SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
DOI : 10.5121/ijcnc.2015.7405 75
A GENETIC ALGORITHM TO SOLVE THE
MINIMUM-COST PATHS TREE PROBLEM
Ahmed Y. Hamed1
and M. R. Hassan2
1
College of Applied Studies and Community Services, University of Dammam,
KSA.
2
Computer Science Branch, Mathematics Department, Faculty of Science, Aswan
University, Egypt.
ABSTRACT
One of the important steps in routing is to find a feasible path based on the state information. In order to
support real-time multimedia applications, the feasible path that satisfies one or more constraints has to be
computed within a very short time. Therefore, the paper presents a genetic algorithm to solve the paths tree
problem subject to cost constraints. The objective of the algorithm is to find the set of edges connecting all
nodes such that the sum of the edge costs from the source (root) to each node is minimized. I.e. the path
from the root to each node must be a minimum cost path connecting them. The algorithm has been applied
on two sample networks, the first network with eight nodes, and the last one with eleven nodes to illustrate
its efficiency.
KEYWORDS
Computer networks; Minimum-cost paths tree; Genetic algorithms.
1. INTRODUCTION
The shortest paths tree rooted at vertex s is a spanning tree T of G, such that the path distance
from root v to any other vertex u in T is the shortest path distance from v to u in G,[1]. In the case
of single link failure, [2], proposed an algorithm to solve the optimal shortest paths tree. When
considering multicast tree, [3], the authors presented an algorithm to find the Shortest Best Path
Tree (SBPT). Based on labeling techniques, Ziliaskopoulos et al. in [4], proposed an algorithm to
solve the shortest path trees. Also, The shortest paths tree problem has been solved by an efficient
modified continued pulse coupled neural network (MCPCNN) model, [5].
Heuristic and approximate algorithms for multi-constrained routing (MCR) are not effective in
dynamic network environment for real-time applications when the state information of the
network is out of date, [6]. The authors in [6] presented a genetic algorithm to solve the MCR
problem subject to transmission delay and transmission success ratio. Younes in [7] proposed a
genetic algorithm to determine the k shortest paths with bandwidth constraints from a single
source node to multiple destinations nodes. Liu et al. in [8] presented an oriented spanning tree
(OST) based genetic algorithm (GA) for solving both the multi-criteria shortest path problem
(MSPP) and the multi-criteria constrained shortest path problems (MCSPP). Also, in [9] the
genetic algorithm is used to find the low-cost multicasting tree with bandwidth and delay
constraints.
The paper presents a genetic algorithm to solve the paths tree problem under cost constraint. The
algorithm reads the connection matrix and the cost matrix of a given network. Also, given the
source (root) node s, then the genetic operations are executed to search the minimum cost paths
that construct the minimum cost paths tree rooted at the source node s.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
76
The rest of the paper is organized as follows: Section 2 presents notations. The problem
description in section 3. The proposed GA and its components are given in section 4. Section 5
provides the pseudo code of the entire GA. Section 6 shows the illustrative examples. Finally,
section 7 presents conclusions.
2. Notations
G
N
E
eij
ce
M
CM
np
Ts
A network graph.
The number of nodes in G.
The number of edges in G.
An edge between node i and node j in G.
The cost of an edge e.
The connection matrix of the given network.
The cost matrix of the given network.
The number of paths from node s to t
The shortest path rooted at node s
3. THE PROBLEM DESCRIPTION
Given a specified vertex s. Let Pi
(s, t) be a path number i from s to t. Let Ci
(P(s, t)) be the cost of the
path Pi
(s, t), i = 1,2, …, np. The path Pk
(s, t) has a minimum cost among all the (s, t)-paths if:
Where
Therefore, the minimum-cost paths tree Ts is the collection of minimum cost paths from the
source (root) node s to the destination nodes ti. I.e.
The presented method in this paper depend on reading both the connection and cost matrices of a
given network, and then find the minimum-cost paths tree rooted at the source node.
Consider the following network with five nodes, shown in Figure 1.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
77
Figure 1. Five nodes network.
The connection matrix (a square matrix of dimension N x N that represents a connection between
each node-pairs) of the Figure 1 network is:
Figure 2. The connection matrix of network in Figure 1
The cost matrix CM for the network shown in Figure 1 is in the following form:
Figure 3. The cost matrix network in Figure 1.
In Figure 4, we show that the minimum-cost paths tree rooted at node 1 with the minimum cost
equals to 23.
Figure 4. Minimum-cost paths tree rooted at node 1
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
78
4. THE PROPOSED GENETIC ALGORITHM (GA)
In the proposed GA, each candidate path is represented by a binary string with length N that can
be used as a chromosome. Each element of the chromosome represents a node in the network
topology. So, for a network of N nodes, there are N string components in each candidate solution
x. Each chromosome must contain at least two none zero elements.
For example if N = 8, the path of Figure 5 is represented as a chromosome as shown in Figure 6.
Figure
Figure 5. A candidate Path.
1 2 3 4 5 6 7 8
1 0 1 1 0 0 0 1
Figure 6. The chromosome corresponding to the path given in Figure 2.
In the following subsections we give an explanation of different components (operations) of the
presented genetic algorithm.
4.1. Initial Population
The generated chromosome in initial population must contain at least two none zero elements to
be a real candidate path. The following steps show how to generate pop_size chromosomes of the
initial population:
1. Randomly generate a chromosome x.
2. Check if x represents a real candidate path, i.e. contains at least two non zero elements.
3. Repeat steps 1 to 2 to generate pop_size chromosomes.
4.2. The objective function
The cost of the candidate path is used as objective function to compare the solutions and find the
best one. The cost of the candidate path is calculated when it satisfies the following conditions:
The chromosome must contain at least two none zero elements.
The chromosome contains a connected candidate path. I.e. each node in the path connects
at least one another.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
79
4.3. Genetic Crossover Operation
In the proposed GA, we use the single cut point crossover to breed a new offspring from two
parents. The crossover operation will be performed if the crossover ratio (Pc=0.90) is verified.
The cut point is randomly selected. Figure 7 shows the crossover operation.
Cut point
Parent 1 1 1 0 1 1 0 0
Child 1 1 1 0 1 1 0 1
Parent 1 0 1 0 0 1 0 1
Figure 7. Example of the crossover operation.
4.4. Genetic Mutation Operation
The mutation operation is performed on bit-by-bit basis. In the proposed approach, the mutation
operation will be performed if the mutation ratio (Pm) is verified. The Pm in this approach is
chosen experimentally to be 0.02. The point to be mutated is selected randomly. The offspring
generated by mutation is shown in Figure 8.
1 0 1 1 0 0 0 1
1 1 1 0 0 0 0 0
Figure 8. An example of the mutation operation.
5. THE ENTIRE ALGORITHM
The following pseudocode illustrates the use of our different components of the GA algorithm to
generate the minimum-cost paths tree of a given network.
Algorithm Find minimum-cost paths tree
Input : Set the parameters: pop_size, max_gen, Pm, Pc.
Output : Minimum-cost paths tree
1. Set j = 2, the destination node.
2. Generate the initial population according to the steps in Section 0.
3. gen←1.
4. While (gen < = max_gen) do {
5. P ← 1
6. While (P <= pop_size) do {
7. Apply Genetic operations to obtain new population
7.1. Apply crossover according to Pc parameter (Pc >=0.90) as described in section 4.3.
7.2. Apply Mutation as shown in section 4.4.
7.3. Compute the total cost of the candidate path according to Section 3.
8. P ← P+1.
9. }
10. Set gen =gen + 1
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
80
11. if gen > max_gen then stop
12. }
13. Save the candidate path for the destination j that has the minimum cost (the shortest path
between the root node and the destination node j).
14. Set j = j + 1
15. If j <= N Goto Step 2, otherwise stop the entire algorithm and print out the minimum-cost
paths tree.
5. EXPERIMENTAL RESULTS
The proposed algorithm is implemented using Borland C++ Ver. 5.5 and the initial values of the
parameters are: population size (pop-size=20), maximum generation (max_gen=50), Pc=0.90,
and Pm=0.02. The technique reads both the connection and cost matrices of the given network.
Then it generates the shortest paths tree of the network that posses the minimum cost. Two
Examples are used to test and validate the proposed technique.
5.1 Eight nodes example
In this section, we illustrate the results of applying the presented GA on an eight nodes
network example, as shown in Figure 9. The final output o the GA is shown in Table 1.
Figure 10 shows the shortest paths tree rooted at node 1.
Figure 9. Eight nodes network.
Table 1: The final output of the GA.
The chromosome The shortest paths set The cost
(1 1 0 0 0 0 0 0) {1, 2} 6
(1 0 1 0 0 0 0 0) {1, 3} 5
(1 0 1 1 0 0 0 0) {1, 3, 4} 9
(1 0 0 0 1 0 0 0) {1, 5} 4
(1 0 0 0 0 1 0 0) {1, 6} 6
(1 0 0 0 0 1 1 0) {1, 6, 7} 10
(1 0 1 1 0 0 0 1) {1, 3, 4, 8} 13
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
81
Figure 10: The shortest paths tree
6.2. Eleven nodes example
In this section, the GA is applied on eleven nodes example as shown in Figure 11. The final
output of the GA is shown in Table 2. Figure 12 shows the minimum-cost paths tree rooted at
node 1.
Figure 11: Eleven nodes network.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
82
Table 2. The final output of the GA.
The chromosome The shortest paths set The cost
(1 1 0 0 0 0 0 0 0 0 0) {1, 2} 8
(1 0 1 0 0 0 0 0 0 0 1) {1, 11, 3} 8
(1 0 1 1 0 0 0 0 0 0 1) {1, 11, 3, 4} 17
(1 1 0 0 1 0 0 0 0 0 0) {1, 2, 5} 10
(1 0 0 0 0 1 1 0 0 0 0) {1, 7, 6} 17
(1 0 0 0 0 1 0 0 0 0 0) {1, 7} 9
(1 0 0 0 0 0 0 1 1 0 0) {1, 9, 8} 9
(1 0 0 0 0 0 0 0 1 0 0) {1, 9} 6
(1 0 0 0 0 0 0 0 0 1 1) {1, 11, 10} 11
(1 0 0 0 0 0 0 0 0 0 1) {1, 11} 3
Figure 12: The minimum-cost paths tree rooted at node 1.
6.3. Sixteen nodes example
Also, the GA is applied on sixteen nodes example as shown in Figure 13. The final output of the
GA is shown in Table 3. Figure 14 shows the minimum-cost paths tree rooted at node 1.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
83
Figure 13: Sixteen nodes network
Table 3. The final output of the GA.
The chromosome The shortest paths set
The
cost
(1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0) {1, 3, 2} 11
(1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0) {1, 3} 3
(1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0) {1, 4} 7
(1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0) {1, 3, 2, 5} 14
(1 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0) (1, 3, 7, 6} 21
(1 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0) (1, 3, 7} 13
(1 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0) (1, 3,7, 8} 30
(1 0 1 0 0 0 1 0 1 1 0 0 0 0 0 0 ) (1, 3, 7, 10, 9} 28
(1 1 1 0 1 0 0 0 0 1 0 0 0 0 0 0 ) (1, 3, 7, 10} 22
(1 0 0 1 0 0 1 1 0 0 1 0 0 0 0 0 ) (1, 3, 7, 11} 15
(1 0 1 0 0 0 1 0 0 0 1 1 0 0 0 0) (1, 3, 7, 11, 12} 18
(1 0 1 0 0 0 1 0 0 0 1 1 1 0 0 ) (1, 3, 7, 11, 14, 13} 26
(1 0 1 0 0 0 0 0 0 0 1 1 0 1 1 0 ) (1, 3, 11, 12, 15, 14} 31
(1 0 1 0 0 0 1 0 0 0 1 0 0 1 1 0 ) (1, 3, 7, 11, 14, 15} 24
(1 0 1 0 0 0 1 0 0 0 1 0 0 1 0 1 ) (1, 3, 7, 11, 14, 16} 28
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
84
Figure 14: The minimum-cost paths tree rooted at node 1.
7. CONCLUSIONS
The paper addressed the minimum-cost paths tree problem and presented an efficient GA to solve
this problem. The algorithm reads both the connection and cost matrices of a given network, then
search the minimum-cost paths that construct the minimum-cost paths tree rooted at a given node
s. The GA has been applied on two examples, the results proved that the efficiency of the
proposed GA. For the future work, the GA can be extended to solve multi-constrained paths tree
problem.
References
[1] Pierre Hansen and Maolin Zheng, “Shortest shortest path trees of a network”, Discrete Applied
Mathematics, Vol. 65, Issues 1–3, March 1996, pp.275–284.
[2] Yueping Li, Zhe Nie and Xiaohong Zhou, “Finding the Optimal Shortest Path Tree with Respect to
Single Link Failure Recovery”, Fourth International Conference on Networked Computing and
Advanced Information Management, 2008, NCM '08, Vol. 1, pp. 412 – 415.
[3] Hiroshi Fujinoki and Kenneth J. Christensen, “The New Shortest Best Path Tree (SBPT) Algorithm
for Dynamic Multicast Trees”, Conference onLocal Computer Networks, 1999. LCN '99. pp. 201-
211.
[4] Athanasios K. Ziliaskopoulos, Fotios D. Mandanas, and Hani S. Mahmassani,”An extension of
labeling techniques for finding shortest path trees”, European Journal of Operational Research, Vol.
198 (2009), pp. 63–72.
[5] Hong Qua, Simon X. Yang, Zhang Yi, and Xiaobin Wanga, “A novel neural network method for
shortest path tree computation”, Applied Soft Computing, Vol. 12 (2012), pp. 3246–3259.
[6] Ting Lu and Jie Zhu, “A genetic algorithm for finding a path subject to two constraints”, Applied Soft
Computing, Vol. 13, Issue 2, February 2013, pp. 891-898.
[7] A. Younes , “A genetic algorithm for finding the k shortest paths in a network”, Egyptian Informatics
Journal, Vol. 11, Issue 2, December 2010, pp. 75-79.
[8 Linzhong Liu, Haibo Mu, Xinfeng Yang, Ruichun He, and Yinzhen LiAn, “oriented spanning tree
based genetic algorithm for multi-criteria shortest path problems”, Applied Soft Computing, Vol. 12,
Issue 1, January 2012, pp. 506-515.
[9] A. Younes, “Multicast routing with bandwidth and delay constraints based on genetic algorithms”,
Egyptian Informatics Journal, Vol. 12, Issue 2, July 2011, pp. 107-114.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
85
AUTHORS
Ahmed Younes Hamed received his PhD degree in Sept. 1996 from South Valley
University, Egypt. His research interests include Artificial Intelligence and genetic
algorithms; specifically in the area of computer networks. Recently, he has started conducting
a research in the area of Image Processing. Currently, he works as an Associate Professor in
University of Dammam, KSA. Younes always publishes the outcome of his research in
international journals and conferences.
Moatamad Hassan holds a PhD of Computer Science in June 2006 from Aswan University,
Faculty of Science, Aswan, Egypt. He is currently an assistant professor at the Department of
Mathematics, Computer Science Branch, Faculty of Science, Aswan University, Aswan,
Egypt. His work deals with QoS, Reliability, and Computer Network Design problems.

More Related Content

What's hot

MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
ijcseit
 
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
IJCI JOURNAL
 
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree MultiplierDesign of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Waqas Tariq
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
Zac Darcy
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
IJERA Editor
 
A Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak TransformA Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak Transform
CSCJournals
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
IJCNCJournal
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
eSAT Journals
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
eSAT Publishing House
 
Neural Style Transfer in practice
Neural Style Transfer in practiceNeural Style Transfer in practice
Neural Style Transfer in practice
MohamedAmineHACHICHA1
 
Enriched Firefly Algorithm for Solving Reactive Power Problem
Enriched Firefly Algorithm for Solving Reactive Power ProblemEnriched Firefly Algorithm for Solving Reactive Power Problem
Enriched Firefly Algorithm for Solving Reactive Power Problem
ijeei-iaes
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
ijsrd.com
 
A new efficient way based on special stabilizer multiplier permutations to at...
A new efficient way based on special stabilizer multiplier permutations to at...A new efficient way based on special stabilizer multiplier permutations to at...
A new efficient way based on special stabilizer multiplier permutations to at...
IJECEIAES
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
IJCNCJournal
 
IRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET- Chord Classification of an Audio Signal using Artificial Neural NetworkIRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET Journal
 
Architecture neural network deep optimizing based on self organizing feature ...
Architecture neural network deep optimizing based on self organizing feature ...Architecture neural network deep optimizing based on self organizing feature ...
Architecture neural network deep optimizing based on self organizing feature ...
journalBEEI
 
CFM Challenge - Course Project
CFM Challenge - Course ProjectCFM Challenge - Course Project
CFM Challenge - Course Project
KhalilBergaoui
 
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
ijcsit
 
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
ijsrd.com
 
PAPR analysis of OFDM system using AI based multiple signal representation me...
PAPR analysis of OFDM system using AI based multiple signal representation me...PAPR analysis of OFDM system using AI based multiple signal representation me...
PAPR analysis of OFDM system using AI based multiple signal representation me...
TELKOMNIKA JOURNAL
 

What's hot (20)

MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
 
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
 
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree MultiplierDesign of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
Design of an Adaptive Hearing Aid Algorithm using Booth-Wallace Tree Multiplier
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
 
A Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak TransformA Text-Independent Speaker Identification System based on The Zak Transform
A Text-Independent Speaker Identification System based on The Zak Transform
 
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMPERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHM
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
Neural Style Transfer in practice
Neural Style Transfer in practiceNeural Style Transfer in practice
Neural Style Transfer in practice
 
Enriched Firefly Algorithm for Solving Reactive Power Problem
Enriched Firefly Algorithm for Solving Reactive Power ProblemEnriched Firefly Algorithm for Solving Reactive Power Problem
Enriched Firefly Algorithm for Solving Reactive Power Problem
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
 
A new efficient way based on special stabilizer multiplier permutations to at...
A new efficient way based on special stabilizer multiplier permutations to at...A new efficient way based on special stabilizer multiplier permutations to at...
A new efficient way based on special stabilizer multiplier permutations to at...
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
 
IRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET- Chord Classification of an Audio Signal using Artificial Neural NetworkIRJET- Chord Classification of an Audio Signal using Artificial Neural Network
IRJET- Chord Classification of an Audio Signal using Artificial Neural Network
 
Architecture neural network deep optimizing based on self organizing feature ...
Architecture neural network deep optimizing based on self organizing feature ...Architecture neural network deep optimizing based on self organizing feature ...
Architecture neural network deep optimizing based on self organizing feature ...
 
CFM Challenge - Course Project
CFM Challenge - Course ProjectCFM Challenge - Course Project
CFM Challenge - Course Project
 
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
 
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
 
PAPR analysis of OFDM system using AI based multiple signal representation me...
PAPR analysis of OFDM system using AI based multiple signal representation me...PAPR analysis of OFDM system using AI based multiple signal representation me...
PAPR analysis of OFDM system using AI based multiple signal representation me...
 

Viewers also liked

IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IJCNCJournal
 
A distributed ip based telecommunication system using sip
A distributed ip based telecommunication system using sipA distributed ip based telecommunication system using sip
A distributed ip based telecommunication system using sip
IJCNCJournal
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
IJCNCJournal
 
An Optimal Software Framework for Parallel Computation of CRC
An Optimal Software Framework for Parallel Computation of CRCAn Optimal Software Framework for Parallel Computation of CRC
An Optimal Software Framework for Parallel Computation of CRC
IJCNCJournal
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
IJCNCJournal
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
IJCNCJournal
 
Novel designs of broadband patch
Novel designs of broadband patchNovel designs of broadband patch
Novel designs of broadband patch
IJCNCJournal
 
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...
IJCNCJournal
 
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
IJCNCJournal
 
IMPROVING IPV6 ADDRESSING TYPES AND SIZE
IMPROVING IPV6 ADDRESSING TYPES AND SIZEIMPROVING IPV6 ADDRESSING TYPES AND SIZE
IMPROVING IPV6 ADDRESSING TYPES AND SIZE
IJCNCJournal
 

Viewers also liked (10)

IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
A distributed ip based telecommunication system using sip
A distributed ip based telecommunication system using sipA distributed ip based telecommunication system using sip
A distributed ip based telecommunication system using sip
 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
 
An Optimal Software Framework for Parallel Computation of CRC
An Optimal Software Framework for Parallel Computation of CRCAn Optimal Software Framework for Parallel Computation of CRC
An Optimal Software Framework for Parallel Computation of CRC
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
Novel designs of broadband patch
Novel designs of broadband patchNovel designs of broadband patch
Novel designs of broadband patch
 
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...
EFFECT OF OPERATING WAVELENGTHS AND DIFFERENT WEATHER CONDITIONS ON PERFORMAN...
 
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
 
IMPROVING IPV6 ADDRESSING TYPES AND SIZE
IMPROVING IPV6 ADDRESSING TYPES AND SIZEIMPROVING IPV6 ADDRESSING TYPES AND SIZE
IMPROVING IPV6 ADDRESSING TYPES AND SIZE
 

Similar to A genetic algorithm to solve the

An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
CSCJournals
 
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
CSCJournals
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
IRJET Journal
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
IJCNCJournal
 
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowUsing Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
IJCSIS Research Publications
 
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
ijmnct
 
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
ijmnct
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
IJECEIAES
 
Poster
PosterPoster
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
IJERA Editor
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
IOSRJECE
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
CSCJournals
 
Network coding
Network codingNetwork coding
Network codingLishi He
 
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based ApproachesRouting in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
ijmnct
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
ijcsity
 
A Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelA Biologically Inspired Network Design Model
A Biologically Inspired Network Design Model
Xin-She Yang
 
A Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelA Biologically Inspired Network Design Model
A Biologically Inspired Network Design Model
Xin-She Yang
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
pijans
 

Similar to A genetic algorithm to solve the (20)

An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
 
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network w...
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic FlowUsing Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
Using Genetic Algorithm for Shortest Path Selection with Real Time Traffic Flow
 
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
 
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
50120130406039
5012013040603950120130406039
50120130406039
 
Poster
PosterPoster
Poster
 
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
 
Network coding
Network codingNetwork coding
Network coding
 
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based ApproachesRouting in Wireless Mesh Networks: Two Soft Computing Based Approaches
Routing in Wireless Mesh Networks: Two Soft Computing Based Approaches
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
 
A Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelA Biologically Inspired Network Design Model
A Biologically Inspired Network Design Model
 
A Biologically Inspired Network Design Model
A Biologically Inspired Network Design ModelA Biologically Inspired Network Design Model
A Biologically Inspired Network Design Model
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
E021052327
E021052327E021052327
E021052327
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 

Recently uploaded

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

A genetic algorithm to solve the

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 DOI : 10.5121/ijcnc.2015.7405 75 A GENETIC ALGORITHM TO SOLVE THE MINIMUM-COST PATHS TREE PROBLEM Ahmed Y. Hamed1 and M. R. Hassan2 1 College of Applied Studies and Community Services, University of Dammam, KSA. 2 Computer Science Branch, Mathematics Department, Faculty of Science, Aswan University, Egypt. ABSTRACT One of the important steps in routing is to find a feasible path based on the state information. In order to support real-time multimedia applications, the feasible path that satisfies one or more constraints has to be computed within a very short time. Therefore, the paper presents a genetic algorithm to solve the paths tree problem subject to cost constraints. The objective of the algorithm is to find the set of edges connecting all nodes such that the sum of the edge costs from the source (root) to each node is minimized. I.e. the path from the root to each node must be a minimum cost path connecting them. The algorithm has been applied on two sample networks, the first network with eight nodes, and the last one with eleven nodes to illustrate its efficiency. KEYWORDS Computer networks; Minimum-cost paths tree; Genetic algorithms. 1. INTRODUCTION The shortest paths tree rooted at vertex s is a spanning tree T of G, such that the path distance from root v to any other vertex u in T is the shortest path distance from v to u in G,[1]. In the case of single link failure, [2], proposed an algorithm to solve the optimal shortest paths tree. When considering multicast tree, [3], the authors presented an algorithm to find the Shortest Best Path Tree (SBPT). Based on labeling techniques, Ziliaskopoulos et al. in [4], proposed an algorithm to solve the shortest path trees. Also, The shortest paths tree problem has been solved by an efficient modified continued pulse coupled neural network (MCPCNN) model, [5]. Heuristic and approximate algorithms for multi-constrained routing (MCR) are not effective in dynamic network environment for real-time applications when the state information of the network is out of date, [6]. The authors in [6] presented a genetic algorithm to solve the MCR problem subject to transmission delay and transmission success ratio. Younes in [7] proposed a genetic algorithm to determine the k shortest paths with bandwidth constraints from a single source node to multiple destinations nodes. Liu et al. in [8] presented an oriented spanning tree (OST) based genetic algorithm (GA) for solving both the multi-criteria shortest path problem (MSPP) and the multi-criteria constrained shortest path problems (MCSPP). Also, in [9] the genetic algorithm is used to find the low-cost multicasting tree with bandwidth and delay constraints. The paper presents a genetic algorithm to solve the paths tree problem under cost constraint. The algorithm reads the connection matrix and the cost matrix of a given network. Also, given the source (root) node s, then the genetic operations are executed to search the minimum cost paths that construct the minimum cost paths tree rooted at the source node s.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 76 The rest of the paper is organized as follows: Section 2 presents notations. The problem description in section 3. The proposed GA and its components are given in section 4. Section 5 provides the pseudo code of the entire GA. Section 6 shows the illustrative examples. Finally, section 7 presents conclusions. 2. Notations G N E eij ce M CM np Ts A network graph. The number of nodes in G. The number of edges in G. An edge between node i and node j in G. The cost of an edge e. The connection matrix of the given network. The cost matrix of the given network. The number of paths from node s to t The shortest path rooted at node s 3. THE PROBLEM DESCRIPTION Given a specified vertex s. Let Pi (s, t) be a path number i from s to t. Let Ci (P(s, t)) be the cost of the path Pi (s, t), i = 1,2, …, np. The path Pk (s, t) has a minimum cost among all the (s, t)-paths if: Where Therefore, the minimum-cost paths tree Ts is the collection of minimum cost paths from the source (root) node s to the destination nodes ti. I.e. The presented method in this paper depend on reading both the connection and cost matrices of a given network, and then find the minimum-cost paths tree rooted at the source node. Consider the following network with five nodes, shown in Figure 1.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 77 Figure 1. Five nodes network. The connection matrix (a square matrix of dimension N x N that represents a connection between each node-pairs) of the Figure 1 network is: Figure 2. The connection matrix of network in Figure 1 The cost matrix CM for the network shown in Figure 1 is in the following form: Figure 3. The cost matrix network in Figure 1. In Figure 4, we show that the minimum-cost paths tree rooted at node 1 with the minimum cost equals to 23. Figure 4. Minimum-cost paths tree rooted at node 1
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 78 4. THE PROPOSED GENETIC ALGORITHM (GA) In the proposed GA, each candidate path is represented by a binary string with length N that can be used as a chromosome. Each element of the chromosome represents a node in the network topology. So, for a network of N nodes, there are N string components in each candidate solution x. Each chromosome must contain at least two none zero elements. For example if N = 8, the path of Figure 5 is represented as a chromosome as shown in Figure 6. Figure Figure 5. A candidate Path. 1 2 3 4 5 6 7 8 1 0 1 1 0 0 0 1 Figure 6. The chromosome corresponding to the path given in Figure 2. In the following subsections we give an explanation of different components (operations) of the presented genetic algorithm. 4.1. Initial Population The generated chromosome in initial population must contain at least two none zero elements to be a real candidate path. The following steps show how to generate pop_size chromosomes of the initial population: 1. Randomly generate a chromosome x. 2. Check if x represents a real candidate path, i.e. contains at least two non zero elements. 3. Repeat steps 1 to 2 to generate pop_size chromosomes. 4.2. The objective function The cost of the candidate path is used as objective function to compare the solutions and find the best one. The cost of the candidate path is calculated when it satisfies the following conditions: The chromosome must contain at least two none zero elements. The chromosome contains a connected candidate path. I.e. each node in the path connects at least one another.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 79 4.3. Genetic Crossover Operation In the proposed GA, we use the single cut point crossover to breed a new offspring from two parents. The crossover operation will be performed if the crossover ratio (Pc=0.90) is verified. The cut point is randomly selected. Figure 7 shows the crossover operation. Cut point Parent 1 1 1 0 1 1 0 0 Child 1 1 1 0 1 1 0 1 Parent 1 0 1 0 0 1 0 1 Figure 7. Example of the crossover operation. 4.4. Genetic Mutation Operation The mutation operation is performed on bit-by-bit basis. In the proposed approach, the mutation operation will be performed if the mutation ratio (Pm) is verified. The Pm in this approach is chosen experimentally to be 0.02. The point to be mutated is selected randomly. The offspring generated by mutation is shown in Figure 8. 1 0 1 1 0 0 0 1 1 1 1 0 0 0 0 0 Figure 8. An example of the mutation operation. 5. THE ENTIRE ALGORITHM The following pseudocode illustrates the use of our different components of the GA algorithm to generate the minimum-cost paths tree of a given network. Algorithm Find minimum-cost paths tree Input : Set the parameters: pop_size, max_gen, Pm, Pc. Output : Minimum-cost paths tree 1. Set j = 2, the destination node. 2. Generate the initial population according to the steps in Section 0. 3. gen←1. 4. While (gen < = max_gen) do { 5. P ← 1 6. While (P <= pop_size) do { 7. Apply Genetic operations to obtain new population 7.1. Apply crossover according to Pc parameter (Pc >=0.90) as described in section 4.3. 7.2. Apply Mutation as shown in section 4.4. 7.3. Compute the total cost of the candidate path according to Section 3. 8. P ← P+1. 9. } 10. Set gen =gen + 1
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 80 11. if gen > max_gen then stop 12. } 13. Save the candidate path for the destination j that has the minimum cost (the shortest path between the root node and the destination node j). 14. Set j = j + 1 15. If j <= N Goto Step 2, otherwise stop the entire algorithm and print out the minimum-cost paths tree. 5. EXPERIMENTAL RESULTS The proposed algorithm is implemented using Borland C++ Ver. 5.5 and the initial values of the parameters are: population size (pop-size=20), maximum generation (max_gen=50), Pc=0.90, and Pm=0.02. The technique reads both the connection and cost matrices of the given network. Then it generates the shortest paths tree of the network that posses the minimum cost. Two Examples are used to test and validate the proposed technique. 5.1 Eight nodes example In this section, we illustrate the results of applying the presented GA on an eight nodes network example, as shown in Figure 9. The final output o the GA is shown in Table 1. Figure 10 shows the shortest paths tree rooted at node 1. Figure 9. Eight nodes network. Table 1: The final output of the GA. The chromosome The shortest paths set The cost (1 1 0 0 0 0 0 0) {1, 2} 6 (1 0 1 0 0 0 0 0) {1, 3} 5 (1 0 1 1 0 0 0 0) {1, 3, 4} 9 (1 0 0 0 1 0 0 0) {1, 5} 4 (1 0 0 0 0 1 0 0) {1, 6} 6 (1 0 0 0 0 1 1 0) {1, 6, 7} 10 (1 0 1 1 0 0 0 1) {1, 3, 4, 8} 13
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 81 Figure 10: The shortest paths tree 6.2. Eleven nodes example In this section, the GA is applied on eleven nodes example as shown in Figure 11. The final output of the GA is shown in Table 2. Figure 12 shows the minimum-cost paths tree rooted at node 1. Figure 11: Eleven nodes network.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 82 Table 2. The final output of the GA. The chromosome The shortest paths set The cost (1 1 0 0 0 0 0 0 0 0 0) {1, 2} 8 (1 0 1 0 0 0 0 0 0 0 1) {1, 11, 3} 8 (1 0 1 1 0 0 0 0 0 0 1) {1, 11, 3, 4} 17 (1 1 0 0 1 0 0 0 0 0 0) {1, 2, 5} 10 (1 0 0 0 0 1 1 0 0 0 0) {1, 7, 6} 17 (1 0 0 0 0 1 0 0 0 0 0) {1, 7} 9 (1 0 0 0 0 0 0 1 1 0 0) {1, 9, 8} 9 (1 0 0 0 0 0 0 0 1 0 0) {1, 9} 6 (1 0 0 0 0 0 0 0 0 1 1) {1, 11, 10} 11 (1 0 0 0 0 0 0 0 0 0 1) {1, 11} 3 Figure 12: The minimum-cost paths tree rooted at node 1. 6.3. Sixteen nodes example Also, the GA is applied on sixteen nodes example as shown in Figure 13. The final output of the GA is shown in Table 3. Figure 14 shows the minimum-cost paths tree rooted at node 1.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 83 Figure 13: Sixteen nodes network Table 3. The final output of the GA. The chromosome The shortest paths set The cost (1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0) {1, 3, 2} 11 (1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0) {1, 3} 3 (1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0) {1, 4} 7 (1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0) {1, 3, 2, 5} 14 (1 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0) (1, 3, 7, 6} 21 (1 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0) (1, 3, 7} 13 (1 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0) (1, 3,7, 8} 30 (1 0 1 0 0 0 1 0 1 1 0 0 0 0 0 0 ) (1, 3, 7, 10, 9} 28 (1 1 1 0 1 0 0 0 0 1 0 0 0 0 0 0 ) (1, 3, 7, 10} 22 (1 0 0 1 0 0 1 1 0 0 1 0 0 0 0 0 ) (1, 3, 7, 11} 15 (1 0 1 0 0 0 1 0 0 0 1 1 0 0 0 0) (1, 3, 7, 11, 12} 18 (1 0 1 0 0 0 1 0 0 0 1 1 1 0 0 ) (1, 3, 7, 11, 14, 13} 26 (1 0 1 0 0 0 0 0 0 0 1 1 0 1 1 0 ) (1, 3, 11, 12, 15, 14} 31 (1 0 1 0 0 0 1 0 0 0 1 0 0 1 1 0 ) (1, 3, 7, 11, 14, 15} 24 (1 0 1 0 0 0 1 0 0 0 1 0 0 1 0 1 ) (1, 3, 7, 11, 14, 16} 28
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 84 Figure 14: The minimum-cost paths tree rooted at node 1. 7. CONCLUSIONS The paper addressed the minimum-cost paths tree problem and presented an efficient GA to solve this problem. The algorithm reads both the connection and cost matrices of a given network, then search the minimum-cost paths that construct the minimum-cost paths tree rooted at a given node s. The GA has been applied on two examples, the results proved that the efficiency of the proposed GA. For the future work, the GA can be extended to solve multi-constrained paths tree problem. References [1] Pierre Hansen and Maolin Zheng, “Shortest shortest path trees of a network”, Discrete Applied Mathematics, Vol. 65, Issues 1–3, March 1996, pp.275–284. [2] Yueping Li, Zhe Nie and Xiaohong Zhou, “Finding the Optimal Shortest Path Tree with Respect to Single Link Failure Recovery”, Fourth International Conference on Networked Computing and Advanced Information Management, 2008, NCM '08, Vol. 1, pp. 412 – 415. [3] Hiroshi Fujinoki and Kenneth J. Christensen, “The New Shortest Best Path Tree (SBPT) Algorithm for Dynamic Multicast Trees”, Conference onLocal Computer Networks, 1999. LCN '99. pp. 201- 211. [4] Athanasios K. Ziliaskopoulos, Fotios D. Mandanas, and Hani S. Mahmassani,”An extension of labeling techniques for finding shortest path trees”, European Journal of Operational Research, Vol. 198 (2009), pp. 63–72. [5] Hong Qua, Simon X. Yang, Zhang Yi, and Xiaobin Wanga, “A novel neural network method for shortest path tree computation”, Applied Soft Computing, Vol. 12 (2012), pp. 3246–3259. [6] Ting Lu and Jie Zhu, “A genetic algorithm for finding a path subject to two constraints”, Applied Soft Computing, Vol. 13, Issue 2, February 2013, pp. 891-898. [7] A. Younes , “A genetic algorithm for finding the k shortest paths in a network”, Egyptian Informatics Journal, Vol. 11, Issue 2, December 2010, pp. 75-79. [8 Linzhong Liu, Haibo Mu, Xinfeng Yang, Ruichun He, and Yinzhen LiAn, “oriented spanning tree based genetic algorithm for multi-criteria shortest path problems”, Applied Soft Computing, Vol. 12, Issue 1, January 2012, pp. 506-515. [9] A. Younes, “Multicast routing with bandwidth and delay constraints based on genetic algorithms”, Egyptian Informatics Journal, Vol. 12, Issue 2, July 2011, pp. 107-114.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015 85 AUTHORS Ahmed Younes Hamed received his PhD degree in Sept. 1996 from South Valley University, Egypt. His research interests include Artificial Intelligence and genetic algorithms; specifically in the area of computer networks. Recently, he has started conducting a research in the area of Image Processing. Currently, he works as an Associate Professor in University of Dammam, KSA. Younes always publishes the outcome of his research in international journals and conferences. Moatamad Hassan holds a PhD of Computer Science in June 2006 from Aswan University, Faculty of Science, Aswan, Egypt. He is currently an assistant professor at the Department of Mathematics, Computer Science Branch, Faculty of Science, Aswan University, Aswan, Egypt. His work deals with QoS, Reliability, and Computer Network Design problems.