SlideShare a Scribd company logo
1 of 34
Download to read offline
A Combined Genetic Adaptive Search (GeneAS)
          for Engineering Design



    Kalyanmoy Deb and Mayank Goyal (India)

       Journal of Computer Science and Informatics, 1996
                    volume 26, page 30-45



                          Reviewed by

                      Paskorn Champrasert
                      paskorn@cs.umb.edu
                      http://dssg.cs.umb.edu
Outline
• Introduction
• Genetic Operations
    – Crossover (Binary Crossover, SBX Crossover)
    – Mutation
• GeneAS Algorithms
• Experiment Results
• Conclusion



 October 24, 08         DSSG Group Meeting          2/31
Introduction
• The aim in an engineering design problem is to
  minimize or maximize a design objective and
  satisfy constraints.
• The optimization problem can be expressed in the
  following form:

• The variable
  vector X
  represents a set
  of variables.
                       xi , i = 1, 2, , N
October 24, 08       DSSG Group Meeting          3/31
A Simple Cantilever beam design problem:
• A cantilever beam is a beam that is rigidly supported at
  one end and carries a certain load on the other end.
                      Design possibilities:
                      - Shape (circular or square)
                           binary design variable (0/1)
                      - Size
                        Diameter of circular shape
                        Side of square shape
                           discrete variable
                        because size are not available in any sizes
                      - Length
                           real variable
                        because we can cut beams at any length
                      - Material
                            discrete variable
                         (cast iron, aluminum, steel, brass)
  October 24, 08           DSSG Group Meeting                         4/31
Research Issues
• The optimization problem is involving with different types of
  variables.
  E.g.,
  - For the material variable
    if the steel is represented as 1 and cast iron is represented as 2,
         no intermediate value (e.g., 1.4 ) is allowed.
             binary-coded variable should be used.
  - For the beam length variable (0-100)
    if the length is represented by using 4 bit binary-coded variable
  (0000-1111). The precision of the variable is only 100/16 = 6.25
        no more precise value (e.g., 2.5) is allowed
            real-coded variable should be used.
• Designers must rely on an optimization algorithms which is
  flexible enough to handle a mixed type of variables

 October 24, 08               DSSG Group Meeting                          5/31
GeneAS
• The algorithm restricts its search only to the permissible
  values of the design variables.

• GeneAS uses a combination of binary-coded and real-
  coded GA, depending on the nature of the design
  variables.
     – Variables are coded differently
     – Genetic Operations (crossover and mutation) are performed
       differently for each variable.
        E.g.,
        - Beam length is real-coded variable
             real value crossover and real value mutation are used.
        - Beam diameter is binary-coded variable
            binary value crossover and real value mutation are used.

October 24, 08                DSSG Group Meeting                       6/31
Binary-Coded GA
• In a binary-coded GA, the variables are
  represented in binary strings formed with 1 and 0.
• Variables can be expressed as :
            ( b1b2b3…bn ) , bi is ether 1 or 0
• E.g., 7-bit string representing the diameter in the
  range of (3,130) mm, the precision in the solution
  is 1 mm
    (130-3)/(1111111B-0000000B)
    = 127/127 = 1mm

  October 24, 08        DSSG Group Meeting              7/31
Binary Genetic Operations
                               One-point Crossover
1       0        0      1
                                   1) A single crossover point on both parents
1       1        1      0          string is selected.
                                   2) All data beyond that crossover point in
                 Crossover point
                                   either parent is swapped between the two
1       0        1      0          parent organisms.

1       1        0      1          The resulting organisms are the offspring:



                                   Binary Mutation
1       1        1      0
                                    Each bit of offspring has a probability
1       1        0      0           (mutation rate) to flip (0 1 or 1 0)

October 24, 08                           DSSG Group Meeting                      8/31
Important Property of One-Point Crossover
1) The average of the decoded parameter values is
  the same before and after the crossover
  operation.

  1       0      0   1   9
                                    Average = 11.5
  1       1      1   0 14

  1       0      1   0   10
                                    Average = 11.5
  1       1      0   1   13

October 24, 08                DSSG Group Meeting     9/31
October 24, 08   DSSG Group Meeting   10/31
Important Property of One-Point Crossover
2) Spread factor:
   Spread factor β is defined as the ratio of the spread of
   offspring points to that of the parent points:
                              c1 −c2
                   β=       | p1 −p2 |
                                                                 c1   c2

- Contracting Crossover       β<1                          p1              p2
    The offspring points are enclosed by the parent points.

- Expanding Crossover         β>1                     c1                        c2

    The offspring points enclose the parent points.        p1              p2

- Stationary Crossover       β=1                                c1              c2
     The offspring points are the same as parent points         p1              p2
 October 24, 08               DSSG Group Meeting                            11/31
Spread Factor Property
• Assume parents strings are two strings:
     p1= (a1a2a3…a15)
     p2 = (b1b2b3…b15).
• The crossover point is varied from (0,15)
                     The probability distribution:
                     -- The probability of occurrence of β ≈ 1 is more likely than
                     any other β value.
                         If the parents are closer, the spread of the two likely
                     offspring is also smaller.
                         If the spread of parents is more, the spread of likely
                     offspring is also large.




  October 24, 08                 DSSG Group Meeting                             12/31
Real-Coded GA
• In a real-coded GA, the variables are represented in continuous
  variables.
• Variables can be expressed as :
               X , X is any number in [XL,XU]
               XL is lower bound ,XU is upper bound

• The binary-coded genetic operations cannot be used for real-coded
  variables.

• The genetic operations have to be modified in order to handle real-
  coded variables
  However, the proposed real-coded genetic operations should
  reserve the binary-coded genetic operation properties.


   October 24, 08             DSSG Group Meeting                      13/31
SBX
             Simulated Binary Crossover
• Simulated Binary Crossover (SBX) was proposed in
  1995 by Deb and Agrawal.

• SBX was designed with respect to the one-point
  crossover properties in binary-coded GA.
     – Average Property:
       The average of the decoded parameter values is the same
       before and after the crossover operation.
     – Spread Factor Property:
       The probability of occurrence of spread factor β ≈ 1 is more
       likely than any other β value.


October 24, 08               DSSG Group Meeting                       14/31
SBX – Offspring Value
To reserve the average property, the offspring values
 are calculated as:
  Offspring:                                                  c1   c2

            c1 = x − 1 β(p2 − p1 )
                 ¯ 2                  β<1                p1              p2

            c2 = x + 1 β(p2 − p1 )
                 ¯ 2
                                                   c1                    c2
    By,                               β>1
                   1
          x=
          ¯        2 (p1
                  + p2 )                                p1              p2
          p2 > p1
                                                        c1              c2
      So,
                                       β=1              p1              p2
            c=x
            ¯ ¯
  October 24, 08              DSSG Group Meeting                              15/31
Spread Factor (β) in SBX
• The probability distribution of β in SBX should be similar (e.g.
  same shape) to the probability distribution of β in Binary-coded
  crossover.
• This paper proposed probability                        c(β) = 0.5(n + 1)β n , β ≤ 1
  distribution function as:                                                   1
                                                         c(β) = 0.5(n + 1) β n+2 , β > 1
                                                                  1.6
                                                                  1.4




                                       Probability Distribution
                                                                  1.2
                                                                  1.0                   n=2
                                                                  0.8
                                                                  0.6
                                                                  0.4
                                                                  0.2
                                                                  0.0
                                                                        0   1   2   3    4    5   6     7
                                                                                    β



October 24, 08              DSSG Group Meeting                                                        16/31
A large value of n gives a higher
                              probability for creating ‘near-parent’
contracting                   solutions.
   c(β) = 0.5(n + 1)β n , β ≤ 1



                      expanding
                                            1
                       c(β) = 0.5(n + 1) β n+2 , β > 1




                                                 Mostly, n=2 to 5
October 24, 08              DSSG Group Meeting                    17/31
Spread Factor (β) as a random number
          • β is a random number that follows the proposed
            probability distribution function:
                           1.6
                           1.4
                                                                         To get a β value,
Probability Distribution




                           1.2
                                                                         1) A unified random number u
                                                     n=2
                                                                            is generated [0,1]
                           1.0
                           0.8
                           0.6                                           2) Get β value that makes the
                           0.4
                           0.2
                                                                            area under the curve = u
                           0.0
                                     u
                                 0   1       2   3    4    5   6     7
                                                 β                          Offspring:
                                         β
                                                                                    c1 = x − 1 β(p2 − p1 )
                                                                                         ¯ 2
                                                                                    c2 = x + 1 β(p2 − p1 )
                                                                                         ¯ 2
                    October 24, 08                                 DSSG Group Meeting                   18/31
Real Mutation
• Mutation probability (pm) in (0,1) is applied to each
  variable.
• For each variable
      If a unified random number um in (0,1) < pm
  mutation operator is performed for the variable.
                                                 p: parent
                                                 c: offspring

                         It represent the maximum permissible change
                         in the parent

    ¯
    δ      is a random number. Its probability distribution function is:


October 24, 08                  DSSG Group Meeting                         19/31
¯
     ± is generated the same process as the      β

October 24, 08              DSSG Group Meeting       20/31
Combined GA (GeneAS)
• GeneAS
     – Each variable is coded depending on its nature.
     – The crossover operator and mutation operator have
       to be applied variable by variable.
           • If it is a binary-coded variable, the binary-genetic
             operations are performed
           • If it is a real-coded variable, the real-genetic operations are
             performed.
     – The fitness function and constraint function are
       calculated as normal.


October 24, 08                   DSSG Group Meeting                       21/31
*reproduction = selection mechanism
October 24, 08   DSSG Group Meeting                    22/31
Experiments
• Two different problems are solved using GeneAS.
• Two different problems were solved using different
  traditional optimization algorithms.
      - Lagrange multiplier method
           by Kannan and Kramer 1993
      - Branch and Bound method
             by Sandgren 1988
• GeneAS
      Crossover Probability =0.9
       Mutation Probability =0
      Selection mechanism = ?
      Population size =50
      Max generation =?

October 24, 08         DSSG Group Meeting              23/31
Gear Train Design




October 24, 08        DSSG Group Meeting   24/31
• Since, all the four variables are discrete, each
  variable is coded in six-bit binary string (64
  values), so that variables take values between 12
  and 75.
• Four constraints are added to the objective
  function.




October 24, 08       DSSG Group Meeting           25/31
Result




GeneAS have found much better solutions than the
 previously known optimal solutions.
October 24, 08      DSSG Group Meeting         26/31
Welded Beam Design
• A rectangular beam needs to be welded as a
  cantilever beam to carry a certain load.
• The objective of the design of the welded beam
  is to minimize the overall cost of the fabrication
  which involves the cost of beam material and the
  cost of weld deposit.
• Two different welding configurations can be
  applied.
    (1 is used for four-sided welding and 0 is used
  for two-sided welding) : X1
October 24, 08         DSSG Group Meeting          27/31
• One of the four materials can be used
     – (00-steel, 01-cast iron, 10-aluminum, 11-brass): X2
•   h : X3
•   t : X4
•   b : X5
•   l : X6




October 24, 08            DSSG Group Meeting                 28/31
October 24, 08   DSSG Group Meeting   29/31
Results
 X1          = Four-sided X2 =Steel
 X3          =0.1875 X4 =8.2500 X5 =0.2500 X6 =1.6849

 g1(x)       =380.1660
 g2(x)       =402.0473
 g3(x)       = 0.2346
 g4(x)       = 0.1621

     F(x) =1.9622




October 24, 08             DSSG Group Meeting           30/31
Conclusions
• This paper presents a proposed genetic
  algorithms for engineering optimization
  problems.
• The type variable can be different.
• SBX and real-mutation is proposed.
• The results show that GeneAS can find very
  good optimal solutions.



October 24, 08      DSSG Group Meeting         31/31
Discrete Variables




October 24, 08         DSSG Group Meeting   32/31
SBX




October 24, 08   DSSG Group Meeting   33/31
BLX-α
    • Blend Crossover (BLX-α) was proposed by Eshelman and
      Schaffer (1993)
    • BLX-α operator is used for real-parameter GAs.
    • α represents a constant. (0,1)
    • For two parents x1 and x2 (assume x1 < x2)
    • BLX-α randomly picks a solution in the range
      [x1- α(x2-x1) , x2+ α(x2-x1) ]
                                                 Possible offspring

                              x1       x2
                      α(x2-x1)           α(x2-x1)

    • The investigators have reported that BLX-0.5 (α=0.5)
    performs better than BLX operators with other α value.

October 24, 08              DSSG Group Meeting                        34/31

More Related Content

What's hot

08 decrease and conquer spring 15
08 decrease and conquer spring 1508 decrease and conquer spring 15
08 decrease and conquer spring 15Hira Gul
 
A Short Introduction to Generative Adversarial Networks
A Short Introduction to Generative Adversarial NetworksA Short Introduction to Generative Adversarial Networks
A Short Introduction to Generative Adversarial NetworksJong Wook Kim
 
Newton's Backward Interpolation Formula with Example
Newton's Backward Interpolation Formula with ExampleNewton's Backward Interpolation Formula with Example
Newton's Backward Interpolation Formula with ExampleMuhammadUsmanIkram2
 
Newton's forward difference
Newton's forward differenceNewton's forward difference
Newton's forward differenceRaj Parekh
 
IVR - Chapter 7 - Patch models and dictionary learning
IVR - Chapter 7 - Patch models and dictionary learningIVR - Chapter 7 - Patch models and dictionary learning
IVR - Chapter 7 - Patch models and dictionary learningCharles Deledalle
 
Artificial Neural Network Lect4 : Single Layer Perceptron Classifiers
Artificial Neural Network Lect4 : Single Layer Perceptron ClassifiersArtificial Neural Network Lect4 : Single Layer Perceptron Classifiers
Artificial Neural Network Lect4 : Single Layer Perceptron ClassifiersMohammed Bennamoun
 
Batch normalization presentation
Batch normalization presentationBatch normalization presentation
Batch normalization presentationOwin Will
 
Lesson 27: Lagrange Multipliers I
Lesson 27: Lagrange Multipliers ILesson 27: Lagrange Multipliers I
Lesson 27: Lagrange Multipliers IMatthew Leingang
 
Machine learning Lecture 3
Machine learning Lecture 3Machine learning Lecture 3
Machine learning Lecture 3Srinivasan R
 
Circular Convolution
Circular ConvolutionCircular Convolution
Circular ConvolutionSarang Joshi
 
Newton Forward Difference Interpolation Method
Newton Forward Difference Interpolation MethodNewton Forward Difference Interpolation Method
Newton Forward Difference Interpolation MethodAdeel Rasheed
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSOMohamed Talaat
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier TransformAbhishek Choksi
 
Propositional And First-Order Logic
Propositional And First-Order LogicPropositional And First-Order Logic
Propositional And First-Order Logicankush_kumar
 

What's hot (20)

08 decrease and conquer spring 15
08 decrease and conquer spring 1508 decrease and conquer spring 15
08 decrease and conquer spring 15
 
A Short Introduction to Generative Adversarial Networks
A Short Introduction to Generative Adversarial NetworksA Short Introduction to Generative Adversarial Networks
A Short Introduction to Generative Adversarial Networks
 
Newton's Backward Interpolation Formula with Example
Newton's Backward Interpolation Formula with ExampleNewton's Backward Interpolation Formula with Example
Newton's Backward Interpolation Formula with Example
 
Newton's forward difference
Newton's forward differenceNewton's forward difference
Newton's forward difference
 
IVR - Chapter 7 - Patch models and dictionary learning
IVR - Chapter 7 - Patch models and dictionary learningIVR - Chapter 7 - Patch models and dictionary learning
IVR - Chapter 7 - Patch models and dictionary learning
 
Practical Swarm Optimization (PSO)
Practical Swarm Optimization (PSO)Practical Swarm Optimization (PSO)
Practical Swarm Optimization (PSO)
 
Artificial Neural Network Lect4 : Single Layer Perceptron Classifiers
Artificial Neural Network Lect4 : Single Layer Perceptron ClassifiersArtificial Neural Network Lect4 : Single Layer Perceptron Classifiers
Artificial Neural Network Lect4 : Single Layer Perceptron Classifiers
 
Batch normalization presentation
Batch normalization presentationBatch normalization presentation
Batch normalization presentation
 
Lesson 27: Lagrange Multipliers I
Lesson 27: Lagrange Multipliers ILesson 27: Lagrange Multipliers I
Lesson 27: Lagrange Multipliers I
 
Machine learning Lecture 3
Machine learning Lecture 3Machine learning Lecture 3
Machine learning Lecture 3
 
Neural ODE
Neural ODENeural ODE
Neural ODE
 
Circular Convolution
Circular ConvolutionCircular Convolution
Circular Convolution
 
Newton Forward Difference Interpolation Method
Newton Forward Difference Interpolation MethodNewton Forward Difference Interpolation Method
Newton Forward Difference Interpolation Method
 
N queen problem
N queen problemN queen problem
N queen problem
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
 
RM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lectureRM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lecture
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier Transform
 
Value iteration networks
Value iteration networksValue iteration networks
Value iteration networks
 
Propositional And First-Order Logic
Propositional And First-Order LogicPropositional And First-Order Logic
Propositional And First-Order Logic
 

Similar to Simulated Binary Crossover

Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...Masahiro Kanazaki
 
PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...Jinwon Lee
 
Condition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating EquipmentCondition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating EquipmentJordan McBain
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductorswtyru1989
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...gueste63bd9
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...ganuraga
 
28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpadMedia4math
 
Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...Till Blume
 
On recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEKOn recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEKedadk
 
Lecture6
Lecture6Lecture6
Lecture6voracle
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative RecommendersOn the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative RecommendersJérôme KUNEGIS
 
GRUPO 5 : novel fuzzy logic based edge detection technique
GRUPO 5 :  novel fuzzy logic based edge detection techniqueGRUPO 5 :  novel fuzzy logic based edge detection technique
GRUPO 5 : novel fuzzy logic based edge detection techniqueviisonartificial2012
 
study Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processingstudy Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video ProcessingChiamin Hsu
 
Attention is All You Need (Transformer)
Attention is All You Need (Transformer)Attention is All You Need (Transformer)
Attention is All You Need (Transformer)Jeong-Gwan Lee
 
Applied Deep Learning 11/03 Convolutional Neural Networks
Applied Deep Learning 11/03 Convolutional Neural NetworksApplied Deep Learning 11/03 Convolutional Neural Networks
Applied Deep Learning 11/03 Convolutional Neural NetworksMark Chang
 

Similar to Simulated Binary Crossover (20)

Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
 
PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...
 
Condition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating EquipmentCondition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating Equipment
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductors
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
 
28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad
 
Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...
 
From FVS to F-Deletion
From FVS to F-DeletionFrom FVS to F-Deletion
From FVS to F-Deletion
 
On recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEKOn recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEK
 
Lecture6
Lecture6Lecture6
Lecture6
 
R02410651069
R02410651069R02410651069
R02410651069
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative RecommendersOn the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
 
GRUPO 5 : novel fuzzy logic based edge detection technique
GRUPO 5 :  novel fuzzy logic based edge detection techniqueGRUPO 5 :  novel fuzzy logic based edge detection technique
GRUPO 5 : novel fuzzy logic based edge detection technique
 
study Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processingstudy Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processing
 
Attention is All You Need (Transformer)
Attention is All You Need (Transformer)Attention is All You Need (Transformer)
Attention is All You Need (Transformer)
 
Applied Deep Learning 11/03 Convolutional Neural Networks
Applied Deep Learning 11/03 Convolutional Neural NetworksApplied Deep Learning 11/03 Convolutional Neural Networks
Applied Deep Learning 11/03 Convolutional Neural Networks
 

Recently uploaded

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 

Recently uploaded (20)

Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

Simulated Binary Crossover

  • 1. A Combined Genetic Adaptive Search (GeneAS) for Engineering Design Kalyanmoy Deb and Mayank Goyal (India) Journal of Computer Science and Informatics, 1996 volume 26, page 30-45 Reviewed by Paskorn Champrasert paskorn@cs.umb.edu http://dssg.cs.umb.edu
  • 2. Outline • Introduction • Genetic Operations – Crossover (Binary Crossover, SBX Crossover) – Mutation • GeneAS Algorithms • Experiment Results • Conclusion October 24, 08 DSSG Group Meeting 2/31
  • 3. Introduction • The aim in an engineering design problem is to minimize or maximize a design objective and satisfy constraints. • The optimization problem can be expressed in the following form: • The variable vector X represents a set of variables. xi , i = 1, 2, , N October 24, 08 DSSG Group Meeting 3/31
  • 4. A Simple Cantilever beam design problem: • A cantilever beam is a beam that is rigidly supported at one end and carries a certain load on the other end. Design possibilities: - Shape (circular or square) binary design variable (0/1) - Size Diameter of circular shape Side of square shape discrete variable because size are not available in any sizes - Length real variable because we can cut beams at any length - Material discrete variable (cast iron, aluminum, steel, brass) October 24, 08 DSSG Group Meeting 4/31
  • 5. Research Issues • The optimization problem is involving with different types of variables. E.g., - For the material variable if the steel is represented as 1 and cast iron is represented as 2, no intermediate value (e.g., 1.4 ) is allowed. binary-coded variable should be used. - For the beam length variable (0-100) if the length is represented by using 4 bit binary-coded variable (0000-1111). The precision of the variable is only 100/16 = 6.25 no more precise value (e.g., 2.5) is allowed real-coded variable should be used. • Designers must rely on an optimization algorithms which is flexible enough to handle a mixed type of variables October 24, 08 DSSG Group Meeting 5/31
  • 6. GeneAS • The algorithm restricts its search only to the permissible values of the design variables. • GeneAS uses a combination of binary-coded and real- coded GA, depending on the nature of the design variables. – Variables are coded differently – Genetic Operations (crossover and mutation) are performed differently for each variable. E.g., - Beam length is real-coded variable real value crossover and real value mutation are used. - Beam diameter is binary-coded variable binary value crossover and real value mutation are used. October 24, 08 DSSG Group Meeting 6/31
  • 7. Binary-Coded GA • In a binary-coded GA, the variables are represented in binary strings formed with 1 and 0. • Variables can be expressed as : ( b1b2b3…bn ) , bi is ether 1 or 0 • E.g., 7-bit string representing the diameter in the range of (3,130) mm, the precision in the solution is 1 mm (130-3)/(1111111B-0000000B) = 127/127 = 1mm October 24, 08 DSSG Group Meeting 7/31
  • 8. Binary Genetic Operations One-point Crossover 1 0 0 1 1) A single crossover point on both parents 1 1 1 0 string is selected. 2) All data beyond that crossover point in Crossover point either parent is swapped between the two 1 0 1 0 parent organisms. 1 1 0 1 The resulting organisms are the offspring: Binary Mutation 1 1 1 0 Each bit of offspring has a probability 1 1 0 0 (mutation rate) to flip (0 1 or 1 0) October 24, 08 DSSG Group Meeting 8/31
  • 9. Important Property of One-Point Crossover 1) The average of the decoded parameter values is the same before and after the crossover operation. 1 0 0 1 9 Average = 11.5 1 1 1 0 14 1 0 1 0 10 Average = 11.5 1 1 0 1 13 October 24, 08 DSSG Group Meeting 9/31
  • 10. October 24, 08 DSSG Group Meeting 10/31
  • 11. Important Property of One-Point Crossover 2) Spread factor: Spread factor β is defined as the ratio of the spread of offspring points to that of the parent points: c1 −c2 β= | p1 −p2 | c1 c2 - Contracting Crossover β<1 p1 p2 The offspring points are enclosed by the parent points. - Expanding Crossover β>1 c1 c2 The offspring points enclose the parent points. p1 p2 - Stationary Crossover β=1 c1 c2 The offspring points are the same as parent points p1 p2 October 24, 08 DSSG Group Meeting 11/31
  • 12. Spread Factor Property • Assume parents strings are two strings: p1= (a1a2a3…a15) p2 = (b1b2b3…b15). • The crossover point is varied from (0,15) The probability distribution: -- The probability of occurrence of β ≈ 1 is more likely than any other β value. If the parents are closer, the spread of the two likely offspring is also smaller. If the spread of parents is more, the spread of likely offspring is also large. October 24, 08 DSSG Group Meeting 12/31
  • 13. Real-Coded GA • In a real-coded GA, the variables are represented in continuous variables. • Variables can be expressed as : X , X is any number in [XL,XU] XL is lower bound ,XU is upper bound • The binary-coded genetic operations cannot be used for real-coded variables. • The genetic operations have to be modified in order to handle real- coded variables However, the proposed real-coded genetic operations should reserve the binary-coded genetic operation properties. October 24, 08 DSSG Group Meeting 13/31
  • 14. SBX Simulated Binary Crossover • Simulated Binary Crossover (SBX) was proposed in 1995 by Deb and Agrawal. • SBX was designed with respect to the one-point crossover properties in binary-coded GA. – Average Property: The average of the decoded parameter values is the same before and after the crossover operation. – Spread Factor Property: The probability of occurrence of spread factor β ≈ 1 is more likely than any other β value. October 24, 08 DSSG Group Meeting 14/31
  • 15. SBX – Offspring Value To reserve the average property, the offspring values are calculated as: Offspring: c1 c2 c1 = x − 1 β(p2 − p1 ) ¯ 2 β<1 p1 p2 c2 = x + 1 β(p2 − p1 ) ¯ 2 c1 c2 By, β>1 1 x= ¯ 2 (p1 + p2 ) p1 p2 p2 > p1 c1 c2 So, β=1 p1 p2 c=x ¯ ¯ October 24, 08 DSSG Group Meeting 15/31
  • 16. Spread Factor (β) in SBX • The probability distribution of β in SBX should be similar (e.g. same shape) to the probability distribution of β in Binary-coded crossover. • This paper proposed probability c(β) = 0.5(n + 1)β n , β ≤ 1 distribution function as: 1 c(β) = 0.5(n + 1) β n+2 , β > 1 1.6 1.4 Probability Distribution 1.2 1.0 n=2 0.8 0.6 0.4 0.2 0.0 0 1 2 3 4 5 6 7 β October 24, 08 DSSG Group Meeting 16/31
  • 17. A large value of n gives a higher probability for creating ‘near-parent’ contracting solutions. c(β) = 0.5(n + 1)β n , β ≤ 1 expanding 1 c(β) = 0.5(n + 1) β n+2 , β > 1 Mostly, n=2 to 5 October 24, 08 DSSG Group Meeting 17/31
  • 18. Spread Factor (β) as a random number • β is a random number that follows the proposed probability distribution function: 1.6 1.4 To get a β value, Probability Distribution 1.2 1) A unified random number u n=2 is generated [0,1] 1.0 0.8 0.6 2) Get β value that makes the 0.4 0.2 area under the curve = u 0.0 u 0 1 2 3 4 5 6 7 β Offspring: β c1 = x − 1 β(p2 − p1 ) ¯ 2 c2 = x + 1 β(p2 − p1 ) ¯ 2 October 24, 08 DSSG Group Meeting 18/31
  • 19. Real Mutation • Mutation probability (pm) in (0,1) is applied to each variable. • For each variable If a unified random number um in (0,1) < pm mutation operator is performed for the variable. p: parent c: offspring It represent the maximum permissible change in the parent ¯ δ is a random number. Its probability distribution function is: October 24, 08 DSSG Group Meeting 19/31
  • 20. ¯ ± is generated the same process as the β October 24, 08 DSSG Group Meeting 20/31
  • 21. Combined GA (GeneAS) • GeneAS – Each variable is coded depending on its nature. – The crossover operator and mutation operator have to be applied variable by variable. • If it is a binary-coded variable, the binary-genetic operations are performed • If it is a real-coded variable, the real-genetic operations are performed. – The fitness function and constraint function are calculated as normal. October 24, 08 DSSG Group Meeting 21/31
  • 22. *reproduction = selection mechanism October 24, 08 DSSG Group Meeting 22/31
  • 23. Experiments • Two different problems are solved using GeneAS. • Two different problems were solved using different traditional optimization algorithms. - Lagrange multiplier method by Kannan and Kramer 1993 - Branch and Bound method by Sandgren 1988 • GeneAS Crossover Probability =0.9 Mutation Probability =0 Selection mechanism = ? Population size =50 Max generation =? October 24, 08 DSSG Group Meeting 23/31
  • 24. Gear Train Design October 24, 08 DSSG Group Meeting 24/31
  • 25. • Since, all the four variables are discrete, each variable is coded in six-bit binary string (64 values), so that variables take values between 12 and 75. • Four constraints are added to the objective function. October 24, 08 DSSG Group Meeting 25/31
  • 26. Result GeneAS have found much better solutions than the previously known optimal solutions. October 24, 08 DSSG Group Meeting 26/31
  • 27. Welded Beam Design • A rectangular beam needs to be welded as a cantilever beam to carry a certain load. • The objective of the design of the welded beam is to minimize the overall cost of the fabrication which involves the cost of beam material and the cost of weld deposit. • Two different welding configurations can be applied. (1 is used for four-sided welding and 0 is used for two-sided welding) : X1 October 24, 08 DSSG Group Meeting 27/31
  • 28. • One of the four materials can be used – (00-steel, 01-cast iron, 10-aluminum, 11-brass): X2 • h : X3 • t : X4 • b : X5 • l : X6 October 24, 08 DSSG Group Meeting 28/31
  • 29. October 24, 08 DSSG Group Meeting 29/31
  • 30. Results X1 = Four-sided X2 =Steel X3 =0.1875 X4 =8.2500 X5 =0.2500 X6 =1.6849 g1(x) =380.1660 g2(x) =402.0473 g3(x) = 0.2346 g4(x) = 0.1621 F(x) =1.9622 October 24, 08 DSSG Group Meeting 30/31
  • 31. Conclusions • This paper presents a proposed genetic algorithms for engineering optimization problems. • The type variable can be different. • SBX and real-mutation is proposed. • The results show that GeneAS can find very good optimal solutions. October 24, 08 DSSG Group Meeting 31/31
  • 32. Discrete Variables October 24, 08 DSSG Group Meeting 32/31
  • 33. SBX October 24, 08 DSSG Group Meeting 33/31
  • 34. BLX-α • Blend Crossover (BLX-α) was proposed by Eshelman and Schaffer (1993) • BLX-α operator is used for real-parameter GAs. • α represents a constant. (0,1) • For two parents x1 and x2 (assume x1 < x2) • BLX-α randomly picks a solution in the range [x1- α(x2-x1) , x2+ α(x2-x1) ] Possible offspring x1 x2 α(x2-x1) α(x2-x1) • The investigators have reported that BLX-0.5 (α=0.5) performs better than BLX operators with other α value. October 24, 08 DSSG Group Meeting 34/31