the measured data for components of vector TrJ are presented in different units of measurement, they have different physical meaning and vary in different ranges, they have been reduced to the normalized form, so that they vary in the range (0, 1). In this case, the value 0 corresponds to the minimum value of the threat, and the value 1 corresponds to the maximum of this threat. Let’s do this normalization using the following method. If higher values of threat X i correspond to better state of this threat, the indicators values are logistically normalized according to the formula:  axi;j 1 Cnorm ðxi;j Þ ¼ 1 þ e b

ð4:10Þ

where parameters a and b are calculated as an average value and a standard deviation for the set of countries under analysis. Otherwise, when the highest values of threat X i correspond to worse state of parameter, we use the value inverse to the one calculated by formula (4.23):  axi;j 1 Cnorm ðxi;j Þ ¼ 1  1 þ e b After this normalization we have vector

 !  T rJ :

ð4:11Þ

4.2 Identifying the Regularity of the Emergence …

159

Table 4.3 Top 12 global threats for the sustainable development in the beginning of the XXI century No.

Threat ID

Threat description

Source of quantitative data for the threat

1

ES

The global decrease in energy security

2

FB

3

GINI

The misbalance between biological capacity of the Earth and human needs in biosphere in the context of changing the demographic structure of the world The growing income inequality between people and countries of the Earth

Determined by the index of energy security calculated by the formula (4.7) [4] Measured in global hectares per person (global footprint network [6])

4

GD

The spread of global diseases (in the sense of their global spread in the world

5

IG

6

CP

The information gap determined by the sum of ICT development index and global cybersecurity index The сorruption perception

7

WA

The limited access to drinking-water

8

GW

The global warming

9

SF

10

ND

11

CI

The state fragility calculated as an average arithmetic value between political and economical instability of the country The index of vulnerability of the country to natural disasters Conflicts intensity—quantity of conflicts in the world, both in the separate countries, and between the sovereign states and groups of such states

Measured by Gini coefficient which is a number between 0 and 1, where 0 corresponds with perfect equality (where everyone has the same income) and 1 corresponds with perfect inequality (where one person has all the income— and everyone else has zero income) [7] Measured by the total quantity of the people (millions per year) died from most dangerous diseases [8] Calculated by formula (4.8) [4]

Measured by the index of corruption perception varying within the range from 0 to 10; where 0 is a maximum corruption level and 10—minimum corruption level [9] Measured by the percentage of the population which has no access to drinking-water [10, 11] Measured by the quantity of carbon dioxide emissions in metric tones [4] Measured by state fragility index, which changes in the range from 0 to 23, where 0—minimum fragility; 23—maximum fragility [12] Calculated by the formula (4.9) [4] Determined by the Heidelberg Institute for International Conflict Research (from 0 to 5) [4]

(continued)

4 Intellectual Analysis of Systemic World Conflicts and Global …

160 Table 4.3 (continued) No.

Threat ID

Threat description

Source of quantitative data for the threat

12

NI

Military proliferation—global threat of the debarment of the nuclear war, terrorism, the increasing of total number of weapons. The level of the threat is opposite to value of Nonproliferation index defines degree of military proliferation and covers four categories of policy: Demilitarization or disarmament; Scientific research; State’s development; Level of nonproliferation for neighbor states

Measured by World Data Center for Geoinformatics and Sustainable Development with a complex indicators [4]

 !  T rJ ¼ ðES ; FB ; GINI ; CD ; IG ; CP ; WA ; GW ; SF ; ND ; CI ; NI Þ:   Let us associate security index Isec each country with a value TrJ , being the Minkowski norm of the vector TrJ for the jth country, composed of normalized threats, for p = 3. After such normalization the security index Isec for each country  ! is defined as the Minkowski norm of vector S j ¼ sij ; sij ¼ 1  tij ; i ¼ 1; n:

Isec

  ! ¼  SJ  ¼

n  X p sij

!1p ð4:12Þ

i¼1

with parameter p ¼ 3.   ! Let us call Isec ¼  SJ  the degree of remoteness from the action of the set of 12 threats stated in Sect. 4.2.2 for the jth country.   Based on the calculated norms of the vector of threats TrJ  for each country j, let us introduce an order relation between clusters of countries (Table 4.4):     Kk Kj , Trk   TrJ  ð4:13Þ From Table 4.4 it follows that Cluster 1 includes the group of countries most successful from the safety standpoint, for which the degree of remoteness from the set of 12 global threats is the greatest in the sense of (4.12). And vice versa, Cluster 5 includes the countries most vulnerable in this respect. For these countries the degree of remoteness from the set of 12 global threats is minimum. Based on the data presented in Table 4.4, Fig. 4.6 illustrates the safety levels for different countries and regions of the world.

2

1

3

(FB) Biodiversity balance (measured in global hectares per person)

Canada ($42183.295)

Finland ($43401.228)

Australia ($49,755.315)

Germany ($42,161.320)

Norway ($70,868.122)

Netherlands ($45,637.887)

Sweden ($51,844.761)

Denmark ($53,578.757)

Switzerland ($79,887.518)

Japan ($38,900.5690

Belgium ($41,271.482)

Austria ($44,757.635)

1

2

3

4

5

6

7

8

9

10

11

12

3.000

0.000

0.000

2.000

0.000

0.000

−1.535

−4.044

−4.281

−5.762

−3.115

0.000

−4.674

3.881

0.000

3.000

−3.211

2.137

0.000

0.000

0.000

6.864

6.606

7.422

4

(CI) Conflicts intensity (from 0 to 5)

0.766

0.785

0.845

0.829

0.780

0.827

0.837

0.846

0.801

0.853

0.821

0.836

5

(IG) Information gap

75.000

77.000

72.000

86.000

90.000

88.000

83.000

85.000

81.000

79.000

89.000

82.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

Cluster 1 (very high degree of remoteness)

Country, GDP per capita 2016, USDb

Country rank

0.445

0.460

0.575

0.439

0.452

0.489

0.455

0.506

0.663

0.544

0.441

0.687

7

(ES) Global decrease of energy security

0.545

0.545

0.537

0.546

0.539

0.542

0.543

0.544

0.539

0.566

0.546

0.547

8

(GD) Spread of global diseases

62,408.673

93,618.510

1,243,384.358

40,348.001

38,067.127

44,326.696

169,972.784

59,636.421

757,312.507

377,906.352

46,299.542

47,5734.578

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.556

0.556

0.553

0.556

0.556

0.556

0.556

0.556

0.556

0.550

0.556

0.554

10

(ND) Vulnerability to natural disasters

Table 4.4 Countries degree remoteness from the set of threats based on clustering analysis, 2013–2016a

0.154

0.151

0.188

0.148

0.147

0.159

0.170

0.138

0.204

0.149

0.149

0.168

11

(NI) Proliferation (measured with a complex indicator)

100.000

100.000

100.000

100.000

100.000

100.000

100.000

100.000

100.000

100.000

100.000

99.800

12

(WA) Limited access to drinking water

30.480

27.590

32.110

31.640

29.080

27.320

27.990

25.900

30.130

34.940

27.120

33.680

13

(GINI) Increasing inequality between people and nations on Earth

27.500

29.000

35.100

21.800

21.500

22.600

28.200

21.200

28.600

22.500

18.800

23.800

14

1.597

1.610

1.612

1.618

1.628

1.648

1.655

1.667

1.675

1.687

1.696

1.763

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

4.2 Identifying the Regularity of the Emergence … 161

New Zealand ($39,412.159)

Korea, Rep. ($27,538.806)

Iceland ($59,764.705)

France ($36,857.119)

Ireland ($64,175.438)

United States ($57,638.159)

Italy ($30,661.222)

Luxembourg ($100,738.684)

United Kingdom ($40,367.038)

13

14

15

16

17

18

19

20

21

22

3.000

0.000

3.000

0.000

0.000

3.000

−2.152

−1.111

−4.810

−3.453

−11.507

−3.779

Uruguay ($15220.566)

Estonia ($17736.803)

Spain ($26616.488)

23

24

25

1.000

3.000

3.225

−2.448

6.912

0.000

0.000

0.000

−5.186

0.795

0.000

4.934

4

1.000

−6.746

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

0.800

0.857

0.742

0.848

0.764

0.742

0.878

0.789

0.849

0.644

0.853

0.817

0.874

5

(IG) Information gap

58.000

70.000

71.000

81.000

81.000

47.000

74.000

73.000

69.000

78.000

53.000

90.000

84.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

Cluster 2 (high degree of remoteness)

2

Singapore ($52,962.492)

1

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

0.597

0.415

0.415

0.602

0.415

0.565

0.980

0.428

0.597

0.415

0.501

0.433

0.416

7

(ES) Global decrease of energy security

0.558

0.538

0.561

0.536

0.549

0.560

0.547

0.541

0.546

0.546

0.547

0.545

0.521

8

(GD) Spread of global diseases

236,968.874

19,915.477

7605.358

457,472.918

10,161.257

344,767.673

5,186,168.427

34,964.845

333,190.954

1969.179

592,499.192

33,960.087

50,556.929

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.556

0.556

0.552

0.555

0.556

0.556

0.548

0.556

0.554

0.556

0.556

0.517

0.556

10

(ND) Vulnerability to natural disasters

0.141

0.134

0.105

0.118

0.132

0.158

0.134

0.144

0.150

0.139

0.203

0.133

0.182

11

(NI) Proliferation (measured with a complex indicator)

100.000

99.600

99.700

100.000

100.000

100.000

99.200

97.900

100.000

100.000

97.600

100.000

100.000

12

(WA) Limited access to drinking water

35.890

33.150

41.600

32.570

34.790

35.160

41.060

32.520

33.100

26.940

N/A

N/A

N/A

13

(GINI) Increasing inequality between people and nations on Earth

39.800

43.400

36.200

32.400

24.100

43.100

34.000

22.500

34.500

22.800

36.100

21.300

32.900

14

1.509

1.514

1.516

1.538

1.544

1.550

1.559

1.571

1.572

1.579

1.581

1.587

1.591

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

162 4 Intellectual Analysis of Systemic World Conflicts and Global …

Portugal ($19838.027)

Poland ($12414.099)

Slovenia ($21650.213)

Latvia ($14071.027)

Slovakia ($16529.541)

Mauritius ($9630.944)

Lithuania ($14900.779)

Malta ($25145.393)

26

27

28

29

30

31

32

33

34

0.000

0.000

0.000

−2.643

−0.193

−3.841

Belarus ($4989.428)

Guyana ($4529.139)

Romania ($9522.771)

Barbados ($15891.627)

35

36

37

38

1.000

0.000

−3.199

0.000

0.060

66.184

−1.351

1.000

0.000

1.000

−2.444

−1.675

0.000

−2.286

1.000

0.000

−2.344

2.975

4

0.000

−2.840

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

0.534

0.691

0.379

0.729

0.627

0.674

0.765

0.581

0.771

0.578

0.725

0.671

0.738

5

(IG) Information gap

61.000

48.000

34.000

40.000

55.000

59.000

54.000

51.000

57.000

61.000

62.000

62.000

55.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

Cluster 3 (medium degree of remoteness)

2

Czech Republic ($18483.716)

1

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

0.415

0.452

0.415

0.416

0.415

0.418

0.415

0.424

0.415

0.415

0.457

0.452

0.442

7

(ES) Global decrease of energy security

0.550

0.507

0.505

0.585

0.537

0.527

0.555

0.546

0.553

0.548

0.540

0.532

0.542

8

(GD) Spread of global diseases

1448.465

70,736.430

1936.176

63,769.130

2218.535

12,640.149

3725.672

33,677.728

7080.977

14,440.646

302,333.149

46,262.872

98,660.635

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.554

0.555

0.529

0.553

0.556

0.556

0.556

0.556

0.556

0.534

0.556

0.556

0.497

10

(ND) Vulnerability to natural disasters

0.120

0.113

0.116

0.128

0.128

0.123

0.120

0.123

0.128

0.141

0.129

0.130

0.140

11

(NI) Proliferation (measured with a complex indicator)

99.700

100.000

98.300

99.700

100.000

96.600

99.900

100.000

99.300

99.500

98.300

100.000

100.000

12

(WA) Limited access to drinking water

N/A

27.450

N/A

27.180

N/A

35.150

35.840

26.120

35.480

25.590

32.080

36.040

26.130

13

(GINI) Increasing inequality between people and nations on Earth

49.000

52.900

70.900

73.900

39.600

42.400

43.200

44.900

47.400

33.900

40.700

29.200

40.800

14

1.371

1.376

1.379

1.391

1.404

1.412

1.434

1.435

1.440

1.463

1.467

1.469

1.478

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

4.2 Identifying the Regularity of the Emergence … 163

2

Costa Rica ($11824.638)

Croatia ($12149.190)

Israel ($37180.527)

Brazil ($8649.948)

Hungary ($12820.088)

Oman ($14982.358)

Argentina ($12440.321)

Russian Federation ($8748.369)

Saudi Arabia) ($20028.648)

Montenegro ($7028.935)

Bulgaria ($7469.025)

Ukraine ($2185.728)

Mongolia ($3694.083)

1

39

40

41

42

43

44

45

46

47

48

49

50

51

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

3.000

0.000

1.000

5.000

−5.161

−0.500

−0.012

−0.719

0.000

3.000

1.164

7.774

1.000

1.000

−3.993

3.052

2.000

−0.899

3.000

−5.634

4.000

1.000

−0.979

5.831

4

0.000

−0.948

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

0.420

0.604

0.703

0.516

0.705

0.806

0.641

0.806

0.679

0.684

0.782

0.721

0.541

5

(IG) Information gap

38.000

29.000

41.000

45.000

46.000

29.000

36.000

45.000

48.000

40.000

64.000

49.000

58.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

0.417

0.450

0.433

0.415

0.533

0.703

0.446

0.436

0.424

0.624

0.425

0.415

0.415

7

(ES) Global decrease of energy security

0.558

0.582

0.531

0.535

0.581

0.540

0.585

0.565

0.541

0.551

0.540

0.541

0.613

8

(GD) Spread of global diseases

41,591.114

271,101.310

39,563.263

2247.871

541,428.883

1,789,074.295

189,818.588

61,183.895

41,440.767

503,677.118

71,073.794

17,711.610

7616.359

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.525

0.554

0.553

0.550

0.556

0.554

0.549

0.555

0.552

0.455

0.480

0.554

0.531

10

(ND) Vulnerability to natural disasters

0.104

0.131

0.118

0.106

0.135

0.080

0.121

0.124

0.132

0.136

0.175

0.121

0.108

11

(NI) Proliferation (measured with a complex indicator)

64.400

96.200

99.400

99.700

97.000

96.900

99.100

93.400

100.000

98.100

100.000

99.600

97.800

12

(WA) Limited access to drinking water

32.040

24.090

36.010

31.930

N/A

41.590

42.670

N/A

30.550

51.480

42.780

32.510

48.530

13

(GINI) Increasing inequality between people and nations on Earth

56.600

75.500

53.700

55.200

72.200

81.000

48.400

51.600

52.700

65.300

79.700

52.400

45.100

14

1.311

1.313

1.322

1.328

1.332

1.339

1.352

1.355

1.357

1.357

1.366

1.367

1.370

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

164 4 Intellectual Analysis of Systemic World Conflicts and Global …

2

Malaysia ($9508.238)

China ($8123.181)

Greece ($17890.575)

Bhutan ($2773.547)

Panama ($13680.236)

Chile ($13792.926)

Cyprus ($23541.488)

Kazakhstan ($7714.694)

Seychelles ($15075.719)

Belize ($4744.736)

Albania ($4124.982)

Georgia ($3865.786)

Botswana ($6924.150)

1

52

53

54

55

56

57

58

59

60

61

62

63

64

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

3.000

−2.706

2.000

3.000

−2.991

−2.926

3.000

−0.456

0.000

0.000

−1.065

0.115

0.000

N/A

0.000

3.000

−0.684

N/A

0.000

0.139

0.000

3.000

−2.667

0.527

4

2.000

−1.840

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

0.507

0.763

0.469

0.373

0.400

0.561

0.644

0.563

0.573

0.349

0.658

0.666

0.810

5

(IG) Information gap

60.000

57.000

39.000

N/A

55.000

29.000

55.000

66.000

38.000

65.000

44.000

40.000

49.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

0.415

0.415

0.415

0.415

0.415

0.448

0.415

0.444

0.415

0.415

0.452

0.926

0.448

7

(ES) Global decrease of energy security

0.402

0.547

0.536

0.552

0.549

0.566

0.542

0.565

0.569

0.518

0.560

0.542

0.549

8

(GD) Spread of global diseases

5423.493

7510.016

4814.771

517.047

645.392

262,901.898

5947.874

83,171.227

10,362.942

883.747

69,155.953

10,249,463.020

236,510.499

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.552

0.533

0.500

0.530

0.491

0.554

0.556

0.488

0.551

0.547

0.551

0.382

0.495

10

(ND) Vulnerability to natural disasters

0.107

0.117

0.115

0.117

0.131

0.131

0.111

0.122

0.108

0.117

0.130

0.132

0.145

11

(NI) Proliferation (measured with a complex indicator)

96.200

100.000

95.100

99.500

95.700

92.900

100.000

99.000

94.700

100.000

100.000

95.500

98.200

12

(WA) Limited access to drinking water

60.460

40.090

28.960

N/A

46.820

26.330

34.310

50.450

50.700

38.810

36.680

42.160

46.260

13

(GINI) Increasing inequality between people and nations on Earth

63.500

78.900

61.200

66.000

60.200

66.500

64.000

41.900

53.200

77.600

55.900

74.900

66.100

14

1.250

1.257

1.264

1.266

1.270

1.273

1.281

1.284

1.291

1.297

1.298

1.301

1.301

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

4.2 Identifying the Regularity of the Emergence … 165

Azerbaijan ($3878.709)

Cabo Verde ($2997.753)

Serbia ($5426.198)

Mexico ($8208.556)

65

66

67

68

69

4

5.000

3.000

0.000

3.000

5.000

−1.718

−1.481

−1.600

−1.517

−1.345

Tunisia ($3688.646)

India ($1709.592)

Iran ($5219.109)

Armenia ($3614.688)

Thailand ($5910.621)

Syria (N/A)

Macedonia ($5237.148)

Moldova ($1900.226)

70

71

72

73

74

75

76

77

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

3.000

4.000

3.000

3.000

2.000

5.000

3.000

3.000

−1.394

−0.628

−2.221

−1.176

−1.349

−0.886

−1.504

−0.767

0.571

0.640

0.319

0.694

0.431

0.584

0.584

0.633

0.669

0.536

0.323

0.677

0.665

5

(IG) Information gap

30.000

37.000

13.000

35.000

33.000

29.000

40.000

41.000

30.000

42.000

59.000

30.000

41.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

Cluster 4 (low degree of remoteness)

2

Turkey ($10862.600)

1

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

0.415

0.415

0.416

0.453

0.415

0.523

0.664

0.416

0.498

0.417

0.415

0.430

0.478

7

(ES) Global decrease of energy security

0.543

0.603

0.656

0.534

0.555

0.574

0.386

0.556

0.571

0.533

0.542

0.583

0.555

8

(GD) Spread of global diseases

4976.119

8294.754

36,064.945

303,117.887

5496.833

616,976.417

2,034,752.294

27,667.515

488,602.081

44,869.412

443.707

35,643.240

323,451.402

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.546

0.456

0.548

0.416

0.540

0.549

0.523

0.556

0.536

0.450

0.543

0.552

0.555

10

(ND) Vulnerability to natural disasters

0.104

0.117

0.124

0.135

0.116

0.112

0.092

0.113

0.134

0.139

0.110

0.120

0.124

11

(NI) Proliferation (measured with a complex indicator)

88.400

99.400

90.100

97.800

100.000

96.200

94.100

97.700

96.100

99.200

91.700

87.000

100.000

12

(WA) Limited access to drinking water

26.830

44.050

N/A

37.850

31.480

37.350

35.150

35.810

48.210

29.060

47.190

31.790

40.180

13

(GINI) Increasing inequality between people and nations on Earth

73.200

67.000

110.800

78.800

69.600

86.900

79.600

74.600

70.400

72.000

71.500

76.300

77.300

14

1.184

1.185

1.187

1.187

1.191

1.197

1.199

1.211

1.221

1.222

1.225

1.230

1.231

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

166 4 Intellectual Analysis of Systemic World Conflicts and Global …

2

Bolivia ($3104.956)

Kyrgyzstan ($1077.603)

Ghana ($1513.461)

Egypt ($3477.852)

Paraguay ($4077.742)

Vietnam ($2170.648)

Namibia ($4414.979)

Jordan ($4087.938)

Algeria ($3916.882)

Venezuela, Bolivarian Republic of (N/A)

Bosnia and Herzegovina ($4808.405)

1

78

79

80

81

82

83

84

85

86

87

88

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

0.000

2.000

3.000

3.000

2.000

4.532

−1.868

−1.792

−0.550

−1.521

3.000

4.000

−1.458

−0.676

0.000

−0.632

3.000

3.000

−0.590

7.538

3.000

4

(CI) Conflicts intensity (from 0 to 5)

13.799

3

(FB) Biodiversity balance (measured in global hectares per person)

0.377

0.521

0.519

0.453

0.283

0.400

0.438

0.696

0.434

0.422

0.324

5

(IG) Information gap

39.000

17.000

34.000

48.000

52.000

33.000

30.000

34.000

43.000

28.000

33.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

0.415

0.470

0.456

0.415

0.415

0.439

0.415

0.442

0.415

0.415

0.420

7

(ES) Global decrease of energy security

0.556

0.578

0.541

0.493

0.430

0.562

0.570

0.508

0.421

0.583

0.560

8

(GD) Spread of global diseases

21,906.658

185,531.865

134,215.867

24,807.255

2948.268

152,624.207

4972.452

213,012.363

14,620.329

9842.228

19,702.791

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.446

0.553

0.556

0.556

0.407

0.499

0.440

0.556

0.550

0.530

0.459

10

(ND) Vulnerability to natural disasters

0.118

0.118

0.133

0.117

0.110

0.136

0.109

0.114

0.108

0.101

0.107

11

(NI) Proliferation (measured with a complex indicator)

99.900

93.100

83.600

96.900

91.000

97.600

98.000

99.400

88.700

90.000

90.000

12

(WA) Limited access to drinking water

33.830

46.940

N/A

N/A

60.970

37.590

51.670

N/A

42.77

26.820

48.400

13

(GINI) Increasing inequality between people and nations on Earth

74.600

81.600

78.300

78.000

71.100

70.700

72.600

90.200

71.200

81.100

78.500

14

1.140

1.143

1.143

1.146

1.158

1.158

1.164

1.165

1.170

1.173

1.180

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

4.2 Identifying the Regularity of the Emergence … 167

2

Colombia ($5805.605)

El Salvador ($4223.585)

Fiji ($5233.469)

Ecuador ($6018.527)

Tajikistan ($795.844)

Morocco ($2892.776)

Peru ($6049.233)

Jamaica ($4878.576)

Congo, Republic of the ($1528.245)

Lebanon ($8257.294)

Indonesia ($3570.295)

South Africa ($5274.546)

Bangladesh ($1358.779)

1

89

90

91

92

93

94

95

96

97

98

100

101

102

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

3.000

3.000

3.000

3.000

3.000

3.000

3.000

−1.486

9.513

−3.094

−0.225

−2.262

−0.377

3.000

−0.895

1.532

3.000

−0.389

2.000

−0.964

3.000

4.000

−1.300

0.259

4.000

4

(CI) Conflicts intensity (from 0 to 5)

1.821

3

(FB) Biodiversity balance (measured in global hectares per person)

0.488

0.591

0.490

0.433

0.216

0.466

0.484

0.594

0.435

0.548

0.392

0.354

0.635

5

(IG) Information gap

26.000

45.000

37.000

28.000

20.000

39.000

35.000

37.000

25.000

31.000

40.000

36.000

37.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

0.423

0.462

0.480

0.415

0.418

0.415

0.430

0.415

0.415

0.426

0.415

0.415

0.448

7

(ES) Global decrease of energy security

0.565

0.279

0.490

0.569

0.465

0.547

0.567

0.550

0.582

0.571

0.524

0.619

0.577

8

(GD) Spread of global diseases

68,950.601

471,238.836

479,364.908

22581.386

2482.559

7726.369

57,153.862

58,558.323

3586.326

43,527.290

1708.822

6358.578

89,625.147

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.486

0.548

0.548

0.434

0.553

0.494

0.515

0.553

0.529

0.546

0.525

0.509

0.516

10

(ND) Vulnerability to natural disasters

0.114

0.116

0.121

0.121

0.105

0.117

0.120

0.107

0.110

0.114

0.127

0.104

0.108

11

(NI) Proliferation (measured with a complex indicator)

86.900

93.200

87.400

99.000

76.500

93.800

86.700

85.400

73.800

86.900

95.700

93.800

91.400

12

(WA) Limited access to drinking water

32.130

63.380

39.470

N/A

48.940

45.460

44.140

40.720

30.760

45.380

42.780

41.840

53.500

13

(GINI) Increasing inequality between people and nations on Earth

90.700

69.900

74.900

89.600

92.200

65.000

72.000

74.200

83.800

75.600

76.200

72.500

80.200

14

1.072

1.072

1.075

1.075

1.086

1.090

1.092

1.105

1.107

1.109

1.111

1.117

1.130

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

168 4 Intellectual Analysis of Systemic World Conflicts and Global …

2

Sri Lanka ($3909.989)

Laos ($2338.692)

Dominican Republic ($6722.224)

Honduras ($2361.160)

Rwanda ($702.836)

Benin ($789.440)

Zambia ($1269.574)

Nepal ($729.122)

1

103

104

105

106

107

108

109

110

3.000

−0.395

0.000

−0.434

0.000

2.000

−0.314

1.062

3.000

3.000

−0.968

0.034

1.000

0.165

4

3.000

−0.954

Madagascar ($401.742)

Malawi ($300.308)

Philippines ($2951.072)

Guinea ($661.528)

111

112

113

114

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

4.000

−0.479

3.000

0.000

−0.171

0.622

0.000

1.573

0.218

0.609

0.213

0.246

0.425

0.340

0.216

0.524

0.252

0.356

0.411

0.482

5

(IG) Information gap

27.000

35.000

31.000

26.000

29.000

38.000

36.000

54.000

30.000

31.000

30.000

36.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

Cluster 5 (very low degree of remoteness)

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

0.415

0.434

0.415

0.415

0.415

0.415

0.415

0.415

0.415

0.415

0.415

0.415

7

(ES) Global decrease of energy security

0.471

0.519

0.396

0.489

0.537

0.355

0.466

0.416

0.613

0.567

0.541

0.570

8

(GD) Spread of global diseases

2299.209

98,238.930

1272.449

3076.613

6501.591

3824.681

5797.527

799.406

9064.824

22,071.673

2174.531

16,024.790

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.552

0.257

0.451

0.497

0.410

0.528

0.526

0.551

0.458

0.544

0.472

0.377

10

(ND) Vulnerability to natural disasters

0.116

0.123

0.111

0.102

0.116

0.111

0.100

0.117

0.109

0.116

0.125

0.116

11

(NI) Proliferation (measured with a complex indicator)

76.800

91.800

90.200

51.500

91.600

65.400

77.900

76.100

91.200

84.700

75.700

95.600

12

(WA) Limited access to drinking water

33.730

43.040

46.120

42.650

32.840

55.620

43.440

50.440

50.640

47.070

37.890

39.160

13

(GINI) Increasing inequality between people and nations on Earth

103.800

84.700

87.600

84.200

91.200

86.300

78.900

91.300

79.800

70.800

84.400

87.700

14

1.022

1.029

1.033

1.036

1.039

1.056

1.057

1.058

1.061

1.062

1.066

1.069

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

4.2 Identifying the Regularity of the Emergence … 169

Country, GDP per capita 2016, USDb

2

Lesotho ($1039.704)

Guatemala ($4146.744)

Central African Republic ($382.213)

Sierra leone ($505.205)

Yemen ($990.335)

Pakistan ($1443.625)

Nicaragua ($2151.382)

Cambodia ($1269.907)

Cote d`Ivoire ($1534.974)

Gambia ($473.190)

Senegal ($952.768)

Mali ($779.945)

Tanzania, United Republic of

Country rank

1

115

116

117

118

119

120

121

122

123

124

125

126

127

Table 4.4 (continued)

3.000

−0.239

3.000

−0.132

3.000

3.000

−0.169

0.080

3.000

0.408

3.000

−0.134

4.000

−0.380

3.000

5.000

−0.511

0.855

3.000

0.014

4.000

3.000

−0.751

6.404

4

0.000

−0.628

(CI) Conflicts intensity (from 0 to 5)

3

(FB) Biodiversity balance (measured in global hectares per person)

0.337

0.220

0.365

0.265

0.442

0.370

0.286

0.441

0.196

0.355

0.165

0.340

0.257

5

(IG) Information gap

32.000

32.000

45.000

26.000

34.000

21.000

26.000

32.000

14.000

30.000

20.000

28.000

39.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

0.415

0.415

0.415

0.415

0.415

0.415

0.415

0.441

0.415

0.415

0.415

0.415

0.415

7

(ES) Global decrease of energy security

0.435

0.442

0.524

0.524

0.392

0.510

0.570

0.479

0.545

0.475

0.439

0.593

0.384

8

(GD) Spread of global diseases

10751.644

1026.760

8423.099

491.378

8987.817

5573.840

4569.082

153,368.608

25,346.304

1191.775

297.027

13,597.236

2295.542

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.539

0.497

0.486

0.491

0.556

0.431

0.470

0.485

0.555

0.552

0.548

0.409

0.495

10

(ND) Vulnerability to natural disasters

0.098

0.111

0.108

0.099

0.097

0.121

0.112

0.103

0.117

0.114

0.119

0.100

0.104

11

(NI) Proliferation (measured with a complex indicator)

55.600

77.000

78.500

90.200

81.900

75.500

87.000

91.400

54.900

62.600

68.500

92.800

81.800

12

(WA) Limited access to drinking water

37.780

33.040

40.290

47.330

43.180

30.760

47.050

30.690

N/A

33.990

56.240

48.660

54.180

13

(GINI) Increasing inequality between people and nations on Earth

81.800

95.200

83.600

86.800

97.900

87.400

79.000

101.700

111.500

91.000

112.100

83.200

80.900

14

0.936

0.939

0.958

0.963

0.970

0.994

0.996

1.009

1.010

1.015

1.016

1.021

1.021

15

(Isec) Degree of remoteness from the set of threats

(continued)

(SF) State fragility (measured with the failed states index)

170 4 Intellectual Analysis of Systemic World Conflicts and Global …

Burkina faso ($627.103)

Togo ($578.462)

Ethiopia ($706.757)

Niger (N/A)

Uganda ($580.384)

Swaziland ($2770.199)

Cameroon ($1374.514)

Nigeria ($2175.673)

Angola ($3308.700)

Kenya ($1455.360)

Mozambique ($382.069)

128

129

130

131

132

133

134

135

136

137

138

3.000

3.000

−0.651

−1.156

3.000

3.000

−0.509

1.061

3.000

1.441

5.000

3.000

−0.318

−0.429

3.000

−0.441

3.000

3.000

−0.579

0.482

3.000

4

(CI) Conflicts intensity (from 0 to 5)

−0.220

3

(FB) Biodiversity balance (measured in global hectares per person)

0.275

0.541

0.224

0.528

0.413

0.235

0.481

0.237

0.302

0.392

0.278

5

(IG) Information gap

27.000

26.000

18.000

28.000

26.000

43.000

25.000

35.000

34.000

32.000

42.000

6

(CP) Corruption perception index

Total influence of the set of global threats on different countries

0.415

0.415

0.437

0.451

0.415

0.415

0.415

0.415

0.415

0.415

0.415

7

(ES) Global decrease of energy security

0.330

0.401

0.389

0.284

0.411

0.393

0.354

0.464

0.354

0.464

0.459

8

(GD) Spread of global diseases

4019.032

13,300.209

32,463.951

95,650.028

6813.286

1089.099

4895.445

1961.845

10,634.300

2229.536

3058.278

9

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.517

0.459

0.519

0.535

0.544

0.537

0.536

0.452

0.504

0.548

0.411

10

(ND) Vulnerability to natural disasters

N/A—data not available Latest available data Data Source: The World Bank (World Development Indicators, https://data.worldbank.org/indicator/NY.GDP.PCAP.CD, Last Updated Date 22.02.2018)

b

a

a

2

1

($877.508)

Country, GDP per capita 2016, USDb

Country rank

Table 4.4 (continued)

0.102

0.108

0.118

0.100

0.107

0.115

0.106

0.120

0.112

0.108

0.111

11

(NI) Proliferation (measured with a complex indicator)

51.100

63.200

49.000

68.500

75.600

74.100

79.000

58.200

57.300

63.100

82.300

12

(WA) Limited access to drinking water

45.580

48.510

42.720

42.970

46.540

51.450

41.010

33.990

33.170

46.020

35.300

13

(GINI) Increasing inequality between people and nations on Earth

87.800

98.300

90.500

103.500

97.800

87.600

97.700

98.400

97.200

85.800

89.400

14

(SF) State fragility (measured with the failed states index)

0.856

0.881

0.903

0.913

0.918

0.919

0.921

0.924

0.926

0.930

0.934

15

(Isec) Degree of remoteness from the set of threats

4.2 Identifying the Regularity of the Emergence … 171

Fig. 4.6 Countries safety levels—degree of remoteness from the set of threats (based on clustering analysis)

172 4 Intellectual Analysis of Systemic World Conflicts and Global …

ISO

Country

Isec

1 CAN Canada 1.763 2 FIN Finland 1.696 3 AUS Australia 1.687 4 DEU Germany 1.675 5 NOR Norway 1.667 6 NLD Netherlands 1.655 7 SWE Sweden 1.648 8 DNK Denmark 1.628 9 CHE Switzerland 1.618 10 JPN Japan 1.612 a For each country critical values of the threats

Rank Isec

CI

CP

0.215 0.224 0.136 0.242 0.224 0.100 0.233 0.224 0.153 0.672 0.684 0.141 0.427 0.224 0.119 0.730 0.224 0.130 0.349 0.684 0.105 0.599 0.224 0.096 0.706 0.224 0.114 0.715 0.525 0.203 indicators are highlighted

FB

Table 4.5 Top 10 countries with the highest level of national securitya 0.059 0.534 0.253 0.077 0.346 0.492 0.393 0.500 0.539 0.190

ES 0.406 0.409 0.339 0.434 0.415 0.421 0.425 0.433 0.409 0.441

GD 0.574 0.451 0.546 0.651 0.455 0.486 0.450 0.448 0.449 0.766

GW 0.191 0.202 0.178 0.220 0.183 0.190 0.198 0.238 0.196 0.184

IG 0.339 0.330 0.359 0.331 0.330 0.331 0.330 0.330 0.331 0.344

ND 0.098 0.218 0.222 0.019 0.327 0.093 0.148 0.239 0.228 0.040

NI

0.312 0.309 0.309 0.309 0.309 0.309 0.309 0.309 0.309 0.309

WA

0.392 0.237 0.426 0.303 0.214 0.255 0.241 0.279 0.339 0.351

GINI

0.131 0.108 0.124 0.156 0.118 0.154 0.125 0.120 0.121 0.197

SF

4.2 Identifying the Regularity of the Emergence … 173

174

4 Intellectual Analysis of Systemic World Conflicts and Global …

As presented in Table 4.5, the common trait of the ten leaders is high Isec, and low level of threats. E.g., the group leaders, Canada, Finland, and Australia, have the best indicators among all the group countries. However, certain coefficients such as biodiversity balance (FB), energy security (ES) and global warming (GW) are higher than average. The G-7 countries are characterized by a high level of national security and therefore a low vulnerability to the impact of 12 global threats (Table 4.6). The BRICS group of countries (Table 4.7) are characterized by average level of life security (except for South Africa) and high level of threats. Notably, China, the Russian Federation, and India are characterized by very high global warming (GW) coefficients. Brazil, the group leader, has high level of vulnerability to natural disasters (ND), and personal income inequality (GINI). The lowest security level is characteristic of South Africa, where the average level of threats is the highest in the group: notably vulnerability to global diseases (GD) and personal income inequality (GINI). Six countries from the Results of Cluster Analysis (Table 4.4) are characterized by high level of conflicts intensity indicator, which is caused by armed conflicts in the territories of such countries (Table 4.8). In total, experts of the Heidelberg Institute for International Conflict Research counted 226 violent conflicts in the world in 2016 [4], 18 of them were defined as wars and 20—as limited wars. Wars: – Sub-Saharan Africa: Nigeria (farmers—pastoralists); Nigeria, Cameroon, Chad, Niger (Boko Haram); Somalia, Kenya (al-Shabaab); South Sudan (inter-communal violence); South Sudan (SPLM/A-in-Opposition); Sudan (Darfur); Sudan (SPLM/A-North/Southern Kordofan, Blue Nile). – Middle East and Maghreb: Afghanistan (Taliban et al.); Syria, Iraq et al. (IS); Libya (opposition); Syria (inter-opposition violence); Syria (opposition); Turkey (PKK, TAK); Yemen, Saudi Arabia (al-Houthi); Yemen (AQAP, Ansar al-Sharia). – Asia and Oceania: Pakistan (Islamist militant groups). – The Americas: Mexico (drug cartels). – Europe: Ukraine (Donbas). Limited wars: – Sub-Saharan Africa: Central African Republic (Anti-Balaka—ex-Séléka); DR Congo (ADF); DR Congo (Bantu—Batwa); DR Congo (Mayi-Mayi et al.); DR Congo, Rwanda (FDLR); Nigeria (northerners—southerners); Sudan (inter-communal violence). – Middle East and Maghreb: Egypt (Islamist groups/Sinai Peninsula); Turkey (opposition). – Asia and Oceania: India (Naxalites); Myanmar (KIA, KIO/Kachin State); Myanmar (Rohingya); Myanmar (TNLA/Shan State); Pakistan–India; Philippines (BIFM, BIFF—MILF, government).

ISO

Country

Isec

FB

CI

CP

1 CAN Canada 1.763 0.215 0.224 0.136 4 DEU Germany 1.675 0.672 0.684 0.141 10 JPN Japan 1.612 0.715 0.525 0.203 17 FRA France 1.572 0.627 0.684 0.227 19 USA United States 1.559 0.735 0.684 0.188 20 ITA Italy 1.550 0.682 0.224 0.461 22 GBR United Kingdom 1.538 0.696 0.684 0.141 a For each country critical values of the threats indicators are highlighted

Rank Isec

Table 4.6 The level of national security of the G-7 countriesa 0.059 0.077 0.190 0.153 0.002 0.210 0.146

ES 0.406 0.434 0.441 0.409 0.404 0.359 0.446

GD 0.574 0.651 0.766 0.533 0.997 0.537 0.569

GW 0.191 0.220 0.184 0.181 0.160 0.274 0.182

IG 0.339 0.331 0.344 0.342 0.370 0.333 0.335

ND

0.098 0.019 0.040 0.209 0.374 0.154 0.560

NI

0.312 0.309 0.309 0.309 0.321 0.309 0.309

WA

0.392 0.303 0.351 0.377 0.594 0.432 0.363

GINI

0.131 0.156 0.197 0.193 0.189 0.257 0.179

SF

4.2 Identifying the Regularity of the Emergence … 175

ISO

Country

Isec

FB

42 BRA Brazil 1.357 0.270 46 RUS Russian Federation 1.339 0.473 53 CHN China 1.301 0.649 71 IND India 1.199 0.557 101 ZAF South Africa 1.072 0.632 a For each country critical values of the threats indicators are

Rank Isec

CP

0.809 0.545 0.684 0.671 0.684 0.545 0.809 0.545 0.684 0.485 highlighted

CI

Table 4.7 The level of national security of the BRIСS countriesa 0.117 0.049 0.004 0.076 0.472

ES 0.390 0.431 0.425 0.880 0.973

GD

GW 0.582 0.860 1.000 0.891 0.573

IG 0.336 0.216 0.357 0.456 0.448

ND 0.792 0.341 0.944 0.491 0.370

NI 0.346 0.894 0.395 0.824 0.592

WA 0.339 0.358 0.381 0.404 0.420

GINI 0.823 0.608 0.623 0.431 0.946

SF 0.474 0.640 0.577 0.626 0.524

176 4 Intellectual Analysis of Systemic World Conflicts and Global …

ISO

Country

Isec

FB

CI

CP

ES

50 UKR Ukraine 1.313 0.561 0.893 0.671 0.507 65 TUR Turkey 1.231 0.607 0.893 0.533 0.424 69 MEX Mexico 1.221 0.590 0.893 0.660 0.368 75 SYR Syria 1.187 0.569 0.893 0.816 0.605 118 YEM Yemen 1.010 0.552 0.893 0.808 0.607 134 NGA Nigeria 0.913 0.548 0.893 0.682 0.504 a For each country critical values of the threats indicators are highlighted

Rank Isec

Table 4.8 High level of conflicts intensity countriesa GD 0.288 0.375 0.322 0.119 0.414 0.971

GW 0.516 0.531 0.578 0.448 0.445 0.465

IG 0.432 0.358 0.353 0.761 0.856 0.527

ND 0.340 0.336 0.428 0.370 0.337 0.432

NI 0.408 0.486 0.372 0.488 0.574 0.760

WA 0.369 0.309 0.371 0.474 0.916 0.806

GINI 0.182 0.570 0.764 0.500 0.500 0.644

SF 0.583 0.602 0.529 0.865 0.869 0.824

4.2 Identifying the Regularity of the Emergence … 177

4 Intellectual Analysis of Systemic World Conflicts and Global …

178

– The Americas: Brazil (drug-trafficking organizations); Colombia (ELN); Colombia (inter-cartel violence, neo-paramilitary groups, left-wing militants); El Salvador (Maras); Mexico (inter-cartel violence, paramilitary groups).

4.2.4

Conclusions

1. Based on the intellectual analysis of big historical data pertaining to global conflicts taking place from 705 B.C. till now, the regularity of their occurrence is determined. It is shown that a sequence of life cycles of system world conflicts is subordinate to the law of the Fibonacci series, and the intensity of these conflicts, depending on a level of technological evolution of the society, builds up under the hyperbolic law. By using the determined regularity we attempt to foresee the upcoming world conflict, called “the conflict of XXI century”, and analyze its nature and the principal characteristics-duration, main phases of its flow and intensity. 2. A set of 12 basic global threats that generate “the conflict of XXI” was described. By using the cluster analysis we identify the impact of these threats on different countries of the world and on large groups of countries (civilizations) united by the common culture features. Suppositions were made on possible scenarios of the world development during “the conflict of XXI” and after its termination.

4.3

Interrelation Between Periodic Processes in the Global Economy and Systemic World Conflicts

One of the major challenges to modern science because of the prompt development of the global economic crisis and aggravation of global conflicts is to draw up scientifically justified “metric” express forecasts of the social development for near and far future. The role of any scientific forecasts and predictions should not be exaggerated since they are conventional and limited, especially in the cases where the process being analyzed passes to the so-called “blow-up mode” [13]. However, the reliability of any forecast considerably increases if it “resonates” with other global or local tendencies, hypotheses, and patterns. In our study, such additional patterns are: • modern hypotheses that the historical time accelerates as scientific and technological progress develops [13]; • cyclical nature of economic development [14]; • the tendency to reduce the duration of economic cycles as scientific and technological progress develops [15, 16].

4.3 Interrelation Between Periodic Processes in the Global …

179

The most significant are four types of economic cycles [14]: • • • •

the the the the

Kitchin inventory cycle of 3–5 years; Juglar fixed-investment cycle of 7–11 years; Kuznets infrastructural investment cycle of 15–25 years; Kondratiev wave or long technological cycle of 45–60 years.

In our study, we consider Kondratiev’s economic cycles as the most fundamental, characterizing not only economic, but also social and political processes in society. Proceeding from the above facts and considering the evolutionary development of the civilization as a holistic process, which is determined by a harmonious interaction of its components, we will compare the patterns of Kondratieff cycles of the development of global economy and identified in Sect. 4.2 Cn -waves of global systemic conflicts and will make an attempt to predict the course of periodic processes in the 21st century.

4.3.1

Periodicity of Global Systemic Conflicts and Economic Processes

In the previous section (Sect. 4.2), the Fibonacci pattern of the course of systemic world conflicts was revealed (Table 4.1), presented in terms of the duration of these conflicts T ðCn Þ(4.1–4.4) and their intensity I  ðCn Þ (4.5–4.6). As mentioned above, the property of a cyclical change of the economy is reflected by Kondratieff cycles (K-cycles) discovered by an outstanding Russian economist Nikolai Kondratiev 80 years ago [14, 15]. During the last two centuries, such cycles with 40–60-year periods (Table 4.9) fully complied with the actual development of economy. Figure 4.7 illustrates the course of K-cycles that cover the time interval from the first half of the last century to the present time. Analyzing these cycles reveals that the major depression (in the USA) during the downwave of the third K-cycle is illustrative for the last century; it has begun at the end of the 1920s, developed into the default of dollar in 1933, and has essentially Table 4.9 Common sequence of K-cycles No. of K-cycle, n

Notation

Duration T(Cn) of the full cycle Kn0 , year

Upwave duration L0n;1 for the K-cycle, year

Downwave duration Ln;2 for the K-cycle, year

1

K01

1779–1844/51

1779–1810/17

1810/17–1844/51

2

K02 K03 K04 K05

1844/51–1890/96

1844/51–1870/75

1870/75–1890/96

1890/96–1936/40

1890/96–1914/20

1914/20–1936/40

1936/40–1980/85

1936/40–1966/71

1966/71–1980/85

1980/85–2020/25

1980/85–2003/09

2003/09–?

3 4 5

180

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.7 Long-term Kondratieff cycles in the 20th–early 21st century

rearranged the world structure as a result of the Second World War. The next long crisis of the global economy, which is on the downwave of the fourth K-cycle, began at the end of the 1960s–the early 1970s, developed into the default of dollar in 1971, oil crisis in 1973–1975, passed to the deep economic crisis called stagflation, and resulted in the mid-1980s–the early 1990s in the disintegration of the Soviet Union, reconfiguration of the world, and its transition to a unipolar world model. Of great importance are Kondratieff’s conclusions (confirmed by the analysis of historical evidence) that the periods of upwaves of Kondratieff cycles are usually accompanied by more serious social disruptions (revolutions, wars, etc.) than the periods of downwaves [14, 15]. Hence, Kondratieff cycles characterize not only economic but also socio-political dynamics. An analysis of these phenomena reveals an interrelation between two cyclic processes, development of the global economy and the occurrence and course of global systemic conflicts. Nowadays, the mankind is on the border of the transition from the downwave of the fifth Kondratieff cycle to the rising wave of the sixth K-cycle. This state corresponds to the transition from the global economic crisis to the next economic upswing.

4.3.2

Analysis of the Relationship Between Systemic World Conflicts and the Global Economy

Despite numerous attempts to establish a law governing the cyclic processes, none pattern of the varying duration of full K-cycles in time has been scientifically substantiated, which complicates drawing up efficient “metric” forecasts of social development for the near and far future. As a rule, all the studies addressed the internal nature of Kondratieff cycles. For example, the hypothesis is well known that the duration of K-cycles reduces with the scientific and technological progress [17, 18].

4.3 Interrelation Between Periodic Processes in the Global …

181

Kondratieff and his disciples emphasized that the patterns in the cyclic dynamics of the economy and society are basically probabilistic. For different parameters (as well as countries and regions), K-cycles are more or less pronounced. The results of the analysis of long-term waves depend on the metrics and system of indicators underlying the global historical pulsations and trends. In this section we propose a new approach to revealing the patterns of time variation in the duration of full K-cycles that synchronizes the development of K-cycles with an external “metric” process, namely, with the course of global systemic conflicts [16]. Basic Assumption. Let us formulate an assumption to be used in what follows: there is one more downwave in the Kondratieff cycle that lasts about 28–30 years (1750/55–1779/85) and precedes the first upwave (1779/85–1810/17) identified by Kondratieff [14, 15]. Such an assumption can be substantiated by a number of objective statements; we will mention the most important ones. First, the statement that such a wave (if exists) falls and lasts about 28 years agrees well with the fact that the next wave accrues with approximately the same duration, i.e., there is metric conformity in the sequence of down- and upwaves. Second, as a distinguished Austrian-American scientist J. Schumpeter asserted, there is a set of Kondratieff cycles. Schumpeter’s conclusions were based on his “innovation theory of business” [19], which he used as late as in the 1930s to develop a “Kondratieff cyclic paradigm” and innovation concept of “long waves.” Third, Kondratieff waves should not be considered just as a form of cyclic economic dynamics. They are a kind of historical cycles that cover the structure of the whole society. It is in this aspect that Braudel [20], a well-known historian of the 20th century, considered Kondratieff cycles and related them with the historical tendency of the society and dated appearing of such cycles several centuries back: If we associate two processes, the century tendency and Kondratieff cycles, we can hear “music” of long-term conjuncture that sounds in two voices. In contrast to the conventional point of view, the cycles Kondratieff speaks about appeared on the European theater not in 1779 but several centuries earlier. Adding the movements to the rise or downfall of the century tendency, Kondratieff cycles strengthened or softened it [20]. Modified Sequence of Kondratieff Cycles. Let us consider the main assumption. We will generate a new sequence of Kondratieff cycles fKn gn 1 (Table 4.6) based on the conventional chronology [15–18]. In what follows, we will call the sequence fKn gn 1 a modified sequence of Kondratieff cycles (MSKC).   Note that while each term of the conventional sequence Kn0 n 1 of Kondratieff cycles (Table 4.6) is defined by a pair AB ¼ ðupwave; downwaveÞ; the associated Kondratieff cycles in the modified sequence fKn gn 1 are defined by the inverse pair

182

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.8 Modified Sequence of K-cycles {Kn}n 1 joined with C5 -wave on the interval 1750– 1920 (a), and with C6 -wave on the interval 1920–2008 (b)

BA ¼ ðdownwave; upwaveÞ: Since the sequence of C-waves of global systemic conflicts (see Table 4.1) and the modified sequence of K-cycles of development of global economy (see Table 4.10) are considered as interdependent components of the holistic process of development of global society, let us overlap the curves of these processes on a unified time scale from 1750 to 2008 (Fig. 4.8). Note that waves of global conflicts Cn are actually joined together (see by Table 4.1) during some time, and specific

4.3 Interrelation Between Periodic Processes in the Global …

183

dates of joining waves C4 and C5 (1750); C5 and C6 (1920); C6 and C7 (2008) are determined as some averaged instants of time. Analyzing the result of overlapping these two processes on the common time axis reveals a pattern; we will formulate it as the following principles. 1. Quantization Principle. The time intervals Tk ðDðCn ÞÞ; n 5, on which the wave Cn undergoes the five phases of evolution: (origin) > (growth) > (culmination) > (decrease) > (decay), contain an integer number Tk ðCn Þ of full K-cycles of the MSKC fKn gn 1 . 2. Monotonicity Principle. The average duration Tk ðCn Þ of one full K-cycle of the MSKC fKn gn 1 on the time intervals ðCn Þ substantially decreases as n grows. Denote by    G Ck ; fKn gn 1 , KsðkÞ ; KsðkÞ þ 1 ; . . .; KsðkÞ þ mðkÞ ; k 5 a group (quantum) of K-cycles separated by the C-wave Ck from the MSKC fKn gn 1 . Then Tk ðCk Þ ¼ mðkÞ þ 1 and mP ðk Þ  T KsðkÞ þ r ; Tk ðDðCk ÞÞ ¼ ðmðkÞ þ 1Þ1 r¼0

 where T Kj is the duration of one full Kondratieff cycle Kj . In this case,   G C5 ; fKn gn 1 ¼ fK1 ; K2 ; K3 g; G C6 ; fKn gn 1 ¼ fK4 ; K5 g; Tk ðDðC5 ÞÞ ¼ T ðK1 Þ þ T ð3K2 Þ þ T ðK3 Þ ¼ 56:6 years; nk ðDðC5 ÞÞ ¼ 3; Tk ðDðC6 ÞÞ ¼ T ðK4 Þ þ2 T ðK5 Þ ¼ 43:3years; nk ðDðC6 ÞÞ ¼ 2: The pattern revealed allows formulating the basic hypothesis on the probable next based on which the seventh wave of the next group  step of quantization, G C7 ; fKn gn 1 of K-cycles can be distinguished in the MSKC fKn gn 1 . To this end, let us formulate the following hypothesis. Main Hypothesis. Since development of the global economy and the course of global systemic conflicts are interdependent components of the same process of evolutionary development of a globalized society, the coordination of these processes on the time intervals Tk ðDðC5 ÞÞ and Tk ðDðC6 ÞÞ as to obeying the quantization and monotonicity principles holds true also on the time interval Tk ðDðC7 ÞÞ. Based on the main hypothesis, we can predict the course (in a metric sense) of K-cycles in the 21st century, namely: a. the time interval Tk ðDðC7 ÞÞ contains no less than two full MSKC cycles fKn gn 1 ;

184

4 Intellectual Analysis of Systemic World Conflicts and Global …

b. average duration of one full K-cycle on the time interval Tk ðDðC7 ÞÞ is much shorter than Tk ðDðC6 ÞÞ ¼ 43: 5 years. Hence, two cases that correspond to two scenarios of Kondratieff cycles in the 21st century are possible. Scenario A. The time interval 2008–2092 contains two full Kondratieff cycles (Fig. 4.9a). In this case,  G C7 ; fKn gn 1 ¼ fK6 ; K7 g; nk ðDðC7 ÞÞ ¼ 2; Tk ðDðC7 ÞÞ ¼ T ðK6 Þ þ2 T ðK7 Þ ¼ 42:5 years\Tk ðDðC6 ÞÞ ¼ 43:5 years: Scenario B. The time interval 2008–2092 contains three full Kondratieff cycles (Fig. 4.9b). In this case,  G C7 ; fKn gn 1 ¼ fK6 ; K7 ; K8 g; nk ðDðC5 ÞÞ ¼ 3; Tk ðDðC7 ÞÞ ¼ T ðK6 Þ þ T ð3K7 Þ þ T ðK8 Þ ¼ 28:3 years\Tk ðDðC6 Þ ¼ 43:5 years: The main confirmation of the validity of the scenario A is the commonly assumed average duration of one full K-cycle varying from 40 to 60 years [15, 16]. However, more powerful arguments can be given in favor of the scenario B. First, obeying the monotonicity principle is rather conventional for the scenario A since Tk ðDðC7 ÞÞ ¼ 42:5 years and Tk ðDðC6 ÞÞ ¼ 43:5 years can be assumed

Fig. 4.9 Predicted Kondratieff cycles in the 21st century: a scenario A: nk ðDðC7 ÞÞ ¼ 2; T ðK6 Þ ¼ T ðK7 Þ, b scenario B: nk ðDðC7 ÞÞ ¼ 3; T ðK6 Þ ¼ T ðK7 Þ ¼ T ðK8 Þ

4.3 Interrelation Between Periodic Processes in the Global …

185

Table 4.10 Modified sequence of K-cycles No. of K-cycle, n

Notation, Kn

Duration T(Cn) of the full cycle Kn0 , year

Upwave duration L0n;2 for the Kn-cycle, year

Downwave duration Ln;1 for the Kn-cycle, year

1

K1

1750/55–1810/17

1750/55–1779/85

2

K2

1810/17–1870/75

1810/17–1844/51

3

K3

1870/75–1914/20

1870/75–1890/96

4

K4

1914/20–1966/71

1914/20–1936/40

5

K5

1966/71–2003/09

1966/71–1980/85

1779/85– 1810/17 1844/51– 1870/75 1890/96– 1914/20 1936/40– 1966/71 1980/85– 2003/09

approximately equal because of the errors of time “joints” of the processes on the time interval from 1750 to 2092. Second, results of some modern studies of global evolutionary processes (such as the concept about the acceleration of historical time [21] and the hypothesis that the duration of Kondratieff cycles tends to reduce with the scientific and technological progress [17, 18]) may indirectly confirm the priority of the scenario B. If the scenario B takes place, then most probably the durations TðK6 Þ; TðK7 Þ, and TðK8 Þ of the predicted K-cycles K6 , K7 , and K8 will be related as follows: T ðK8 Þ\T ðK7 Þ\T ðK6 Þ; where T ðK6 Þ þ T ðK7 Þ þ T ðK8 Þ ¼ T ðC7 Þ ¼ 85 years: Certainly, to substantiate the choice of the most reliable relationship among T ðK6 Þ; T ðK7 Þ, and T ðK8 Þ, additional integrated studies are necessary that would take into account the dynamics of various components of the global evolution of the civilization such as the following key ones: prompt depletion of power resources of the Earth, varied demographic structure of the world, growing social inequality among people and countries, global climate changes, natural disasters, etc. It is important to establish a relationship between the time quantum k c of the life of Cwaves and average duration of one full cycle of the modified sequence of Kondratieff cycles. Since kc  85 years [2] and Tk ðDðC5 Þ [ DðC6 Þ [ DðC7 ÞÞ ¼ ð2092  1750Þ=8 ¼ 42:75 years kc  2Tk ðDðC5 Þ [ DðC6 Þ [ DðC7 ÞÞ and the sequence fT ðCn Þg; n ¼ 1; 2; . . .; 7 (Table 4.2) can be represented as the following series:

4 Intellectual Analysis of Systemic World Conflicts and Global …

186

T ðC1 Þ  13  ck ; T ðC2 Þ  8  ck ; T ðC3 Þ  5  ck ; T ðC4 Þ  3  ck ; T ðC5 Þ  2  ck ; T ðC6 Þ  1  ck ; T ðC7 Þ  1  ck ; where ck ¼ 2Tk ðDðC5 Þ [ DðC6 Þ [ DðC7 ÞÞ:

This yields Fibonacci dependence of the duration of life of all waves Cn on the average duration of one full cycle of the modified sequence of Kondratieff cycles during the time interval from 1750 to 2092. Finally, the above pattern confirms the hypothesis that the duration of Kondratieff cycles tends to reduce with scientific and technological progress [17, 18], with the following refinement: the hypothesis is true not for the sequence fT ðKn Þgn 1 generated by the fKn gn 1 but for the sequence fTk ðDðCm ÞÞgm 5 generated by the    sequence of groups (quantums) of K-cycles G Cm ; fKn gn 1 m 5 .

4.3.3

Conclusions

1. Based on the evolutionary development of the civilization as a holistic process determined by a harmonious interaction of its components, we have compared the patterns of a sequence of Kondratieff cycles of development of global economy and of C-waves of global systemic conflicts and have made an attempt to predict the course of these interconnected processes in the 21st century with the use of a metric approach. 2. The results of the analysis allow concluding that the 21st century will most probably manifest three K-cycles with the average duration of one full cycle of about 30 years, which is much shorter than the average duration of one of the previous five Kondratieff cycles (50 years). This may be because of the technological progress and the new technological pattern being formed, which cannot be investigated yet at the present stage of the development of the mankind. 3. The interrelation has been revealed and Fibonacci dependence has been established for the time quantum kc of the life cycles of C-waves of global systemic conflicts and average duration of one full cycle of the modified sequence of Kondratieff cycles on the time interval from 1750 to 2092. 4. The results of the study confirm the refined hypothesis that the duration of Kondratieff cycles tend to reduce with the scientific and technological progress [17, 18]. The revealed synchronization of the development of the global economy and the course of global systemic conflicts can be interpreted as indirect confirmation of the adequacy of the models of Kondratieff cycles [15, 16] and C-waves [2].

4.4 Metric Aspects of Periodic Processes in Economy and Society

4.4

187

Metric Aspects of Periodic Processes in Economy and Society

The interrelation and principles of the development of various processes in the nature and society are discussed in many publications [19, 22]. The paper [2] reveals the pattern of global system conflicts based on the dynamic model of so-called C-waves with the underlying metrics of golden section. The paper [20] compares the principles of the sequence of great Kondratieff cycles of the development of the global economy and C-waves of global system conflicts. An attempt is made to predict these periodic processes for the XXIst century. The principles revealed for global system conflicts and great Kondratieff cycles become much more reliable if they correspond to some additional external conditions (concepts, principles, hypotheses) and the conclusions made on their basis are coordinated or “resonate” with the conclusions of other independent studies. We will consider the evolution of the civilization as a holistic process that results from the harmonic interaction of its components and substantiate the conformity of the principles revealed in [2] to some additional conditions, namely: • • • •

law of structural harmony [21]; modern concept on the acceleration of historical time [23, 24]; concept of great Kondratieff cycles [15, 16]; global forecasts for the XXIst century [15, 17, 18, 22, 25–28].

By studying the empirical sequence of the periodicity of global conflicts, we will  perform the structural analysis of Cn-waves n ¼ 1; 6 identified in [2] and propose metric approaches to the analysis and prediction of some global civilization processes.

4.4.1

Initial Definitions

Let us introduce some concepts and definitions: • In what follows, we will call the Fibonacci-pattern of global system conflicts substantiated in [2] the F-pattern; • CW is the totality of all the global conflicts (according to [22]) from 705 BC to Nowday; • NWC (t) is the number of all the global conflicts c 2 CW in the year t; • Dðm; nÞ , fk : ðm  k  nÞ ^ ðk 2 Z Þg; m; n 2 Z, where Z is the set of integers; • fNWC ðtÞgt2Dð750;NowdayÞ is the empirical sequence of the periodicity of global conflicts CW (WC-sequence for short); P • IWC ðDðm; nÞÞ ¼ mes1 Dðm; nÞ t2Dðm;nÞ NWC ðtÞ is the intensity of the WCsequence on the set (time interval) Dðm; nÞ;

4 Intellectual Analysis of Systemic World Conflicts and Global …

188

• a partition xðDðm; nÞÞ of the set Dðm; nÞ is the sequence of sets fDðms ; ns Þgs¼1;M that satisfies the following conditions: (i) m1 ¼ m; nM ¼ n, (ii) Dðmr ; nr Þ \ Dðml ; nl Þ;81 6¼ 1; r; l ¼ 1; M, SM (iii) s¼1 Dðms ; ns Þ ¼ Dðm; nÞ; • we will say that the WC-sequence generates a local wave LW C ðDðm; nÞÞ of global conflicts on the seto (time interval) Dðm; nÞ if there exists a partition n xðDðm; nÞÞ Dðms ; ns Þs¼1;5

such as

IWC ðDðm1 ; n1 ÞÞ\IWC ðDðm2 ; n2 ÞÞ\IWC ðDðm3 ; n3 ÞÞ; IWC ðDðm5 ; n5 ÞÞ  IWC ðDðm4 ; n4 ÞÞ\IWC ðDðm3 ; n3 ÞÞ;

• the quantity mes Dðm; nÞ determines the duration of the life cycle of the wave LWC ðDðm; nÞÞ, and the time intervals Dðms ; ns Þ; s ¼ 1; 5 are the durations of the corresponding phases (stages) fS(LWC ðDðm; nÞÞ): origin Dðm1 ; n1 Þ; growth Dðm2 ; n2 Þ; culmination Dðm3 ; n3 Þ; decrease Dðm4 ; n4 Þ; and decay Dðm5 ; n5 Þ; • I ðLWc ðDðmn ; nn ÞÞÞ IWC ðDðm; nÞÞ is the intensity of the local wave LWC ðDðm; nÞÞ of global conflicts; • I ðfS ðLWC ðDðm; nÞÞÞÞ IWC ðDðms ; ns ÞÞ is the intensity of the phase fS(LWC (Dðm; nÞÞÞ of the local wave LWC (Dðm; nÞ of global conflicts.

4.4.2

Structural Analysis of Global System Conflicts

Table 4.11 shows the partition of the time interval Dð750; NowdayÞ xðDð750; NowdayÞÞ ¼ fDðan ; bn Þgn¼1;60 defined in [2].

Table 4.11 Time intervals Dðan ; bn Þ; n ¼ 1; 6; and their main characteristics Cn-waves

C1 C2 C3 C4 C5 C6 C7 (predicted wave)

Time range Dðan ; bn Þ, years

Length of time intervals T ðDðan ; bn ÞÞ, years, k  85 years

Ratio of time intervals

Dð705; 401Þ Dð402; 1074Þ Dð1075; 1497Þ Dð1498; 1749Þ Dð1750; 1919Þ Dð1920; 2007Þ Dð2008; 2092Þ

1007  13  k 673  8  k 423  5  k 252  3  k 170  2  k 88  1  k 85  1  k

1.645 1.591 1.679 1.482 1.932 1.035 –

T ðDðan ;bn ÞÞ T ðDðan þ 1 ;bn þ 1 ÞÞ

Correspondence to Fibonacci numbers fFs g

F7= 13 F6 = 8 F5 = 5 F4 = 3 F3 = 2 F2= 1 F1= 1

4.4 Metric Aspects of Periodic Processes in Economy and Society

189

Table 4.12 Local waves of global conflicts and their metric characteristics LW C ðDðan ; bn ÞÞ LW C ðDða1 ; b1 ÞÞ C1 wave

LW C ðDða2 ; b2 ÞÞ C2 wave

LW C ðDða3 ; b3 ÞÞ C3 wave

LW C ðDða4 ; b4 ÞÞ C4 wave

LW C ðDða5 ; b5 ÞÞ C5 wave

LW C ðDða6 ; b6 ÞÞ C6 wave

Phase

Notation

Phases (years) Beginning

End

Duration

Intensity

Origin

f 1;1

−705

−500

206

1.4174

Growth

f 1;2

−499

−355

165

2.4007

Culmination

f 1;3

−344

−63

272

3.4485

Decrease

f 1;4

−62

401

464

0.7414

Decay

f 1;5

Origin

f 2;1

402

631

230

1.5261

Growth

f 2;2

632

826

195

3.7692

Culmination

f 2;3

827

970

144

4.875

Decrease

f 2;4

971

1074

104

3.5288

Decay

f 2;5

Origin

f 3;1

1075

1146

72

4.8056

Growth

f 3;2

1147

1207

61

7.5902

Culmination

f 3;3

1208

1281

74

9.8919

Decrease

f 3;4

1282

1436

155

7.0968

Decay

f 3;5

1437

1497

61

5.6885

Origin

f 4;1

1498

1566

69

8.0435

Growth

f 4;2

1567

1638

72

11.639

Culmination

f 4;3

1639

1660

22

18.591

Decrease

f 4;4

1661

1718

58

11.069

Decay

f 4;5

1719

1749

31

7.2258

Origin

f 5;1

1750

1778

29

8.4138

Growth

f 5;2

1779

1800

22

11.909

Culmination

f 5;3

1801

1819

19

25.053

Decrease

f 5;4

1820

1868

49

16.000

Decay

f 5;5

1869

1919

51

8.5882

Origin

f 6;1

1920

1958

39

9.359

Growth

f 6;2

1959

1988

30

22.700

Culmination

f 6;3

1989

1996

8

30.75

Decrease

f 6;4

1997

2007

11

29.545

Table 4.12 summarizes the results of the structural analysis and metric characteristics of six Cn-waves of global system conflicts. In view of the results of the structural analysis, the WC-sequence generates six successive local waves of global conflicts on the time interval Dð750; 2007Þ : LWC ðDða1 ; b1 ÞÞ; LWC ðDða2 ; b1 ÞÞ; . . .; LWC ðDða6 ; b6 ÞÞ;

190

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.10 Structural analysis of a local wave LWC ðDða5 ; b5 ÞÞ, of global conflicts: a sweep of the WCsequence on the time interval Dða5 ; b5 Þ; b phases fk;5 LWC ðDða5 ; b5 ÞÞ; k ¼ 1; 5, and their intensities

which represent some global cyclic civilization process [22] with decreasing period (see Table 4.11) and increasing intensity (see Table 4.12). Since the sequence of time intervals fDðan ; bn Þgn¼1;60 determines the corresponding sequence of life cycles of Cn-waves of global system conflicts [2], Cn LWC ðDðan ; bn ÞÞ; n ¼ 1; 6. Figure 4.10 exemplifies the structural analysis of the time-base sweep of the WC-sequence on the time interval Dða5 ; b5 Þ, and Fig. 4.11 illustrates another feature of the pattern of global conflicts, i.e., the strict hierarchy of Cn-waves with respect to the intensities of their phases:   I fn1 ;i \I fn2 ;i 8n1 \n2 ; n1 ; n2 2 Dðl; 6Þ; i ¼ 1; 5 The collective portrait of the intensity distribution of the phases fn;i ; n ¼ 1; 6; i ¼ 1; 5, of Cn-waves of global system conflicts (Fig. 4.12) evidently shows the wave dynamics of the pattern of global system conflicts.

4.4 Metric Aspects of Periodic Processes in Economy and Society

191

Fig. 4.11 Hierarchy of Сnwaves of global system conflicts with respect to the intensities of their phases fn;i ; n ¼ 1; 6; i ¼ 1; 5

Fig. 4.12 Intensity distribution for the phases fn;i , n ¼ 1; 6; i ¼ 1; 5 Сn-waves of global system conflicts

4.4.3

Confirmation of the F-Pattern by Other Independent Studies

Any revealed pattern will be much more reliable if it corresponds to some additional external conditions (concepts, principles, hypotheses, etc.) and the

192

4 Intellectual Analysis of Systemic World Conflicts and Global …

conclusions obtained on its basis coincide or “resonate” with conclusions of other independent studies. Therefore, we will discuss the conclusions of some independent studies that confirm the reliability of the F-pattern. The first argument: the golden section present in the structure of C-waves. Indeed, according to the structural harmony law [21], in any self-organizing system, each operation mode varying according to the variations in structural states of the system is related to a special time scale. This time scale is associated with a certain invariant of the generalized golden section as a characteristic of the stationary state of the system. The second argument: as an integral part of the holistic evolutionary development of the civilization, the universal effect of the acceleration of historical time [23, 24] is manifested in the F-pattern since the duration of the lifecycles of Cwaves of global system conflicts successively decreases. The third argument is based on the prognostic properties of the F-pattern. As follows from Table 4.7, the Fibonacci sequence { FS } degenerates for Cn-waves for n [ 6. Whence the natural question arises: what will happen to the civilization after 2092, in particular, in the XXIInd century? Probably, the final cycle of an evolutionary chain will begin: C1 [ C2 [ C3 [ C4 [ C5 [ C6 [ C7 ? This question was answered by Vernadsky [22] and Moiseev [25], outstanding scientists of the last century. They independently proposed the idea that if mankind does not cardinally change its global behavior, the environment in the middle of the XXIst century will degrade to the point that mankind will cease to exist. These conclusions were made for the constant paradigm of mankind existence— self-serving. If mankind changes the global existence paradigm to, for example, harmonious coexistence on the Earth, then it will continue the mission on the planet and the pattern of global conflicts revealed for the previous paradigm, which corresponds to the Fibonacci sequence, will no longer be valid for the new paradigm. Thus, according to the forecast which is based on the F-pattern, the XXIst century is an especial, critical phase of the evolution of our civilization. Moreover, the proposed model allows not only making general conceptual conclusions but also predicting and evaluating the metric characteristics of the possible stages of the evolutionary development of the civilization in the XXIst century. The fourth argument is based on the synchronism of two periodic processes: C-waves of global system conflicts and K-cycles of the development of the global economy, which are interdependent components of the unified holistic development of the global society. The fundamental property of the global society is cyclic development of its economy. This property is manifested by great Kondratieff cycles (K-cycles) discovered 80 years ago by Nikolai Kondratieff (Kondratiev), an outstanding Russian economist [15, 16]. Within the last two centuries, such cycles with periods of 40–60 years were in complete agreement with the real development of the economy.

4.4 Metric Aspects of Periodic Processes in Economy and Society

193

The paper [20] interrelates the pattern of global system conflicts and the development of the global economy. Overlapping these two processes on the common time axis in [20] reveals their synchronism, which can be formulated as the following two principles: • Quantization Principle. The time intervals DðCn Þ; n 5 on which the wave Cn undergoes the five phases of evolution: (ORIGIN) >(GROWTH) > (CULMINATION) > (DECREASE) > (DECAY), contain an integer number nk ðDðCn ÞÞ of complete K-cycles; • Monotonicity Principle. The average duration Tk ðDðCn ÞÞ of one complete K-cycle on the time intervals DðCn Þ substantially decreases as n grows.

4.4.4

F-Principle as the Basis of a Metric Study of Global Civilization Processes

As the global economic crisis promptly expands and global conflicts sharply aggravate, quick “metric” forecasts become of special value. As the results of [20] show, the F-pattern may be an important aspect in the development of a scientifically proved toolkit and methodology for the analysis of global civilization processes. Since the development of the global economy and the course of global system conflicts are interdependent components of the evolutionary development of a globalized society, we may assume that the synchronism of these processes on the time intervals DðC5 Þ and DðC6 Þ as to obeying the quantization and monotonicity principles holds true also on the time interval DðC7 Þ This yields, in particular, the Fibonacci-dependence of the duration of the lifecycles of C-waves of global system conflicts on the average duration of great Kondratieff cycles from 1750 to 2092. As shown in [20], two scenarios for great Kondratieff cycles are possible in the 21st century: • Scenario A. The period from 2008 to 2092 includes two complete Kondratieff cycles, 43.5 years on average each; • Scenario B. The period from 2008 to 2092 includes three complete Kondratieff cycles, 28.3 years on average each. More telling arguments can be brought in favor of scenario B. This can be confirmed indirectly by the results of some modern studies of global evolution processes, of which noteworthy are the concept of acceleration of historical time [23] and the hypothesis that the duration of great K-cycles tends to reduce with scientific and technical progress [17, 18].

4 Intellectual Analysis of Systemic World Conflicts and Global …

194

4.4.5

Conclusions

1. Based on the evolutionary development of the civilization considered as a holistic process with harmonious interaction of its various components, it has been justified that the F-pattern corresponds to a number of additional conditions, namely: • • • •

the law of structural harmony; the modern concept of acceleration of historical time; the concept of great Kondratieff cycles; global forecasts for the XXIst century as an especial, critical phase of the development of the civilization.

2. As a result of the structural analysis of the time-base sweep of the WCsequences on the time interval Dð750; NowdayÞ, all the metric characteristics of Cn-waves, n ¼ 1; 6 have been established. 3. A new feature of the dynamics of Cn-waves of global system conflicts has been revealed, namely, the strict hierarchy of Cn-waves with respect to the intensities of their phases. 4. The metric forecast of the manifestation of great Kondratieff cycles in the 21st century based on the F-pattern has been considered as an example.

4.5

Big Solar Spiral of Stirring up Global Systemic Conflicts

In Sect. 4.2 and in paper [2], an analysis of the hypothetical Fibonacci pattern of global systemic conflicts is made, based on the dynamic model of so-called C-waves with the golden ratio metrics underneath. The studies [20, 29] consider the evolutionary development of the civilization as an integral process formed as a result of harmonic interference of its various components and justify the correspondence of this pattern to a number of additional conditions, namely: – existence of an interrelation of global systemic conflicts and Kondratiev cycles of economic conjuncture (Sect. 4.3), [20]; – the law of structural harmony [15, 21]; – modern concept on the acceleration of historical time [23]; – global forecasts for the XXIst century as a special critical phase of the development of civilization [30]. Based on the analysis of the empirical sequence of the frequencies of global conflicts, structural analysis of C-waves was carried out and metric approaches to the analysis and forecasting of some global civilizational processes were considered. Note that throughout centuries, according to the synchronous development of

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

195

the civilization, the nature of global conflicts also varied. It became especially noticeable at the end of the XXth and in the first decades of the XXIst centuries, when the mankind passed to the “information society” where the terms such as information wars, cyber wars, hybrid wars, psychotropic weapon, etc. have already become customary. However, the results mentioned above were grounded on the investigation of only “inner” factors of civilizational processes, where a human being with his mentality, complicated inner world, culture, and values remains the subject of all conflicts. The manifestation of any global conflict was related, first of all, to release of an enormous “mental” and “social” energy accumulated by people. But it is lawful to raise the question: Whether there are external (for a person) factors influencing the behavior of civilizational processes and, in particular, patterns of global systemic conflicts? To discuss this topic, let us turn to some authorities. As far back as in the last century, A. L. Chizhevskii, an outstanding biophysicist, one of the founders of space natural science, used a huge amount of factual material and justified that the life of the biosphere and social rhythms depend on the rhythms of the Sun and Space [31]. He had formulated the following postulates [32]: • solar and space cycles in arithmetic mean are determined by the quantity approximately equal to 11 years, and there are grounds to suppose that physical factors calling this periodicity are periodically appearing sunspots, geomagnetic storms, and other manifestations of solar magnetic activity substantially influencing the life of the biosphere; • modification of social rhythms on the Earth’s surface (peak and decay phases with respect to birth and death rates, illness, social manifestations, etc.), coinciding in time with solar and space cycles, allow us to suppose that the reason of this pattern can also be out of social factor; • the reason of the strict periodicity of solar rhythms in all historical epochs can be a physical factor influencing more or less uniformly all the population of our planet; • solar activity itself does not generate social bursts in literal sense (wars, revolutions, etc.) and only promotes the accumulation of enormous “collective,” “mental,” and “social” energy on the Earth, which then leads to its release. In this context, one of the major tasks of modern science is to reveal the spectrum of patterns of the operation of interrelated system “the Sun–the Earth” for a fuller understanding of civilizational processes and to implement the corresponding set of measures to prepare the mankind for future (predictable) global events and to mitigate the expected adverse consequences. In [31, 32] assumptions are made about the concentration of local conflicts near the maxima of solar activity; however, publications on the influence of solar activity on global conflicts with unstable “time configuration” and considerable duration are virtually absent. The supercomplexity of such problems is obvious. In the present section, based on the Fibonacci pattern of global systemic conflicts (Sects. 4.2 and 4.3), [2, 20, 29], we will formulate the hypotheses about a metric

4 Intellectual Analysis of Systemic World Conflicts and Global …

196

relationship between two global periodic processes: the sequence of 11-year cycles of solar activity and evolutionary structurization of the family of C-waves of global systemic conflicts enveloping large and super-large time intervals and having a variable structural configuration.

4.5.1

Synchronous Variation of Solar Activity and Formation of C-Waves of Global Systemic Conflicts

The 11-year cycle of solar activity with average 11.1 year duration is defined by the Schwabe–Wolf [33] law. For the quantitative determination of solar activity, the Wolf numbers averaged over a year [33] published by the Zurich observatory since 1849 are most often applied. A number according to the Zurich indexing is assigned to all the observed 11-year cycles of solar activity. Number one is assigned to the cycle began in 1755, and the number of the current cycle began in 2008–2009 is 24. All the observations of solar spots are summarized and monthly average and annual average values of the Wolf numbers are determined at the Solar Influences Data Analysis Center (Belgium) [34]. An important statistical dependence of a series of Wolf numbers is characterized by the relation of amplitude and phase of cycles. According to this rule, the larger the duration of the current cycle, the less the amplitude of the next cycle [28]. Solar cycle is asymmetric with respect to the maximum of solar activity: growth phase (4.6 years) is shorter than decay phase (6.5 years) [33]. Table 4.13 shows the list of 11-year cycles of solar activity recorded since 1755 [28, 35, 36]. The graphic illustration of Zurich cycles Nos. 1–23 and of their kÞ parameters is presented in Fig. 4.13 by a radar chart, where sðmax is the year of the Table 4.13 The list of 11-year cycles of solar activity recorded since 1755 Cycle number

Years of active Zurich cycles Minimum Maximum

Cycle number

Years of active Zurich cycles Minimum Maximum

1 2 3 4 5 6 7 8 9 10 11 12

1755 1766 1775 1784 1798 1810 1823 1833 1843 1856 1867 1878

13 14 15 16 17 18 19 20 21 22 23 24

1889 1901 1913 1923 1933 1944 1954 1964 1976 1986 1996 2008

1761 1769 1778 1787 1804 1816 1830 1837 1848 1860 1870 1883

1893 1905 1917 1928 1937 1947 1957 1968 1979 1989 2000

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

197

ð1Þ

ð2Þ

ð23Þ

Fig. 4.13 Parameters of the Zurich Schwabe–Wolf cycles WSA ; WSA ; . . .; WSA (1755–2008): —is the maximum solar activity SA of smoothed monthly average Wolf numbers, minimum of solar activity SA of smoothed monthly average Wolf number

ðk Þ

—is the

maximum solar activity in the Zurich cycle WSA , k is the number of Zurich cycle  k ¼ 1; 23 .   Let us introduce some definitions: ZSA SW are Zurich Schwabe–Wolf cycles (Zurich cycles, Schwabe–Wolf Z-cycles; correspond to the Zurich numbers k 2   Ið1; 23ÞÞ; RSA SW are recovered Schwabe–Wolf cycles (recovered cycles,   Schwabe–Wolf R-cycles; correspond to the numbers k 2 Ið1; 0ÞÞ; PSA SW are predictable Schwabe–Wolf cycles (predictable cycles, Schwabe–Wolf P-cycles; correspond to the Zurich numbers k 2 Ið24; þ 1ÞÞ, where  Iðm; nÞ ¼  fk 2 Z : m k   ng;   CSA SW RSA SW [ ZSA SW [ PSA SW :

198

4 Intellectual Analysis of Systemic World Conflicts and Global …

The constant ðSW Þ

lSA

¼ 11:1 year

is called the Schwabe–Wolf solar metric (the Schwabe–Wolf metric). Note that this metric, as a stable external performance criterion of various global dynamic processes in the interrelated system “the Sun–the Earth” allows us to improve some metric parameters of these processes. In particular, parameters of Ck-waves can be adjusted proceeding from the following facts: • on the basis of scientific observations for the last three centuries, the number of 11.1 years is found as a stable arithmetic mean value of Schwabe–Wolf cycle periods; • considerable lengths of periods TðCk Þ of ðCk Þ-waves, k 2 I ð1; 4Þ of global systemic conflicts (260 years < TðCk Þ < 1200 years) [2, 20, 29] allows us to assume that on the time intervals DðC1 Þ; DðC2 Þ; DðC3 Þ and DðC4 Þ determining the life cycles of these waves, the number 11.1 years as arithmetic mean value of the periods of Schwabe–Wolf cycles will be exhibited even more explicitly. The «reconstruction» of ðCk Þ-waves has allowed us, in particular, to solve the important problem of determining “time glueing” of the intervals DðCk Þ of the manifestation of ðCk Þ-waves, k 2 I ð1; 4Þ, based on the stable external criterion, the Schwabe–Wolf metric. The correction error was 1.23% with the completely retained hierarchical order of Ck-waves, k 2 I ð1; 7Þ½31: Table 4.14 shows the results of the correction of intervals DðCk Þ of the manifestation of Ck-waves for k 2 I ð3; 7Þ: Here, ½ak ; b k  ¼ DðCk Þ is the time interval of the manifestation of Ck-wave [2, 29], and ak ; bk ¼ D ðCk Þ is the interval of manifestation of Ck-wave, modified by the Schwabe–Wolf metric. This procedure also allows us to arrange the Schwabe–Wolf R-cycles on the time intervals D ðCk Þ; k 2 I ð1; 4Þ; uniformly with the period of 11.1 years and, based on the stable external criterion, to specify the values of the universal time quantum kC of global systemic conflicts [29] and mean value Tkc of the duration of Kondratiev cycles of the modified sequence of K-cycles [20]: kC ffi 89years; Tkc ffi 44:14 years:

Table 4.14 Results of the corrected “Glueing” of intervals of the manifestation of Ck-waves

ð4:14Þ

Ck -wave

ak

bk

ak

bk

C7-wave C6-wave C5-wave C4-wave C3-wave

2008 1920 1750 1498 1075

2092 2008 1920 1750 1498

2008 1919 1741 1474 1030

2097 2008 1919 1741 1474

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

199

The ordered set of Schwabe–Wolf solar cycles     ðk Þ HW W 2 CSA SW : D ðW Þ \ DðCk Þ 6¼ ; ; k 2 I ð1; 7Þ;

ð4:15Þ

ðk Þ

is called an ensemble (HW -ensemble) stirring up the ðCk Þ-wave of global systemic conflicts, where D ðW Þ ¼ ½s1 ; s2  is the time interval of the manifestation of cycle   W 2 CSA SW : ðk Þ

Remark 1 By stirring up of Ck -wave of global systemic conflicts by HW -ensemble ðk Þ HW Ck )

we will mean the process of active systemic influence of the (briefly, sequence of Schwabe–Wolf solar cycles constituting this ensemble on the process of evolutionary structurization of the Ck -wave, k 2 I ð1; 7Þ. Remark 2 By stirring up a family of fCk gk2I ð1;7Þ -waves of global systemic conflicts ð1Þ

ð2Þ

ð7Þ

by a sequence of ensembles of HW ; HW ; . . .; HW Schwabe–Wolf cycles (briefly, ð1Þ

ð2Þ

ð7Þ

ðHW C1 Þ 7! ðHW C2 Þ 7! . . . 7! ðHW C7 Þ) we will mean the process of active systemic influence of the sequence of solar cycles constituting these ensembles on the process of evolutionary formation of the sequence of Ck -waves as an integral structure. Figure 4.14 shows the alignment n oof two processes on the time axis: sequence of ð5Þ

ðlÞ

Schwabe–Wolf cycles HW WSA

l2I ð0;15Þ

and sequence of empirical frequencies ð5Þ

NW of global systemic conflicts [2, 23]. Stirring up by HW -ensemble of C5-waves of global systemic conflicts is illustrated. The cycle with the number 0 pertains to   Zurich cycles ZSA SW in addition as original one taking into account the corrected glueing of time intervals DðCk Þ; k 2 I ð1; 7Þ: ð6Þ Figure 4.15 illustrates “stirring up” by HW -ensemble of C6-wave of global systemic conflicts manifested in the 20th century [29]. Based on the aforesaid and the results from Sect. 4.2, we may state that the chain of stirring up the sequence of C-waves ð1Þ

ð2Þ

ð7Þ

c : ðHW C1 Þ 7! ðHW C2 Þ 7!    7! ðHW C7 Þ; where 8 n o n o ð1Þ ðlÞ ð2Þ ðlÞ > HW WSA ; HW WSA ; > > > l2I > n o ð232;129Þ n ol2I ð128;65Þ > > ð3Þ ðlÞ ð4Þ ðlÞ > ; HW WSA ; < HW WSA l2I ð 64;25 Þ n o n o l2I ð24;1Þ ð 5 Þ ð l Þ ð 6 Þ ð l Þ > > HW WSA ; HW WSA ; > > l2I ð0;15 l2I ð16;23Þ > nÞ o > > ð7Þ ðlÞ > : HW WSA ; l2I ð24;31Þ

ð4:16Þ

200

4 Intellectual Analysis of Systemic World Conflicts and Global …

ð5Þ

Fig. 4.14 Illustrated «stirring up» by HW -ensemble of Schwabe–Wolf Z-cycles of C5-wave of global systemic conflicts on the time interval from 1750 till 1920: NWC is empirical frequencies of global conflicts; NW is smoothed monthly average Wolf’s numbers

ð6Þ

Fig. 4.15 Illustrated «stirring up» by HW -ensemble of Schwabe–Wolf Z-cycles of C6-wave of global systemic conflicts exhibited in the XXth century (1920–2008)

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

201

implements the process of systemic evolutionary structurization of the family of fCk gk2I ð1;7Þ -waves of global systemic conflicts. The sequence of numbers ð7Þ

ð6Þ

ð1Þ

card HW ; card HW ; . . .; HW

corresponds to the fragment of the Fibonacci sequence F ðC7 Þ; F ðC6 Þ; . . .; F ðC1 Þ for C7-, C6-, …, C1-waves, namely 8 ð7Þ ðSW Þ ð6Þ ðSW Þ ð5Þ ðSW Þ > < card HW ¼ 1  hC ; card HW ¼ 1  hC ; card HW ¼ 2  hC ; ð4Þ ðSW Þ ð3Þ ðSW Þ ð2Þ ðSW Þ card HW ¼ 3  hC ; card HW ¼ 5  hC ; card HW ¼ 8  hC ; > : ð1Þ ðSW Þ card HW ¼ 13  hC ; where ðSW Þ

hC

8

ð4:17Þ ðk Þ

is the global Schwabe–Wolf constant (global CSW-constant) of stirring up by HW ensembles of Schwabe–Wolf solar cycles of the family of fCk gk2I ð1;7Þ -waves of global systemic conflicts. Let us introduce the following notation: pSWC ðCÞ is the process of evolutionary structurization of the family of Ck -waves of global systemic conflicts, k 2 I ð1; 7Þ;  pSA SW is the global process of variation in solar activity in the context of manifestation of the Schwabe–Wolf cycles; pGE ðKC Þ is the world economy development process in a context of manifestation of Kondratiev cycles. Let us formulate the supposed hypothetical pattern of the metric relationship of  global processes pSA SW and pSWC ðC Þ as the following hypothesis. Hypothesis of (SA-WC)-synchrony. Each Ck -wave, k 2 I ð1; 7Þ, of global systemic conflicts contains an integer number of complete Schwabe–Wolf solar cycles ðSW Þ

Nk ¼ hC ðSW Þ

 F ðCk Þ;

ð4:18Þ

where hC is the global CSW-constant and FðCk Þ is the number of the Fibonacci sequence, corresponding to Ck-wave. Considering (4.16–4.18), the hypothesis of (SA-WC)-synchrony, and the results from Sect. 4.2, let us formulate the hypothesis about the presence of a metric interrelation among three global synchronous processes:

4 Intellectual Analysis of Systemic World Conflicts and Global …

202

 pSWC ðC Þ; pSA SW and pGE ðKC Þ: Hypothesis of (SA-WC-GE)-interrelation. The following relation takes place: ðSW Þ

kC ffi hC

ðSW Þ

 lSA

ffi 2T KC ; ðSW Þ

where kC is a universal time slot of global systemic conflicts, hC

is global

ðSW Þ lSA

is the Schwabe–Wolf Solar metric, and T KC is average duration SA-constant, of one Kondratiev cycle.

4.5.2

Visualization of the Process of “Stirring Up” of the Family of fCK gK2Ið1;7Þ -Waves of Global Systemic Conflicts

Figure 4.16 shows big Solar spiral of the process of “stirring up” of the family of fCk gk2I ð1;7Þ -waves of global systemic conflicts by the sequence of ensembles of the

Fig. 4.16 Big «Solar spiral» of the process of «stirring up» of the family of fCk gk2I ð1;7Þ -waves of global systemic conflicts by a sequence of ensembles of Schwabe–Wolf cycles ð1Þ ð2Þ ð7Þ HW ; HW ; . . .; HW on the time interval from 840 BC till 2097 AD

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

203

Fig. 4.17 Hyperbolic «Solar spiral» of the process of «stirring up» of the family of fCk gk2I ð1;7Þ -waves of global systemic conflicts by the sequence of ensembles of Schwabe–Wolf cycles ð1Þ ð2Þ ð7Þ HW ; HW ; . . .; HW on the time interval from 840 BC till 2097 AD

ð1Þ

ð2Þ

ð7Þ

Schwabe–Wolf cycles HW ; HW ; . . .; HW on the time interval from 840 BC till 2097 AD. The main parameters of the process are shown, as well as the structural properties of the waves of global conflicts (strict hierarchy of Ck -waves  systemic with respect to the intensities I uk;i of phases of their evolutionary development, uk;i , i 2 I ð1; 5Þ, Ck -waves; Tk ¼ TðCkÞ is the duration of the life cycles of Ck ðk Þ

waves, k 2 I ð1; 7Þ; Nk is the number of Zurich cycles in the ensemble HW ; k 2 I ð1; 7Þ : Nk ¼ Nk þ 1 þ Nk þ 2 ; N6 ¼ N7 ¼¼ hðcSW Þ , k 2 I ð1; 5Þ; Tk ¼ Tk þ 1 þ Tk þ 2 ; and T6 ¼ T7 ¼ kC ; k 2 I ð1; 5Þ. Taking into account the hyperbolic growth of the intensities of Ck -waves, k 2 I ð1; 7Þ [2], Fig. 4.17 also shows the hyperbolic Solar spiral of the process of “stirring up” of the family of fCk gk2I ð1;7Þ -waves of global systemic conflicts by the ð1Þ

ð2Þ

ð7Þ

sequence of ensembles HW ; HW ; . . .; HW on the time interval specified above. Here, T(C7) = 89, T (C6) = 89, T(C5) = 178, T(C4) = 267, T(C3) = 445, T (C2) = 712, and T(C1) = 1157.

4.5.3

ðK Þ

Local “Stirring Up” by H W -Ensemble of Schwabe– Wolf Solar Cycles of Evolution Phases of Ck -Wave of Global Systemic Conflicts

We have formulated the hypotheses and performed the analysis of metric aspects of the process of “stirring up” of the family of fCk gk2I ð1;7Þ -waves of global systemic ð1Þ

ð2Þ

ð7Þ

conflicts by the sequence of Schwabe–Wolf cycles HW ; HW ; . . .; HW , promoting the system formation of a global configuration of Ck-waves as an integrated structure on super-large time intervals.

204

4 Intellectual Analysis of Systemic World Conflicts and Global …

ð23Þ

ð6Þ

Fig. 4.18 Zurich cycle WSA 2 HW corresponding to the «decay» phase of C6-wave (C-wave of ð24Þ

ð7Þ

the 20th century); new (partially manifested) Zurich cycle WSA 2 HW the «origin» phase of C7-wave (C-wave of the XXIst century)

corresponding to

An important separate problem is investigating the patterns of the formation of the inner configuration for each separate Ck-wave, k 2 I ð1; 7Þ, which is manifested on a smaller time Such configuration is defined by the local hierarchy of  interval. the intensities I uk;i of its evolution phases uk;i , i 2 I ð1; 5Þ. To know the mechanisms of formation of such local structures is especially important in the scenario analysis of the development of global civilization processes in short-term perspective. ð23Þ Figure 4.18 illustrates the cycle WSA manifested at the “Decay” phase of the C6 -wave of global systemic conflicts (C-wave of the XXth century) completed in 2007. We used the results of statistical observations carried out from December, 2008 till April, 2014 [37] to represent parameters of the new solar cycle ð24Þ ð7Þ WSA 2 HW , stirring up the first phase (Origin) of the forecasted (final) C7-wave of global systemic conflicts (C-wave of the XXIst century). The years of active Sun (2013–2014) are emphasized. Analyzing the time interval 2013–2014 as an active Sun period, we may state that it was characterized by considerable social disruptions in different regions of the world: Syria, Crimea, South-East Ukraine, Iran, and Iraq are the characteristic examples of releasing the collected social energy of major groups of population of the Earth at the initial phase of the seventh systemic global conflict.

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

4.5.4

205

Scenarios “XXI–2k” and “XXI–3k” of Global Civilizational Processes During the Seventh Systemic Global Conflict

Let us consider possible scenarios of the manifestation of two Kondratiev cycles during the seventh systemic global conflict (scenario “XXI–2K”) and three such cycles (scenario “XXI–3K”) [20]. Based on the alignment on the time interval D ðC7 Þ (from 2008 till 2097) of three synchronous (forecasted) processes.  pSWC ðC Þ; pSA SW and pGE ðKC Þ: Figures 4.19 and 4.20 show two possible scenarios “XXI–2K” and “XXI–3K” of the developments of global civilizational processes in the XXIst century. Taking into account the patterns presented above and leaning upon the results from [2, 20, 29], we present the results of the metric scenario analysis 4.15 and  4.16.  in Tables  ðk Þ

For brevity sake, we use the following notation: smax WSA

ðk Þ

and smin WSA

are

respectively the years of the maximum and minimum activity of the Schwabe–Wolf ðk Þ  Þ and V  ðK  Þ respectively the ascending and descending Zurich cycle WSA ; V þ ðK  Þ and tmin ðK  Þ are respectively the  tmax ðK half-waves of the Kondratiev cycle K;  years of maximum and minimum conjuncture KGE for the Kondratiev cycle K; notation A  B means that points A and B are rather close on the numerical axis; t (O), t(G) and t(U) are conventional instants of time since which (according to scientific forecast) the amount of oil, gas, and uranium consumed in the world, respectively, will exceed their production. We will assume that the scenario XXI-3K is more likely in the 21st century compared to the scenario XXI-2K. In favor of this assumption, we give two arguments: 1. According to the hypothesis of the acceleration of historical time [21], all processes in the 21st century will proceed faster than in previous centuries. 2. Changes in the modern world are no longer linear in time (Fig. 4.21a). As defined by the UN Summit on Sustainable Development of 2015 and Davos Summit of 2015, these changes are exponential (Fig. 4.21b), and the new digital world is accordingly called exponential, where a, b and k are the constants of a global society growth.

4.5.5

Conclusions

1. In this section we have formulated the hypotheses about the presence of a metric relationship between the sequence of 11-year Schwabe–Wolf cycles of solar

206

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.19 Scenario XXI–2K. Alignment on the time interval DðC7 Þ of fragments of three forecasted global, synchronous, periodic processes pSWC ðC Þ; pSA SW and pGE ðKC Þ, namely, ð7Þ  1ð7Þ and K  2ð7Þ , and phases uk;i , HW -ensemble of Schwabe–Wolf cycles, two Kondratiev cycles K i 2 I ð1; 5Þ, of the final in the XXIst century C7-wave of global systemic conflicts

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

207

Fig. 4.20 Scenario XXI–3K. Alignment on the time interval D ðC7 Þ of fragments of forecasted  ð7Þ global, synchronous, periodic processes pSWC ðC Þ; pSA SW and pGE ðKC Þ, namely, HW -ensemble ð7Þ

ð7Þ

ð7Þ

of Schwabe–Wolf cycles, three Kondratiev cycles: K1 , K2 , K3 , and phases uk;i , i 2 I ð1; 5Þ, of the final in the XXIst century C7 –wave of global systemic conflicts

4 Intellectual Analysis of Systemic World Conflicts and Global …

208

Table 4.15 Results of the metric analysis of the XXI–3K scenario   ðkÞ Correspondence Correspondence Phases smax W SA to the half-wave to the cycle of C7year of K-cycle wave   ð24Þ ð7Þ u7;1 2013 W SA V K1   ð25Þ ð7Þ u7;2 2024 W SA V þ K1 ð26Þ 2035 W SA

u7;3

ð27Þ

2045

ð28Þ

2057

ð29Þ

2068

ð30Þ

2079

ð31Þ

2090

W SA W SA

u7;4

W SA W SA

u7;5

W SA

  ð7Þ V K2   ð7Þ V þ K2   ð7Þ V K3   ð7Þ V þ K3   ð7Þ V þ K3

Table 4.16 Results of the metric analysis of the “XXI–2K” scenario   ðkÞ Correspondence Correspondence Phases smax W SA to the half-wave to the cycle of C7year of K-cycle wave   ð24Þ u7;1 2013  ð7Þ W SA V K 1   ð25Þ u7;2 2024  ð7Þ W SA Vþ K 1 ð26Þ 2035 W SA   ð27Þ 2045 u7;3  ð7Þ W SA V K 2   ð28Þ ð7Þ 2057 W SA V þ K2   ð29Þ ð7Þ 2068 u7;4 W SA V K3   ð30Þ ð7Þ 2079 W SA V þ K3   ð31Þ ð7Þ u7;5 2090 W SA V þ K3

Special (critical) instants of time  smax W 24 SA 2 X7;1  tðOÞ; tðGÞ ffi smax W 26 SA    ð7Þ tmin K 1 ffi smax W 25 SA    ð7Þ tmax K 1 ffi smax W 26 SA  tðU Þ ffi smax W 28 SA    ð7Þ tmin K 2 ffi smin W 27 SA    ð7Þ tmin K 3 ffi smax W 30 SA    ð7Þ smax W 31 SA ffi tmax K 3

Special (critical) instants of time  smax W 24 SA 2 X7;1  tðOÞ; tðGÞ ffi smax W 26 SA     ð7Þ ffi smin W 25 tmin K SA 1    ð7Þ tðU Þ ffi smax K 1     ð7Þ ffi smin W 27 tmax K SA 1     ð7Þ ffi smin W 29 tmin K SA 2     ð7Þ ffi smin W 31 tmax K SA 2

activity and the process of evolutionary structurization of the family of C-waves of global systemic conflicts enveloping large and super-large time intervals and having unstable “time configuration.” This relationship can be considered, in particular, as one more proof of the F-pattern of civilizational processes, leaning upon the global external criterion.

4.5 Big Solar Spiral of Stirring up Global Systemic Conflicts

209

Fig. 4.21 Development of global society, a—linear growth; b—exponential growth

2. Within the framework of the formulated hypotheses, we have obtained the formula relating the main metric performances of three global periodic processes of the Schwabe–Wolf cycles of solar activity, C-waves of global systemic conflicts, and Kondratiev cycles of the development of the global economy. 3. We have constructed the big and hyperbolic “Solar spirals” of the process of “stirring up” of the family of waves of global systemic conflicts by the sequence of ensembles of Schwabe–Wolf cycles on the time interval from 840 BC till 2097 AD, as a visual illustration of the revealed patterns. 4. We have considered the formation of the local configuration of a separate Ckwave of global systemic conflicts defined by the inner hierarchy of the intensities of its evolution phases. We have presented current parameters for the new, 24th, Schwabe–Wolf Zurich solar cycle “stirring up” the first phase (“Origin”) of the predicted C7-wave. We have emphasized years 2013 and 2014 as years of active Sun. 5. We have constructed two possible scenarios, XXI–2K and XXI–3K, for the development of global civilizational processes during the seventh (final) systemic global conflict in the 21st century. We have used the revealed patterns to formulate the main characteristic features of the scenarios and to define their metric performances.

210

4.6

4 Intellectual Analysis of Systemic World Conflicts and Global …

Influence of Global Threats on the Sustainable Development of Countries and Regions of the World

The study presented in this section is based on the concept of “sustainable development” being the further development of studies of Vernadskij about noosphere [22]. It has been theoretically and practically proved that on the edge of the centuries studies about the noosphere appeared to be a necessary platform for the development of three-dimension concept of ecological, social and economic sustainable development [4]. Economic approach is based on the optimal usage of limited resources and application of natural-, power- and material saving technologies for creation of the gross income flow which would at least provide the preservation (not reduction) of the gross capital (physical, natural or human), with the use of which the gross income is created. From the ecological point of view the sustainable development is aimed at provision of the integrity of both biological and physical natural systems as well as their viability that influences the global stability of the whole biosphere. The ability of such systems to renovate and adapt to the various changes instead of maintenance of the biological variety in the certain static state, its degradation and loss is becoming extremely important. Social constituent is aimed at human development, the preservation of stability of social and cultural systems, as well as the decrease in the number of conflicts in the society. A human being shall become not the object but the subject of the development participating in the processes of his/her vital activity formation, decision-making and implementation of the decisions, in the control over their implementation. To meet such requirements it is important to fairly distribute the wealth between the people, to observe pluralism of thoughts and tolerate human relationships, to preserve cultural capital and its variety, including first of all, the heritage of non-dominant cultures. Systemic coordination and balance of these three components is an extremely difficult task. In particular, the interconnection of social and ecological constituents causes the necessity to preserve equal rights of present and future generations to use natural resources. The interaction of social and economic constituents requires the achievement of equal and fair distribution of material wealth between people and help provision to the poor. And finally, the correlation of environmental and economic components requires the cost estimation of anthropogenic influences on environment. In this study a Sustainable Development Gauging Matrix (SDGM) [4] within three abovementioned components is proposed and these processes are globally modeled in terms of quality and security of the human life. With the help of this Matrix the sustainable development processes have been globally modeled for a large group of world countries in terms of quality and security of the human life. The present article is a development of investigations that are presented in [38, 39] and describe the theoretical substantiation and computer modeling of the influence

4.6 Influence of Global Threats on the Sustainable Development …

211

of system global conflicts on the sustainable development of countries and regions of the world in the global context. A distinctive feature of the investigations presented in these works lies in the analysis of linear dependences between values of levels of separate threats and integrated quality and safety indicators of life of people. Also in this section is analyzed the influence of 12 global threats on the sustainable development at the qualitative level with the use of Bayesian Belief Networks (BBNs) based on the theory of causality [40] with allowance for linear and nonlinear dependences. In such problems, the use of a BBN that is a graphic model of probabilistic interrelations on a set of variables together with the apparatus of mathematical statistics provides a number of advantages, namely, it makes it possible to reveal causal relationships between different variables and, hence, to facilitate the understanding of complicated phenomena and processes such as sustainable development. Moreover, a BBN possessing both causal and probabilistic semantics is a convenient means for joint representation of expert knowledge determining causal relationships and instrumentally obtained statistical data (measurements, observations, and computations).

4.6.1

The Methodology of Sustainable Development Evaluation in Terms of Quality and Security of the Human Life

The important issue in the process of implementation of the concept of sustainable development is the formation of the measurement system (Matrix) for the quantitative and qualitative assessment of this complicated procedure. The process of sustainable development will be characterized according to two main components: security (Csl) and quality (Cql) of the human life (4.19). Under this concept, the generalized measure (index) of sustainable development can be presented by means of the quaternion {Q}: ! fQg ¼ jwsl Csl þ wql Cql Ie; Iec; Is; :

ð4:19Þ

The quaternion {Q} includes an imaginary scalar part j wsl Csl which describes the security of human life and a real scalar part as a projection of the norm of vector radius ~ Cql to an ideal vector with coordinates (1;1;1) which describes the quality of human life within three dimensions: economic (Iec), ecological (Ie) and pffi pffiffiffi socio-institutional (Is). Also we denote wsl ¼ 1= ½312; wql ¼ 1= 3. Under this condition j gains a value of a real unit for a normal regular state of society development at Csl > 0 and a value of an imaginary unit when a society enters conflict state (Csl = 0):

212

4 Intellectual Analysis of Systemic World Conflicts and Global …



1; pffiffiffiffiffiffiffi for Csl [ 0; 1; for Csl ¼ 0 ðconflictÞ:

! Pn  j p 1p The security of human life component Csl ¼ Isec ¼ Sj ¼ is i¼1 si examined in detail in Sect. 4.2.3 and is represented by the set of threats (Table 4.3) and formula (4.12). Therefore, further on, we will examine in more detail the component of the quality of human life Cql(Iec, Ie, Is). Sustainable development estimation methodology in the context of quality of human life. For every country the Euclidean norm of vector radius of human life  quality ~ Cql is given in the following form:   qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 þ I2 þ I2: ~ Cql  ¼ Iec e s

ð4:20Þ

In this case the indicators and policy categories which form the component of the quality of human life Cql(Iec, Ie, Is) are calculated as a weighted total: Ii ¼

n X

wj xi;j ; i ¼ 1; m;

j¼1

n X

wj ¼ 1;

ð4:21Þ

j¼1

where Ii is a value of an indicator or a category of policy for ith country (the number of the countries is m), wj is weight of the jth component of I index (the number of the components is n), xi,j is a value of the jth component for ith country. Such representation of integrated indices (indicators and categories of policy) envisages that components of xi,j in the formula (4.21) must be non-dimensional and vary within the same range. Considering the fact that all data, indicators and indices included into the model are measured by virtue of different physical values, may be interpreted differently and change within the different ranges, they were aggregated to the standard form in such a way that all their variations would occur within the range from 0 to 1. To carry out this normalization, the formulas (4.10–4.11) can be used. This normalization gives the possibility to calculate each of Iec, Ie, Is indices and with the help of them the components with appropriate weighting coefficients. Then the quantitative value of human life quality can be identified as projection of the norm of this vector to an ideal vector with coordinates (1; 1; 1), (Fig. 4.22): Cql ¼

qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 þ I 2 þ I 2  cosðaÞ Iec e s

ð4:22Þ

The deviation angle a of the vector’s radius Cql from the ideal vector (1, 1, 1) is estimated on the basis of the values of dimensions Iec, Ie, Is in the following way:

4.6 Influence of Global Threats on the Sustainable Development …

213

Fig. 4.22 Human life quality component (Сql) and harmonization level (G = 1 − a)

Iec þ Ie þ Is 1 a ¼ arccos pffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ; 0  a  arccos pffiffiffi : 2 2 2 3 3  Iec þ Ie þ Is

ð4:23Þ

Thus, the projection of the norm of the vector’s radius ~ Cql to the ideal vector (1, 1, 1) characterizes the human life quality and the attitude position of the vector ~ Cql in the coordinate system (Iec, Ie, Is) characterizes the “harmonization” level of sustainable development. We should mention that when the angle a approaches 0, the harmonization level of sustainable development increases, i.e. the equidistance of the vector ~ Cql from each of coordinates (Iec, Ie, Is) will correspond to the highest harmonization value of sustainable development. If this vector approaches one of these coordinates, this will indicate the priority direction of the corresponding dimension development and neglect of two others. Let the value G = 1 − a be the harmonization level of sustainable development. It will increase when G approaches 1 and decrease when G approaches 0. As the researches of human life quality and security are conducted with the help of different methods and sets of initial data, it is worth performing them separately in three stages. At the first stage we will analyze the human life quality as one of the components of sustainable development. At the second stage we will investigate the

214

4 Intellectual Analysis of Systemic World Conflicts and Global …

human life security as another component of sustainable development. And at the third stage we will calculate the aggregate value of the Sustainable Development Index using two components and investigate this index. In order to conduct the research of the life quality component of sustainable development, it is necessary to sample the data with the help of which each of three dimensions of sustainable development will be characterized in the most appropriate way. These data shall conform to the following important requirements: they have to be formed annually on continuing basis by respected and recognized international organizations. Thus, the life quality component of sustainable development Cql and the harmonization level of sustainable development G = 1 − a are calculated on the basis of their constituents Iec, Ie, Is. Considering the requirements to initial data mentioned above the value of every dimension Iec, Ie, Is will be calculated according to five global indices widely used in the international practice (Table 4.17), being annually formed by the recognized international organizations. Let us consider all of them. The Economic Dimension Index (Iec) is formed on the basis of aggregation of two global indices (Table 1.17). 1. The Global Competitiveness Index (Ic) was created by the organizers of the World Economic Forum. This index is annually estimated for 139 world economics and published in the form of so-called “Global competitiveness report” (World Economic Forum, www.weforum.org). To reduce the correlation between parts of quality of life we constructed own index based on original one.

Table 4.17 Global indices used for calculation Сql and G = 1 − a Life quality component Сql

Global index

Constituents

Source

Economic (Iec)

Ic—Global competitiveness index

8 policy categories, 21 indicators 12 indicators

World Economic Forum [www.gcr.weforum.org], World Bank [http://www.worldbank.org] Heritage Foundation & The Wall Street Journal [www.heritage.org/ index/] Yale and Columbia universities, USA [www.epi.yale.edu]

Ief—Economic Freedom Index Ecological (Ie)

Socio-institutional (Іs)

EPI— Environmental Performance Index 6 indices

9 policy categories, 14 indicators 26 indicators

World Bank [http://www. worldbank.org], Transparency International [https://www. transparency.org/ research/cpi/ overview]

4.6 Influence of Global Threats on the Sustainable Development …

215

It is formed of the following three groups of indicators: 1—the group of indicators of basic requirements (Basic requirements); 2—the group of indicators of the stimulants efficiency (Efficiency stimulants) and 3—the group of indicators of innovation (Innovation). The first group includes two complex categories of economic policy: Infrastructure and Macroeconomic Environment. The second one consists of five policy categories: market size; the level of financial market development; technological readiness; labor market efficiency; effectiveness of goods and services. The third group involves three indicators: patent apps; technicians in R&D; charges for the use of intellectual property, payments. 2. The Index of Economic Freedom (Ief) was created by the Heritage Foundation (The Heritage Foundation, www.heritage.org/index/). This index is formed of the following twelve indicators: Property rights; Government integrity; Judicial effectiveness; Government spending; Tax burden; Fiscal heath; Business freedom; Labor freedom; Monetary freedom; Trade freedom; Investment freedom; Financial freedom. The Ecological Dimension Index (Ie) will be estimated with the help of EPI (Environmental Performance Index (Yale Center for Environmental Low& Policy, www.epi.yale.edu). This index is formed by the Yale Center of Environmental Law and Policy together with Columbia University (USA) for 163 countries of the world. To calculate this index the aggregation method is used according to which EPI index is formed of two categories of top-level environmental policy (Environmental health, being the sanitary state of environment, and Ecosystem vitality, which is the vital ability of the ecosystem), nine medium-level ecological indicators and 14 low-level indicators. The presented index and its indicators identify the ability of every country to protect its environment both during a current period of time and also in long-term perspective, on the basis of availability of national environmental system, the ability to resist to environmental impacts and decrease in human dependence on environmental impacts, social and institutional resources of a country to meet the environmental challenges, possibility of global control over the environmental state of the country etc. Moreover, they can be used as a powerful tool for making decisions on the analytical basis including social and economic dimensions of sustainable development of the country. The Social Dimension index (Is) will be formed of six indices: Health, wellness and basics needs; Education; Personal rights and freedom; Personal safety; Corruption perception; Social Infrastructure. These indices are formed with the help of following indicators: human life cost, leisure and culture of people, economic state of the country, environmental state of the country, human freedom, human health, an infrastructure state, life risks and safety, nation poverty factors, level of unemployment, human health-care activities, gender conditions in the country and other.

216

4 Intellectual Analysis of Systemic World Conflicts and Global …

Table 4.18 shows the groups of policy categories and indicators used for global modeling of sustainable development processes. As it is shown in Tables 4.17 and 4.18, life quality component of sustainable development Cql and its harmonization degree G = 1 − a were determined with the usage of 73 indicators. On the basis of description of relations between different categories of policy and indicators reduced to common calculating platform, the mathematical SDGM model was developed, the structure of which is presented in Fig. 4.23. It was taken into account that all data, indicators and indexes included into model (Fig. 4.23) are measured with the help of different physical quantities, may be interpreted differently and change within different ranges. That is why they were normalized for their changes to occur within range from 0 to 1. In this case the worst values of mentioned indicators conform to numeral values close to 1. Such normalization gives the opportunity to calculate every index Iec, Ie, Is and component Cql through their components with appropriate weight coefficients. In their turn the weight coefficients in the formula of calculation of life quality component of sustainable development Cql are selected in order to give the possibility to provide equal values of economic, ecological and social dimension in the coordinate system (Iec, Ie, Is). Therefore, the SDGM model gives the possibility to calculate life quality component of sustainable development Cql and harmonization degree of this development G = 1 − a for every country of the world for which data about global indexes and indicators exist (Table 4.18).

4.6.2

Some Basic Definitions and Concepts

This investigation is devoted to the determination of causal relations between the mentioned threats (Table 4.3) and indicators of sustainable development (4.12), (4.19–4.22) at a qualitative level. On this basis, a holistic interpretation of processes of sustainable development of countries and regions of the world is developed and also the vulnerability of this development to the influence of the collection of the mentioned threats is estimated. Let’s introduce some basic definitions and concepts: 1. We consider the collection of global threats (Table 4.3) that exert influence on the sustainable development of countries and regions of the world [39]. Initial quantitative data on indicators of sustainable development, on each of these threats, and also on gross domestic products (GDPs) of countries that will be used for the construction of BBNs are presented in [39]. Since these data vary within different ranges and have different physical dimensions, we will use their normalized values:

4.6 Influence of Global Threats on the Sustainable Development …

217

Table 4.18 Policy categories and indicators for global modeling of sustainable development processes Global competitiveness (50%)

Stimulants efficiency (50%)

Market size (20%)

Domestic credit to private sector (30%) Import volume index (30%) Household final consumption expenditure (40%)

The level of financial market development (20%)

External debt stocks (50%)

Technological readiness (20%)

Technical cooperation grants (50%)

Deposit interest rate (50%)

High-technology exports (50%) Labor market efficiency (20%)

GDP pe r person employed (50%) Employment to population ratio (50%)

Effectiveness of goods and services (20%)

Exports of goods and services (40%) Imports of goods and services (40%) Market capitalization of listed companies (20%)

Basic requirements (40%)

Macroeconomic environment (50%)

Foreign direct investment (20%) Portfolio Investment (40%) Total reserves (40%)

Infrastructure (50%)

Agriculture (20%) Industry (30%) GDP per capita (50%)

Innovations (10%)

Patent apps (30%) Technicians in R&D (40%) Charges for the use of intellectual property, payments (30%)

nomic freedom (50%)

Rule of law (25%)

Property rights (8%) Government integrity (8%) Judicial effectiveness (8%)

Government size (25%)

Government spending (8%) Tax burden (8%) Fiscal heath (8%)

Regulatory efficiency (25%)

Business freedom (8%)

Open markets (25%)

Trade freedom (8%)

Labor freedom (8%) Monetary freedom (8%) Investment freedom (8%) Financial freedom (8%)

Health, wellness and basics needs (20%)

The number of people per doctor (11.1%) Hospital beds (11.1%)

(continued)

4 Intellectual Analysis of Systemic World Conflicts and Global …

218 Table 4.18 (continued)

The infant mortality rate (11.1%) Life expectancy (11.1%) Health expenditure (11.1%) Prevalence of undernourishment (11.1%) Depth of the food deficit (11.1%) Maternal mortality ratio (11.1%) Mortality rate (11.1%) Education (20%)

Literacy rate (20%) School enrollment (20%) School enrollment, secondary (20%) School enrollment, tertiary (20%) Public spending on education (20%)

Personal rights and freedom (15%)

Freedom of speech

Personal safety (15%)

Intentional homicides (50%) Political terror (50%)

Corruption perception (20%) Social Infrastructure (10%)

Mobile cellular subscriptions (12.5%) Internet users (12.5%) Telephones (12.5%) Vehicles (12.5%) Number of airports (12.5%) Navigable waterways (12.5%) Paved highways (12.5%) Rail lines (12.5%)

Environmental performance

Environmental heath (50%)

Health impacts (33%) Air quality (33%)

Environmental risk exposure Household air quality (30%) Air pollution (70%)

Ecosystem vitality (50%)

Water and sanitation (33%)

Unsafe drinking water (50%)

Climate and energy (25%)

Trend in carbon intensity

Biodiversity and habitat (25%)

Species protection (40%)

Unsafe sanitation (50%)

Terrestrial biome protection (40%) Marine protected areas (20%)

Fisheries (5%)

Fish stocks

Forests (10%)

Tree cover loss

Agriculture (10%)

Nitrogen balance (50%) Nitrogen use efficiency (50%)

Water resources (25%)

Water treatment

4.6 Influence of Global Threats on the Sustainable Development …

zi;j ¼ Pn

xi;j  Xj  ; r Xj

219

ð4:24Þ

xi;j

is the average value of an indicator of sustainable develwhere Xj ¼ i¼1 n opment, a threat, and a GDP; n is the number of rows being analyzed, and  r Xj ¼

sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi n  X 2 xi;j  Xj

ð4:25Þ

i¼1

is the standard deviation of a variable Xj Data normalized in this way have zero mean and unit variance. Data for indicators of sustainable development, global threats, and also GDPs for countries of the world in 2016 are taken from [4] and presented in Table 4.19. 2. A Bayesian Belief Networks (BBNs) is a directed acyclic graph in which each vertex is associated with a discrete random quantity Xi ; i ¼ 1; n, assuming values xij ; j ¼ 1; mi and arcs determine causal relations between random quantities. Vertices of this graph are associated with tables of conditional probabilities calculated by the Bayes formula PðbjaÞ ¼

PðajbÞPðbÞ ; PðaÞ

ð4:26Þ

where a and b are random events, P(a) and P(b) are probabilities of occurrences of the events a and b, and P(b|a) and P(a|b) are probabilities of occurrence of the event b provided that event a has occurred and, on the contrary, the occurrence of a provided that the event b has occurred. 3. Using the terminology of hypotheses and evidence, we denote by H an event in the case when a given hypothesis is true and by E an event in the case when a definite testimony (evidence) has come that can testify to the mentioned hypothesis. Then formula (4.26) can be rewritten in the form PðHjE Þ ¼

PðEjH ÞPðH Þ   : PðEjH ÞPðH Þ þ P EjH P H

ð4:27Þ

Relationship (4.18) establishes a relation of a hypothesis with evidence and also establishes a relation of the evidence being observed with a hypothesis that is not yet justified. This interpretation also presumes the determination of the a priori probability of the hypothesis P(H) that is fixed prior to the observation or manifestation of some fact.

220

4 Intellectual Analysis of Systemic World Conflicts and Global …

The determination of new evidences of the form Eij : Xi ¼ xij ; i ¼ 1; n; j ¼ 1; mi ; in a BBN leads to the assignment of a posteriori probability (4.27) to each hypothesis of the form Hij : Xi ¼ xij ; i ¼ 1; n; j ¼ 1; mi , this probability determines the degree of belief in this hypothesis [41]. 4. For the synthesis of a BBN from data on the threats presented above, two problems should be solved. The first problem is connected with the selection of significant variables and definition of causal relations on their set and, as a rule, is solved owing to the involvement of experts in the field of analysis of threats. The second problem lies in the formation of tables of conditional probabilities that are associated with vertices of the graph of the BBN. This problem can be solved on the basis of computation of conditional probabilities from available experimental data on threats. It should be noted that if experimental data on threats are presented in interval scales [42], then they should be digitized, for example, with the use of clusterization by the method of k-means [43]. In essence, the passage from quantitative estimates to qualitative ones is performed at this stage. 5. If a BBN has been constructed, then, specifying a threshold value for the degree of belief, one can determine the set of confirmed hypotheses for various collections of evidences. Generalizing these data, we obtain a qualitative characteristic of relations between threats Xi ; i ¼ 1; n: A distinctive feature of the model being considered is that the involvement of insignificant threats and causal relations between them in this model leads to a significant growth in the dimension of the model. For example, to specify tables of conditional probabilities for a model in which dependences on all 12 global threats are determined for each indicator of sustainable development provided that mi ¼ 3; i ¼ 1; n; it is required to use 7  312 ¼ 3720087 real numbers. Hence, the number of vertices and arcs of the BBN should be decreased with preserving only essential variables and relations between them. A possible method of overcoming the mentioned “dimensionality” problem is the application of statistical dependency analysis with the use of methods of estimating correlations [44] or calculation of entropy [45]. In particular, correlation analysis makes it possible to obtain an estimate for the linear dependence between variables and to determine parameters of a linear model. The calculation of conditional entropy can also be used as an indication of nonlinear dependences but, in this case, it does not provide any information on the kind of such a dependence.

4.6.3

Synthesis of Topologies of BBNs

Let the information entropy of a discrete random quantity Xi ; i ¼ 1; n (a threat, an indicator of sustainable development, and a GDP) that can assume values xij ; j ¼ 1; mi , be computed by the formula

4.6 Influence of Global Threats on the Sustainable Development …

H ðXi Þ ¼

mi X   P Xi ¼ xij log2 P Xi ¼ xij ;

221

ð4:28Þ

j¼1

and let it be an averaged quantitative estimate of the indefiniteness (unexpectedness) of occurring events connected with the fact that a variable Xi assumes values xij . By obviating this indefiniteness, we obtain information, i.e., intrinsic information on a variable Xi [46] is specified by the formula I ðXi Þ ¼ H ðXi Þ:

ð4:29Þ

Let the upper-bound estimate of intrinsic information [47] I ðXi Þ  Imax ¼ log2 mi ;

i ¼ 1; n;

be also known (the equality is reached under the condition  P Xi ¼ xij ¼ m1i ; i ¼ 1; n; j ¼ 1; mi Þ: Then, using relationships (4.28) and (4.29), the measure of the specific informativeness of a variable can be defined as follows: I ðXi Þ Is ðXi Þ ¼ : ð4:30Þ log2 mi We represent the results of computations of the value of is by formula (4.30) for a collection of variables from Table 4.14. In particular, the specific informativeness of the variable GDP is equal to 0.64. Accordingly, we have Is = 1.00, Iql = 1.00, SF = 1.00, Q = 0.99, IG = 0.99, CP = 0.98, Iec = 0.97, GINI = 0.97, GD = 0.95, Ie = 0.95, NI = 0.93, Isec = 0.80, CI = 0.80, BB = 0.77, ND = 0.72, WA = 0.71, ES = 0.25, and GW = 0.19. Here, the variables ES (Global decrease in energy security) and ND (vulnerability to natural disasters) can be excluded from consideration since it is poorly informative. To quantitatively characterize the mutual influence between variables Xi and Xk, i ¼ 1; n; k ¼ 1; n we will use the concept of mutual information [46]  I ðXi ; Xk Þ ¼ H ðXi Þ  H Xj jXk ;

ð4:31Þ

 where H Xj jXk ¼ H ðXi Xk Þ  H ðXi Þ is the conditional entropy calculated with the help of formulas of conditional probabilities and relationship (4.28). According to [46], mutual information is a statistical function of two random quantities that determines the amount of information contained in one random quantity Xi with respect to another Xk : For mutual information, the following symmetry property is satisfied: I ðXi ; Xk Þ ¼ I ðXk ; Xi Þ; the mutual information of independent variables is equal to zero, i.e., we have I ðXi ; Xk Þ ¼ H ðXi Þ 

222

4 Intellectual Analysis of Systemic World Conflicts and Global …

H ðXi jXk Þ ¼ H ðXi Þ  H ðXi Þ ¼ 0; the mutual information of I ðXi ; Xi Þ is equal to the intrinsic information of this variable, I ðXi ; Xi Þ ¼ H ðXi Þ  H ðXi jXi Þ ¼ H ðXi Þ  0 ¼ H ðXi Þ ¼ I ðXi Þ: The upper limit of mutual information is also known,    I Xi ; Xj  min H ðXi Þ; H Xj :

ð4:32Þ

Using the formula for mutual information (4.31) and its upper limit (4.32), the specific mutual informativeness for variables Xi and Xk, i ¼ 1; n; k ¼ 1; n can be found as follows: Is ðXi ; Xk Þ ¼

H ðXi Þ  H ðXi jXk Þ   : min H ðXi Þ; H Xj

ð4:33Þ

It is obvious that we have Is ðXi ; Xi Þ ¼ 1: If these variables are independent, then we have Is ðXi ; Xk Þ ¼ 0: Based on data of Table 4.19 and using formula (4.33), values of specific mutual informativeness IsðXi; Xk Þ were calculated for the GDP level and indicators of sustainable development and threats (Table 4.20). If a threshold value Ist ðXi ; XkÞ is specified (in this case, we have Ist ðXi ; Xk Þ 0:75Þ, then essential dependences between global threats and indicators of sustainable development can be singled out (in Table 4.20, these indicators are highlighted by a heavy faced type). As can be seen from Table 4.20, the variables BB, GD, ND, NI, WA, GINI have less influence on the indicators of the sustainable development. The indirect influence of these indicators is defined similarly using the calculation of joint information for the threats. The BBN topology synthesized in this manner and destined for the conceptual analysis and modeling of the influence of global threats on the sustainable development of countries and regions of the world can be represented by the block diagram depicted in Fig. 4.24.

4.6.4

Modelling the Influence of Global Threats on the Sustainable Development of Countries and Regions of the World with the Use of BBNs

We perform the computer modeling of the influence of global threats in several stages. 1. Discretization of Initial Data. We reduce data of Table 4.19 to the following three discretization levels: high (H), average (M), and low (L) since only

Botswana

Brazil

Bulgaria

Burkina faso

Cambodia

20

21

22

Bosnia and Herzegovina

17

18

Plurinational State of Bolivia

16

19

Benin

Bhutan

14

15

Belgium

Belarus

11

Belize

Barbados

10

12

Bangladesh

9

13

Austria

Australia

6

Azerbaijan

Armenia

5

7

Argentina

4

8

Algeria

Angola

2

3

Albania

1

1

Country

0.38

0.29

0.66

−1.25

−1.11

−0.38

−0.82

−0.76

−0.41

−0.54

−0.38

−0.41

−0.65

−0.16

−1.01

−0.04

−0.82

−0.71

1.35

0.01

1.92

0.42

−0.38

−0.54

0.42

−1.20

−0.76

0.11

1.49

0.01

2.03

−0.38

1.68

0.19

−0.65

2.47

0.19

−0.50

−1.43

−0.49

−0.49

0.11

3

0.29

2

Q

−0.60

GDP per capita

−1.15

−1.29

0.74

0.09

0.51

−0.41

−0.55

−0.27

−1.20

−0.09

1.24

0.19

0.28

−1.56

0.00

1.47

1.61

−0.50

−0.45

0.44

−0.50

0.91

−0.64

−1.44

−0.41

−0.45

−0.74

0.96

−1.49

0.68

−1.07

−0.36

1.24

1.71

0.35

−1.68

−0.04

0.37

−1.39

−1.25

0.40

5

Iec

−1.56

−0.60

0.32

4

Iql

0.80

−1.47

−1.75

0.98

0.71

0.01

−0.68

0.06

−0.50

−1.75

0.29

−0.96

−1.19

0.52

0.06

0.24

0.20

−0.22

0.24

−0.78

0.20

1.49

0.52

0.84

0.94

−1.33

−1.29

−0.92

1.77

1.72

−0.36

0.24

−1.52

−0.27

0.10

7

Is

−1.80

1.03

1.17

1.17

0.89

0.75

−1.47

−0.04

0.34

6

Ie

Data for indicators of sustainable development

−0.89

−1.05

0.42

0.59

0.15

−0.29

−0.12

0.32

−0.62

0.21

1.41

0.70

0.64

−0.56

0.04

1.36

1.63

−0.07

0.53

−1.16

−0.29

0.21

8

Isec

−0.10

−0.02

−0.10

−1.97

−0.17

0.41

−3.33

−0.31

0.05

−0.31

1.63

0.34

0.91

0.05

0.70

1.07

−1.64

0.70

0.70

−0.70

1.27

−1.31

0.04

0.70

−1.31

−1.31

1.33

0.15

0.20

0.31

−0.92

0.36

0.72

−1.18

0.51

0.05

−1.31 −1.31

0.31

−0.97

−0.70

−1.31

0.87

−1.59

−1.31

0.41

0.70

−1.31

0.91

−1.74

0.70

0.72

0.51

1.48

0.66

0.36

11

CP

−2.25

−0.70

0.70

0.70

−1.31

10

CI

0.26

−1.10

−0.60

0.48

0.26

9

BB

Data for global threats

0.56

0.56

0.23

−2.69

0.56

0.56

0.43

0.56

0.56

0.56

−0.30

0.56

0.56

0.36

0.30

−0.03

−1.82

0.56

−0.03

0.17

−0.23

0.56

12

ES

0.29

1.17

−0.12

−0.48

1.89

−0.58

−0.64

0.14

1.07

−0.48

−0.38

−1.05

−0.48

−0.74

−1.00

−0.38

−0.74

−0.53

−1.05

2.05

−0.33

−0.17

13

GD

−0.42

−0.42

−0.32

1.05

−0.42

−0.42

−0.42

−0.42

−0.42

−0.42

−0.21

−0.21

−0.42

−0.21

−0.32

−0.21

0.74

−0.42

0.11

−0.32

0.00

−0.42

14

GW

Table 4.19 Normalized data for indicators of sustainable development, global threats, and GDPs for countries

0.96

1.37

−0.82

−0.73

0.23

0.92

1.19

1.05

1.56

0.96

−1.23

−0.95

0.10

0.37

−0.73

−1.14

−1.46

0.64

−0.50

1.56

0.19

0.46

15

IG

1.99

2.20

−0.69

1.62

−0.69

1.78

1.57

−0.59

−0.01

−0.11

−0.80

−0.69

−0.75

0.99

−0.69

−0.80

−0.64

−0.38

−0.64

0.15

−0.80

0.68

16

ND

0.08

0.71

0.24

−0.86

0.92

0.24

0.92

0.34

1.29

0.34

−1.65

−0.39

0.13

0.50

0.13

−1.75

−1.54

0.40

0.08

0.24

−0.65

0.45

17

NI

1.41

0.82

−0.73

−0.62

−0.46

−0.78

0.12

−0.78

1.19

−0.73

−0.78

−0.78

−0.78

0.39

0.39

−0.78

−0.78

−0.78

−0.73

2.58

0.71

−0.36

18

WA

0.94

1.03

−0.65

−0.11

−0.20

0.34

0.53

0.53

0.57

−0.06

−1.52

0.34

−0.84

1.07

0.44

−1.56

−1.70

0.12

−0.88

1.07

0.53

−0.29

20

SF

(continued)

−1.02

−0.39

−0.34

1.60

2.17

−0.60

1.33

0.08

0.76

−0.08

−1.39

−1.44

−0.08

−0.86

−0.92

−1.07

−0.45

−0.92

0.65

0.65

−0.08

−1.23

19

GINI

4.6 Influence of Global Threats on the Sustainable Development … 223

El Salvador

Estonia

Ethiopia

40

41

42

Ecuador

Egypt

38

39

Denmark

Dominican Republic

36

37

Cyprus

Czech Republic

34

35

Croatia

33

Republic of the Congo

30

Costa Rica

Colombia

29

Cote d`Ivoire

China

28

31

Chile

27

32

Cape verde

Central african republic

25

Canada

24

26

Cameroon

23

1

Country

0.10

−1.11

0.89

−1.06

−0.38

−0.65

−0.21

−0.76

0.77

0.66

1.31

−1.39

−0.82

−0.41

−0.60

0.39

−0.64

−0.64

−0.49

−0.65

1.59

−0.46

2.30

1.26

−0.49

0.44

0.66

0.05

0.00

0.98

−0.43

0.10

−1.39

−0.60

−0.82

0.17

1.63

2.08

3

−1.29

2

−0.76

4

−1.52

1.34

−0.37

−0.87

−0.74

−0.32

1.57

1.29

0.83

0.65

−1.06

0.92

−1.43

0.37

−0.09

1.24

−1.75

0.19

1.47

−1.29

−1.11

1.38

0.21

−0.88

−1.39

−0.36

1.43

1.34

−1.66

1.26

−0.22

−0.36

−0.36

0.43

1.26

1.08

0.80

1.17

−0.50

0.68

−0.96

0.75

−0.96

0.47

−0.50

0.61

−1.66

−1.42

1.08

−1.15

6

Ie

−0.45

0.58

−1.63

0.96

0.40

1.43

−1.58

0.40

1.71

−0.97

5

Iec

Is

Isec

7

−1.24

0.98

−0.96

−0.87

−0.17

−0.82

1.77

1.12

0.75

0.70

−1.42

1.12

−1.52

−0.59

−0.17

1.31

−1.89

0.98

1.35

−1.42

8

−1.11

1.14

−0.40

−0.18

−0.40

−0.62

1.47

1.03

0.26

0.59

−0.94

0.64

−0.51

−0.34

0.37

0.26

−0.78

0.04

1.79

−1.11 −1.31

0.05

0.70

1.27 −0.70

0.34

1.27

0.70

0.66

−1.38

0.51

0.66

0.82

0.82

−2.00

−1.31 0.70

0.56

0.56

0.56

0.03

0.36

0.56

−0.17

0.03

0.56

−0.61 −0.61

0.04

0.56

0.56

0.56

0.50

−0.10

−0.26

0.66

−0.82

1.38

0.46

−3.48

0.03

−1.23 0.31

0.56

0.56

−3.09

0.56

12

ES

1.38

−0.87

−1.79

1.07

11

CP

−1.31

−0.70

0.70

−1.31

0.70

1.27

0.70

0.70

1.27

−1.17

0.41

−0.17

0.19

0.41

0.84

0.84

0.19

−0.24

0.19

−2.76

−0.74

0.77

0.12

−2.11

0.41

−1.31

−2.40

10 0.70

−0.31

9

CI

Data for global threats

Iql

BB

Q

Data for indicators of sustainable development

GDP per capita

Table 4.19 (continued)

2.25

−0.22

−1.51

0.35

−0.84

−0.74

−0.27

−0.33

−0.33

−0.33

2.00

−1.41

1.12

−0.94

−0.33

−0.74

1.48

−0.33

−0.38

1.84

13

GD

−0.42

−0.42

−0.42

0.21

−0.32

−0.42

−0.32

−0.11

−0.42

−0.42

−0.42

−0.42

−0.42

−0.21

5.48

−0.21

−0.42

−0.42

0.95

−0.42

14

GW

1.28

−1.46

1.05

−0.82

0.00

1.05

−1.18

−1.00

−0.54

−0.91

0.60

0.05

1.56

−0.50

−0.63

−0.09

1.69

1.19

−1.41

0.73

15

IG

0.57

−0.80

0.41

−0.80

−0.54

−0.48

−0.80

0.73

−0.80

−0.75

−0.80

−0.17

−0.69

0.25

2.41

0.94

−0.59

−0.48

−0.75

−0.48

16

ND

0.66

−0.76

1.08

0.50

0.50

0.34

−1.44

−1.07

0.71

0.08

1.39

0.87

1.03

0.87

−0.65

−0.02

0.24

0.71

−2.17

0.92

17

NI

2.37

−0.73

−0.25

−0.73

0.39

0.60

−0.78

−0.78

−0.78

−0.73

0.87

−0.62

1.30

−0.04

−0.41

−0.73

1.89

−0.04

−0.78

1.41

18

WA

1.30

−1.06

0.25

1.07

0.39

0.16

−1.70

−1.15

−0.15

−0.70

1.34

−1.02

1.12

0.62

0.39

−1.11

1.71

0.21

−1.65

1.34

20

SF

(continued)

−0.71

−0.71

0.50

−0.08

0.97

1.18

−1.23

−1.54

−0.55

−0.81

0.71

1.33

1.39

1.75

0.55

1.54

1.96

1.18

−0.65

1.13

19

GINI

224 4 Intellectual Analysis of Systemic World Conflicts and Global …

Japan

Jordan

Kazakhstan

66

Jamaica

63

64

Italy

62

65

Ireland

Israel

Iran

59

60

Indonesia

58

61

Iceland

India

56

57

Honduras

Hungary

54

Guyana

53

55

Guatemala

Guinea

51

52

Ghana

Greece

Germany

48

49

Georgia

47

50

France

Gambia

45

Finland

44

46

Fiji

43

1

Country

−0.78

−0.71

−0.55

−0.54

0.00

0.01

1.54

0.15

1.54

0.01

−0.54

−0.54

1.12

0.80

1.37

1.43

1.45

−0.55

−0.65

2.03

1.45

−0.55

1.92

−0.76

0.70

−0.13

−0.60

0.00

−0.64

−1.15

−0.65

−0.82

0.38

−0.46

−0.71

0.55

1.63

0.47

−0.60

1.87

1.35

−1.29

1.70

1.59

−0.82

1.97

3

−0.09

2

−0.60

4

5

0.58

0.11

−0.14

1.95

0.44

0.49

1.10

1.62

−1.63

−0.22

−0.22

1.24

0.54

−0.74

−0.97

−1.07

−0.22

0.24

0.15

0.80

0.57

1.03

0.66

1.17

−0.41

−0.45

−1.33

1.31

1.08

−0.08

0.06

−1.24

−0.08

−1.01 1.12

−0.03

1.03

−0.50

−1.42

1.22

1.31

0.43

6

Ie

−1.07

1.90

1.01

−0.97

0.82

1.20

−0.59

0.42

1.52

0.32

0.97

0.83

1.43

−0.87

−0.46

−0.83

1.43

0.74

−0.78

−0.69

−1.33

−0.46

0.42

−0.64

1.57

0.65

−1.43

1.24

1.47

0.19

Iec

Is

Isec

−0.54

0.33

1.49

−0.17

1.03

0.38

1.26

−0.41

−0.36

−0.45

1.35

0.29

−1.29

−0.87

−1.19

−0.73

0.61

−0.50

1.58

0.89

−1.42

1.35

1.63

0.52

7

8

0.26

−0.29

1.41

−0.51

1.25

0.59

1.30

−0.07

−0.56

−0.07

1.36

0.59

−0.62

0.64

−0.78

−0.78

0.32

−0.18

1.57

0.15

−1.00

1.30

1.63

−0.40

0.84

0.48

1.27

0.41

0.98

1.56

0.26

0.62

−0.02

−2.49

0.70

0.04

0.04

0.70

−0.15

−1.31

−2.22 0.92

−0.10

0.56

−1.48 −0.21

0.56

0.36

−2.09

0.30 0.36

−1.48 −1.13

−1.31

−1.49

−0.70

−2.95

0.56

0.70

0.92

0.46

0.31

−1.69

0.56 0.36

0.87

0.56

0.56

0.56

−0.17

−0.21

0.66

1.02

0.97

0.05

0.56

−2.95

−1.79 0.10

0.56

−0.77

0.56

−1.33 1.07

0.03

0.56

12

ES

−2.00

0.05

11

CP

0.70

0.70

1.27

−1.31

−0.31 0.12

0.04

0.70

−1.31

0.70

0.70

0.70

−1.31

0.70

0.70

0.70

0.19

−0.10

−3.91

−0.31

0.12

0.77

0.12

0.91

0.05

−0.02

0.70

−1.31

−2.18 0.62

0.04

10

0.19

9

CI

Data for global threats

Iql

BB

Q

Data for indicators of sustainable development

GDP per capita

Table 4.19 (continued)

−0.74

0.60

−0.22

−0.38

−0.64

−0.27

−0.27

−0.89

0.66

2.05

−0.38

−0.27

−1.46

0.40

1.02

−1.15

−0.64

1.74

−0.27

−0.43

0.04

−0.38

−0.38

0.04

13

GD

0.32

−0.42

3.05

−0.42

0.63

−0.21

−0.32

1.37

1.05

4.32

−0.42

−0.32

−0.42

−0.42

−0.42

−0.42

−0.21

−0.42

1.79

−0.42

−0.42

0.53

−0.32

−0.42

14

GW

−0.09

0.55

−1.46

0.46

−1.05

−1.18

−1.23

−0.18

0.32

−0.18

−0.54

−0.73

1.47

0.92

1.56

1.10

−0.59

0.64

−1.27

−1.14

1.42

−1.46

−1.37

0.87

15

IG

−0.75

−0.80

−0.75

0.83

−0.80

1.15

−0.80

−0.59

−0.59

0.04

−0.80

−0.69

1.57

−0.11

−0.69

2.26

−0.64

−0.64

−0.80

−0.22

0.89

−0.75

−0.80

−0.01

16

ND

−0.60

0.29

−2.49

0.29

−1.91

−2.33

−1.33

0.61

0.08

1.60

−1.07

−0.65

0.76

0.40

0.34

1.29

−0.49

0.87

−2.59

0.29

1.34

−1.60

−1.54

−0.29

17

NI

−0.14

−0.52

−0.78

−0.25

−0.78

−0.78

−0.62

−0.46

0.34

−0.30

−0.78

−0.78

−0.04

−0.62

1.30

−0.14

−0.78

0.23

−0.78

−0.78

0.07

−0.78

−0.78

−0.41

18

WA

−0.02

0.53

−1.34

−0.11

−1.06

0.62

−1.70

0.94

0.39

0.62

−1.65

−0.70

0.62

0.16

1.53

0.75

−0.52

0.21

−1.52

0.57

0.94

−1.38

−1.74

0.44

20

SF

(continued)

−1.54

−0.08

−0.86

−0.08

−0.45

0.65

−0.81

−0.13

0.18

−0.45

−1.49

−1.07

1.54

−0.08

−0.65

1.33

−0.24

−0.08

−1.13

0.29

−0.08

−0.71

−1.44

0.65

19

GINI

4.6 Influence of Global Threats on the Sustainable Development … 225

Mauritius

Mexico

Moldova

Mongolia

Montenegro

82

84

85

86

Malta

81

83

Malaysia

Mali

79

80

Madagascar

Malawi

Macedonia, the former Republic of Yugoslav

76

77

Luxembourg

75

78

Lesotho

Lithuania

Lebanon

72

73

Latvia

71

74

Kyrgyzstan

Laos

69

Republic of Korea

68

70

Kenya

67

1

Country

−1.20

−0.76

0.84

−1.15

−0.09

−0.18

0.56

−0.27

−0.21

−0.71

−0.60

−0.38

0.98

0.61

−1.34

−0.16

−0.82

0.61

−1.11

−1.11

−0.82

0.15

−0.54

−0.82

1.35

2.80

1.12

−0.46

0.17

1.03

−0.21

−0.27

−1.15

−0.76

−0.76

0.17

1.31

0.83

3

−1.11

2

−0.76

4

0.60

−0.55

−0.04

0.00

0.78

1.01

−1.52

0.74

−1.33

−1.29

0.32

1.34

1.20

−1.47

−0.32

1.01

−1.43

−0.32

1.20

−0.92

0.16

−0.55

−0.88

0.54

1.15

0.54

−0.78

1.15

−1.25

−0.36

0.44

1.24

1.24

−1.39

−0.50

0.91

−1.16

−0.41

1.67

−0.69

5

Iec

0.71

−0.54

0.52

0.29

0.01

1.22

−1.80

0.34

−1.52

−1.89

0.61

1.17

1.08

−1.61

−0.13

1.12

−1.52

0.24

0.01

−0.73

6

Ie

Is

Isec

7

0.75

−0.22

0.15

−1.01

0.75

0.89

−1.42

0.38

−0.68

−1.05

−0.22

1.21

0.89

−0.82

−0.13

0.61

−1.15

−0.50

1.26

−0.78

8

0.48

0.37

−0.12

−2.64

0.86

0.75

−1.05

0.37

−0.73

−0.73

−0.12

1.25

0.75

−0.78

−0.56

0.86

−0.62

−0.18

1.36

−1.27

9

−0.67

0.05

−2.47

0.12

0.34

0.77

1.13

−0.17

0.48

−0.02

−1.31 1.07

−1.31

−1.31

0.70

1.62

−0.05

0.41

0.87

0.87

−0.56

−0.61

−1.31 −1.31

0.77

−0.26

0.82

0.70

0.04

−1.31

0.46

−1.79

0.70

−1.31

0.41

2.64

0.36 −0.87

−1.31 −1.31

0.12

0.97

−0.77

0.87

−0.02

0.70

−0.70

−1.10 0.91

−0.70

0.97

−0.51

−1.31 0.70

1.07

11

CP

0.70

10

−0.17

0.12

1.49

0.05

CI

Data for global threats

Iql

BB

Q

Data for indicators of sustainable development

GDP per capita

Table 4.19 (continued)

0.56

0.50

0.56

−1.03

0.56

0.56

0.56

−0.10

0.56

0.56

0.56

0.56

0.50

0.56

0.56

0.56

0.56

0.56

−1.10

0.56

12

ES

−0.17

−0.58

−0.33

−0.84

−0.53

−0.22

1.43

−0.43

1.95

0.71

−1.31

−0.43

−0.02

2.05

−0.79

−0.48

−0.27

−1.05

−0.43

1.89

13

GD

−0.42

−0.32

−0.42

1.05

−0.42

−0.42

−0.42

0.32

−0.42

−0.42

−0.42

−0.42

−0.42

−0.42

−0.42

−0.42

−0.42

−0.42

1.37

−0.42

14

GW

0.19

0.73

−0.13

−0.68

−1.14

−0.45

1.56

−1.32

1.60

1.47

−0.50

−1.14

−0.68

1.42

0.64

−1.14

0.78

0.73

−1.46

0.05

15

IG

−0.64

−0.01

−0.54

−0.27

−0.80

−0.80

0.73

0.78

1.73

0.73

1.62

−0.80

−0.80

0.78

1.94

−0.80

1.31

−0.11

−0.80

1.57

16

ND

0.97

1.08

1.08

−0.76

0.13

−0.39

0.66

−1.33

0.71

1.18

0.34

−0.65

−0.02

1.08

0.08

−0.39

−0.18

1.24

−2.59

0.87

17

NI

−0.78

2.10

0.23

−0.46

−0.78

−0.78

1.25

−0.62

0.07

2.53

−0.73

−0.78

−0.52

0.87

−0.73

−0.73

1.35

0.12

−0.57

2.15

18

WA

−0.56

−0.52

0.30

0.16

−1.06

−1.20

1.25

−0.06

0.94

0.80

−0.02

−1.65

−1.11

0.66

1.03

−0.93

0.80

0.66

−1.34

1.34

20

SF

(continued)

−0.86

−0.86

−1.49

1.28

−0.34

−0.08

−0.71

1.07

1.07

0.65

0.81

−0.50

−0.45

1.81

−0.08

−0.39

−0.03

−1.49

−0.08

−0.08

19

GINI

226 4 Intellectual Analysis of Systemic World Conflicts and Global …

Rwanda

Saudi Arabia

Senegal

107

108

109

Romania

Russian Federation

105

106

Poland

Philippines

102

Portugal

Peru

101

103

Paraguay

100

104

Pakistan

Panama

98

Oman

97

99

Nigeria

Norway

95

96

Nicaragua

Niger

New Zealand

92

93

Netherlands

91

94

Namibia

Nepal

89

Mozambique

88

90

Morocco

87

1

Country

−0.23

−1.15

−0.49

−0.82

0.01

−0.46

−0.43

−0.65

0.19

−0.78

−0.76

−0.78

0.83

−0.82

0.75

0.10

−0.27

0.11

1.07

0.55

1.12

−0.18

−0.60

0.00

−1.20

0.33

−0.76

−0.16

0.42

0.55

1.54

−1.80

−0.65

2.74

−0.87

−1.39

−0.71

−0.82

1.54

1.70

1.54

−1.52

−0.82

2.03

3

−0.27

2

−0.65

4

5

−0.55

−0.69

0.11

0.35

−0.78

−0.04

0.40

−1.02

0.74

0.40

0.96

0.16

0.68

−0.17

0.30

−0.88

0.63

1.10

−0.55

−1.02

−0.55

1.62

1.67

−1.21

−0.22

−1.16

−0.22

−0.18

1.06

1.11

−0.18

0.37

−0.09

0.32

−1.43

0.32

1.43

−1.10

−1.52

−0.83

1.52

1.43

−1.43

−0.14

−1.56

−0.14

Iec

Is

7

−0.64

−0.17

−1.52

0.98

0.98

1.26

0.84

0.29

0.20

−0.04

0.61

−0.08

−0.17

−0.64

−0.78

0.52

1.12

1.12

−0.87

0.06

0.06

−0.08

−1.56

0.84

−0.92 −1.47

1.68

−1.33

−1.15

−0.87

1.49

1.45

−0.96

−0.04

−1.29

−0.27

1.17

−1.05

−1.89

−0.59

1.22

0.89

−1.52

0.01

−1.80

0.34

6

Ie

Isec

8

−1.00

0.48

−0.62

0.48

0.64

0.97

0.97

−0.73

−0.51

−0.18

0.32

−0.84

0.53

1.57

−2.64

−1.11

−0.84

1.36

1.52

−0.67

−0.23

−1.33

−0.45

9

0.70

−0.10

1.49

−0.02

−0.53

−0.17

0.70

0.62

0.05

−0.60

−2.40

−0.17

0.05

1.13

1.07

0.70

0.70

0.04

0.70

−0.05

−0.10

−0.56

0.92

−0.21

−1.02 −1.02

−1.31 −1.31 −0.70

0.56

0.56

0.87

0.41

0.77

−0.05

−1.89

0.97

0.56

1.27

0.70

0.70

−1.31

1.27

−0.70

1.62 −1.31

0.05

0.70

−0.81

−0.02

−0.38

−1.31

−1.75

−2.00

−1.84

−1.31

1.34

−0.46

1.02

0.46

11

0.92

−1.31

0.70

0.70

10

CP

0.70

0.05

−1.61

−0.46

0.19

CI

Data for global threats

Iql

BB

Q

Data for indicators of sustainable development

GDP per capita

Table 4.19 (continued)

0.56

−1.63

0.56

−3.15

−0.17

−0.17

−0.23

0.17

0.30

0.56

0.56

0.03

0.17

−1.16

−0.17

0.56

0.56

0.23

−0.23

0.56

0.56

0.56

0.56

12

ES

0.04

−1.00

1.79

−0.27

0.35

−0.12

−0.27

0.14

−0.79

−0.84

−0.79

0.86

−0.74

−0.33

2.51

1.12

−0.79

−0.38

−0.33

−0.22

1.58

2.36

−0.48

13

GD

−0.42

1.16

−0.42

4.00

−0.21

−0.32

0.42

−0.11

−0.32

−0.42

−0.42

0.00

−0.32

−0.32

−0.21

−0.42

−0.42

−0.32

0.11

−0.42

−0.42

−0.42

−0.32

14

GW

1.01

−0.86

0.14

−1.27

−0.77

−0.68

−0.95

−0.32

0.37

0.64

−0.13

0.60

−1.27

−1.46

0.14

1.51

1.33

−1.32

−1.41

0.69

1.33

1.37

−0.27

15

IG

0.99

−0.80

−0.64

−0.75

−0.80

−0.80

−0.80

2.73

0.25

1.89

−0.64

1.05

−0.80

−0.80

−0.27

1.68

1.36

0.20

−0.80

2.26

2.26

0.20

−0.69

16

ND

0.87

−0.81

0.34

1.97

0.55

−0.49

−0.49

−0.08

0.08

0.82

0.87

1.13

−0.13

−0.97

1.29

0.13

0.66

−0.70

−2.23

0.40

0.71

1.18

0.92

17

NI

1.14

−0.52

1.35

−0.52

−0.78

−0.78

−0.62

−0.09

0.39

−0.62

−0.36

−0.04

−0.20

−0.78

1.89

2.37

0.39

−0.78

−0.78

−0.04

0.02

2.53

0.55

18

WA

0.80

0.25

1.07

0.66

−0.65

−1.52

−1.15

0.84

0.25

0.25

−0.65

1.43

−0.75

−1.70

1.48

1.34

0.57

−1.70

−1.56

1.07

0.21

0.94

0.34

20

SF

(continued)

0.29

−0.08

1.54

0.50

−1.44

−0.29

−0.86

0.71

0.81

1.65

1.54

−1.02

−0.08

−1.60

0.65

−0.60

1.18

−0.08

−1.34

−0.76

2.17

1.02

0.34

19

GINI

4.6 Influence of Global Threats on the Sustainable Development … 227

Thailand

Togo

Tunisia

Turkey

Uganda

Ukraine

United Kingdom

125

126

127

128

129

130

131

Tajikistan

United Republic of Tanzania

123

124

Switzerland

Syria

121

Sweden

120

122

Sri Lanka

Swaziland

118

119

South Africa

Spain

116

Slovenia

115

117

Singapore

Slovakia

113

114

Seychelles

Sierra leone

111

112

Serbia

110

1

Country

1.54

−1.34

−1.20

−1.39

−0.16

−0.82

−0.60

1.49

−0.04

−0.60

1.70

−0.09

−1.34

−0.49

−1.06

−0.76

−0.82

−0.60

−0.76

1.57

−0.37

−1.15

−0.27

−0.04

−1.43

−0.09

−0.92

−0.64

1.61

−1.06

1.63

1.43

−0.92

−0.60

1.34

−0.37

0.97

−1.76

2.69

1.54

1.52

0.92

1.62

−1.58

−0.50

−0.12

−0.78

−1.11

0.49

−0.55

−1.25

−1.21

1.90

1.29

−0.55

−0.50

1.15

1.17

0.75

−1.10

−0.27

0.57

−1.66

−0.08

−1.05

0.24

−0.36

1.17

1.31

−0.87

−0.45

1.26

0.01

1.26

−0.12

−0.17

1.08

1.17

−1.66

−0.50

0.66

6

Ie

0.58

1.90

−1.21

−0.17

−1.52

−0.09

5

−0.22

4

0.42

0.11

2.30

−0.64

−1.06

−0.65

−0.65

−0.50

1.31

−0.43

1.04

1.03

0.94

0.66

0.33

2.19

0.05

−1.25

0.17

−0.82

3

0.29

2

−0.43

Iec

Is

Isec

1.68

−0.54

−1.42

−0.17

0.10

−0.96

−0.59

−0.68

−0.68

−1.47

1.58

1.40

−0.82

−0.45

1.26

−0.68

1.26

0.70

1.26

−1.15

0.47

0.66

7

1.19

−2.64

−1.11

−2.64

−0.01

−1.11

−0.12

−1.05

−0.45

−2.64

1.47

1.52

−1.11

−0.56

1.14

−0.56

0.97

0.86

1.36

−0.78

0.21

0.04

8

1.13

0.12

0.12

0.48

0.34

0.05

0.34

−0.02

0.05

0.70

1.62

0.70

1.62

0.70

0.70

0.04

0.70

0.70

−0.10 −2.49

0.92

0.56

−0.70

0.56

0.56

−0.17

0.56

0.56

0.50

0.10

−0.90

0.56

0.56

−1.79

1.12

0.20

0.20

0.77

0.56

0.77

1.12

1.69

−1.94

1.62

−1.31

0.19

1.20

−2.00

0.70

−1.39

0.10

0.51

−0.37 −2.49

−0.05

0.56

0.36

0.50

0.56

0.56

0.50

12

ES

−0.82

0.70

0.70

0.70

0.70

−0.97

−1.89 −0.41

−0.70 −1.31 −0.70

0.87

−0.61

0.15

11

0.70

−1.31

0.70

10

CP

0.26

0.19

0.70

0.62

0.70

0.48

1.85

−0.10

−0.31

0.41

9

CI

Data for global threats

Iql

BB

Q

Data for indicators of sustainable development

GDP per capita

Table 4.19 (continued)

−0.17

−1.00

2.25

−0.53

−0.58

1.12

−0.17

1.53

−1.00

−1.87

−0.38

−0.33

2.00

−0.79

−0.58

2.51

−0.43

−0.38

0.09

0.91

−0.43

−0.12

13

GD

0.95

0.42

−0.42

0.53

−0.32

−0.42

0.42

−0.42

−0.42

−0.32

−0.32

−0.32

−0.42

−0.42

0.32

0.95

−0.42

−0.32

−0.32

−0.42

−0.42

−0.32

14

GW

−1.46

−0.32

0.42

−0.63

−0.45

0.87

−0.77

1.10

0.64

1.19

−1.37

−1.37

1.51

0.37

−1.27

−0.22

−0.18

−0.18

−1.55

1.05

0.83

0.10

15

IG

−0.80

−0.75

−0.27

−0.75

−0.80

−0.59

2.15

−0.38

−0.11

−0.59

−0.80

−0.80

−0.32

2.47

−0.80

−0.59

−0.22

−0.80

−0.80

−0.69

0.89

1.73

16

ND

0.24

−0.55

0.92

−0.13

0.55

0.87

−0.81

1.39

0.76

−0.13

−1.49

−1.91

0.45

0.40

−1.18

0.40

−1.12

−0.08

−2.44

0.50

−0.60

−1.07

17

NI

−0.78

−0.46

1.09

−0.78

−0.62

2.15

−0.62

2.42

1.51

0.07

−0.78

−0.78

1.51

−0.41

−0.78

−0.20

−0.73

−0.78

−0.78

2.15

−0.41

−0.73

18

WA

−1.43

0.39

1.30

0.48

0.34

0.89

0.57

0.71

0.80

1.71

−1.70

−1.70

0.94

0.94

−1.20

0.12

−1.38

−1.02

−1.43

1.07

−0.34

0.25

20

SF

(continued)

−0.81

−1.75

0.39

0.29

−0.34

1.07

−0.03

−0.08

−1.02

−0.08

−0.92

−1.44

1.60

0.13

−0.34

2.28

−1.60

−1.54

−0.08

−0.60

1.18

−1.23

19

GINI

228 4 Intellectual Analysis of Systemic World Conflicts and Global …

Viet Nam

Yemen

Zambia

135

136

137

Uruguay

Bolivarian Republic of Venezuela

133

134

United States

132

1

Country

−0.78

−1.99

−0.78

−0.71

−0.76

−0.71

−0.78

−1.61

−1.06

0.97

−0.78

1.07

1.52

4

−0.64

0.22

1.49

3

0.06

2.08

2

−0.55

−1.25

−0.78

−1.82

0.63

1.86

5

Iec

−0.41

−1.52

−1.05

0.47

0.29

1.08

6

Ie

Is

Isec

−0.96

−1.75

−0.92

−1.47

1.40

1.40

7

−0.62

−2.64

−0.23

−0.29

1.14

1.25

8 −1.31

−0.46

0.05

0.12 −1.31

1.62

0.70

0.70

−2.25 0.05

0.70

10

1.42

9

CI

0.41

1.64

0.72

1.48

−1.43

0.56

0.56

0.10

−0.50

0.56

12 −3.48

11

ES

−1.54

CP

Data for global threats

Iql

BB

Q

Data for indicators of sustainable development

GDP per capita

Table 4.19 (continued)

2.25

−0.38

−0.69

−0.94

−0.64

−0.43

13

GD

−0.42

−0.42

0.00

0.11

−0.42

5.48

14

GW

1.10

1.65

0.83

0.19

−1.05

−1.55

15

IG

−0.06

−0.75

0.68

−0.75

−0.69

−0.59

16

ND

0.66

0.29

−0.86

0.24

1.03

−0.76

17

NI

2.05

2.47

−0.57

−0.20

−0.78

−0.73

18

WA

1.91

−0.08

−0.08

1.18

0.50

0.39

19

GINI

0.89

1.71

0.16

0.71

−1.34

−1.38

20

SF

4.6 Influence of Global Threats on the Sustainable Development … 229

230

4 Intellectual Analysis of Systemic World Conflicts and Global …

Table 4.20 Values of specific mutual informativeness

Fig. 4.23 The mathematical SDGM model for determination of life quality component of sustainable development and its harmonization degree

discrete variables can be used within the framework of a BBN model. We also specify unknown values of variables (U). 2. Construction of a Bayesian Belief Network. For the construction and parametric adjustment of such a model, we will use the system GeNIe 2.0 [48] destined for the construction and modeling of Bayesian networks. In Fig. 4.25, the appearance of a Bayesian Belief Network constructed in the system GeNIe 2.0 is presented. Such a BBN allows one to estimate the degree of belief in hypotheses with respect to the influence of various threats on indicators of sustainable development of countries and regions of the world and causal relations between these variables.

4.6 Influence of Global Threats on the Sustainable Development …

231

Fig. 4.24 A BBN destined for the analysis of the influence of global threats on the sustainable development of countries and regions of the world

Fig. 4.25 A bayesian belief network constructed in system GeNIe 2.0

232

4 Intellectual Analysis of Systemic World Conflicts and Global …

In particular, for example, the evidences PðE1 : GDP ¼ H Þ ¼ 1 is established. As a result, the degree of belief in the hypotheses H1 : ðQ ¼ H Þ, H2 : ðIql ¼ H Þ, H3 : ðIsec ¼ H Þ, H4 : ðIe ¼ H Þ, H5 : ðIec ¼ H Þ, and H6 : ðIs ¼ H Þ is very high and amounts to 1.00 but, for example, for the hypothesis H7 : ðCP ¼ LÞ; the degree of belief equals 0.25. Countries with a high level of GDP always have a high value of all indicators of sustainable development, but relative to threats, for example CP, it doesn’t mean anything. 3. Modeling of a BBN. In modeling a BBN, we establish the task of testing following hypotheses: «If the value (evalue) of some model’s variable (evar) is known, what will be the expected value (hvalue) of another variable (hvar).». For this hypothesis we have: fpðh : ½ðhvar ¼ hvalueÞjðe : ½evar ¼ evalueÞÞg 8cvar; evar 2 fGDP; Q; Iql; Iec; Ie; Is; Isec; BB; CI; CP; GD; IG; ND; NI; WA; SF g; evalue; cvalue 2 fL; M; H g To test the formulated hypotheses, the library SMILE [48] was used. In this case, a BBN was modelled with an exhaustive search for evidence. Thus, the collection of results were obtained whose total length equaled 316 ¼ 43; 046; 721 rows. It is obvious that their semantic interpretation for this length is a practically impossible task. In this connection, it is necessary to reduce data end formally generalize them. To reduce the data we estimated the probabilities of the first (a) and second (b) types error and removed the rows with high a values and low values (1 − b). 4. Formal Generalization of Results of Modeling. To generalize the obtained results, we apply the set-theoretic approach [49] according to which a generalization of the facts presented by their specifications can be obtained as a result of set-theoretic operations over these specifications. We associate with evidence Eij : Xi ¼ xij the Boolean function  f Eij : Xi ¼ xij ¼



1 0

 if P Eij : Xi ¼ xij Pi otherwise;

where Pt is a given threshold for belief. We also define f EiU : Xi ¼ U the conjunction of the following function:  [ j j fi Ei : Xi ¼ xij f EiU : Xi ¼ U ¼ 8xij 2 fL; M; H g Then the conjunction of the following form corresponds to a collection of evidences e ¼ E1 ; E2 ; . . .; En :

4.6 Influence of Global Threats on the Sustainable Development …

f ð eÞ ¼

n [

233

f ðEi Þ:

i¼1

  For a hypothesis H justified on a set of collections of evidences ej ; j ¼ 1; m, we have m  [ f ðH Þ ¼ f ej : j¼1

Applying the rule of implication and the Quine–McCluskey covering method [50] to ðH Þ, one can obtain a minimal set covering all the collections of evidences for which the hypothesis H is justified.

4.6.5

Interpretation of the Generalized Results of Modeling

In Table 4.21, the results of modeling are generalized that are represented by minimal sets of collections of evidences that are justified by the hypotheses, respectively. Table 4.21 Generalized results of BBN modeling

234

4 Intellectual Analysis of Systemic World Conflicts and Global …

Analysis of the simulation results in Table 4.21 (the evidence are shown in bold) allows us to assess the expected level of the indicators of the sustainable development and the degree of manifestation of threats in conditions of uncertainty, when the values of some indicators are unknown. For example, based on the analysis of lines 1–15, in which hypotheses are given, and the condition that one of the indicators of the sustainable development is known, it can be said that the indicators of the sustainable development are closely interrelated. Thus, a high level of GDP is always accompanied by high levels of all indicators of sustainable development (line 1); a low level of Iql is accompanied by low levels of GDP and Is, and it is also a determining factor for the low level of Q (line 5); a high level of Iec is accompanied by high levels of indicators Ie, Is, Isec and determines a high level of indicators Q and Iql (line 9); if it is known that Ie has a low level we can say that GDP, Q and Iql will also have a low level (line 10); knowing that the Is level is low allows us to say that GDP and Iql levels are also low (line 11); the high level of Is is accompanied by a high level of all indicators of the sustainable development with the exception of those that are directly related to economic development, i.e. GDP and Iec (line 12); low Isec level is accompanied by low levels of GDP, Q and Is indicators, as well as low level of ND threat (line 13). In general, knowing the levels of the sustainable development indicators does not provide an opportunity to predict the levels of threat indicators (lines 1–15). In the second part of the table (lines 16–28) hypotheses are given, provided that the level of one of the threats is known. The analysis of these lines allows us to say that threats are interrelated with each other, some of them influence the indicators of the sustainable development directly and others influence indirectly. For example, a low level of CI is accompanied by low levels of ND and WA (line 16); if it is known that the level of CP is low then the level of ND, WA and SF threats will also be low, and this corresponds to a high level of Iec and Isec indicators (line 18); the high level of the CP threat is accompanied by a high level of the CI threat (line 20); high level of GD threat manifestation corresponds to high level of the NI and SF threats (line 21); a low level of NI identifies the fact that the threats CP, IC, WA and SF also has a low level, and the sustainability indicators Iec and Isec will be high (line 24); low level of the SF threat corresponds to low levels of the IC, ND and WA threats, as well as high level of Isec indicator.

4.6.6

Visualization of Data on Indicators of Sustainable Development for Countries and Regions of the World

In this section we will present in the table and visual forms relations between levels of vulnerability of countries and regions of the world to global threats and indicators of sustainable development in the global context. Data for indicators of sustainable development, global threats, safety levels and also GDPs for countries of the world in 2016 are taken from [4], ordered in accordance with the method of cluster analysis (4.13) and presented in Table 4.22.

2

1

3

(Q) Index of Sustainable development

5

(CQL) Component of Quality of Life

Ireland

Iceland

Belgium

16

18

United States

15

17

Austria

United Kingdom

13

New Zealand

12

14

Netherlands

Sweden

10

Singapore

9

11

Japan

Norway

7

Denmark

6

8

Switzerland

Finland

Germany

3

4

Canada

2

5

Australia

1

1.025

1.048

1.052

1.065

1.066

1.069

1.073

1.074

1.075

1.076

1.077

1.080

1.095

1.096

1.102

1.110

1.115

1.119

1.290

1.367

1.382

1.418

1.434

1.403

1.418

1.381

1.377

1.423

1.374

1.418

1.442

1.398

1.463

1.445

1.397

1.458

Very high degree of sustainable development

Country,

Rank ISD

0.704

0.820

0.781

0.760

0.789

0.782

0.796

0.820

0.728

0.786

0.784

0.710

0.808

0.822

0.785

0.755

0.764

0.788

7

(Ie) Index of environmental dimension

0.608

0.643

0.700

0.759

0.700

0.646

0.699

0.650

0.709

0.772

0.625

0.789

0.673

0.634

0.771

0.770

0.722

0.724

8

(Iec) Index of economic dimension

0.653

0.632

0.626

0.640

0.679

0.697

0.656

0.642

0.645

0.625

0.679

0.652

0.702

0.674

0.669

0.667

0.637

0.693

9

(Is) Index of social and institutional dimension

0.927

0.969

0.965

0.932

0.966

0.938

0.980

0.975

0.938

0.929

0.936

0.898

0.956

0.946

0.943

0.928

0.951

0.955

10

(G) Garmonization degree

0.000

−4.674

0.000

−1.111

0.000

3.000

−4.810

−5.762

3.000

−3.779

0.000

0.000

−3.115

0.795

0.000

4.934

3.000

1.000

−6.746 3.881

0.000

2.000

−4.281 2.137

0.000

−1.535

0.000

−4.044

0.000

3.000

−3.211 6.606

0.000

0.000

12

(CI) Conflicts intensity (from 0 to 5)

7.422

6.864

11

(FB) Biodiversity balance (measured in global hectares per person)

Table 4.22 Indicators of sustainable development for countries and regions of the world, 2013–2016a

0.785

0.644

0.789

0.878

0.848

0.766

0.817

0.827

0.837

0.874

0.846

0.845

0.780

0.821

0.829

0.801

0.836

0.853

13

(IG) Information Gap

(continued)

77.000

78.000

73.000

74.000

81.000

75.000

90.000

88.000

83.000

84.000

85.000

72.000

90.000

89.000

86.000

81.000

82.000

79.000

14

(CP) Corruption perception index

4.6 Influence of Global Threats on the Sustainable Development … 235

Uruguay

Slovenia

Latvia

Chile

29

30

31

32

0.938

0.941

0.945

0.956

0.959

0.964

0.965

0.969

0.996

1.012

1.014

1.017

1.021

1.022

3

(Q) Index of Sustainable development

Costa Rica

Mauritius

Israel

Romania

35

36

37

38

Malta

Slovakia

33

34

0.885

0.894

0.911

0.911

0.927

0.934

High degree of sustainable development

Lithuania

Portugal

27

28

Italy

Poland

Czech Republic

24

25

Korea, Rep.

23

26

Spain

Estonia

20

21

France

19

22

2

Luxembourg

1

Country,

Rank ISD

Table 4.22 (continued)

1.125

1.154

1.145

1.190

1.182

1.220

1.303

1.212

1.207

1.194

1.234

1.282

1.250

1.201

1.315

1.282

1.332

1.340

1.307

1.331

5

(CQL) Component of Quality of Life

0.743

0.677

0.571

0.703

0.768

0.801

0.671

0.771

0.806

0.618

0.802

0.769

0.719

0.758

0.760

0.567

0.802

0.805

0.798

0.781

7

(Ie) Index of environmental dimension

0.543

0.626

0.631

0.561

0.562

0.557

0.670

0.601

0.486

0.569

0.542

0.644

0.606

0.550

0.653

0.717

0.664

0.631

0.590

0.643

8

(Iec) Index of economic dimension

0.553

0.539

0.573

0.607

0.569

0.585

0.629

0.559

0.623

0.641

0.608

0.584

0.611

0.597

0.610

0.624

0.595

0.626

0.634

0.621

9

(Is) Index of social and institutional dimension

0.892

0.901

0.894

0.927

0.906

0.889

0.925

0.915

0.780

0.880

0.868

0.950

0.976

0.902

0.982

0.836

0.947

0.967

0.924

0.988

10

(G) Garmonization degree

1.000

3.000

−5.634 0.060

0.000 0.000

−0.948 −2.643

0.000 0.000

−3.841 −1.675

1.000 3.000

2.975 −0.684

0.000 1.000

6.912

0.000 0.000

−0.193 −2.344 −2.444

0.000 0.000

−3.453

0.000

−2.840

−2.286

0.000

−5.186

3.000

−2.448 1.000

3.000

−2.152 3.225

12 0.000

11

(CI) Conflicts intensity (from 0 to 5)

−11.507

(FB) Biodiversity balance (measured in global hectares per person)

0.691

0.782

0.765

0.541

0.581

0.627

0.563

0.771

0.578

0.742

0.671

0.674

0.725

0.742

0.738

0.853

0.857

0.800

0.849

0.764

13

(IG) Information Gap

(continued)

48.000

64.000

54.000

58.000

51.000

55.000

66.000

57.000

61.000

71.000

62.000

59.000

62.000

47.000

55.000

53.000

70.000

58.000

69.000

81.000

14

(CP) Corruption perception index

236 4 Intellectual Analysis of Systemic World Conflicts and Global …

Armenia

Macedonia

Jordan

Cabo Verde

59

60

Saudi Arabia

56

57

Argentina

55

58

Serbia

Brazil

52

Albania

Panama

51

53

Botswana

50

54

Belarus

Greece

48

49

Oman

Barbados

46

47

Montenegro

Georgia

44

45

Croatia

Malaysia

42

43

Cyprus

Bulgaria

40

39

41

2

Hungary

1

Country,

Rank ISD

0.771

0.778

0.778

0.782

0.782

0.788

0.798

0.802

0.803

0.807

0.817

0.822

0.827

0.827

0.831

0.839

0.856

0.863

0.869

0.871

0.873

0.877

3

(Q) Index of Sustainable development

Table 4.22 (continued)

0.962

1.031

1.006

1.012

0.906

0.904

0.998

1.037

0.939

1.001

1.052

1.032

0.972

0.989

1.009

1.100

1.089

1.126

1.093

1.130

1.161

1.120

5

(CQL) Component of Quality of Life

0.289

0.592

0.676

0.723

0.536

0.700

0.624

0.685

0.688

0.675

0.569

0.773

0.732

0.329

0.404

0.479

0.688

0.622

0.785

0.745

0.705

0.759

7

(Ie) Index of environmental dimension

0.541

0.561

0.547

0.536

0.535

0.280

0.542

0.477

0.447

0.531

0.600

0.380

0.316

0.570

0.568

0.610

0.519

0.628

0.447

0.545

0.574

0.555

8

(Iec) Index of economic dimension

0.595

0.539

0.493

0.481

0.496

0.531

0.517

0.563

0.514

0.504

0.530

0.560

0.554

0.582

0.579

0.587

0.571

0.541

0.570

0.554

0.573

0.532

9

(Is) Index of social and institutional dimension

0.677

0.970

0.843

0.789

0.917

0.525

0.925

0.828

0.770

0.863

0.899

0.634

0.560

0.722

0.794

0.835

0.895

0.897

0.734

0.894

0.961

0.867

10

(G) Garmonization degree

3.000 3.000 2.000 0.000

−1.176 −1.504 −1.868 −−1.600

1.000 3.000

3.052

3.000 0.000

−1.517 −1.065 −5.161

4.000

0.000 5.831

0.139

0.000

1.000 3.000

−1.351 −2.706 0.115

1.000 0.000

−3.993 −3.199

0.000 3.000

−0.500 −0.456

1.000 2.000

−0.979 −1.840

2.000 1.000

−2.991 −0.012

12 2.000

11

(CI) Conflicts intensity (from 0 to 5)

−0.899

(FB) Biodiversity balance (measured in global hectares per person)

0.323

0.453

0.640

0.431

0.705

0.641

0.469

0.536

0.684

0.573

0.507

0.658

0.729

0.534

0.806

0.763

0.516

0.810

0.721

0.703

0.644

0.679

13

(IG) Information Gap

(continued)

59.000

48.000

37.000

33.000

46.000

36.000

39.000

42.000

40.000

38.000

60.000

44.000

40.000

61.000

45.000

57.000

45.000

49.000

49.000

41.000

55.000

48.000

14

(CP) Corruption perception index

4.6 Influence of Global Threats on the Sustainable Development … 237

Russian Federation

China

61

62

63

0.764

0.768

0.768

3

(Q) Index of Sustainable development

0.481

0.884

Moldova

Thailand

Guyana

Paraguay

Mongolia

Namibia

Morocco

Kyrgyzstan

75

76

77

78

79

80

Fiji

72

73

Bhutan

71

74

Jamaica

Tunisia

69

Azerbaijan

68

70

Kazakhstan

Belize

66

Peru

65

67

Seychelles

64

0.758

0.700

0.702

0.714

0.719

0.721

0.730

0.732

0.734

0.737

0.743

0.744

0.748

0.751

0.754

0.754

0.756

0.895

0.826

0.882

0.873

0.752

0.887

0.714

0.895

0.901

0.961

0.833

0.907

0.999

0.909

0.887

0.882

1.015

0.605

0.621

0.570

0.470

0.563

0.575

0.550

0.657

0.637

0.479

0.665

0.662

0.749

0.611

0.608

0.602

0.478

0.746

0.646

7

(Ie) Index of environmental dimension

0.862

1.020

5

(CQL) Component of Quality of Life

Medium degree of Sustainable development

2

Colombia

1

Country,

Rank ISD

Table 4.22 (continued)

0.458

0.479

0.477

0.444

0.483

0.395

0.551

0.405

0.440

0.456

0.416

0.547

0.464

0.423

0.511

0.573

0.484

0.541

0.388

0.605

8

(Iec) Index of economic dimension

0.466

0.486

0.505

0.490

0.513

0.433

0.462

0.523

0.554

0.528

0.518

0.496

0.429

0.527

0.463

0.513

0.548

0.497

0.443

0.458

9

(Is) Index of social and institutional dimension

0.792

0.835

0.898

0.915

0.918

0.678

0.812

0.719

0.784

0.878

0.734

0.856

0.628

0.775

0.812

0.904

0.880

0.901

0.565

0.749

10

(G) Garmonization degree

0.000 3.000 3.000

−0.895 −0.590

0.000

3.000 4.532

7.774

7.538

0.000

3.000 2.000

−0.767 −1.349 66.184

0.000 2.000

3.000 3.000

−1.486 −1.394 0.527

3.000

−1.481

−0.964

0.000

3.000

−2.926 N/A

3.000

1.532

0.000

3.000

−2.667 N/A

3.000

4.000

12

(CI) Conflicts intensity (from 0 to 5)

1.164

1.821

11

(FB) Biodiversity balance (measured in global hectares per person)

0.422

0.594

0.283

0.420

0.438

0.379

0.694

0.571

0.392

0.349

0.633

0.466

0.677

0.373

0.561

0.484

0.400

0.666

0.806

0.635

13

(IG) Information Gap

(continued)

28.000

37.000

52.000

38.000

30.000

34.000

35.000

30.000

40.000

65.000

41.000

39.000

30.000

N/A

29.000

35.000

55.000

40.000

29.000

37.000

14

(CP) Corruption perception index

238 4 Intellectual Analysis of Systemic World Conflicts and Global …

Egypt

Guatemala

Venezuela, Bolivarian Republic of

Ecuador

Sri Lanka

94

95

96

97

98

Iran

Tajikistan

92

93

Indonesia

India

90

91

South Africa

Algeria

88

89

Lebanon

Ghana

86

87

Philippines

83

Dominican Republic

El Salvador

82

84

Bolivia

81

85

2

Bosnia and Herzegovina

1

Country,

Rank ISD

0.633

0.634

0.637

0.638

0.638

0.642

0.649

0.652

0.655

0.662

0.662

0.665

0.666

0.666

0.673

0.675

0.676

0.677

3

(Q) Index of Sustainable development

Table 4.22 (continued)

0.740

0.709

0.685

0.790

0.666

0.732

0.666

0.673

0.791

0.752

0.810

0.736

0.818

0.828

0.867

0.807

0.757

0.794

5

(CQL) Component of Quality of Life

0.488

0.504

0.651

0.552

0.502

0.604

0.500

0.310

0.493

0.562

0.565

0.385

0.544

0.638

0.614

0.527

0.574

0.452

7

(Ie) Index of environmental dimension

0.449

0.331

0.248

0.477

0.406

0.355

0.289

0.476

0.479

0.357

0.483

0.498

0.446

0.463

0.517

0.521

0.328

0.432

8

(Iec) Index of economic dimension

0.470

0.495

0.369

0.449

0.434

0.450

0.477

0.471

0.481

0.488

0.453

0.469

0.500

0.440

0.434

0.426

0.493

0.527

9

(Is) Index of social and institutional dimension

0.895

0.662

0.348

0.813

0.762

0.620

0.598

0.855

0.938

0.680

0.814

0.887

0.862

0.721

0.740

0.754

0.626

0.834

10

(G) Garmonization degree

3.000 3.000

0.259

3.000

−0.550

−0.954

4.000 3.000

−1.458 −0.751

3.000 3.000

−2.221 −0.389

3.000 4.000

−0.225 −0.628

3.000 3.000

−2.262 −1.792

3.000 0.000

3.000

−0.968 −3.094

4.000

−0.479

−0.632

3.000 4.000

13.799 −1.300

12 2.000

11

(CI) Conflicts intensity (from 0 to 5)

−1.521

(FB) Biodiversity balance (measured in global hectares per person)

0.482

0.548

0.521

0.340

0.696

0.435

0.584

0.584

0.490

0.519

0.591

0.434

0.433

0.356

0.609

0.354

0.324

0.377

13

(IG) Information Gap

(continued)

36.000

31.000

17.000

28.000

34.000

25.000

29.000

40.000

37.000

34.000

45.000

43.000

28.000

31.000

35.000

36.000

33.000

39.000

14

(CP) Corruption perception index

4.6 Influence of Global Threats on the Sustainable Development … 239

Honduras

Rwanda

Zambia

Senegal

99

100

101

102

103

0.603

0.608

0.608

0.609

0.610

3

(Q) Index of Sustainable development

Kenya

Malawi

Laos

Guinea

114

115

Cambodia

111

112

Madagascar

110

113

Swaziland

Cote d`Ivoire

107

Congo, Republic of the

Tanzania, United Republic of

106

108

Benin

105

109

Nicaragua

104

0.547

0.529

0.531

0.534

0.537

0.542

0.542

0.543

0.493

0.443

0.494

0.650

0.562

0.517

0.458

0.644

0.600

0.638

0.551

0.547

0.555

0.674

0.752

0.685

0.685

0.685

0.590

5

(CQL) Component of Quality of Life

0.562

0.584

Low degree of sustainable development

2

Vietnam

1

Country,

Rank ISD

Table 4.22 (continued)

0.335

0.268

0.260

0.440

0.280

0.138

0.395

0.412

0.400

0.377

0.194

0.467

0.459

0.496

0.268

0.552

0.380

7

(Ie) Index of environmental dimension

0.381

0.370

0.357

0.427

0.451

0.463

0.296

0.443

0.455

0.444

0.453

0.442

0.429

0.442

0.511

0.422

0.419

8

(Iec) Index of economic dimension

0.402

0.405

0.452

0.442

0.424

0.417

0.362

0.439

0.376

0.451

0.444

0.433

0.502

0.423

0.457

0.392

0.432

9

(Is) Index of social and institutional dimension

0.862

0.966

0.822

0.868

0.837

0.606

0.571

0.896

0.714

0.959

0.730

0.831

0.871

0.780

0.738

0.648

0.908

10

(G) Garmonization degree

0.622

3.000

1.000

3.000 0.000

−0.509 −0.171 0.165

0.000 3.000

1.573 −0.134

3.000

3.000

−1.156 9.513

3.000

3.000

−0.239

0.408

3.000 0.000

0.855 −0.434

0.000 3.000

1.062 −0.132

3.000 2.000

0.034 −0.314

12 3.000

11

(CI) Conflicts intensity (from 0 to 5)

−0.676

(FB) Biodiversity balance (measured in global hectares per person)

0.218

0.411

0.213

0.541

0.370

0.246

0.216

0.235

0.442

0.337

0.216

0.286

0.365

0.340

0.524

0.252

0.400

13

(IG) Information Gap

(continued)

27.000

30.000

31.000

26.000

21.000

26.000

20.000

43.000

34.000

32.000

36.000

26.000

45.000

38.000

54.000

30.000

33.000

14

(CP) Corruption perception index

240 4 Intellectual Analysis of Systemic World Conflicts and Global …

Niger

Angola

Mozambique

132

133

134

Ukraine

Ethiopia

130

Central African Republic

129

131

Togo

Mali

127

Turkey

126

128

Gambia

Cameroon

124

Burkina Faso

123

125

Pakistan

Sierra Leone

121

122

Uganda

Lesotho

119

120

Mexico

Bangladesh

117

116

118

2

Nepal

1

Country,

Rank ISD

0.432

0.453

0.465

0.469

0.377

0.384

0.401

0.411

0.813

0.289

0.474

0.470

0.417

0.449

0.842

0.502

0.453

0.506

0.414

0.450

0.440

0.565

0.387

0.909

0.458

5

(CQL) Component of Quality of Life

0.475

0.482

0.486

0.495

0.495

0.502

0.504

0.511

0.513

0.518

0.519

0.525

0.525

3

(Q) Index of Sustainable development

Table 4.22 (continued)

0.177

0.281

0.141

0.216

0.698

0.223

0.174

0.219

0.521

0.360

0.290

0.195

0.218

0.282

0.231

0.366

0.176

0.612

0.267

7

(Ie) Index of environmental dimension

0.371

0.337

0.387

0.375

0.304

0.301

0.414

0.375

0.490

0.395

0.395

0.454

0.366

0.407

0.334

0.447

0.382

0.557

0.360

8

(Iec) Index of economic dimension

0.389

0.358

0.407

0.399

0.466

0.292

0.375

0.427

0.495

0.376

0.373

0.400

0.408

0.354

0.438

0.374

0.387

0.422

0.425

9

(Is) Index of social and institutional dimension

0.857

0.784

0.739

0.928

0.513

0.669

0.715

0.882

0.946

0.765

0.815

0.690

0.939

0.744

0.804

0.728

0.826

0.699

0.919

10

(G) Garmonization degree

1.061

3.000

3.000

3.000

−0.318 1.441

5.000 3.000

−0.719 −0.441

4.000

6.404

3.000

3.000

−0.579 0.080

5.000

−1.718

3.000

−0.169

3.000

3.000

−0.220

0.482

3.000

4.000

−0.380 0.014

3.000 0.000

−0.651 −0.628

5.000 3.000

−1.345 −0.377

12 3.000

11

(CI) Conflicts intensity (from 0 to 5)

−0.395

(FB) Biodiversity balance (measured in global hectares per person)

0.275

0.224

0.237

0.302

0.604

0.165

0.220

0.392

0.665

0.413

0.265

0.278

0.355

0.441

0.257

0.481

0.488

0.669

0.425

13

(IG) Information Gap

(continued)

27.000

18.000

35.000

34.000

29.000

20.000

32.000

32.000

41.000

26.000

26.000

42.000

30.000

32.000

39.000

25.000

26.000

30.000

29.000

14

(CP) Corruption perception index

4.6 Influence of Global Threats on the Sustainable Development … 241

2

1

3

(Q) Index of Sustainable development

5

2

15

16

(GD) Spread of global diseases

0.368

0.574

0.590

Australia

Canada

Germany

Switzerland

Finland

Denmark

Japan

Norway

Singapore

Netherlands

Sweden

1

2

3

4

5

6

7

8

9

10

11

0.489

0.455

0.416

0.506

0.575

0.452

0.441

0.439

0.663

0.687

0.544

0.542

0.543

0.521

0.544

0.537

0.539

0.546

0.546

0.539

0.547

0.566

Very high degree of sustainable development

1

(ES) Global decrease of energy security

0.213

Yemen

Country,

137

Rank ISD

0.332

0.341

Syria

Nigeria

135

136

44,326.696

169,972.784

50,556.929

59,636.421

1,243,384.358

38,067.127

46,299.542

40,348.001

757,312.507

475,734.578

377,906.352

17

0.556

0.556

0.556

0.556

0.553

0.556

0.556

0.556

0.556

0.554

0.550

18

0.357 (ND) Vulnerability to natural disasters

0.443

0.362

8

(Iec) Index of economic dimension

0.262

0.376

0.509

7

(Ie) Index of environmental dimension

(GW) Global warming (measured in metric tons of carbon dioxide emission)

(CQL) Component of Quality of Life

Very low degree of sustainable development

Country,

Rank ISD

Table 4.22 (continued)

0.159

0.170

0.182

0.138

0.188

0.147

0.149

0.148

0.204

0.168

0.149

19

(NI) Proliferation (measured with a complex indicator)

0.319

0.386

0.367

9

(Is) Index of social and institutional dimension

100.000

100.000

100.000

100.000

100.000

100.000

100.000

100.000

100.000

99.800

100.000

20

(WA) Limited access to drinking water

0.700

0.762

0.566

10

5.000

−0.511

27.320

27.990

N/A

25.900

32.110

29.080

27.120

31.640

30.130

33.680

34.940

21

22.600

28.200

32.900

21.200

35.100

21.500

18.800

21.800

28.600

23.800

22.500

22

(SF) State fragility (measured with the Failed States Index)

5.000 5.000

−0.886

12

(CI) Conflicts intensity (from 0 to 5)

−0.429

11

(FB) Biodiversity balance (measured in global hectares per person)

(GINI) Increasing inequality between people and nations on Earth

(G) Garmonization degree

1.648

1.655

1.591

1.667

1.612

1.628

1.696

1.618

1.675

1.763

1.687

23

(continued)

$51,844.761

$45,637.887

$52,962.492

$70,868.122

$38,900.569

$53,578.757

$43,401.228

$79,887.518

$42,161.320

$42,183.295

$49,755.315

25

14.000 GDP per capita 2016

0.196

28.000

13.000

14

(CP) Corruption perception index

(CSL) Component of Security of Life

0.528

0.319

13

(IG) Information Gap

242 4 Intellectual Analysis of Systemic World Conflicts and Global …

Country,

2

New Zealand

Austria

United Kingdom

United States

Ireland

Iceland

Belgium

Luxembourg

France

Spain

Estonia

Korea, Rep.

Czech Republic

Italy

Poland

Lithuania

Portugal

Uruguay

Rank ISD

1

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

0.415

0.452

0.418

0.457

0.565

0.442

0.501

0.415

0.597

0.597

0.415

0.460

0.415

0.428

0.980

0.602

0.445

0.433

15

(ES) Global decrease of energy security

Table 4.22 (continued)

0.561

0.532

0.527

0.540

0.560

0.542

0.547

0.538

0.558

0.546

0.549

0.545

0.546

0.541

0.547

0.536

0.545

0.545

16

(GD) Spread of global diseases

7605.358

46,262.872

12,640.149

302,333.149

344,767.673

98,660.635

592,499.192

19,915.477

236,968.874

333,190.954

10,161.257

93,618.510

1969.179

34,964.845

5,186,168.427

457,472.918

62,408.673

33,960.087

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.552

0.556

0.556

0.556

0.556

0.497

0.556

0.556

0.556

0.554

0.556

0.556

0.556

0.556

0.548

0.555

0.556

0.517

18

(ND) Vulnerability to natural disasters

0.105

0.130

0.123

0.129

0.158

0.140

0.203

0.134

0.141

0.150

0.132

0.151

0.139

0.144

0.134

0.118

0.154

0.133

19

(NI) Proliferation (measured with a complex indicator)

99.700

100.000

96.600

98.300

100.000

100.000

97.600

99.600

100.000

100.000

100.000

100.000

100.000

97.900

99.200

100.000

100.000

100.000

20

(WA) Limited access to drinking water

41.600

36.040

35.150

32.080

35.160

26.130

N/A

33.150

35.890

33.100

34.790

27.590

26.940

32.520

41.060

32.570

30.480

N/A

21

(GINI) Increasing inequality between people and nations on Earth

36.200

29.200

42.400

40.700

43.100

40.800

36.100

43.400

39.800

34.500

24.100

29.000

22.800

22.500

34.000

32.400

27.500

21.300

22

(SF) State fragility (measured with the Failed States Index)

1.516

1.469

1.412

1.467

1.550

1.478

1.581

1.514

1.509

1.572

1.544

1.610

1.579

1.571

1.559

1.538

1.597

1.587

23

(CSL) Component of Security of Life

(continued)

$15,220.566

$19,838.027

$14,900.779

$12,414.099

$30,661.222

$18,483.716

$27,538.806

$17,736.803

$26,616.488

$36,857.119

$100,738.684

$41,271.482

$59,764.705

$64,175.438

$57,638.159

$40,367.038

$44,757.635

$39,412.159

25

GDP per capita 2016

4.6 Influence of Global Threats on the Sustainable Development … 243

2

Slovenia

Latvia

Chile

1

30

31

32

0.444

0.415

0.415

15

(ES) Global decrease of energy security

0.565

0.553

0.548

16

(GD) Spread of global diseases

Malta

Slovakia

Costa Rica

Mauritius

Israel

Romania

Hungary

Cyprus

Bulgaria

Croatia

Malaysia

Montenegro

Georgia

Oman

Barbados

Belarus

Greece

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

0.452

0.416

0.415

0.436

0.415

0.415

0.448

0.415

0.433

0.415

0.424

0.452

0.425

0.415

0.415

0.424

0.415

0.560

0.585

0.550

0.565

0.547

0.535

0.549

0.541

0.531

0.542

0.541

0.507

0.540

0.555

0.613

0.546

0.537

High degree of sustainable development

Country,

Rank ISD

Table 4.22 (continued)

69,155.953

63,769.130

1448.465

61,183.895

7510.016

2247.871

236,510.499

17,711.610

395,63.263

5947.874

41,440.767

70,736.430

71,073.794

3725.672

7616.359

33,677.728

2218.535

83,171.227

7080.977

14,440.646

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.551

0.553

0.554

0.555

0.533

0.550

0.495

0.554

0.553

0.556

0.552

0.555

0.480

0.556

0.531

0.556

0.556

0.488

0.556

0.534

18

(ND) Vulnerability to natural disasters

0.130

0.128

0.120

0.124

0.117

0.106

0.145

0.121

0.118

0.111

0.132

0.113

0.175

0.120

0.108

0.123

0.128

0.122

0.128

0.141

19

(NI) Proliferation (measured with a complex indicator)

100.000

99.700

99.700

93.400

100.000

99.700

98.200

99.600

99.400

100.000

100.000

100.000

100.000

99.900

97.800

100.000

100.000

99.000

99.300

99.500

20

(WA) Limited access to drinking water

36.680

27.180

N/A

N/A

40.090

31.930

46.260

32.510

36.010

34.310

30.550

27.450

42.780

35.840

48.530

26.120

N/A

50.450

35.480

25.590

21

(GINI) Increasing inequality between people and nations on Earth

55.900

73.900

49.000

51.600

78.900

55.200

66.100

52.400

53.700

64.000

52.700

52.900

79.700

43.200

45.100

44.900

39.600

41.900

47.400

33.900

22

(SF) State fragility (measured with the Failed States Index)

1.298

1.391

1.371

1.355

1.257

1.328

1.301

1.367

1.322

1.281

1.357

1.376

1.366

1.434

1.370

1.435

1.404

1.284

1.440

1.463

23

(CSL) Component of Security of Life

(continued)

$17,890.575

$4989.428

$15,891.627

$14,982.358

$3865.786

$7028.935

$9508.238

$12,149.190

$7469.025

$23,541.488

$12,820.088

$9522.771

$37,180.527

$9630.944

$11,824.638

$16,529.541

$25,145.393

$13,792.926

$14,071.027

$21,650.213

25

GDP per capita 2016

244 4 Intellectual Analysis of Systemic World Conflicts and Global …

2

Botswana

Panama

Brazil

Serbia

Albania

Argentina

Saudi Arabia

Armenia

Macedonia

Jordan

Cabo Verde

Colombia

Russian Federation

China

1

50

51

52

53

54

55

56

57

58

59

60

61

62

63

0.926

0.703

0.448

0.415

0.415

0.415

0.415

0.533

0.446

0.415

0.417

0.624

0.415

0.415

15

(ES) Global decrease of energy security

0.542

0.540

0.577

0.542

0.493

0.603

0.555

0.581

0.585

0.536

0.533

0.551

0.569

0.402

16

(GD) Spread of global diseases

Seychelles

Peru

Kazakhstan

Belize

Azerbaijan

64

65

66

67

68

0.430

0.415

0.448

0.430

0.415

0.583

0.552

0.566

0.567

0.549

Medium degree of Sustainable development

Country,

Rank ISD

Table 4.22 (continued)

35,643.240

517.047

262,901.898

57,153.862

645.392

10,249,463.020

1,789,074.295

89,625.147

443.707

24,807.255

8294.754

5496.833

541,428.883

189,818.588

4814.771

44,869.412

503,677.118

10,362.942

5423.493

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.552

0.530

0.554

0.515

0.491

0.382

0.554

0.516

0.543

0.556

0.456

0.540

0.556

0.549

0.500

0.450

0.455

0.551

0.552

18

(ND) Vulnerability to natural disasters

0.120

0.117

0.131

0.120

0.131

0.132

0.080

0.108

0.110

0.117

0.117

0.116

0.135

0.121

0.115

0.139

0.136

0.108

0.107

19

(NI) Proliferation (measured with a complex indicator)

87.000

99.500

92.900

86.700

95.700

95.500

96.900

91.400

91.700

96.900

99.400

100.000

97.000

99.100

95.100

99.200

98.100

94.700

96.200

20

(WA) Limited access to drinking water

31.790

N/A

26.330

44.140

46.820

42.160

41.590

53.500

47.190

N/A

44.050

31.480

N/A

42.670

28.960

29.060

51.480

50.700

60.460

21

(GINI) Increasing inequality between people and nations on Earth

76.300

66.000

66.500

72.000

60.200

74.900

81.000

80.200

71.500

78.000

67.000

69.600

72.200

48.400

61.200

72.000

65.300

53.200

63.500

22

(SF) State fragility (measured with the Failed States Index)

1.230

1.266

1.273

1.092

1.270

1.301

1.339

1.130

1.225

1.146

1.185

1.191

1.332

1.352

1.264

1.222

1.357

1.291

1.250

23

(CSL) Component of Security of Life

(continued)

$3878.709

$4744.736

$7714.694

$6049.233

$15,075.719

$8123.181

$8748.369

$5805.605

$2997.753

$4087.938

$5237.148

$3614.688

$20,028.648

$12,440.321

$4124.982

$5426.198

$8649.948

$13,680.236

$6924.150

25

GDP per capita 2016

4.6 Influence of Global Threats on the Sustainable Development … 245

Country,

2

Jamaica

Tunisia

Bhutan

Fiji

Moldova

Thailand

Guyana

Paraguay

Mongolia

Namibia

Morocco

Kyrgyzstan

Bosnia and Herzegovina

Bolivia

El Salvador

Philippines

Dominican Republic

Lebanon

Ghana

Rank ISD

1

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

0.415

0.415

0.415

0.434

0.415

0.420

0.415

0.415

0.415

0.415

0.417

0.415

0.415

0.453

0.415

0.415

0.415

0.416

0.415

15

(ES) Global decrease of energy security

Table 4.22 (continued)

0.421

0.569

0.567

0.519

0.619

0.560

0.556

0.583

0.550

0.430

0.558

0.570

0.505

0.534

0.543

0.524

0.518

0.556

0.547

16

(GD) Spread of global diseases

14,620.329

22,581.386

22,071.673

98,238.930

6358.578

19,702.791

21,906.658

9842.228

58,558.323

2948.268

41,591.114

4972.452

1936.176

303,117.887

4976.119

1708.822

883.747

27,667.515

7726.369

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.550

0.434

0.544

0.257

0.509

0.459

0.446

0.530

0.553

0.407

0.525

0.440

0.529

0.416

0.546

0.525

0.547

0.556

0.494

18

(ND) Vulnerability to natural disasters

0.108

0.121

0.116

0.123

0.104

0.107

0.118

0.101

0.107

0.110

0.104

0.109

0.116

0.135

0.104

0.127

0.117

0.113

0.117

19

(NI) Proliferation (measured with a complex indicator)

88.700

99.000

84.700

91.800

93.800

90.000

99.900

90.000

85.400

91.000

64.400

98.000

98.300

97.800

88.400

95.700

100.000

97.700

93.800

20

(WA) Limited access to drinking water

42.77

N/A

47.070

43.040

41.840

48.400

33.830

26.820

40.720

60.970

32.040

51.670

N/A

37.850

26.830

42.780

38.810

35.810

45.460

21

(GINI) Increasing inequality between people and nations on Earth

71.200

89.600

70.800

84.700

72.500

78.500

74.600

81.100

74.200

71.100

56.600

72.600

70.900

78.800

73.200

76.200

77.600

74.600

65.000

22

(SF) State fragility (measured with the Failed States Index)

1.170

1.075

1.062

1.029

1.117

1.180

1.140

1.173

1.105

1.158

1.311

1.164

1.379

1.187

1.184

1.111

1.297

1.211

1.090

23

(CSL) Component of Security of Life

(continued)

$1513.461

$8257.294

$6722.224

$2951.072

$4223.585

$3104.956

$4808.405

$1077.603

$2892.776

$4414.979

$3694.083

$4077.742

$4529.139

$5910.621

$1900.226

$5233.469

$2773.547

$3688.646

$4878.576

25

GDP per capita 2016

246 4 Intellectual Analysis of Systemic World Conflicts and Global …

2

South Africa

Algeria

Indonesia

India

Iran

Tajikistan

Egypt

Guatemala

Venezuela, Bolivarian Republic of

Ecuador

Sri Lanka

Vietnam

Honduras

Rwanda

Zambia

Senegal

1

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

0.415

0.415

0.415

0.415

0.439

0.415

0.426

0.524

0.355

0.416

0.613

0.562

0.570

0.571

0.593

0.578

0.415

0.508

0.582

0.574

0.386

0.490

0.541

0.279

16

(GD) Spread of global diseases

0.470

0.442

0.415

0.523

0.664

0.480

0.456

0.462

15

(ES) Global decrease of energy security

Nicaragua

Benin

104

105

0.415

0.415

0.466

0.570

Low degree of sustainable development

Country,

Rank ISD

Table 4.22 (continued)

5797.527

4569.082

8423.099

3824.681

799.406

9064.824

152,624.207

16,024.790

43,527.290

185,531.865

13,597.236

213,012.363

3586.326

616,976.417

2,034,752.294

479,364.908

134,215.867

471,238.836

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.526

0.470

0.486

0.528

0.551

0.458

0.499

0.377

0.546

0.553

0.409

0.556

0.529

0.549

0.523

0.548

0.556

0.548

18

(ND) Vulnerability to natural disasters

0.100

0.112

0.108

0.111

0.117

0.109

0.136

0.116

0.114

0.118

0.100

0.114

0.110

0.112

0.092

0.121

0.133

0.116

19

(NI) Proliferation (measured with a complex indicator)

77.900

87.000

78.500

65.400

76.100

91.200

97.600

95.600

86.900

93.100

92.800

99.400

73.800

96.200

94.100

87.400

83.600

93.200

20

(WA) Limited access to drinking water

43.440

47.050

40.290

55.620

50.440

50.640

37.590

39.160

45.380

46.940

48.660

N/A

30.760

37.350

35.150

39.470

N/A

63.380

21

(GINI) Increasing inequality between people and nations on Earth

78.900

79.000

83.600

86.300

91.300

79.800

70.700

87.700

75.600

81.600

83.200

90.200

83.800

86.900

79.600

74.900

78.300

69.900

22

(SF) State fragility (measured with the Failed States Index)

1.057

0.996

0.958

1.056

1.058

1.061

1.158

1.069

1.109

1.143

1.021

1.165

1.107

1.197

1.199

1.075

1.143

1.072

23

(CSL) Component of Security of Life

(continued)

($789.440)

($2151.382)

($952.768)

($1269.574)

($702.836)

($2361.160)

$2170.648

$3909.989

$6018.527

N/A

$4146.744

$3477.852

$795.844

$5219.109

$1709.592

$3570.295

$3916.882

$5274.546

25

GDP per capita 2016

4.6 Influence of Global Threats on the Sustainable Development … 247

Country,

2

Tanzania, United Republic of

Cote d`Ivoire

Swaziland

Congo, Republic of the

Madagascar

Cambodia

Kenya

Malawi

Laos

Guinea

Nepal

Mexico

Bangladesh

Uganda

Lesotho

Pakistan

Sierra Leone

Rank ISD

1

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

0.415

0.441

0.415

0.415

0.423

0.498

0.415

0.415

0.415

0.415

0.415

0.415

0.415

0.418

0.415

0.415

0.415

15

(ES) Global decrease of energy security

Table 4.22 (continued)

0.475

0.479

0.384

0.354

0.565

0.571

0.537

0.471

0.541

0.396

0.401

0.510

0.489

0.465

0.393

0.392

0.435

16

(GD) Spread of global diseases

1191.775

153,368.608

2295.542

4895.445

68,950.601

488,602.081

6501.591

2299.209

2174.531

1272.449

13,300.209

5573.840

3076.613

2482.559

1089.099

8987.817

10,751.644

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.552

0.485

0.495

0.536

0.486

0.536

0.410

0.552

0.472

0.451

0.459

0.431

0.497

0.553

0.537

0.556

0.539

18

(ND) Vulnerability to natural disasters

0.114

0.103

0.104

0.106

0.114

0.134

0.116

0.116

0.125

0.111

0.108

0.121

0.102

0.105

0.115

0.097

0.098

19

(NI) Proliferation (measured with a complex indicator)

62.600

91.400

81.800

79.000

86.900

96.100

91.600

76.800

75.700

90.200

63.200

75.500

51.500

76.500

74.100

81.900

55.600

20

(WA) Limited access to drinking water

33.990

30.690

54.180

41.010

32.130

48.210

32.840

33.730

37.890

46.120

48.510

30.760

42.650

48.940

51.450

43.180

37.780

21

(GINI) Increasing inequality between people and nations on Earth

91.000

101.700

80.900

97.700

90.700

70.400

91.200

103.800

84.400

87.600

98.300

87.400

84.200

92.200

87.600

97.900

81.800

22

(SF) State fragility (measured with the Failed States Index)

1.015

1.009

1.021

0.921

1.072

1.221

1.039

1.022

1.066

1.033

0.881

0.994

1.036

1.086

0.919

0.970

0.936

23

(CSL) Component of Security of Life

(continued)

($505.205)

($1443.625)

($1039.704)

($580.384)

($1358.779)

($8208.556)

($729.122)

($661.528)

($2338.692)

($300.308)

($1455.360)

($1269.907)

($401.742)

($1528.245)

($2770.199)

($1534.974)

($877.508)

25

GDP per capita 2016

248 4 Intellectual Analysis of Systemic World Conflicts and Global …

Burkina Faso

Gambia

Cameroon

Turkey

Togo

Mali

Central African Republic

Ukraine

Ethiopia

Niger

Angola

123

124

125

126

127

128

129

130

131

132

133

Mozambique

Syria

Nigeria

Yemen

134

135

136

137

Latest available data N/A—data not available

a

2

1

0.437

0.415

0.415

0.450

0.415

0.415

0.415

0.478

0.415

0.415

0.415

15

(ES) Global decrease of energy security

0.389

0.464

0.354

0.582

0.439

0.442

0.464

0.555

0.411

0.524

0.459

16

(GD) Spread of global diseases

0.415

0.451

0.416

0.415

0.545

0.284

0.656

0.330

Very low degree of sustainable development

Country,

Rank ISD

Table 4.22 (continued)

25,346.304

95,650.028

36,064.945

4019.032

32,463.951

1961.845

10,634.300

271,101.310

297.027

1026.760

2229.536

323,451.402

6813.286

491.378

3058.278

17

(GW) Global warming (measured in metric tons of carbon dioxide emission)

0.555

0.535

0.548

0.517

0.519

0.452

0.504

0.554

0.548

0.497

0.548

0.555

0.544

0.491

0.411

18

(ND) Vulnerability to natural disasters

0.117

0.100

0.124

0.102

0.118

0.120

0.112

0.131

0.119

0.111

0.108

0.124

0.107

0.099

0.111

19

(NI) Proliferation (measured with a complex indicator)

54.900

68.500

90.100

51.100

49.000

58.200

57.300

96.200

68.500

77.000

63.100

100.000

75.600

90.200

82.300

20

(WA) Limited access to drinking water

N/A

42.970

N/A

45.580

42.720

33.990

33.170

24.090

56.240

33.040

46.020

40.180

46.540

47.330

35.300

21

(GINI) Increasing inequality between people and nations on Earth

111.500

103.500

110.800

87.800

90.500

98.400

97.200

75.500

112.100

95.200

85.800

77.300

97.800

86.800

89.400

22

(SF) State fragility (measured with the Failed States Index)

1.010

0.913

1.187

0.856

0.903

0.924

0.926

1.313

1.016

0.939

0.930

1.231

0.918

0.963

0.934

23

(CSL) Component of Security of Life

($990.335)

($2175.673)

(N/A)

($382.069)

($3308.700)

(N/A)

($706.757)

($2185.728)

($382.213)

($779.945)

($578.462)

($10,862.600)

($1374.514)

($473.190)

($627.103)

25

GDP per capita 2016

4.6 Influence of Global Threats on the Sustainable Development … 249

4 Intellectual Analysis of Systemic World Conflicts and Global …

250

Based on the data presented in Table 4.22, Fig. 4.26a, b illustrate the indicators of sustainable development and people’s quality of life for different countries and regions of the world.

4.6.7

Conclusions

1. This section proposes an approved methodology of application of BBNs to the qualitative analysis of dependences and establishment of causal relations between levels of vulnerability of countries and regions of the world to global threats and indicators of sustainable development in the global context. 2. Measures of specific informativeness of a variable and specific mutual informativeness of variables are introduced that can be used for the selection of essential variables, and also definitions are given for causal relations between them in synthesizing topologies of BBNs. It is shown that the influence of threats such as the vulnerability to natural disasters, balance between the biological productivity of a territory and its total consumption, income inequality, instability of a state on the level of sustainable development of countries of the world is less essential in comparison with other global threats. Therefore, these threats were excluded from consideration. 3. BBNs were modelled with a view to testing 316 hypothesis. We used the significance of a and the power of (1 − b) as a criterion for data reduction. A method of generalization of the modeling results is proposed that is based on the construction of a Boolean function for a set of collections of evidences, which makes it possible to use the methods of Boolean algebra for obtaining a minimal set of evidences collections justifying each hypothesis. 4. Analysis of the modeling results allows us to draw out the conclusions that the indicators of the sustainable development are closely interrelated, but knowledge of their values does not give grounds for expecting any specific levels of threats. On the other hand, threats are also interconnected, some of which have a direct impact on indicators of the sustainable development, others has an indirect one. If the values of some threats are known then it identifies the level of indicators of the sustainable development in certain cases.

4.7

The General Concept of the Periodic Systemic World Conflicts

Investigating the global evolutionary development of the civilization as a complicated, integral, self-organizing system assumes taking into account some interrelated processes and factors of various nature, among which global conflicts occupy one of central places. Finding and constructing general models that would

Fig. 4.26 a Sustainable development index. b Quality of human life index

4.7 The General Concept of the Periodic Systemic World Conflicts 251

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.26 (continued)

252

4.7 The General Concept of the Periodic Systemic World Conflicts

253

adequately describe the regularities of world conflicts remains one of the most important yet unsolved problems the science is facing. Despite numerous attempts, no adequate scientifically justified metric toolkit has been proposed yet for global forecast and prediction of the development of world conflicts, which is especially necessary when the global civilization enters the XXIst century as a special critical phase of its development [18, 26, 30]. In the context of finding a solution to this problem, being based on systemic generalization of the results of analysis of an extensive empirical material [1, 51, 52], the studies [2, 20, 29] revealed and justified a hypothetical pattern of systemic world conflicts, based on the so-called dynamic model of C-waves, which is based on the “golden section” metric. In this section we will propose a general concept of C-waves of systemic world conflicts, on the basis of generalization and formalization of the approaches considered in [2, 20, 29]. We will analyze the class of C-waves, which envelopes super-long time intervals. We will show that the pattern of big C-waves is invariant with respect to the evolution of the nature of world conflicts.

4.7.1

Some Concepts and Definitions

Let Wc(m, n) be a set of all world conflicts occurred from year m th to n th, where m, n  Z; Z is the set of integer numbers. In what follows, we will consider that years of the Common era (AD) correspond to positive numbers m and n, and years before Christ (BC) correspond to negative ones. Let us associate any s that belongs to time interval J ðm; nÞðs 2 J ðm; nÞ , ½m; n \ ZÞ with the following group of world conflicts: LðwscÞ ¼ fwc 2 Wc ðm; nÞjPðwc ; sÞ ¼ 1g;

ð4:34Þ

where

Pðwc ; sÞ ¼

1; if conflict wc occurred in year s 0; if conflict wc did not occur in year s

Basic definition. Let the sequence of the group of world conflicts Lðwmc Þ ; Lðwmc þ 1Þ ; Lðwmc þ 2Þ ; . . .; LðwncÞ generate, on the time interval J ðm; nÞ, the family

ð4:35Þ

4 Intellectual Analysis of Systemic World Conflicts and Global …

254

ð4:36Þ

Mc ðm; nÞ ¼ fC1 ; C2 ; . . .; CN g

of waves of Systemic World Conflicts (SWC), briefly SWC-waves or C-waves, if there exists a block matrix

ð4:37Þ for which the following conditions are true: ( sk;0 ¼ sk þ 1;0 þ sk þ 2;0 ; sN1;0 ¼ sN;0 ;

k ¼ 1; N  3;

ð4:38Þ

E k;0 \E k þ 1;0 ; k ¼ 1; N  1; (

ð4:39Þ

E k;1 \E k;2 \E k;3 ; E k;5 \E k;6 \E k;3 ;

ð4:40Þ

k ¼ 1; N;

where (

 sk;i ¼ card J mk;i ; nk;i sk;0 ¼ card J ðmk ; nk Þ; (

ð4:41Þ

i ¼ 1; 5; k ¼ 1; N

E k;i ¼ E mk;i ;nk;i ; i ¼ 1; 5; k ¼ 1; N

ð4:42Þ

E k;0 ¼ E mk;0 ;nk;0 ¼ E mk ;nk 8  1 > < E mk;i ;nk;i ¼ card J mk;i ; nk;i  > :

N

ðsÞ wc

¼ card

X s2I ðmk;i ;nk;i Þ

N

ðsÞ wc

ð4:43Þ

LðwscÞ

 8 J k;0 ¼ J mk;0 ; nk;0 ¼ J ðmk ; nk Þ; k ¼ 1; N > > 0 1 < [  @ > J k;0 ¼ J ðm; nÞA > : J l;0 \ J r;0 ¼ £ 8l 6¼ r l; r ¼ 1; N ^ k¼1;N

ð4:44Þ

4.7 The General Concept of the Periodic Systemic World Conflicts

8  > J k;i ¼ J mk;i ; nk;i ¼ J ðmk ; nk Þ; i ¼ 1; 5; k ¼ 1; N > > 0 1 < [  > J k;i ¼ J k;0 A J k;l \ J k;r ¼ £ 8l 6¼ r l; r ¼ 1; 5 ^ @ > > :

255

ð4:45Þ

i¼1;5

Elements of matrices following parameters of the set M c ðm; nÞ of SWC-waves:

, define the

(1) J k;0 —time interval of the life cycle of Ck  wave, k ¼ 1; N; (2) J k;i ith phase of Ck -wave, k ¼ 1; N; i ¼ 1; 5, namely,

(3) (4) (5) (6)

sk;0 —life cycle duration of Ck -wave, k ¼ 1; N; sk;i —duration of phase fk;i , of Ck -wave, k ¼ 1; N; i ¼ 1; 5; E k;0 —power of Ck -wave, k ¼ 1; N; i ¼ 1; 5; E k;i —power of phase fk;i , of Ck -wave, k ¼ 1; N; i ¼ 1; 5.

  J ¼J k;i  k¼1;N;i¼1;5 interval matrix;     —chronometric matrix, and E ¼ E k;i k¼1;N;i¼1;5 energy k¼1;N;i¼1;5 matrix of the evolutionary structuration process pes swc ðLc ðm; nÞÞ of family M c ðm; nÞ of systemic world conflict waves.

Definition   v ¼ sk;i 

1 We

will

call

Definition 2 Let the family M c ðm; nÞ of SWC-waves be a uniform complete space-time object defined by block matrix a. We will call a—the ensemble of SWC-waves of systemic world conflicts, briefly, ðSWC Þa -ensemble. Let us represent it as follows:

ð4:46Þ where is an operator of local “systemic merge” of “fragments” Ck;i and Ck;i þ 1 of Ck -wave, which correspond to phases fk;i and fk;i þ 1 ; k ¼ 1; N; i ¼ 1; 4; is operator of global system merge of Ck and Ck+1 waves, k ¼ 1; N  1. We will call

256

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.27 Geometric image («phase portrait») of Ck -wave

 number dim ðSWC Þa N—the dimension of ensemble ðSWC Þa , and time interval J ðm; nÞ the interval of manifestation of ðSWC Þa -ensemble.

4.7.2

Geometric Images of CK -Waves and Ensemble of ðSWC Þa -Waves of Systemic World Conflicts

Let us consider the following geometric images (phase portraits) of Ck -waves and ensemble of ðSWC Þa -waves of systemic world conflicts: 1. Geometric Image of Ck -wave, k ¼ 1; N, can be represented as the graph (Fig. 4.27a) of the following step function:  8 E k;1 , t 2 nk1;5 ; > >  > > > > < E k;2 , t 2 nk;1 ; hC ðtÞ ¼ E k;3 , t 2 nk;2 ; k >  > > E k;4 , t 2 nk;3 ; > > >  : E k;5 , t 2 nk;4 ;

nk;1 ; nk;2 ; nk;3 ; nk;4 ; nk;5 ;

ð4:47Þ

(where E k;i —is defined from (4.39), (4.40)), or as a graph of some continuous function hCk ðtÞ, approximates function hCk ðtÞ on the interval ½mk ; nk  (Fig. 4.27b).

4.7 The General Concept of the Periodic Systemic World Conflicts

Fig. 4.28 A fragment

257

of «collective phase portrait» of the ðSWCÞa 

ensemble

2. Geometric Image of the Ensemble of ðSWC Þa -waves of systemic world conflicts (“collective phase portrait” of the family M c ðm; nÞ of Ck -waves, k ¼ 1; N) can be represented as the graph (Fig. 4.28a) of the following step function: hC ðtÞ ¼ hC ðtÞ; t 2 ½mk ; nk ; k ¼ 1; N; k

ð4:48Þ

258

4 Intellectual Analysis of Systemic World Conflicts and Global …

(where function hCk ðtÞ is defined from (4.46)), or by the graph of some continuous function hC ðtÞ that approximates function hC ðtÞ on the interval ½m; n (Fig. 4.28b).

4.7.3

Significant Features of SWC-Concept

We will assume that the correspondence of the SWC-concept under study to the structural harmony principle is its main key feature (F1) [29]. Let T ðCk Þ ¼ sk;0 ; sN1;0 ¼ sN;0 ¼ kc :

ð4:49Þ

Then, according to (4.38) and (4.41), variation in life cycle duration of the T ðCk Þ—sequence of Ck -waves, k ¼ 1; N, obeys the following principle: T ðCk Þ ¼ FNk þ 1  kc ;

ð4:50Þ

where FNk þ 1 —is a number from the Fibonacci sequence. This testifies that golden section is present in the structure of ðSWC Þa -ensemble; and according to the structural harmony principle [23], in any self-organizing system, special time scale corresponds to each operating mode that varies according to variation of structural states of the system. This time scale is “tied” to a certain invariant of generalized golden section as a characteristic of steady state of the system. We will call constant kc a universal time metric quantum of the life cycles of Ck waves of ðSWC Þa -ensemble. In what follows, we will call the Fibonacci regularity (4.38), (4.41), (4.49), (4.50) of the development of systemic world conflicts the F-regularity. The second key feature (F2) of the considered concept is that the universal effect of acceleration of historical time is revealed in the proposed dynamic model of Cwaves [19, 24, 27] since according to (4.38), (4.41) successive reduction of the

Fig. 4.29 Illustration of strict order of Ck -waves with respect to power E i;k of phases fk;i , k ¼ 1; N; i ¼ 1; 5 of their evolutionary development

4.7 The General Concept of the Periodic Systemic World Conflicts

259

Fig. 4.30 Illustration of the correlation between the process ped C of evolutionary development of the civilization and process pes swc ðLc ðm; nÞÞ of evolutionary structurization of the family of Ck waves of systemic world conflicts (global context): Tk J ðmk ; nk Þ ¼ FNk þ 1  kc ; Xk W½J ðmk ; nk Þ 2 XðMÞ; k ¼ 1; N

duration of life cycles of C-waves of the development of systemic world conflicts takes place as an essential component of the integral evolutionary development of the civilization. The third important property (F3) of Ck -waves is their strict hierarchy with respect to the power E i;k of phases fk;i , k ¼ 1; N; i ¼ 1; 5, of their evolutionary development (Fig. 4.29). Based on the features F1–F3 and taking into account (4.34–4.48) and Figs. 4.27, 4.28, it follows that the family M c ðm; nÞ of Ck -waves forms the sequence of irregular, self-similar, local objects that, in turn, allows us to consider the ðSWC Þa ensemble of waves of systemic world conflicts as a global, integral, self-organizing space–time object of fractal nature.

4.7.4

Correlation of Processes of Evolutionary Development of Civilization PEd C and Development of C-Waves of Systemic World Conflicts pes swc ðLc ðm; nÞÞ

Let us denote by M civilization as an integral, open, dynamic, self-organizing system. Let X(M) be the set of various states of system M. Let also W : J 1 7! XðMÞ, where J 1 fJ ðm; nÞgm;n2Z be mapping generated by the process ped C of natural evolutionary development of system M. Definition 3 We will call W½J ðmk ; nk Þ XðCk Þ ¼ Xk ; k ¼ 1; N, the ðF ; kÞ-state   of system M and call W J mk;i ; nk;i X Ck;i ¼ Xk;i ; k ¼ 1; N; i ¼ 1; 5, the ðF ; k; iÞ-state of system M. Since FNk þ 1 2 ;8k [ N, the sequence of Fibonacci numbers fFNk þ 1 gk2N is degenerated for k > N; therefore, the F-regularity revealed on the time interval J ðm; nÞ for the development of systemic world conflicts on the time interval t > n is not true anymore. ðk Þ Figures 4.29 and 4.30 show the diagrams Dg , Dloc , and Dloc , which illustrate the correlation between process ped C of evolutionary development of the civilization and

260

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.31 Illustration of the correlation between the process ped C of evolutionary development of the civilization and process pes swc ðLC ðm; nÞÞ of evolutionary structurization of the family of Ck waves of systemic world conflicts (local context): a for Ck -waves; b for the family Mc ðm; nÞ of   Ck -waves ðTk;i J mk;i ; nk;i ; Xk;i W J mk;i ; nk;i 2 XðMÞ; k ¼ 1; N; i ¼ i ¼ 1; 5Þ

4.7 The General Concept of the Periodic Systemic World Conflicts

261

process pes swc ðLc ðm; nÞÞ of evolutionary structurization of the sequence of Ck -waves of systemic world conflicts (in the global and local contexts) (Fig. 4.31).

4.7.5

The Problem of Identification (Recognition) of C-Waves of Systemic World Conflicts for Big Historical Data

Let us use the above definitions and notation and consider the general solution scheme for the problem of identification of C-waves of systemic world conflicts for big historical data. The First Stage. Statistical analysis of historical data and definition of the set Wc ðr; lÞ of all world conflicts that took place from year rth to year lth. By world conflicts we will mean conflicts that claimed no less than 1000 lives according to available information sources. n o sÞ The Second Stage. Generating the sequence Lðwc

s2ðJ ðr;lÞÞ

of groups of world

conflicts (4.34). The Third Stage. Solving the problem of the existence, on the chosen time intervals J (m, n), of block matrices of the form a ¼ ½J vE  that satisfy conditions (4.38–4.45) and developing the algorithms to construct such matrices. We will distinguish two essentially different cases. Case 1 Assume that the required block matrix a is constructed on the time interval:J (m, n), where r  m\n  l. This means that the family Mc ðm; nÞ of identified Ck -waves, k ¼ 1; N, “completely falls within” the initial time interval J (r, l). It is obvious that in this case the family Mc ðm; nÞ was “revealed” and “remained” as a completed integral object in the historical past. In this case, for the process of evolutionary structurization of the ðSWC Þa ensemble of waves of systemic world conflicts on the time interval J (m, n), we will call block matrix a an empirical matrix; J an empirical interval matrix;v an empirical chronometric matrix; and E an empirical energy matrix. Case 2 Let on the considered time interval J (r, l) only the fragment be “reof some integral ensemble vealed” and “completely fall” within it, and let it be identified by the first M rows of some block matrix a of the form (4.34), namely, by elements J k;i , sk;i , E k;i , k ¼ 1; M; i ¼ 1; 5, constructed on the basis of empirical material. It is natural that this number M should be large enough for the hypothetical statement about the manifestation of the F-regularity for the first M waves of ðSWC Þa -ensemble.   A “missing” fragment CM þ 1; CM þ 2 ; . . .; CN of the ensemble, which is hypothetically defined by the unknown elements J k;i , sk;i , and E k;i for M < k  N, i ¼ 1; 5, can be “restored” according to (4.38–4.45), by extrapolating the revealed F-regularity for M < k  N, i = 1; 5. To improve and correct the values of J k;i , sk;i , and E k;i for M < k  N, i = 1; 5, we can use additional information and factors of various nature from adjacent scientific fields (Fig. 4.32). In this case, we

262

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.32 General scheme of constructing the hypothetic block matrix a ¼ ½J vE : a hypothetic interval matrix T; b hypothetic chronometric matrix v; c hypothetic energy matrix E

will talk about the hypothetical F-regularity of the development of systemic world conflicts on the time interval J (m, n). For the process of evolutionary structurization of (SWC)a-ensemble on the time interval J (m, n), we will call block matrix a hypothetic matrix, J hypothetic interval matrix, v hypothetic chronometric matrix, and E hypothetic energy matrix.

4.7 The General Concept of the Periodic Systemic World Conflicts

263

Fig. 4.33 Illustration of the invariance of the development of big Ck-waves with respect to the evolution of the nature of world conflicts, k ¼ 1; 7

4.7.6

Big C-Waves of Systemic World Conflicts

According to the basic definition, various classes (families) of C-waves of systemic world conflicts can hypothetically exist on different time intervals. However, as follows from [25, 53], of greatest interest among them are classes of C-waves that envelope superbig time intervals, whose F-regularity of the development is invariant with respect to the evolution of the nature of world conflicts. In what follows, it is such C-waves that we will call big waves of systemic world conflicts (briefly, big Cwaves). Note that knowledge about the structural parameters of big C-waves plays an important role in the development of new metric approaches in solving problems of predicting global periodic civilization processes of various nature [1, 2, 53]. On the basis of systematically generalized results of analysis of the empirical sequence of world conflicts that took place from 2500 BC to 2007 AD [4–6], the

264

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.34 Contribution of energy safety (ES) threat to the conflict of 21st century [2]

studies [7–9] identify the ensemble of big C-waves of world conflicts (of dimension dim (ðSWC Þa ) = 7) on superbig time interval J (−750; 2092) of approximately 3000 years, which envelopes various epochs of the development of the civilization. The invariance of F-regularity of the development of the identified Ck -waves with respect to the evolution of the nature of world conflicts is illustrated by Fig. 4.33. On the time interval J (−750, 2007), six “exhibited” Ck-waves of systemic world conflicts were identified. Structural parameters of the seventh, final (predicted) wave C7 are found by extrapolating the revealed F-regularity for the fragment of the ðSWC Þa -ensemble of waves of systemic world conflicts. To improve and update the predicted values of structural parameters of wave C7 , we used additional information from various adjacent scientific fields. For example, we took into account the influence of 12 global threats that can “heat up” the global world conflict generated by the wave C7 , called the “Conflict of the 21st century” (Table 4.3). We also took into account possible influence of some other special local factors on the values of structural parameters of the predicted C7 -wave. Some of them are  presented in Fig. 4.34 for energy safety (ES) threat, where tHK is the Horner–  Kapitsa singularity point [21]; tN is the Newton singularity point. We also specified critical time intervals related to exhaustion of traditional energy resources of the Earth: oil (O), gas (G), and uranium (U). We have found the values of elements J k;i , sk;i , E k;i , k ¼ 1; 7; i ¼ 1; 5, of the hypothetic block matrix a ¼ ½J vE  of the process of evolutionary structurization of ðSWC Þa -ensemble of big Ck -waves of systemic world conflicts. Elements J k;i , k ¼ 1; 7; i ¼ 1; 5, of the hypothetical interval matrix J of the process of evolutionary structurization of the sequence of Ck -waves on time interval J (−750; 2092) are as follows:

4.7 The General Concept of the Periodic Systemic World Conflicts

8 J 1;0 > > > > J 2;0 > > > > J 3;0 > > > > J 4;0 > > > > J 5;0 > > > > J 6;0 > > < J 7;0 J : J 1;3 > > > > J > 2;3 > > > > J > 3;3 > > > J 4;3 > > > > J 5;3 > > > > J 6;3 > : J 7;3

¼ I ð705; 401Þ; ¼ I ð402; 1074Þ; ¼ I ð1075; 1497Þ; ¼ I ð1498; 1749Þ; ¼ I ð1750; 1919Þ; ¼ I ð1920; 2007Þ; ¼ I ð2008; 2092Þ; ¼ I ð334; 63Þ; ¼ I ð827; 970Þ; ¼ I ð1208; 1281Þ; ¼ I ð1639; 1660Þ; ¼ I ð1801; 1819Þ; ¼ I ð1989; 1996Þ; ¼ I ð2048; 2060Þ;

J 1;1 J 2;1 J 3;1 J 4;1 J 5;1 J 6;1 J 7;1 J 1;4 J 2;4 J 3;4 J 4;4 J 5;4 J 6;4 J 7;4

¼ I ð705; 500Þ; ¼ I ð402; 631Þ; ¼ I ð1075; 1146Þ; ¼ I ð1498; 1566Þ; ¼ I ð1750; 1778Þ; ¼ I ð1920; 1958Þ; ¼ I ð2008; 2020Þ; ¼ I ð62; 401Þ; ¼ I ð971; 1074Þ; ¼ I ð1282; 1436Þ; ¼ I ð1661; 1718Þ; ¼ I ð1820; 1868Þ; ¼ I ð1997; 2007Þ; ¼ I ð2061; 2079Þ;

265

J 1;2 J 2;2 J 3;2 J 4;2 J 5;2 J 6;2 J 7;2 J 1;5 J 2;5 J 3;5 J 4;5 J 5;5 J 6;5 J 7;5

¼ I ð499; 335Þ; ¼ I ð632; 826Þ; ¼ I ð1147; 1207Þ; ¼ I ð1567; 1638Þ; ¼ I ð1779; 1800Þ; ¼ I ð1959; 1988Þ; ¼ I ð2021; 2047Þ; ¼ I ð62; 401Þ; ¼ I ð971; 1074Þ; ¼ I ð1437; 1497Þ; ¼ I ð1719; 1749Þ; ¼ I ð1869; 1919Þ; ¼ I ð1997; 2007Þ; ¼ I ð2080; 2092Þ:

Elements sk;i , k ¼ 1; 7; i ¼ 1; 5, of the hypothetical chronometric matrix v of the process of evolutionary structurization of the sequence of Ck-waves on the time interval J (−750; 2092) are as follows: 8 s1;0 > > > > s2;0 > > > > s3;0 < v : s4;0 > > > s5;0 > > > > > s6;0 : s7;0

¼ 1107; ¼ 673; ¼ 423; ¼ 252; ¼ 170; ¼ 88; ¼ 85;

s1;1 s2;1 s3;1 s4;1 s5;1 s6;1 s7;1

¼ 206; ¼ 230; ¼ 72; ¼ 69; ¼ 29; ¼ 39; ¼ 12;

s1;2 s2;2 s3;2 s4;2 s5;2 s6;2 s7;2

¼ 165; ¼ 195; ¼ 61; ¼ 72; ¼ 22; ¼ 30; ¼ 26,

s1;3 s2;3 s3;3 s4;3 s5;3 s6;3 s7;3

¼ 272; ¼ 144; ¼ 74; ¼ 22; ¼ 19; ¼ 8; ¼ 12;

s1;4 s2;4 s3;4 s4;4 s5;4 s6;4 s7;4

¼ 464; ¼ 104; ¼ 155; ¼ 58; ¼ 49; ¼ 11; ¼ 16;

s1;5 s2;5 s3;5 s4;5 s5;5 s6;5 s7;5

¼ 464; ¼ 104; ¼ 61, ¼ 31, ¼ 51, ¼ 11, ¼ 8:

Elements E k;i , k ¼ 1; 7; i ¼ 1; 5, of the hypothetical energy matrix E of the process of evolutionary structurization of the sequence of Ck-waves on the time interval J (−750; 2092): 8 E 1;0 ¼ 1,10, > > > E ¼ 1,12, > > 2;0 > > > E 3;0 ¼ 3,98, < E : E 4;0 ¼ 6,12, > > > E 5;0 ¼ 8,74, > > > E ¼ 11,90, > > : 6;0 E 7;0 ¼ 45,

E 1;1 E 2;1 E 3;1 E 4;1 E 5;1 E 6;1 E 7;1

¼ ¼ ¼ ¼ ¼ ¼ ¼

1,42, 1,53, 4,81, 8,04, 8,41, 9,36, 41,

E 1;2 E 2;2 E 3;2 E 4;2 E 5;2 E 6;2 E 7;2

¼ ¼ ¼ ¼ ¼ ¼ ¼

2,47, 3,77, 7,59, 11,64, 11,91, 22,70, 53,

E 1;3 ¼ E 2;3 ¼ E 3;3 ¼ E 4;3 ¼ E 5;3 ¼ E 6;3 ¼ E 7;3 ¼

3,45, 4,86, 9,89, 18,59, 25,05, 30,75, 65,

E 1;4 E 2;4 E 3;4 E 4;4 E 5;4 E 6;4 E 7;4

¼ ¼ ¼ ¼ ¼ ¼ ¼

0,74, 3,53, 7,10, 11,07, 16,00, 29,55, 49,

E 1;5 E 2;5 E 3;5 E 4;5 E 5;5 E 6;5 E 7;5

¼ ¼ ¼ ¼ ¼ ¼ ¼

0,74, 3,53, 5,69, 7,23, 8,59, 29,55, 33:

A key feature of the identified family of big Ck -waves, k ¼ 1; 7, of systemic world conflicts is that the most powerful (predicted) final C7 -wave completely “falls within” the 21st century, and according to different independent sources [2, 24, 26, 27, 30, 54–58], the peak of “System tsunami of the 21st century” or “New phase passage” is in its middle. If the trends formed at the previous phases of the history remain the same, these shocks will hypothetically lead the mankind to another phase of the development (a combination of technological progress and a big war [58] as the most probable scenario).

266

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.35 Generalized profile of the Canada

Establishing the relationship between the results of the studies obtained in the previous sections, namely: – regularity of the emergence of systemic world conflicts (Sect. 4.2);

4.7 The General Concept of the Periodic Systemic World Conflicts

267

Fig. 4.36 Generalized profile of the Finland

– interrelation between the periodic processes in the global economy and systemic world conflicts (Sect. 4.3); – the relationship between the sequence of 11-year Schwabe-Wolf cycles of solar activity and the family of C-waves of global systemic conflicts (Sect. 4.5);

268

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.37 Generalized profile of the Australia

– the impact of global threats on the sustainable development of countries and regions of the world (Sect. 4.6). We present the generalized profiles of the three most secure countries in the world (Canada—Fig. 4.35, Finland—Fig. 4.36, Australia, Fig. 4.37), the two

4.7 The General Concept of the Periodic Systemic World Conflicts

269

Fig. 4.38 Generalized profile of the United States

countries with the largest nuclear potential (USA—Fig. 4.38, Russia—Fig. 4.39) and three countries with the lowest level of national security (Angola—Fig. 4.40, Kenya—Fig. 4.41, Mozambique—Fig. 4.42).

270

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.39 Generalized profile of the Russia

4.7 The General Concept of the Periodic Systemic World Conflicts

Fig. 4.40 Generalized profile of the Angola

271

272

4 Intellectual Analysis of Systemic World Conflicts and Global …

Fig. 4.41 Generalized profile of the Kenya

4.7 The General Concept of the Periodic Systemic World Conflicts

Fig. 4.42 Generalized profile of the Mozambique

273

4 Intellectual Analysis of Systemic World Conflicts and Global …

274

4.8

Conclusions

1. The generalization and formalization of approaches to the recognition of C-waves of global systemic conflicts through big historical data have been carried out and general concept of description and interpretation of these waves has been proposed. On the basis of intellectual analysis of big data on the conflicts, taking place since 750 B.C. up to now, have been analyzed and their general pattern has been revealed. There has been made an attempt to foresee the next global conflict called the conflict of the 21st century. Its nature and main characteristics have been analyzed. 2. The hypotheses for a metric relation between the global periodic processes, namely between the sequence of 11-year cycles of solar activity, so called Kondratieff cycles of the development of the global economy, and the process of evolutionary structuration of the family of the C-waves of global systemic conflicts have been formulated. There has also been made an attempt to predict these processes in the 21st century by using a metric approach. 3. The possible scenarios of the development of the conflict of the 21st century have been constructed and analyzed. This analysis led to the following conclusions: 3:1. Since for k [ 7, the sequence of Fibonacci numbers fF8k gk2N for the sequence of big Ck -waves, k = 1,7, is degenerated, the revealed F-regularity fails on the time interval t [ 2092. Therefore, natural questions arise: What the 21st century has in store for the civilization? What is the nature of the final state of civilization as a system? What should happen to the world civilization after 2092, in particular, in the 22nd century? Probably, the final cycle of some global evolutionary chain of the development of the mankind begins? 3:2. One can find the answer to this question in the studies by two outstanding scientists of the last century, can be found in the studies of the outstanding scientists of the last century, Vernadskiy [22] and Moisejev [25]. Independently one from the other, they formulated a very close idea: if the mankind, in the planetary scale, does not change radically its behavior (using its mind and its labor for self-destruction), in the middle of the 21st century there can occur the conditions under which people cannot exist. These conclusions were made for the paradigm permanent for the whole history of the mankind: “unlimited and increasing consumption” and for the technosphere (set of technological lifestyles) unfriendly for human inhabitance, developed in the 19th and beginning of the 21st centuries. 3:3. If the mankind can change the paradigm of its behavior in the planetary scale, for example, to “harmonic coexistence” and radically transform the technosphere to “nature-like” (friendly to the human environment, based on the convergence of nano-, bio-, information, cognitive, and socio-humanitarian technologies [53]), then the regularity revealed for the previous paradigm of the development of systemic world conflicts, which corresponds to the Fibonacci sequence, will fail for the new paradigm, which will allow the mankind to continue its mission on the Earth.

References

275

References 1. List of Wars. http://en.wikipedia.org/wiki/List_of_wars 2. M.Z. Zgurovsky, V.V. Yasinsky, Revealing regularities of the course of global system conflicts. Syst. Res. Inf. Technol. 2, 7–18 (2007) 3. H. Scheer, Energy is a driving force for our civilization. http://www.folkecenter.dk/en/articles/ HScheer_aburja.htm 4. World Data Center, «Geoinformatics and Sustainable Development» . http://wdc.org.ua/en 5. GeoHive. http://www.xist.org/earth/population1.aspx 6. Global Footprint Network. http://www.footprintnetwork.org/en/index.php/GFN/ 7. UN and CIA Combined List—Income Ratios and Gini Indices. https://en.wikipedia.org/wiki/ List_of_countries_by_income_equality 8. Health Statistics and Health Information Systems, World Health Organization. http://www. who.int/healthinfo/statistics/programme/en/index.html 9. Corruption Perceptions Index, Transparency international. https://www.transparency.org/ country (2017) 10. Water for Life: Making it Happen. WHO/UNICEF. Joint Monitoring Report. http://www. who.int/water_sanitation_health/monitoring/jmp2005/en/index.html (2005) 11. UNICEF Joint Monitoring Programme for Water Supply and Sanitation (n.d.). Water for life: making it happen. http://www.who.int/entity/water_sanitation_health/waterforlife.pdf 12. M.G. Marshall, Global report on conflict, governance and state fragility, in Foreign Policy Bulletin, ed. by M.G. Marshall, B.R. Cole. http://www.systemicpeace.org/GlobalReport2008. pdf (2008) 13. S.P. Kapitsa, S.P. Kurdyumov, G.G. Malinetskii, Synergetics and Predictions (Synergetics: From Past to Future) (Editorial USSR, Moscow, 2003). (in Russian) 14. N.D. Kondratieff, The Major Cycles of the Conjecture and Prediction Theory (Ekonomika, Moscow, 2002). (in Russian) 15. N.D. Kondratieff, Economic Dynamics Problem (Ekonomika, Moscow, 1989). (in Russian) 16. M.Z. Zgurovskii, General pattern of global system conflicts and global threats of the 21st century. Cybern. Syst. Anal. 43(5), 687–695 (2007) 17. YuV Yakovets, Predicting Cycles and Crises (MFK, Moscow, 2000). (in Russian) 18. Y.V. Yakovets, Cycles and crises in the 21st century: a civilization approach, in Transgender Jubilee Science Conference RAEN, MFK, Moscow (2000) 19. J. Schumpeter, Business Cycles, vols. 1, 2 (McGraw-Hill, New York, 1939) 20. F. Braudel, Civilisation matérielle, économie et capitalisme. XVe-XVIIIe siècle, vol. 3, Le temps du monde (1979) 21. S.P. Kapitsa, On the “acceleration of the historical time”. Novaya Noveish. Istoriya 6, 3–16 (2004) 22. V.I. Vernadskii, A few words on the noosphere. Uspekhi Sovrem. Biologii 18(2) (1944) 23. M.Z. Zgurovsky, Metric aspects of periodic processes in economy and society. Cybern. Syst. Anal. 46(2), 167–172 (2010) 24. M.Z. Zgurovsky, Interrelation between Kondratieff cycles and global systemic conflicts. Cybern. Syst. Anal. 45(5), 742–749 (2009) 25. N.N. Moiseyev, Save mankind on the Earth. Ekologiya i Zhizn 1, 11–13 (2000) 26. E.M. Soroko, Golden Sections, Systems Self-Organization and Evolution Processes: An Introduction to the General Theory of Systems Harmony (KomKniga, Moscow, 2006). (in Russian) 27. YuV Yakovets, Forecasting of Cycles and Crises (MFK, Moscow, 2000). [in Russian] 28. I.M. D’yakonov, Pathways of History: From Ancient Human to Nowadays (Vostoch. Lit., Moscow, 1994) (in Russian) 29. YuI Vitinskii, I. Kopetskii, G.V. Kuklin, Statistics of Sunspots Activity (Nauka, Moscow, 1986). (in Russian)

276

4 Intellectual Analysis of Systemic World Conflicts and Global …

30. Sun Influences Data Analysis Center, Belgium. http://sidc.oma.be/sunspot-data/ (2013) 31. D.H. Hathaway, The solar cycle. Living Rev. Solar Phys. 7(1), 1–65 (2010) 32. R.P. Kane, Some implications using the group sunspot number reconstruction. Sol. Phys. 205 (2), 383–401 (2002) 33. Did you say the Sun has spots?, Space Today. http://www.spacetoday.org/SolSys/Sun/ Sunspots.html (2005) 34. A. Phillips, Solar cycle 24 begins. Science@NASA (2008) 35. S.P. Kapitsa, Phenomenological theory of the growth of Earth’s population. UFN 166, 63–80 (1996) 36. A.P. Nazaretyan, Civilization Crises in the Context of Universal History (Mir, Moscow, 2004) (in Russian) 37. A.D. Panov, Crisis of a planetary cycle of the universal history. Vselennaya, Prostranstvo, Vremya 2, 28–34 (2004) 38. Analysis of sustainable development: Global and regional contexts, in: M. Z. Zgurovsky (sci. adv.), International Council for Science (ISCU), Part 1, Global Modeling of Processes of Sustainable Development in the Context of Quality and Safety of Life of People, NTUU «KPI», Kyiv (2009) 39. T.N. Pomerantseva, A.A. Boldak, Multivariate statistical analysis of the influence of global threats on the security of countries of the world. Cybern. Syst. Anal. 2, 200–210 (2010) 40. J. Pearl, Causality: Models, Reasoning, and Inference, 2nd edn. (Cambridge University Press, Cambridge, 2009) 41. R.J. Larsen, M.L. Marx, An Introduction to Mathematical Statistics and Its Applications, 4th edn. (Pearson, N.Y., 2006) 42. P. Velleman, L. Wilkinson, Nominal, ordinal, interval, and ratio typologies are misleading. Am. Stat. 47, 65–73 (1993) 43. J.A. Hartigan, M.A. Wong, A k-means clustering algorithm. Appl. Stat. 28, 100–108 (1979) 44. S.A. Aivazyan, I.S. Enyukov, L.D. Meshalkin, Applied Statistics: Investigation of Dependences (Financy and Statistika, Moscow, 1985). (in Russian) 45. A.N. Kolmogorov, Three approaches to the definition of the concept ‘quantity of information. Probl. Peredachi Inf. 1(1), 3–11 (1965) 46. E.M. Gabidulin, N.I. Pilipchuk, Lectures on Information Theory (MFTI, Moscow, 2007). (in Russian) 47. C.E. Shannon, Works on the Theory of Information and Cybernetics [Russian translation] (Izd. Inostr. Lit, Moscow, 2002) 48. The GeNIe (Graphical Network Interface) Software Package. http://genie.sis.pitt.edu/about. html 49. A.A. Boldak, M.V. Nevdashchenko, Mathematical apparatus for formalization of models used in designing information systems. Visnyk KPI Ser. Inform. Control Comput. Eng. 47 332–345 (2007) 50. A.A. Markov, Elements of Mathematical Logic (MGU, Moscow, 1984). (in Russian) 51. I.V. Rezko, History of Wars and Conflicts, vol. 1. Compiler I.V. Rezko. (Harvest Ltd, Minsk, 1997) 52. I.V. Rezko, History of Wars and Conflicts, vol. 2. Compiler I.V. Rezko. (Harvest Ltd, Minsk, 1997) 53. M.V. Kovalchuk, Science and Life: My Convergence, Vol. 1: Autobiographical Sketches: Science Educational and Conceptual Articles (Academkniga, Moscow, 2011) (in Russian) 54. N.N. Taleb, Antifragile: Things That Gain from Disorder (KoLibri, Azbuka-Atticus, Moscow, 2012, 2014) (in Russian) 55. G.D. Snooks, The Dynamic Society: Exploring the Sources of Global Change, vol. xvii (Routledge, London, 1996), 491 pp.

References

277

56. A.D. Panov, Scaling Law of the Biological Evolution and the Hypothesis of the Self-CONSISTENT Galaxy Origin of Life (COSPAR. Published by Elsevier Ltd., 2005), 220–225pp. 57. R. Kurzwel, The Singularity Is Near: When Humans Transcend Biology (Viking, 2005), 652pp. 58. S. Karelov, Big War is Imminent. https://medium.com/@sergey_57776/ (2017)