=Paper= {{Paper |id=Vol-1446/GEDM_2015_Submission_1 |storemode=property |title=Graph Grammar Induction via Evolutionary Computation |pdfUrl=https://ceur-ws.org/Vol-1446/GEDM_2015_Submission_1.pdf |volume=Vol-1446 }} ==Graph Grammar Induction via Evolutionary Computation== https://ceur-ws.org/Vol-1446/GEDM_2015_Submission_1.pdf
     Graph Grammar Induction via Evolutionary Computation

                   Linting Xue                        Collin F.Lynch                         Min Chi
              Electrical Engineering                Computer Science                  Computer Science
                   Department                           Department                        Department
              North Carolina State                 North Carolina State              North Carolina State
                    University                           University                        University
             Raleigh, North Carolina,             Raleigh, North Carolina,          Raleigh, North Carolina,
                      U.S.A.                               U.S.A.                            U.S.A.
               lxue3@ncsu.edu                      cflynch@ncsu.edu                    mchi@ncsu.edu

ABSTRACT                                                        In this paper we describe our ongoing work on the automatic
Augmented Graph Grammars provide a robust formalism             induction of Augmented Graph Grammars via Evolutionary
for representing and evaluating graph structures. With the      Computation (EC). Our long-term goal in this work is to
advent of robust graph libraries such as AGG, it has be-        develop automated techniques that can extract empirically-
come possible to use graph grammars to analyze realistic        valid graph rules which can, in turn, be used to classify
data. Prior studies have shown that graph rules can be used     student-produced argument diagrams and to provide the ba-
to evaluate student work and to identify empirically-valid      sis for automated student guidance and evaluation. This will
substructures using hand-authored rules. In this paper we       build upon our prior on the evaluation of a-priori rules for
describe proposed work on the automatic induction of graph      student arguments. We will begin with background material
grammars for student data using evolutionary computation        on Augmented Graph Grammars and discuss prior work on
via the pyEC system.                                            grammar induction. We will then present an overview of our
                                                                planned work.
Keywords
Augmented Graph Grammars, Graph Data, Evolutionary              2.   AUGMENTED GRAPH GRAMMARS
Computation                                                          & ARGUMENT DIAGRAMS
                                                                Classical graph grammars are designed to deal with fixed
1.    INTRODUCTION                                              graphs that are composed from a finite set of static node and
Graph Grammars are logical rule representations for graph       arc types. Augmented graph grammars are an extension of
structures. They can be designed to encode classes of suit-     simple graph grammars that allow for complex node and arc
able graphs to recognize complex sub-features. They were        types, optional substructures, and complex rule expressions
introduced by Rosenfeld and Pfaltz in 1969 as “Context-free     [12]. Rather than using a fixed alphabet of graph compo-
web grammars” [1]. Since then Graph grammars have been          nents they are defined by a complex ontology that allows for
applied to a wide range of areas, including pattern recogni-    subsidiary types such as textual fields, access functions, and
tion [2, 3, 4]; visual programming languages [5]; biological    directional information. They can also be used to evaluate
development [6]; classification of chemical compounds [7, 8];   negated elements as well as quantified expressions. As such
and social network analysis [9, 10, 11]. Simple graph gram-     they are better suited to rich graph data such as user-system
mars are, like string grammars, composed of a set of pro-       interaction logs and student-produced argument diagrams.
duction rules that map from one structure to another. In
this case the rules map from a simple subgraph, typically a     Augmented Graph Grammars have previously been used for
single node or arc, to a more complex structure. As with        the detection of empirically-valid substructures in student-
string grammars the node and arc types are drawn from           produced argument diagrams [13, 14]. In that work a-priori
finite alphabets. Despite their utility, however, graph gram-   rules were used to represent key discussion features and ar-
mars are very difficult to construct. The data structures       gumentative flaws. Argument diagrams are graphical ar-
required are complex [5]. Moreover, development of suitable     gument representations that reify key features of arguments
graph grammars generally requires considerable domain ex-       such as hypothesis statements, claims, and citations as nodes
pertise. Most existing uses of graph grammars have relied       and the supporting, opposing, and informational relation-
on hand-authored rules.                                         ships as arcs between them.

                                                                A sample diagram collected in that work is shown in Figure
                                                                1 The diagram includes a central research claim node, which
                                                                has a single text field indicating the content of the research
                                                                claim. A set of citation nodes are connected to the claim
                                                                node via a set of supporting, opposing and undefined arcs
                                                                colored with green, red and blue respectively. Each citation
                                                                node contains two fields: one for the citation information,
                                                                and the other for a summary of the cited work; each arc has
                                                                a single text field explaining why the relationship holds. At
      Figure 1: A student-produced LASAD argument diagram representing an introductory argument.


the bottom of the diagram, there is a single isolated hypoth-                                            t
esis node that contains two text fields, one for a conditional
or IF field, and the other for conditional or THEN field. We
expect the induced graph grammars from a set of argument           (P aredW comp)                    O        S
diagrams can be used to evaluate the student thesis work.
                                                                                                 a       ¬c       b
Figure 2 shows an a-priori rule that was defined as part
of that work. This rule is designed to identify a subgraph                            
                                                                                        t.T pye = “claim00 or“hypothesis00 
                                                                                                                           
where a single target node t is connected to two separate                             
                                                                                               a.T ype = “Citation00
                                                                                                                          
citation nodes a and b such that: a is connected to t via an
                                                                                                                          
                                                                                                                   00
opposing path; b is connected via a supporting path; and                                      b.T ype = “Citation         
                                                                                             c.T ype = “Comparison00
                                                                                                                          
there exists no comparison arc between a and b. The rules
                                                                                                                          
in that study were implemented using AGG an augmented
graph grammar library built in Python [12]. AGG matches
                                                                  Figure 2: A simple augmented graph grammar rule
the graphs using recursive stack-based algorithm. The code
                                                                  that detects compared counterarguments. The rule
first matches the ground nodes at the top-level of the class
                                                                  shows a two citation nodes (a, & b) that have oppos-
(t, a, & b). It then tests for the recursive productions O,
                                                                  ing relationships with a shared claim node (t) and do
and S, before finally testing for the negated comparison arc
                                                                  not have a comparison arc (c) drawn between them.
c. This rule does not make use of the full range of potential
                                                                  The arcs S and O represent recursive supporting
capacity for Augmented Graph Grammars. However it is
                                                                  and opposing path.
illustrative of the type of rules we plan to induce here, rules
that generalize beyond basic types and draw on existing pro-
duction classes but not, at least in the immediate term, use
complex textual elements or functional features.
                                                                  algorithm [19]. They are based upon controlled graph walks
                                                                  coupled with indexing. While these algorithms are effective,
3.   GRAMMAR INDUCTION                                            particularly on smaller graphs, with low vertex degree they
Graph and relational data has grown increasingly prevalent        can also overfit simpler graph structures and they do not
and graph analysis algorithms have been applied in a wide         scale well to larger, denser graph data [20].
range of domains from social network analysis [15] to bioin-
formatics [16]. Most of this work falls into one of two cate-     The SUBDUE system takes a greedy-compression approach
gories of algorithms: frequent subgraph matching, and graph       to graph mining. SUBDUE searches for candidate sub-
compression.                                                      graphs that can best compress the input graphs by replacing
                                                                  a candidate subgraph with a single vertex. Then nodes and
A number of algorithms have been developed to discover fre-       arcs are added to the vertices to form new candidate sub-
quent subgraphs. These include the gSpan algorithm devel-         graphs. The process is recursive and relies on the Minimum-
oped by Yan and Han [17]; the AGM algorithm developed by          Description-Length (MDL) principle to evaluate the candi-
Inokuchi et al [18]; and the FSG algorithm developed by Ku-       dates. SUBDUE has been applied successfully to extract
ramochi and Karypis which is based on the previous Apriori        structure from visual programming [5], web search [21], and
analyzing user behaviors in games [22].                          lution space. Therefore it is well suited to our present needs.
                                                                 This flexibility is costly, however, as EC is far more compu-
While these methods are successful they have practical and       tationally expensive than more specialized algorithms, and
theoretical limitations. Both classes of approaches are lim-     applications of EC can require a great deal of tuning for
ited to static graphs composed from a finite alphabet of node    each use. In the subsections below we will describe the fit-
and arc types. The frequent subgraph approaches are based        ness function and the operators that we will use in this work.
upon iterative graph walks and can be computationally ex-        For this work we will rely on pyEC a general purpose evo-
pensive and are limited to finding exact matches. They do        lutionary computation engine that we have developed [26].
not generalize beyond the exact graphs matched nor do they
allow for recursive typing. SUBDUE, by contrast is a greedy      4.2    Dataset
algorithm that finds the single most descriptive grammar         Our initial analysis will be based upon a corpus of expert
and does not allow for weighted matches.                         graded student produced argument diagrams and essays pre-
                                                                 viously described in [13, 14]. That dataset was collected as
For our present purposes, however, our goal is to identify       part of a study on students’ use of argument diagrams for
multiple heirarchical classes of the type shown in Figure 2      writing that was conducted at the University of Pittsburgh
that can: generalize beyond exact node and arc types; can        in 2011. For that study we selected a set of students in an
draw on recursive rule productions; and can be weighted          undergraduate-level course on Psychological Research Meth-
based upon the graph quality. Moreover our long-term goal        ods. As part of the course the students were tasked with
with this work is to explore graph rule induction mechanisms     planning and executing an empirical research study and then
that can be expanded to include textual rules and complex        drafting a written report. The students were permitted to
constraints. For that reason we have elected to apply evo-       work individually or in teams. This report was structured as
lutionary computation. This is a general-purpose machine         a standard empirical workshop paper. Prior to drafting the
learning mechanism that can be tunes to explore a range of       report the students were tasked with diagramming the ar-
possible induction mechanisms.                                   gument that they planned to make using LASAD an online
                                                                 tool for argument diagramming and annotation.
4.    METHODS
                                                                 Subsequent to this data collection process the diagrams and
4.1   Evolutionary Computation                                   essays were graded by an experienced TA using a set of par-
Evolutionary Computation (EC) is a general class of ma-          allel grading rubrics. These rubrics focused on the quality of
chine learning and optimization methods that are inspired        the arguments in the diagrams and essays and were used to
by the process of Darwinian evolution through natural se-        demonstrate that the structure and quality of the diagrams
lection [23] such as Genetic Algorithms [24] or Genetic Pro-     can be used to predict the students’ subsequent essay per-
gramming [25]. EC algorithms begin with a population of          formance. These grades will be used as the weighting metric
randomly generated candidate solutions such as snippets of       for the diagrams and will be correlated with performance as
random code, strings representing a target function, or for-     part of the fitness function we describe below. After comple-
mal rules. Each of these solutions is ranked by a fitness        tion of the data collection, grading, and testing phases and
function that is used to evaluate the quality of the individu-   accounting for student dropout and incomplete assignments
als. These functions can be defined by absolute measures of      we collected 105 graded diagram-essay pairs 74 of which were
success such as a suite of test cases, or by relative measures   authored by teams.
such as a competition between chess-playing systems.
                                                                 4.3    Solution Representation
Once the individuals have been ranked a new generation of        For the purposes of our present experiments we will use a
individuals is produced through a combination of crossover       restricted solution representation that relies on a subset of
and mutation operations. Crossover operations combine two        the augmented graph grammar formalism exemplified by the
or more parents to produce one or more candidate children.       rule shown in Figure 2. This will include only element types
In Genetic Algorithms where the candidate solutions are rep-     and recursive productions. In future work we plan to sup-
resented as strings this can be accomplished by splitting two    port the induction of more complex rules defined by multiple
parents at a given index and then exchanging the substrings      graph classes, novel productions, and expressions. However
to produce novel children. In Genetic Programming the par-       for the present study we will focus on the simple case of
ents exchange blocks of code, functions, or subtrees. Muta-      individual classes coupled with predefined productions.
tion operations alter randomly-selected parts of a candidate
solution by swapping out one symbol or instruction for an-       4.4    Fitness Function
other, adding new sub-solutions, or deleting components.         We plan to use the frequency correlation metric previously
This process of ranking and regeneration will iterate until      employed in [13, 14]. In that study the authors assessed the
a target performance threshold is reached or a maximum           empirical validity of a set of a-priori diagram rules. The
number of generations has passed.                                validity of each individual rule was assessed by testing the
                                                                 correlation between the frequency of the class in the existing
EC methods are highly general algorithms that can be read-       graph and the graph grade. The strength of that correlation
ily adapted to novel domains by selecting an appropriate         was estimated using Spearman’s ρ a non-parametic measure
solution representation and modification operations. Thus,       of correlation [27]. In that work the authors demonstrated
in contrast to more specific methods such as SUBDUE, the         that the a-priori rule frequency was correlated with stu-
EC algorithm allows us to tune the inductive bias of our         dents’ subsequent essay grades and showed that the frequen-
search and to explore alternative ways of traversing the so-     cies could be used to predict students’ future performance.
4.5   Mutation
Our mutation operator will draw on the predefined graph
ontology to make atomic changes to an existing graph class.              B      C      D                  F       G
The change will be one of the following operations:
                                                                         1      ∅      3      A            7      ∅      E
Change Node change an existing node’s type.

Change Arc Change an existing arc’s type or orientation.                        4      5      B                   ∅      F

Delete Node Delete a node and its associated arcs.
                                                                                       ∅      C
Delete Arc Delete an existing arc.

Add Node Add a novel node with a specified type.
                                                                    Figure 3: Canonical matricies for crossover parents.
Add Arc Add an arc between existing nodes or add with
    new nodes.

4.6   Crossover                                                          B      G      D                   F      C
By design the crossover operation should, like genetic crossover,
be conservative. Two very similar parents should produce                 1      ∅      3      E            7      ∅      A
similar offspring. Crossover operations should therefore pre-
serve good building blocks and sub-solutions or introns through
random behavior [25]. Arbitrary graph alignment and crossover                   ∅      5      B                   4      F
is a challenging problem that risks causing unsustainable
changes on each iteration. We therefore treat graph crossover
as a matrix problem.                                                                   ∅      G

For each pair of parent classes we will define a pair of di-
agonal matricies of the type illustrated in Figure 3. The           Figure 4: Canonical matricies for crossover children.
letter indicies on the top and right indicate nodes while the
numerical indicies internally indicate arcs, and the ∅ symbol
indicates that no arc is present. The matricies are gener-          grading and feedback. This work represents an improve-
ated in a canonical order based upon the order in which the         ment over prior graph grammar induction algorithms which
nodes were added to the class. Thus on each iteration of the        are limited to classical graph grammars and greedy extrac-
crossover process the corresponding elements will obtain the        tion. This work also represents an extension for evolution-
same index. As a consequence good subsolutions will obtain          ary computation by shifting it into a new domain. As part
the same location and will tend to be preserved over time.          of this work we also plan to explore additional extensions to
                                                                    the standard evolutionary computation algorithm to address
Once a set of parent matricies has been generated we then           problems of over-fitting such as χ2 reduction.
generate two child matricies of the same size as the parents
and then randomly select the node and arc members. In the
example shown in figures 3 and 4 the parents have nodes             6.   REFERENCES
{A,B,C,D} and {E,F,G} while the children have {E,B,G,D}              [1] John L Pfaltz and Azriel Rosenfeld. Web grammars.
and {A,F,C}. Thus we align the nodes in canonical order                  In Proceedings of the 1st international joint conference
and, for each node pair, we flip a coin to decide where they             on Artificial intelligence, pages 609–619. Morgan
are copied. If one parent is larger than the other than any              Kaufmann Publishers Inc., 1969.
additional nodes, in this case D, will be copied to the larger       [2] John L Pfaltz. Web grammars and picture description.
child. We then perform a comparable exchange process for                 Computer Graphics and Image Processing,
the arcs. Each arc or potential arc is defined uniquely in the           1(2):193–220, 1972.
matricies by its endpoints. We thus align the lists of arcs          [3] Horst Bunke. Attributed programmed graph
in a comparable manner and then decide randomly which                    grammars and their application to schematic diagram
arc, or empty arc, to copy. As with the nodes, extra arcs                interpretation. IEEE Transactions on Pattern
from the larger parent, in this case 3,5, and one ∅ are copied           Analysis and Machine Intelligence, 4(6):574–582, 1982.
directly into the larger of the two children.                        [4] Michihiro Kuramochi and George Karypis. Finding
                                                                         frequent patterns in a large sparse graph*. Data
5.    FUTURE WORK                                                        mining and knowledge discovery, 11(3):243–271, 2005.
In this paper we presented a method for the induction of             [5] Keven Ates, Jacek Kukluk, Lawrence Holder, Diane
augmented graph grammars through evolutionary computa-                   Cook, and Kang Zhang. Graph grammar induction on
tion. We are presently applying this work to the automatic               structural data for visual programming. In Tools with
induction of empirically-valid rules for student-produced ar-            Artificial Intelligence, 2006. ICTAI’06. 18th IEEE
gument diagrams. This work will serve to extend our prior                International Conference on, pages 232–242. IEEE,
efforts on the use of augmented graph grammars for student               2006.
 [6] Francesc Rosselló and Gabriel Valiente. Graph                   CSREA Press, 2008.
     transformation in molecular biology. In Formal              [17] Xifeng Yan and Jiawei Han. gspan: Graph-based
     Methods in Software and Systems Modeling, pages                  substructure pattern mining. In Proceedings of the
     116–133. Springer, 2005.                                         IEEE International Conference on Data Mining
 [7] Luc Dehaspe, Hannu Toivonen, and Ross D King.                    (ICDM 2002), pages 721–724. IEEE, 2002.
     Finding frequent substructures in chemical                  [18] Akihiro Inokuchi, Takashi Washio, and Hiroshi
     compounds. In KDD, volume 98, page 1998, 1998.                   Motoda. An apriori-based algorithm for mining
 [8] Stefan Kramer, Luc De Raedt, and Christoph Helma.                frequent substructures from graph data. In Principles
     Molecular feature mining in hiv data. In Proceedings             of Data Mining and Knowledge Discovery, pages
     of the seventh ACM SIGKDD international conference               13–23. Springer, 2000.
     on Knowledge discovery and data mining, pages               [19] Michihiro Kuramochi and George Karypis. Frequent
     136–143. ACM, 2001.                                              subgraph discovery. In Proceedings IEEE International
 [9] Wenke Lee and Salvatore J Stolfo. A framework for                Conference on Data Mining. (ICDM 2001), pages
     constructing features and models for intrusion                   313–320. IEEE, 2001.
     detection systems. ACM transactions on Information          [20] MICHIHIRO Kuramochi and George Karypis. Finding
     and system security (TiSSEC), 3(4):227–261, 2000.                topological frequent patterns from graph datasets.
[10] Calvin Ko. Logic induction of valid behavior                     Mining Graph Data, pages 117–158, 2006.
     specifications for intrusion detection. In Proceedings of   [21] Nitish Manocha, Diane J Cook, and Lawrence B
     the IEEE Symposium on Security and Privacy. (S&P                 Holder. Cover story: structural web search using a
     2000), pages 142–153. IEEE, 2000.                                graph-based discovery system. Intelligence,
[11] Rakesh Agrawal, Ramakrishnan Srikant, et al. Fast                12(1):20–29, 2001.
     algorithms for mining association rules. In Proceedings     [22] Diane J. Cook, Lawrence B. Holder, and G. Michael
     of the 20th International Conference on very large               Youngblood. Graph-based analysis of human transfer
     data bases, VLDB, volume 1215, pages 487–499, 1994.              learning using a game testbed. IEEE Trans. on
[12] Collin F Lynch. Agg: Augmented graph grammars for                Knowl. and Data Eng., 19:1465–1478, November 2007.
     complex heterogeneous data. In Proceedings of the           [23] Charles Darwin. On the Origin of Species by Means of
     first international workshop on Graph-Based                      Natural Selection, or the Preservation of Favoured
     Educational Data Mining (GEDM 2014).                             Races in the Struggle for Life. John Murray:
[13] Collin F. Lynch and Kevin D. Ashley. Empirically                 Albermarle Street: London, United Kingdom, 6
     valid rules for ill-defined domains. In John Stamper             edition, 1872.
     and Zachary Pardos, editors, Proceedings of The 7th         [24] Melanie Mitchell. An Introduction to Genetic
     International Conference on Educational Data Mining              Algorithms. MIT Press: Cambridge, Massachusetts,
     (EDM 2014). International Educational Datamining                 1999.
     Society IEDMS, 2014.                                        [25] Wolfgang Banzhaf. Genetic programming: an
[14] Collin F. Lynch, Kevin D. Ashley, and Min Chi. Can               introduction on the automatic evolution of computer
     diagrams predict essay grades? In Stefan                         programs and its applications. Morgan Kaufmann
     Trausan-Matu, Kristy Elizabeth Boyer, Martha E.                  Publishers ; Heidelburg : Dpunkt-verlag; San
     Crosby, and Kitty Panourgia, editors, Intelligent                Francisco, California, 1998.
     Tutoring Systems, Lecture Notes in Computer Science,        [26] Collin F. Lynch, Kevin D. Ashley, Niels Pinkwart, and
     pages 260–265. Springer, 2014.                                   Vincent Aleven. Argument graph classification with
[15] Sherry E. Marcus, Melanie Moy, and Thayne Coffman.               genetic programming and c4.5. In Ryan
     Social network analysis. In Diane J. Cook and                    Shaun Joazeiro de Baker, Tiffany Barnes, and
     Lawrence B. Holder, editors, Mining Graph Data,                  Joseph E. Beck, editors, The 1st International
     chapter 17, pages 443–468. John Wiley & Sons, 2006.              Conference on Educational Data Mining, Montreal,
[16] Chang Hun You, Lawrence B. Holder, and Diane J.                  Québec, Canada, June 20-21, 2008. Proceedings, pages
     Cook. Dynamic graph-based relational learning of                 137–146, 2008.
     temporal patterns in biological networks changing over      [27] Wikipedia. Spearman’s rank correlation coefficient —
     time. In Hamid R. Arabnia, Mary Qu Yang, and                     wikipedia, the free encyclopedia, 2013. [Online;
     Jack Y. Yang, editors, BIOCOMP, pages 984–990.                   accessed 27-February-2013].