SlideShare a Scribd company logo
Made By:
Gyandeep Kansal(9911103464)
F-2
 It was indeed difficult to select one topic from the long list hat was
provided to us. I believe that it is technology that binds this entire
society together. Genetic Algorithms have been researched upon and
studied for several years now, surprisingly after all this time most of the
techniques developed are not efficient enough and/or resource intrinsic.
 It was with this basic idea that I chose the topic of research on genetic
algorithms so that I can understand and further the work done on this
particular topic
 In addition genetic algorithms as a technique is interesting and has
applications across various fields, such as secure communication,
optimizing programs, values and hardware etc.
Evaluation
When every new population is created each member is evaluated for its fitness by testing
for some attribute. For example in the One’s max problem each member is tested to see
how many of its genes contains the integer 1
Selection
Individuals are selected at random in groups after they are evaluated for their fitness and
the individuals with the highest fitness within these groups are used to populate the new
generation.
Crossover
Once the pool for the new members to be created from is selected crossover is used to
produce the new members a point is chosen at random on a chromosome where it will be
split and joined with the other half of another chromosome split at the same point in
order to make a new chromosome (a new member).
Mutation
Mutation to random members and is necessary to produce the randomness
required to prevent a population from becoming identical to previous
generations and in turn to bring about a higher fitness level. A point is picked at
random within a chromosome and the mutation that occurs is random.
Here crossover and mutation are shown
diagrammatically. As evident from the
diagrams crossover is the selection of bits for
the purpose of “exploitation” whereas
mutation serves the purpose of “exploration”.
The operator called XOR Operates in 3 steps. All of these steps are discussed one by
one.
For Crossover
 Step-1: In this step two parents are selected for the XOR step
 Step-2: The chromosomes of the child are taken from parent 1 if a randomly
generated number is less than or equal to a predefined number known as
Uniformrate.
 Step-3: If the random number generated is greater than Uniformrate, then for that
bit of child’s chromosome a XOR is taken of Parent 1 and Parent 2’s corresponding
bit
For Mutation
 Step-1: The child’s chromosome is run through a loop.
 Step-2: For every bit a random number is generated and if that number is greater
than the predefined MutationRate then the child retains its original bit.
 Step-3: If the number is less than the mutation rate, then the child’s bit is XOR’ed
with a rounded off random number between zero and one. Thus we have a mutated
child.
On the basis of test case status, we came to know about the limitations of our
proposed algorithm that our algorithm is not working properly when
 There is a high mutation rate requirement
 For some test cases the algorithm is not functioning as well as it is supposed to.
 The functionality of roll back has not been able to be applied
The proposed algorithm has been applied to two test programs:
General Genetic Algorithm: It has been found in the results that the proposed algorithm was
able to find the solution in 16 generations and half the execution time than the common G.A.
Which was used in the previous version of the program
Travelling Salesman Problem: The Proposed algorithm did not work on this problem.
Through this problem we were able to properly analyze the limitations and implementation
issues of our problem
Function
Name
Performance
before XOR
Performance
after XOR
Remarks
Generalized
G.A. Problem
21
generations
16
generations
Algorithm
Successfully
applied
TSP 100
generations
N/A Algorithm not
applicable
The above project aimed at finding a new approach for genetic algorithms, hence
we arrived at a solution, the XOR approach. However there is plenty of scope for
development in the future. We discuss a few future scope of development
 One of the reasons for choosing XOR as a mathematical operator was to someday
include the feature of “ROLLBACK” in the algorithm. Currently if the algorithms
next generation is not ‘Healthier’ than the parent generation, they are rejected at
the next selection phase. Using a rollback based algorithm will help in going back
to the previous step using reverse xor on children and re-evaluating the children of
that generation until a healthier generation is produced
 Here our algorithm did not work better for some of the test functions, we aim to
remove that discrepancy in the future
In this project, a new crossover operator called XOR is proposed and experiments are
conducted. The proposed operator is tested by a number of test functions with various levels
of difficulty. A comparison between the results of this method and the results of other
crossover operators are made. XOR operator gives better results according to other crossover
operators. Although the most of crossover operators showed similar results, XOR operator
had slightly better results than the other crossover for F1, F2, F4, F5 functions. For F3
function, HC operator has slightly better result than XOR operator. However, XOR operator
produces better result than SPC, TPC, IC and AC. For F6 function, the results of this study
are very close to those of AC, but in generally XOR operator performed the best results than
other crossover operators. The most important advantage of the proposed method is that more
variety is presented in possible number of children according to SPC and TPC operators. The
experiments and the results presented in the project clearly reveal the potential capability of
the proposed method in optimization processing based on GA. Moreover, it has the great
potential to improve the performance of GA applications in different area of engineering.
As seen in test programs, only those programs may be optimised by this algorithm whose
objective function and population array can be represented by binary numbers.
Final ppt

More Related Content

Viewers also liked

Vlsi design and fabrication ppt
Vlsi design and fabrication  pptVlsi design and fabrication  ppt
Vlsi design and fabrication ppt
Manjushree Mashal
 
Integrated circuit
Integrated circuitIntegrated circuit
Integrated circuit
Jessa Arnado
 
Integrated Circuits
Integrated CircuitsIntegrated Circuits
Integrated Circuits
ANAND G
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI
illpa
 
WCDMA
WCDMAWCDMA
Integrated circuits
Integrated circuitsIntegrated circuits
Integrated circuits
Naveen Sihag
 
IC Packaging
IC PackagingIC Packaging
IC Packaging
santoshnimbal
 

Viewers also liked (7)

Vlsi design and fabrication ppt
Vlsi design and fabrication  pptVlsi design and fabrication  ppt
Vlsi design and fabrication ppt
 
Integrated circuit
Integrated circuitIntegrated circuit
Integrated circuit
 
Integrated Circuits
Integrated CircuitsIntegrated Circuits
Integrated Circuits
 
Introduction to VLSI
Introduction to VLSI Introduction to VLSI
Introduction to VLSI
 
WCDMA
WCDMAWCDMA
WCDMA
 
Integrated circuits
Integrated circuitsIntegrated circuits
Integrated circuits
 
IC Packaging
IC PackagingIC Packaging
IC Packaging
 

Similar to Final ppt

Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
IOSR Journals
 
M017127578
M017127578M017127578
M017127578
IOSR Journals
 
Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)
Ahmed Gad
 
Genetic algorithms mahyar
Genetic algorithms   mahyarGenetic algorithms   mahyar
Genetic algorithms mahyar
Mahyar Teymournezhad
 
Genetic algorithms in Data Mining
Genetic algorithms in Data MiningGenetic algorithms in Data Mining
Genetic algorithms in Data Mining
Atul Khanna
 
Advanced Optimization Techniques
Advanced Optimization TechniquesAdvanced Optimization Techniques
Advanced Optimization Techniques
Valerie Felton
 
Software Testing Using Genetic Algorithms
Software Testing Using Genetic AlgorithmsSoftware Testing Using Genetic Algorithms
Software Testing Using Genetic Algorithms
IJCSES Journal
 
nature inspired algorithms
nature inspired algorithmsnature inspired algorithms
nature inspired algorithms
Gaurav Goel
 
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning SystemAnalysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Harshal Jain
 
Genetic Algorithms for Evolving Computer Chess Programs
Genetic Algorithms for Evolving Computer Chess Programs   Genetic Algorithms for Evolving Computer Chess Programs
Genetic Algorithms for Evolving Computer Chess Programs
Patrick Walter
 
Genetic Algorithm
Genetic Algorithm Genetic Algorithm
Genetic Algorithm
Bhushan Mohite
 
Meta Machine Learning: Hyperparameter Optimization
Meta Machine Learning: Hyperparameter OptimizationMeta Machine Learning: Hyperparameter Optimization
Meta Machine Learning: Hyperparameter Optimization
Priyatham Bollimpalli
 
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
IJCI JOURNAL
 
A Comparative Analysis of Genetic Algorithm Selection Techniques
A Comparative Analysis of Genetic Algorithm Selection TechniquesA Comparative Analysis of Genetic Algorithm Selection Techniques
A Comparative Analysis of Genetic Algorithm Selection Techniques
IRJET Journal
 
Software testing using genetic algorithms
Software testing using genetic algorithmsSoftware testing using genetic algorithms
Software testing using genetic algorithms
Nurhussen Menza
 
Parallel evolutionary approach paper
Parallel evolutionary approach paperParallel evolutionary approach paper
Parallel evolutionary approach paper
Priti Punia
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
SEKHARREDDYAMBATI
 
RM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lectureRM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lecture
VIT University (Chennai Campus)
 
L018147377
L018147377L018147377
L018147377
IOSR Journals
 
Machine learning
Machine learningMachine learning
Machine learning
business Corporate
 

Similar to Final ppt (20)

Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
 
M017127578
M017127578M017127578
M017127578
 
Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)Introduction to Optimization with Genetic Algorithm (GA)
Introduction to Optimization with Genetic Algorithm (GA)
 
Genetic algorithms mahyar
Genetic algorithms   mahyarGenetic algorithms   mahyar
Genetic algorithms mahyar
 
Genetic algorithms in Data Mining
Genetic algorithms in Data MiningGenetic algorithms in Data Mining
Genetic algorithms in Data Mining
 
Advanced Optimization Techniques
Advanced Optimization TechniquesAdvanced Optimization Techniques
Advanced Optimization Techniques
 
Software Testing Using Genetic Algorithms
Software Testing Using Genetic AlgorithmsSoftware Testing Using Genetic Algorithms
Software Testing Using Genetic Algorithms
 
nature inspired algorithms
nature inspired algorithmsnature inspired algorithms
nature inspired algorithms
 
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning SystemAnalysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
 
Genetic Algorithms for Evolving Computer Chess Programs
Genetic Algorithms for Evolving Computer Chess Programs   Genetic Algorithms for Evolving Computer Chess Programs
Genetic Algorithms for Evolving Computer Chess Programs
 
Genetic Algorithm
Genetic Algorithm Genetic Algorithm
Genetic Algorithm
 
Meta Machine Learning: Hyperparameter Optimization
Meta Machine Learning: Hyperparameter OptimizationMeta Machine Learning: Hyperparameter Optimization
Meta Machine Learning: Hyperparameter Optimization
 
Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)Genetic algorithm guided key generation in wireless communication (gakg)
Genetic algorithm guided key generation in wireless communication (gakg)
 
A Comparative Analysis of Genetic Algorithm Selection Techniques
A Comparative Analysis of Genetic Algorithm Selection TechniquesA Comparative Analysis of Genetic Algorithm Selection Techniques
A Comparative Analysis of Genetic Algorithm Selection Techniques
 
Software testing using genetic algorithms
Software testing using genetic algorithmsSoftware testing using genetic algorithms
Software testing using genetic algorithms
 
Parallel evolutionary approach paper
Parallel evolutionary approach paperParallel evolutionary approach paper
Parallel evolutionary approach paper
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
RM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lectureRM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lecture
 
L018147377
L018147377L018147377
L018147377
 
Machine learning
Machine learningMachine learning
Machine learning
 

Recently uploaded

Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 

Recently uploaded (20)

Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 

Final ppt

  • 2.  It was indeed difficult to select one topic from the long list hat was provided to us. I believe that it is technology that binds this entire society together. Genetic Algorithms have been researched upon and studied for several years now, surprisingly after all this time most of the techniques developed are not efficient enough and/or resource intrinsic.  It was with this basic idea that I chose the topic of research on genetic algorithms so that I can understand and further the work done on this particular topic  In addition genetic algorithms as a technique is interesting and has applications across various fields, such as secure communication, optimizing programs, values and hardware etc.
  • 3. Evaluation When every new population is created each member is evaluated for its fitness by testing for some attribute. For example in the One’s max problem each member is tested to see how many of its genes contains the integer 1 Selection Individuals are selected at random in groups after they are evaluated for their fitness and the individuals with the highest fitness within these groups are used to populate the new generation. Crossover Once the pool for the new members to be created from is selected crossover is used to produce the new members a point is chosen at random on a chromosome where it will be split and joined with the other half of another chromosome split at the same point in order to make a new chromosome (a new member).
  • 4. Mutation Mutation to random members and is necessary to produce the randomness required to prevent a population from becoming identical to previous generations and in turn to bring about a higher fitness level. A point is picked at random within a chromosome and the mutation that occurs is random.
  • 5. Here crossover and mutation are shown diagrammatically. As evident from the diagrams crossover is the selection of bits for the purpose of “exploitation” whereas mutation serves the purpose of “exploration”.
  • 6.
  • 7. The operator called XOR Operates in 3 steps. All of these steps are discussed one by one. For Crossover  Step-1: In this step two parents are selected for the XOR step  Step-2: The chromosomes of the child are taken from parent 1 if a randomly generated number is less than or equal to a predefined number known as Uniformrate.  Step-3: If the random number generated is greater than Uniformrate, then for that bit of child’s chromosome a XOR is taken of Parent 1 and Parent 2’s corresponding bit For Mutation  Step-1: The child’s chromosome is run through a loop.  Step-2: For every bit a random number is generated and if that number is greater than the predefined MutationRate then the child retains its original bit.  Step-3: If the number is less than the mutation rate, then the child’s bit is XOR’ed with a rounded off random number between zero and one. Thus we have a mutated child.
  • 8. On the basis of test case status, we came to know about the limitations of our proposed algorithm that our algorithm is not working properly when  There is a high mutation rate requirement  For some test cases the algorithm is not functioning as well as it is supposed to.  The functionality of roll back has not been able to be applied
  • 9. The proposed algorithm has been applied to two test programs: General Genetic Algorithm: It has been found in the results that the proposed algorithm was able to find the solution in 16 generations and half the execution time than the common G.A. Which was used in the previous version of the program Travelling Salesman Problem: The Proposed algorithm did not work on this problem. Through this problem we were able to properly analyze the limitations and implementation issues of our problem
  • 10. Function Name Performance before XOR Performance after XOR Remarks Generalized G.A. Problem 21 generations 16 generations Algorithm Successfully applied TSP 100 generations N/A Algorithm not applicable
  • 11. The above project aimed at finding a new approach for genetic algorithms, hence we arrived at a solution, the XOR approach. However there is plenty of scope for development in the future. We discuss a few future scope of development  One of the reasons for choosing XOR as a mathematical operator was to someday include the feature of “ROLLBACK” in the algorithm. Currently if the algorithms next generation is not ‘Healthier’ than the parent generation, they are rejected at the next selection phase. Using a rollback based algorithm will help in going back to the previous step using reverse xor on children and re-evaluating the children of that generation until a healthier generation is produced  Here our algorithm did not work better for some of the test functions, we aim to remove that discrepancy in the future
  • 12. In this project, a new crossover operator called XOR is proposed and experiments are conducted. The proposed operator is tested by a number of test functions with various levels of difficulty. A comparison between the results of this method and the results of other crossover operators are made. XOR operator gives better results according to other crossover operators. Although the most of crossover operators showed similar results, XOR operator had slightly better results than the other crossover for F1, F2, F4, F5 functions. For F3 function, HC operator has slightly better result than XOR operator. However, XOR operator produces better result than SPC, TPC, IC and AC. For F6 function, the results of this study are very close to those of AC, but in generally XOR operator performed the best results than other crossover operators. The most important advantage of the proposed method is that more variety is presented in possible number of children according to SPC and TPC operators. The experiments and the results presented in the project clearly reveal the potential capability of the proposed method in optimization processing based on GA. Moreover, it has the great potential to improve the performance of GA applications in different area of engineering. As seen in test programs, only those programs may be optimised by this algorithm whose objective function and population array can be represented by binary numbers.