SlideShare a Scribd company logo
As we increase the number of objectives we are trying to
achieve we also increase the number of constrains on the
problem and complixity increases ..
Genatic algorithm GA is ideal for these types of problems
where the search space is large & number of feasiables
solutions is small
 It’s an adaptive heurastic search algorithm
based on the evoultionary ideas of natural
selections and genatic
 It follows the principles laid down by darwin
of survival to the fittest
 A fittest fuction is used to evaluate
indviduales
• generate intial population M(0)
• compute and save the fitness U(M) of each indvidual m in population
M(T)
• define selection probablties P(M) for each indvidual M in M(T) so that
P(M) is propotional to U(M)
• generate M(T+1) by selecting indviduals from M(T) to mate
• step 2 repeated untill desired character ( sutiable solution ) obtained
 Intialization
 Selection
 Genetic operator
 Termination
Initialization
Selection
Genetic
operator
termination
• through wich generation will stop due to :
1) fixed number of generation reached
2) maximum number of solution
Any one who can encode solutions of a given problem to chromosomes in
GA & compare the performance ( fitness ) os solutions
Computer architecture : using GA to find out weak links
Learning robots behavior using genatic algorithm
Automated design of mechatronics systems using bond graphs
 Despite the succeful applications of GA to
numerous optimization of several problems
the identification of the correct settings of
genatic parameters such as ( population size
, crossover & mutation operator ) is not an
easy task
 Many works have been performed in order to
identify the correct settings value by trial &
error
• fuzzy is capable to adjust the rate of crossover & mutation operators
•Recently CHEONG & LAI (2000) said that GA controlled by fuzzy logic control
are more efficent in search speed & search quality of GA without FLC
 Based on the fact that it encourages well-
performed operators to produce more
efficient offspring while reducing the chance
of poorly performing operators to destroy the
potential indviduals during genatic search
process
We uses a real number representation instead of abit-string
• STEP 1 ) : intial population i.e : any random number of population
•STEP 2) : genetic operator i.e : selection , cross over & mutation
•STEP 3) : stop condition i.e : maximum number of muattion
 STEP 1) same as CGA.
 STEP 2) same as CGA .
 STEP 3) RegulatingGA parameters
 STEP 4) repeat step 2&3 untill stop condition
is reached .
 the right selection is one of the most
imoprtant genetic operators .
 Learning how to tune the parameters as
( mutation , probablity , population size ...etc)
is important
 Because a very small mutation rate may lead
to genetic drift or the high rate of mutation
may lead to loss of good solutions .
1) Choose intial population indvidual
2) Evaluate the fitness of that indvidual
3) Select the best fitness indvidual for matting
4) Breed new indviduals by crossing over
5) Evaluate the new indvidual fitness
Repeat till termination
• GA didn’t do well with complexity as the large number of
elements exposed to mutation ie : desiging an engine .
• Sometimes the stop conditions is not clear as the better
solution is only in comparison to other solution .
.
• Operating a dynamic data is difficult as genom start to convert
and become no longer a valid data later
Z I A D
Z O H D Y

More Related Content

Viewers also liked

2..iron deficiency of anemia.2
2..iron deficiency of anemia.22..iron deficiency of anemia.2
2..iron deficiency of anemia.2Afrina Qureshi
 
1.. introduction to blood
1.. introduction to blood1.. introduction to blood
1.. introduction to bloodAfrina Qureshi
 
Presentaciongrupotarea6
Presentaciongrupotarea6Presentaciongrupotarea6
Presentaciongrupotarea6
Alejandro J. Nava
 
Estudiodecasogrupotarea8
Estudiodecasogrupotarea8Estudiodecasogrupotarea8
Estudiodecasogrupotarea8
Alejandro J. Nava
 
10..lymphoma final year
10..lymphoma final year10..lymphoma final year
10..lymphoma final yearAfrina Qureshi
 
Etiqueta y protocolo 1.pptx
Etiqueta y protocolo 1.pptxEtiqueta y protocolo 1.pptx
Etiqueta y protocolo 1.pptx
Margarita Peña
 
Rickets and osteomalacia
Rickets and   osteomalaciaRickets and   osteomalacia
Rickets and osteomalaciaAfrina Qureshi
 
3..rafi ghori megaloblastic anaemia
3..rafi ghori megaloblastic anaemia3..rafi ghori megaloblastic anaemia
3..rafi ghori megaloblastic anaemiaAfrina Qureshi
 
Malaikat-Malaikat Allah
Malaikat-Malaikat AllahMalaikat-Malaikat Allah
Malaikat-Malaikat AllahSufro Kamalia
 
Boiling & condensation
Boiling & condensationBoiling & condensation
Boiling & condensationziad zohdy
 
Intro to nanomaterial
Intro to nanomaterialIntro to nanomaterial
Intro to nanomaterialziad zohdy
 
Applications of ceramics
Applications of ceramicsApplications of ceramics
Applications of ceramicsziad zohdy
 

Viewers also liked (20)

Inspection
InspectionInspection
Inspection
 
71ec2. gerd
71ec2. gerd71ec2. gerd
71ec2. gerd
 
2..iron deficiency of anemia.2
2..iron deficiency of anemia.22..iron deficiency of anemia.2
2..iron deficiency of anemia.2
 
1.. introduction to blood
1.. introduction to blood1.. introduction to blood
1.. introduction to blood
 
Rpp ips asean
Rpp ips aseanRpp ips asean
Rpp ips asean
 
Presentaciongrupotarea6
Presentaciongrupotarea6Presentaciongrupotarea6
Presentaciongrupotarea6
 
6..sickle cell anemia
6..sickle cell anemia6..sickle cell anemia
6..sickle cell anemia
 
Estudiodecasogrupotarea8
Estudiodecasogrupotarea8Estudiodecasogrupotarea8
Estudiodecasogrupotarea8
 
Cvt
CvtCvt
Cvt
 
10..lymphoma final year
10..lymphoma final year10..lymphoma final year
10..lymphoma final year
 
Etiqueta y protocolo 1.pptx
Etiqueta y protocolo 1.pptxEtiqueta y protocolo 1.pptx
Etiqueta y protocolo 1.pptx
 
Rickets and osteomalacia
Rickets and   osteomalaciaRickets and   osteomalacia
Rickets and osteomalacia
 
3..rafi ghori megaloblastic anaemia
3..rafi ghori megaloblastic anaemia3..rafi ghori megaloblastic anaemia
3..rafi ghori megaloblastic anaemia
 
Malaikat-Malaikat Allah
Malaikat-Malaikat AllahMalaikat-Malaikat Allah
Malaikat-Malaikat Allah
 
Boiling & condensation
Boiling & condensationBoiling & condensation
Boiling & condensation
 
Intro to nanomaterial
Intro to nanomaterialIntro to nanomaterial
Intro to nanomaterial
 
Applications of ceramics
Applications of ceramicsApplications of ceramics
Applications of ceramics
 
Ulcera42008
Ulcera42008Ulcera42008
Ulcera42008
 
hemolytic anemia 1
hemolytic anemia 1hemolytic anemia 1
hemolytic anemia 1
 
Ppt tokoh pancasila
Ppt tokoh pancasilaPpt tokoh pancasila
Ppt tokoh pancasila
 

Similar to Ga presentation

Clustering using GA and Hill-climbing
Clustering using GA and Hill-climbingClustering using GA and Hill-climbing
Clustering using GA and Hill-climbing
Fatemeh Karimi
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
SEKHARREDDYAMBATI
 
L018147377
L018147377L018147377
L018147377
IOSR Journals
 
reference paper.pdf
reference paper.pdfreference paper.pdf
reference paper.pdf
MayuRana1
 
WIX3001 Lecture 6 Principles of GA.pptx
WIX3001 Lecture 6 Principles of GA.pptxWIX3001 Lecture 6 Principles of GA.pptx
WIX3001 Lecture 6 Principles of GA.pptx
KelvinCheah4
 
Advanced Optimization Techniques
Advanced Optimization TechniquesAdvanced Optimization Techniques
Advanced Optimization Techniques
Valerie Felton
 
MACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHMMACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHM
Puneet Kulyana
 
Genetic algorithms in Data Mining
Genetic algorithms in Data MiningGenetic algorithms in Data Mining
Genetic algorithms in Data Mining
Atul Khanna
 
Optimazation
OptimazationOptimazation
Optimazation
Ahmed M. Elkholy
 
ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO...
 ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO... ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO...
ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO...
cscpconf
 
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning SystemAnalysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Harshal Jain
 
Differential Evolution Algorithm (DEA)
Differential Evolution Algorithm (DEA) Differential Evolution Algorithm (DEA)
Differential Evolution Algorithm (DEA)
A. Bilal Özcan
 
BGA.pptx
BGA.pptxBGA.pptx
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
IOSR Journals
 
M017127578
M017127578M017127578
M017127578
IOSR Journals
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
Nitesh Kumar
 
Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...
Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...
Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...
Madhav Mishra
 
Geneticalgorithms 100403002207-phpapp02
Geneticalgorithms 100403002207-phpapp02Geneticalgorithms 100403002207-phpapp02
Geneticalgorithms 100403002207-phpapp02
Amna Saeed
 
CSA 3702 machine learning module 4
CSA 3702 machine learning module 4CSA 3702 machine learning module 4
CSA 3702 machine learning module 4
Nandhini S
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Sagar Deogirkar
 

Similar to Ga presentation (20)

Clustering using GA and Hill-climbing
Clustering using GA and Hill-climbingClustering using GA and Hill-climbing
Clustering using GA and Hill-climbing
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
L018147377
L018147377L018147377
L018147377
 
reference paper.pdf
reference paper.pdfreference paper.pdf
reference paper.pdf
 
WIX3001 Lecture 6 Principles of GA.pptx
WIX3001 Lecture 6 Principles of GA.pptxWIX3001 Lecture 6 Principles of GA.pptx
WIX3001 Lecture 6 Principles of GA.pptx
 
Advanced Optimization Techniques
Advanced Optimization TechniquesAdvanced Optimization Techniques
Advanced Optimization Techniques
 
MACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHMMACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHM
 
Genetic algorithms in Data Mining
Genetic algorithms in Data MiningGenetic algorithms in Data Mining
Genetic algorithms in Data Mining
 
Optimazation
OptimazationOptimazation
Optimazation
 
ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO...
 ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO... ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO...
ENHANCED BREAST CANCER RECOGNITION BASED ON ROTATION FOREST FEATURE SELECTIO...
 
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning SystemAnalysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
Analysis of Parameter using Fuzzy Genetic Algorithm in E-learning System
 
Differential Evolution Algorithm (DEA)
Differential Evolution Algorithm (DEA) Differential Evolution Algorithm (DEA)
Differential Evolution Algorithm (DEA)
 
BGA.pptx
BGA.pptxBGA.pptx
BGA.pptx
 
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
Application of Genetic Algorithm and Particle Swarm Optimization in Software ...
 
M017127578
M017127578M017127578
M017127578
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
 
Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...
Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...
Applied Artificial Intelligence Unit 4 Semester 3 MSc IT Part 2 Mumbai Univer...
 
Geneticalgorithms 100403002207-phpapp02
Geneticalgorithms 100403002207-phpapp02Geneticalgorithms 100403002207-phpapp02
Geneticalgorithms 100403002207-phpapp02
 
CSA 3702 machine learning module 4
CSA 3702 machine learning module 4CSA 3702 machine learning module 4
CSA 3702 machine learning module 4
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Ga presentation

  • 1.
  • 2. As we increase the number of objectives we are trying to achieve we also increase the number of constrains on the problem and complixity increases .. Genatic algorithm GA is ideal for these types of problems where the search space is large & number of feasiables solutions is small
  • 3.  It’s an adaptive heurastic search algorithm based on the evoultionary ideas of natural selections and genatic  It follows the principles laid down by darwin of survival to the fittest  A fittest fuction is used to evaluate indviduales
  • 4. • generate intial population M(0) • compute and save the fitness U(M) of each indvidual m in population M(T) • define selection probablties P(M) for each indvidual M in M(T) so that P(M) is propotional to U(M) • generate M(T+1) by selecting indviduals from M(T) to mate • step 2 repeated untill desired character ( sutiable solution ) obtained
  • 5.  Intialization  Selection  Genetic operator  Termination
  • 7. Genetic operator termination • through wich generation will stop due to : 1) fixed number of generation reached 2) maximum number of solution
  • 8. Any one who can encode solutions of a given problem to chromosomes in GA & compare the performance ( fitness ) os solutions Computer architecture : using GA to find out weak links Learning robots behavior using genatic algorithm Automated design of mechatronics systems using bond graphs
  • 9.  Despite the succeful applications of GA to numerous optimization of several problems the identification of the correct settings of genatic parameters such as ( population size , crossover & mutation operator ) is not an easy task  Many works have been performed in order to identify the correct settings value by trial & error
  • 10. • fuzzy is capable to adjust the rate of crossover & mutation operators •Recently CHEONG & LAI (2000) said that GA controlled by fuzzy logic control are more efficent in search speed & search quality of GA without FLC
  • 11.  Based on the fact that it encourages well- performed operators to produce more efficient offspring while reducing the chance of poorly performing operators to destroy the potential indviduals during genatic search process
  • 12. We uses a real number representation instead of abit-string • STEP 1 ) : intial population i.e : any random number of population •STEP 2) : genetic operator i.e : selection , cross over & mutation •STEP 3) : stop condition i.e : maximum number of muattion
  • 13.  STEP 1) same as CGA.  STEP 2) same as CGA .  STEP 3) RegulatingGA parameters  STEP 4) repeat step 2&3 untill stop condition is reached .
  • 14.
  • 15.  the right selection is one of the most imoprtant genetic operators .  Learning how to tune the parameters as ( mutation , probablity , population size ...etc) is important  Because a very small mutation rate may lead to genetic drift or the high rate of mutation may lead to loss of good solutions .
  • 16. 1) Choose intial population indvidual 2) Evaluate the fitness of that indvidual 3) Select the best fitness indvidual for matting 4) Breed new indviduals by crossing over 5) Evaluate the new indvidual fitness Repeat till termination
  • 17. • GA didn’t do well with complexity as the large number of elements exposed to mutation ie : desiging an engine . • Sometimes the stop conditions is not clear as the better solution is only in comparison to other solution . . • Operating a dynamic data is difficult as genom start to convert and become no longer a valid data later
  • 18. Z I A D Z O H D Y