SlideShare a Scribd company logo
For More Info Https://www.ThesisScientist.com
CHAPTER 3
BACKGROUND
3.1 GENETIC ALGORITHM
GA is a search technique that depends on the natural selection and genetics principles and
which determines a optimal solution for even a hard issue.
 Genetic algorithms are normally a family of computational models which are
motivated by the biological evolution. These algorithms encode a powerful
solution to a particular problem on a simple chromosome i.e. data structure and use
genetic operators to these structures so as to preserve severe information.
 Genetic algorithms are usually viewed as a function optimizer.
 Genetic algorithms can be used to a broad range of problems.
 For solving the issue by genetic algorithm the first step is to generate the
chromosomes population (random). Then these chromosomes are estimated in
such a manner that the chromosome which shows a better solution for the problem
will be provided more opportunities than the poorer solution.
 The genetic algorithms are part of the evolutionary algorithms family, which are
computational models, motivated in the Nature.
GAs are more reliable as compared to other most search techniques because they need
only information related to the quality of the solution created by every parameter set
(objective function values) and not like other optimization techniques which needs
derivative information, or worse yet, entire knowledge of the parameters and problem
structure[9].There are some difference between GA’s and other optimization/conventional
searching algorithms [14] . They are briefly explained as follows
1) GAs work with a coding of the parameter set, not the parameters themselves. Thus GAs
can easily manage the discrete or integer variables.
2) GAs search within a points population, not a single point. Thus GAs can offer a
globally optimal solution.
For More Info Https://www.ThesisScientist.com
3) GAs employ only objective function information, not derivatives or other auxiliary
knowledge. Thus GAs can manage the non-continuous, non-smooth and non-
differentiable functions which are actually available in a practical optimization issue. 4)
GAs employ probabilistic transition rules, not deterministic rules, Although GAs appear to
be a good mechanism to solve optimization issue, sometimes the solution achieved from
GAs is only a near global optimal solution.
3.2 BASIC FEATURES OF GA
GA is a sub division of artificial intelligence.
 AI (Artificial intelligence) is a computer science branch by which researchers
implement an intelligent computer system that has intelligence same as human
being.
 GA comes in the category of search algorithms that are based on computer and are
random in nature. These algorithms are obtained from the natural theory of
“survival of the fittest” being specified by Darwin.
 The mechanization of intelligent nature is a pre concern of this branch.
 GA is also appropriate for complicated problems.
 It generates the best of the best solutions.
The aim of GA is to increase the candidate solutions payoff in the population against an
objective function from problem domain. The scheme for the GA is to repeatedly use
surrogates for the mutation and recombination genetic processes on the population of
candidate solutions, where the objective function used to a decoded representation of a
candidate governs the probabilistic contributions a provided candidate solution can build
the subsequent generation of candidate solutions.
3.3 HISTORY OF GENETIC ALGORITHM
John Holland is assumed as the father of Genetic Algorithm. He discovered it in the early
1970's.and after that he and his students contribute much to the growth of this field.
Holland research was not concentrated on domain and optimization specific practical
problem but was on the adaptation concept as viewed in nature [6] and [7]. Other
For More Info Https://www.ThesisScientist.com
significant contributions were performed by Frantz in 1972 who inquired what were
known as Genetic Algorithm for Search and in 1971 Holstein inquired genetic plans for
adaptive control and function optimization. Several people involved biologists, are
amazed that life at the level of complexity that we realize could have emerged in the
relatively short time proposed by the fossil record [20].
Several human inventions were motivated by the natural selection. Genetic algorithm is
one of them. The main concept of this is the fittest survival or in other words it is called
natural selection. As evidently in nature the individual that has better chances for survival
will survive for a larger period of time. This in turn offers a better chance to create
offspring with its genetic material. In other words They can say that the fittest candidate
will survive and unfit will not. This force of nature is as known natural selection and on
this principle GA operates for solving optimization problems.
3.4BASICTERMINOLOGYofGA
Before beginning a discussion on Genetic Algorithms, it is essential to be familiar with
some basic terminology which will be used throughout this tutorial.
 Population − It is a subset of all the possible (encoded) solutions to the given
problem. The population for a GA is analogous to the population for human
beings except that instead of human beings, we have Candidate Solutions
representing human beings.
 Chromosomes − A chromosome is one such solution to the given problem.
 Gene − A gene is one element position of a chromosome.
 Allele − It is the value a gene takes for a particular chromosome.
 Genotype − Genotype is the population in the computation space. In the
computation space, the solutions are represented in a way which can be easily
understood and manipulated using a computing system.
 Phenotype − Phenotype is the population in the actual real world solution space in
which solutions are represented in a way they are represented in real world
situations.
 Decoding and Encoding − For simple problems, the phenotype and
genotype spaces are the same. However, in most of the cases, the phenotype and
genotype spaces are different. Decoding is a process of transforming a solution
For More Info Https://www.ThesisScientist.com
from the genotype to the phenotype space, while encoding is a process of
transforming from the phenotype to genotype space. Decoding should be fast as it
is carried out repeatedly in a GA during the fitness value .
Figure 3.1: represent structure of Gene, Genome, Chromosome
 Fitness Function − A fitness function simply defined is a function which takes
the solution as input and produces the suitability of the solution as the output. In
some cases, the fitness function and the objective function may be the same,
while in others it might be different based on the problem.

Figure 3.2: structure of Fitness Computation
 Genetic Operators − These alter the genetic composition of the offspring. These
include crossover, mutation, selection, etc.
For More Info Https://www.ThesisScientist.com
3.5 OPERATORS OF GA
GA begins with random creation of initial population and then the selection, crossover and
mutation operations are conducted until best population is determined. Gas are practical
and simple algorithm and easy to be implemented in power system.
In other words, considering an initial random population generated and measured, genetic
evolution happens by means of three basic genetic operators [22].
1) Parent selection.
2) Crossover.
3) Mutation.
The descriptions of these genetic operators are provided below [23]:
1. Parent Selection/Selection Strategy:
The selection of parents to generate successive generations plays a significant role in the
GA. This permits the fitter individuals to be chosen more usually to reproduce. There is a
no. of selection techniques introduced in the literature [24].
In this technique, n individuals are copied from the population randomly and the best of
the n is introduced into population for further genetic processing. This process is repeated
until the mating pool is filled.
TournamentSelection
In K-Way tournament selection, It select K individuals from the population at random
and select the best out of these to become a parent. The same process is repeated for
selecting the next parent. Tournament Selection is also extremely popular in literature as
it can even work with negative fitness values.
For More Info Https://www.ThesisScientist.com
Figure 3.3: Tournament Selection Scheme
2. Crossover:
Crossover is a significant operator of the GA. The primary aim of crossover is to
reorganize the information of two different individuals and create a new one. It is a
structured, yet randomized method of exchanging formation between strings. It
encourages the exploration of new fields in search space. Cross swapping operator is used
on the chosen individuals. Here, two different cross sites of parent chromosomes are
selected randomly. The cross over operation is finished by exchanging the middle
substring between strings.
Figure 3.4: working of Crossover
For More Info Https://www.ThesisScientist.com
3. Mutation:
Mutation consists of securing the procedure of reproduction and crossover efficiently
without much loss of the potentially helpful genetic material. Mutation is by itself a
random walk through the string space and offers for occasional interference in the
crossover operation by introducing one or more genetic elements during reproduction.
This operation assures diversity in the genetic strings over large period of time and
prevents stagnation in the emergence of optimal individuals. Bit wise mutation changes 1
to 0 and vice-versa. The above specified operations of selection, crossover and mutation
are repeated until the best individual is detected.
Figure 3.5: Working of Mutation
3.6 BASIC STRUCTUREofGA
The basic structure of a GA is as follows −
Figure 3.6: Flow Chart of Genetic Algorithm
For More Info Https://www.ThesisScientist.com
3.6.1 ALGORITHM
A simple genetic algorithm of above discussion is provided as follow:
1. Create a population of binary string randomly
2. Compute the fitness for every string in the population
3. Generate offspring strings through reproduction, crossover and mutation operation.
4. Measure the new strings and compute the fitness for every string (chromosome).
5. If the search objective is fulfilled, or an allowable generation is achieved, return the best
chromosome as the solution; else go to step 3.
FLOWCHART
Figure 3.7 (a) Starting phase of Genetic Algorithm
For More Info Https://www.ThesisScientist.com
Fig 3.7(b): Flowchart of Simple Genetic Algorithm
The FF (fitness function) evaluation and genetic evolution take part in an iterative process,
which finishes when a maximum no. of generations is arrived, as illustrated in Fig.3.7.
For More Info Https://www.ThesisScientist.com
Figure 3.8 cost estimation in GA
For More Info Https://www.ThesisScientist.com
Figure 3.9 crossover and mutation in GA
For More Info Https://www.ThesisScientist.com
Figure 3.10 Fitness function estimation in GA
3.7 ADVANTAGES OF GENETIC ALGORITHM
Genetic algorithms differ from traditional search and optimization methods by some
significant points:
 Genetic algorithms search parallel from a population of points. Therefore, it has
the ability to avoid being trapped in local optimal solution like traditional methods,
which search from a single point.
 Genetic algorithms use probabilistic selection rules, not deterministic ones.
 Genetic algorithms work on the Chromosome, which is encoded version of
potential solutions’ parameters, rather the parameters themselves.
 Genetic algorithms use fitness score, which is obtained from objective functions,
without other derivative or auxiliary information
 Genetic algorithms can be employed for a wide variety of optimization problems.
They perform very well for large scale optimization problems which may be very
difficult or impossible to solve by other traditional methods.
For More Info Https://www.ThesisScientist.com
3.8 VANET Routing Protocols
Routing is a mechanism to establish and to select a specific path in order to send data from
source to destination [14, 16]. There are various routing algorithm designed for ad-hoc
networks. Classification of various VANET routing protocols can be divided in two broad
categories: proactive or Table Driven Routing Protocols (DSDV, OLSR, FSR) and
reactive or On-demand routing protocols (AODV, DSR, TORA) that shown in figure 3.11.
In the next section describes a detail overview of various reactive routing protocols
(AODV, DSR).
Figure 3.11 VANET Routing Protocols
3.9 Reactive/On Demand Routing Protocols
Reactive routing protocols were designed to reduce the overheads by maintaining
information for active routes at each node [8]. This means that each node determined and
maintained routes only when it requires sending data to a particular destination. It using
two main mechanisms for route establishment: Route discovery and Route maintenance
[17, 25]. Route discovery mechanism uses two messages: Route Request (RREQ) and
Route Reply (RREP).
For More Info Https://www.ThesisScientist.com
Figure 3.12: Route Request Propagation in Reactive Routing Protocols
The basic approach is when a node needs to send a message to a particular destination, it
broadcasts the RREQ message in the network that shown in figure 3.12 When RREQ
message found a destination node then destination node send a RREP message to source
node that shown in figure 3.13.
Figure 3.13: Route Reply Propagation in Reactive Routing Protocols
Ad hoc On Demand Distance Vector (AODV): Ad hoc On Demand Distance Vector
(AODV) is a pure reactive routing protocol which is capable of both unicasting and
multicasting. In Ad hoc On Demand Distance Vector (AODV), like all reactive protocols,
it works on demand basis when it is required by the nodes within the network [8, 14].
When source node has to send some data to destination node then initially it propagates
Route Request (RREQ) message which is forwarded by intermediate nodes until
For More Info Https://www.ThesisScientist.com
destination is reached. A route reply message is unicasted back to the source node if the
receiver is either the node using the requested address, or it has a valid route to the
requested address that is shown is figure 3.14.
(a) (b)
Figure 3.14: AODV Route Discovery Process. (a) Propagation of the RREQ.
(b) Path of the RREP to the source.
Working of Ad Hoc On Demand Distance Vector Routing (AODV): In this type of routing
[14, 16] allows the communication between two nodes via intermediated nodes, if those
two nodes are not within the range of each other. To establish a route between source to
the destination, AODV using route discovery phase, along which Route Request message
(RREQ) messages are broadcasted to all its neighbouring nodes. This phase makes sure
that these routes do not forms any loops and find only the shortest possible route to the
destination node. It also uses destination sequence number for each route entry, which
ensures the loop free route, this is the one of the main benefit of AODV routing protocol.
For example if two different sources send two different requests to a same destination
node, then a requesting node selects the one with greatest sequence number. In the route
discovery phase several control messages are defined in AODV that are defined as
follows.
a) RREQ (Route Request): When any node wants to communicate with other node
then it broadcast route request message (RREQ) to its neighbouring nodes [14, 16].
This message is forwarded by all intermediate nodes until destination is reached.
For More Info Https://www.ThesisScientist.com
The route request messages (RREQ) contains the some information such as RREQ
id or broadcast id, source and destination IP address, source and destination
sequence number and a counter.
b) RREP (Route Reply): When any intermediate nodes received Route Request
(RREQ) message then it unicast the route reply message (RREP) to source node
either it is valid destination or it has path to destination and reverse path is
constructed between source and destination [14, 16]. Each route reply message
(RREP) packet consist of some information such as hop count, destination
sequence number, source and destination IP address.
c) RERR (Route Error): Whenever there is any link failure arises in the routing
process then route error message (RERR) is used for link failure notifications. The
route error message (RERR) consist of some information such as Unreachable
Destination node IP Address, Unreachable Destination node Sequence Number.
Routing in AODV: There are various mechanisms which are followed in AODV routing
approach:
a) AODV Route Discovery phase: To establish a route between source node to the
destination node, AODV using route discovery phase, along which the Route
Request message (RREQ) messages are broadcasted to all its neighbouring nodes
[14]. This phase makes sure that these routes do not forms any loops and find only
the shortest possible path to the destination node. It also uses destination sequence
number for each route entry that ensures the loop free route, this is the one of the
main benefit of AODV routing protocol. For example if two different sources
sends two different request to a same destination node, then a destination node
selects only that node having largest sequence number. In the route discovery
phase several control messages are defined in AODV protocol.
b) AODV Route Table Management: In AODV, Routing table management is
required to avoid those entities of nodes that do not exist or having invalid route
from source to destination. The need for routing table management is important to
For More Info Https://www.ThesisScientist.com
make communication loop free. It consists of following characteristics to maintain
the route table for each node.
• Destination IP address
• Total number of hops to the destination
• Destination sequence numbers
• Number of active neighbours
• Route expiration time
c) AODV Route Maintenance: In AODV, when any node in the network detects that a
route is not valid anymore for communication it delete all the related entries from
the routing table .And it sends the Route reply message (RREP) to all current
active neighbouring nodes to inform that the route is not valid anymore for
communication purpose.
Dynamic Source Routing Protocol (DSR)
Dynamic Source Routing is a reactive routing protocol that is based on the concept of
source routing [8, 16]. Source routing means source has the complete knowledge of entire
route to the destination before transmitting data. In DSR each node maintains a route
cache where it records all possible learned routes. It using two main mechanisms: Route
discovery and Route maintenance.
Route Discovery: Whenever a source node wants to send a data packet to destination node
in the network, it first looks in its Route Cache to find a valid hop sequence to the
destination [1].
For More Info Https://www.ThesisScientist.com
Figure 3.15: Route Request Propagation in DSR
If such a route exists, the source node attaches to the packet header the complete route to
the destination and forwards the packet to the next node. The next node checks the packet
header and forwards the packet to the next node. The process terminates when the packet
reaches the destination. If the source node cannot find a valid hop sequence to the
destination in its Route Cache then it initiates a route discovery process [17].
In route discovery process a route request (RREQ) message is broadcasts to all its
neighbouring nodes, adding a unique request ID to each request to prevent
Figure 3.16: Route Reply Propagation in DSR
For More Info Https://www.ThesisScientist.com
 Figure 3.15 shows the RREQ message propagation in the network. And figure 3.16
shows the propagation of RREP message that carries the entire hop sequence.
a) Route Maintenance: Route Maintenance is done by the propagation of route error
message (RERR). Whenever any active node sees or detects the link failure, it
propagates the route error message to its upstream neighbours along the reverse
path till it reaches the source node. To verify the correct operation of the router
links, HELLO messages and acknowledgement messages can be used.
3.10 Classification of the VANET Applications:
The applications of Vehicular Ad hoc Networks (VANET) are classified into three major
groups: 1)comfort oriented applications 2) convenience-oriented applications and 3)safety
oriented applications [11]. Safety oriented related applications look for the increasing
security of passengers by exchanging relevant information through vehicle-to-
infrastructure and vehicle-to-vehicle. And comfort and convenience applications improve
passenger’s comfort and traffic efficiency.
3.10.1 Safety-Oriented Applications: These types of applications help the driver to avoid
potential dangers through the exchange of information among vehicles. They are the
important applications because they serve to avoid accidents [11].
Figure 3.17: Safety Applications provided by VANET
For More Info Https://www.ThesisScientist.com
They can take control of the vehicle in case of hazardous conditions, as in the case of the
automatic braking and only send warning/emergency messages to drivers. Some safety
oriented application shown in Table 3.1[11].
Table 3.1: Examples of Safety-Oriented Applications
Name Description
Intersection violation warning Intersection violation warns drivers when they are
going to pass over a traffic red light .
On-coming traffic warning It assists the driver during over taking manoeuvres
Electronic brake warning It alerts to the driver that a preceding vehicle has
performed a emergent braking.
Vehicle stability warning It reports drivers that they should activate the vehicle
stability control system.
Post-crash notification A vehicle involved in an accident sends warning
/emergency messages in broadcast to approaching
vehicles.
Traffic signal violation warning A roadside unit (RSU) sends messages in broadcast to
warn drivers of potential violations of traffic signals.
Lane change warning It assists drivers to perform a safe lane change
3.10.2 Convenience-Oriented Applications: These types of applications improve the
efficiency of the roads and to save drivers time . Various Convenience oriented
application shown in Table 3.2[11]. Some examples of Convenience Oriented
Applications in VANET as shown in table 3.2.
Table 3.2: Examples of Convenience-Oriented Applications
Name Description
Intersection management Vehicle to vehicle and Vehicle to RSU
communications allow a better intersections
management
For More Info Https://www.ThesisScientist.com
Limited access and detour warning A roadside unit (RSU) sends information in
broadcast about limited access network areas or
detours.
Electronic toll collection A vehicle founds unicast communication with a
toll gate road side unit( RSU) and pays the toll
without stopping vehicle.
Parking availability notification A vehicle asks to a roadside unit (RSU) for a list of
available parking areas or parking spaces, and the
roadside unit (RSU) sends the list to the vehicle.
Congested road notification A vehicle in a congested road forwards
information to other vehicles.
Figure 3.18: Convenience Oriented Application Provided by VANET
3.10.3 Commercial-Oriented Applications: These types of applications serve to make
the travelling more comfortable for example, by means of the internet connection. Few
Commercial oriented application shown in Table 3.3[11].
Table 3.3: Examples of Commercial-Oriented Applications
For More Info Https://www.ThesisScientist.com
Name Description
Remote diagnosis The vehicle driver can start a wireless connection with the
dealer to upload the vehicle diagnostics information to
identify the possible problems.
Media or map download A vehicle can start a wireless connection with the hot-spot
network and home network to download multimedia
contents and location map.
Service announcement Restaurants and other businesses can use a roadside
unit(RSU) to send promotional messages to the drivers
that are in their communication range.

More Related Content

What's hot

MACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHMMACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHM
Puneet Kulyana
 
Genetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial IntelligenceGenetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial Intelligence
Sahil Kumar
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
rabidityfactor
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
DurgeshPratapSIngh8
 
Genetic algorithms in Data Mining
Genetic algorithms in Data MiningGenetic algorithms in Data Mining
Genetic algorithms in Data Mining
Atul Khanna
 
Genetic algorithm raktim
Genetic algorithm raktimGenetic algorithm raktim
Genetic algorithm raktim
Raktim Halder
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
Fatemeh Karimi
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
manalishipra
 
Introduction to genetic algorithms
Introduction to genetic algorithmsIntroduction to genetic algorithms
Introduction to genetic algorithms
shadanalam
 
Flowchart of GA
Flowchart of GAFlowchart of GA
Flowchart of GA
Ishucs
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
SHIMI S L
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
Premsankar Chakkingal
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
Jari Abbas
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
Shruti Railkar
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
garima931
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Ahmed Gad
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
Ahmed Othman
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
anas_elf
 
Exhaustive Search
Exhaustive SearchExhaustive Search
Exhaustive Search
Kasun Ranga Wijeweera
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
SEKHARREDDYAMBATI
 

What's hot (20)

MACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHMMACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHM
 
Genetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial IntelligenceGenetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial Intelligence
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Genetic algorithms in Data Mining
Genetic algorithms in Data MiningGenetic algorithms in Data Mining
Genetic algorithms in Data Mining
 
Genetic algorithm raktim
Genetic algorithm raktimGenetic algorithm raktim
Genetic algorithm raktim
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Introduction to genetic algorithms
Introduction to genetic algorithmsIntroduction to genetic algorithms
Introduction to genetic algorithms
 
Flowchart of GA
Flowchart of GAFlowchart of GA
Flowchart of GA
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
 
Exhaustive Search
Exhaustive SearchExhaustive Search
Exhaustive Search
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 

Similar to Genetic algorithm fitness function

Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
Respa Peter
 
Parallel evolutionary approach paper
Parallel evolutionary approach paperParallel evolutionary approach paper
Parallel evolutionary approach paper
Priti Punia
 
Genetic-Algorithms.ppt
Genetic-Algorithms.pptGenetic-Algorithms.ppt
Genetic-Algorithms.ppt
Nipun85
 
AI_PPT_Genetic-Algorithms.ppt
AI_PPT_Genetic-Algorithms.pptAI_PPT_Genetic-Algorithms.ppt
AI_PPT_Genetic-Algorithms.ppt
HotTea
 
Genetic-Algorithms-computersciencepptnew.ppt
Genetic-Algorithms-computersciencepptnew.pptGenetic-Algorithms-computersciencepptnew.ppt
Genetic-Algorithms-computersciencepptnew.ppt
Fitnessfreaksfam
 
Genetic-Algorithms forv artificial .ppt
Genetic-Algorithms forv artificial  .pptGenetic-Algorithms forv artificial  .ppt
Genetic-Algorithms forv artificial .ppt
neelamsanjeevkumar
 
Genetic-Algorithms for machine learning and ai.ppt
Genetic-Algorithms for machine learning and ai.pptGenetic-Algorithms for machine learning and ai.ppt
Genetic-Algorithms for machine learning and ai.ppt
neelamsanjeevkumar
 
Genetic-Algorithms.ppt
Genetic-Algorithms.pptGenetic-Algorithms.ppt
Genetic-Algorithms.ppt
ssuser2e437f
 
Genetic Algorithms in Artificial Intelligence
Genetic Algorithms in Artificial IntelligenceGenetic Algorithms in Artificial Intelligence
Genetic Algorithms in Artificial Intelligence
ritwijkp2
 
RM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lectureRM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lecture
VIT University (Chennai Campus)
 
E034023028
E034023028E034023028
E034023028
ijceronline
 
Data Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic AlgorithmsData Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic Algorithms
Derek Kane
 
Evolutionary computing - soft computing
Evolutionary computing - soft computingEvolutionary computing - soft computing
Evolutionary computing - soft computing
SakshiMahto1
 
F043046054
F043046054F043046054
F043046054
inventy
 
F043046054
F043046054F043046054
F043046054
inventy
 
F043046054
F043046054F043046054
F043046054
inventy
 
[IJCT-V3I2P31] Authors: Amarbir Singh
[IJCT-V3I2P31] Authors: Amarbir Singh[IJCT-V3I2P31] Authors: Amarbir Singh
[IJCT-V3I2P31] Authors: Amarbir Singh
IJET - International Journal of Engineering and Techniques
 
Explanation and example of genetic algorithm
Explanation and example of genetic algorithmExplanation and example of genetic algorithm
Explanation and example of genetic algorithm
MarkKhan23
 
Genetic Algorithm 2 -.pptx
Genetic Algorithm 2 -.pptxGenetic Algorithm 2 -.pptx
Genetic Algorithm 2 -.pptx
TAHANMKH
 
Genetic algorithms
Genetic algorithmsGenetic algorithms
Genetic algorithms
DEEPIKA T
 

Similar to Genetic algorithm fitness function (20)

Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Parallel evolutionary approach paper
Parallel evolutionary approach paperParallel evolutionary approach paper
Parallel evolutionary approach paper
 
Genetic-Algorithms.ppt
Genetic-Algorithms.pptGenetic-Algorithms.ppt
Genetic-Algorithms.ppt
 
AI_PPT_Genetic-Algorithms.ppt
AI_PPT_Genetic-Algorithms.pptAI_PPT_Genetic-Algorithms.ppt
AI_PPT_Genetic-Algorithms.ppt
 
Genetic-Algorithms-computersciencepptnew.ppt
Genetic-Algorithms-computersciencepptnew.pptGenetic-Algorithms-computersciencepptnew.ppt
Genetic-Algorithms-computersciencepptnew.ppt
 
Genetic-Algorithms forv artificial .ppt
Genetic-Algorithms forv artificial  .pptGenetic-Algorithms forv artificial  .ppt
Genetic-Algorithms forv artificial .ppt
 
Genetic-Algorithms for machine learning and ai.ppt
Genetic-Algorithms for machine learning and ai.pptGenetic-Algorithms for machine learning and ai.ppt
Genetic-Algorithms for machine learning and ai.ppt
 
Genetic-Algorithms.ppt
Genetic-Algorithms.pptGenetic-Algorithms.ppt
Genetic-Algorithms.ppt
 
Genetic Algorithms in Artificial Intelligence
Genetic Algorithms in Artificial IntelligenceGenetic Algorithms in Artificial Intelligence
Genetic Algorithms in Artificial Intelligence
 
RM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lectureRM 701 Genetic Algorithm and Fuzzy Logic lecture
RM 701 Genetic Algorithm and Fuzzy Logic lecture
 
E034023028
E034023028E034023028
E034023028
 
Data Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic AlgorithmsData Science - Part XIV - Genetic Algorithms
Data Science - Part XIV - Genetic Algorithms
 
Evolutionary computing - soft computing
Evolutionary computing - soft computingEvolutionary computing - soft computing
Evolutionary computing - soft computing
 
F043046054
F043046054F043046054
F043046054
 
F043046054
F043046054F043046054
F043046054
 
F043046054
F043046054F043046054
F043046054
 
[IJCT-V3I2P31] Authors: Amarbir Singh
[IJCT-V3I2P31] Authors: Amarbir Singh[IJCT-V3I2P31] Authors: Amarbir Singh
[IJCT-V3I2P31] Authors: Amarbir Singh
 
Explanation and example of genetic algorithm
Explanation and example of genetic algorithmExplanation and example of genetic algorithm
Explanation and example of genetic algorithm
 
Genetic Algorithm 2 -.pptx
Genetic Algorithm 2 -.pptxGenetic Algorithm 2 -.pptx
Genetic Algorithm 2 -.pptx
 
Genetic algorithms
Genetic algorithmsGenetic algorithms
Genetic algorithms
 

More from Prof Ansari

Sci Hub New Domain
Sci Hub New DomainSci Hub New Domain
Sci Hub New Domain
Prof Ansari
 
Sci Hub cc Not Working
Sci Hub cc Not WorkingSci Hub cc Not Working
Sci Hub cc Not Working
Prof Ansari
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
Prof Ansari
 
JAVA INTRODUCTION
JAVA INTRODUCTIONJAVA INTRODUCTION
JAVA INTRODUCTION
Prof Ansari
 
Project Evaluation and Estimation in Software Development
Project Evaluation and Estimation in Software DevelopmentProject Evaluation and Estimation in Software Development
Project Evaluation and Estimation in Software Development
Prof Ansari
 
Stepwise Project planning in software development
Stepwise Project planning in software developmentStepwise Project planning in software development
Stepwise Project planning in software development
Prof Ansari
 
Database and Math Relations
Database and Math RelationsDatabase and Math Relations
Database and Math Relations
Prof Ansari
 
Normalisation in Database management System (DBMS)
Normalisation in Database management System (DBMS)Normalisation in Database management System (DBMS)
Normalisation in Database management System (DBMS)
Prof Ansari
 
Entity-Relationship Data Model in DBMS
Entity-Relationship Data Model in DBMSEntity-Relationship Data Model in DBMS
Entity-Relationship Data Model in DBMS
Prof Ansari
 
A Detail Database Architecture
A Detail Database ArchitectureA Detail Database Architecture
A Detail Database Architecture
Prof Ansari
 
INTRODUCTION TO Database Management System (DBMS)
INTRODUCTION TO Database Management System (DBMS)INTRODUCTION TO Database Management System (DBMS)
INTRODUCTION TO Database Management System (DBMS)
Prof Ansari
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
Prof Ansari
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
Prof Ansari
 
INTERFACING WITH INTEL 8251A (USART)
INTERFACING WITH INTEL 8251A (USART)INTERFACING WITH INTEL 8251A (USART)
INTERFACING WITH INTEL 8251A (USART)
Prof Ansari
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
Prof Ansari
 
INTRODUCTION TO VISUAL BASICS
INTRODUCTION TO VISUAL BASICS INTRODUCTION TO VISUAL BASICS
INTRODUCTION TO VISUAL BASICS
Prof Ansari
 
introduction to Blogging ppt
introduction to Blogging pptintroduction to Blogging ppt
introduction to Blogging ppt
Prof Ansari
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERING
Prof Ansari
 
Introduction to E-commerce
Introduction to E-commerceIntroduction to E-commerce
Introduction to E-commerce
Prof Ansari
 

More from Prof Ansari (20)

Sci Hub New Domain
Sci Hub New DomainSci Hub New Domain
Sci Hub New Domain
 
Sci Hub cc Not Working
Sci Hub cc Not WorkingSci Hub cc Not Working
Sci Hub cc Not Working
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
JAVA INTRODUCTION
JAVA INTRODUCTIONJAVA INTRODUCTION
JAVA INTRODUCTION
 
Project Evaluation and Estimation in Software Development
Project Evaluation and Estimation in Software DevelopmentProject Evaluation and Estimation in Software Development
Project Evaluation and Estimation in Software Development
 
Stepwise Project planning in software development
Stepwise Project planning in software developmentStepwise Project planning in software development
Stepwise Project planning in software development
 
Database and Math Relations
Database and Math RelationsDatabase and Math Relations
Database and Math Relations
 
Normalisation in Database management System (DBMS)
Normalisation in Database management System (DBMS)Normalisation in Database management System (DBMS)
Normalisation in Database management System (DBMS)
 
Entity-Relationship Data Model in DBMS
Entity-Relationship Data Model in DBMSEntity-Relationship Data Model in DBMS
Entity-Relationship Data Model in DBMS
 
A Detail Database Architecture
A Detail Database ArchitectureA Detail Database Architecture
A Detail Database Architecture
 
INTRODUCTION TO Database Management System (DBMS)
INTRODUCTION TO Database Management System (DBMS)INTRODUCTION TO Database Management System (DBMS)
INTRODUCTION TO Database Management System (DBMS)
 
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
 
Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)Master Thesis on Vehicular Ad-hoc Network (VANET)
Master Thesis on Vehicular Ad-hoc Network (VANET)
 
INTERFACING WITH INTEL 8251A (USART)
INTERFACING WITH INTEL 8251A (USART)INTERFACING WITH INTEL 8251A (USART)
INTERFACING WITH INTEL 8251A (USART)
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
 
INTRODUCTION TO VISUAL BASICS
INTRODUCTION TO VISUAL BASICS INTRODUCTION TO VISUAL BASICS
INTRODUCTION TO VISUAL BASICS
 
introduction to Blogging ppt
introduction to Blogging pptintroduction to Blogging ppt
introduction to Blogging ppt
 
INTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERINGINTRODUCTION TO SOFTWARE ENGINEERING
INTRODUCTION TO SOFTWARE ENGINEERING
 
Introduction to E-commerce
Introduction to E-commerceIntroduction to E-commerce
Introduction to E-commerce
 

Recently uploaded

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 

Recently uploaded (20)

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 

Genetic algorithm fitness function

  • 1. For More Info Https://www.ThesisScientist.com CHAPTER 3 BACKGROUND 3.1 GENETIC ALGORITHM GA is a search technique that depends on the natural selection and genetics principles and which determines a optimal solution for even a hard issue.  Genetic algorithms are normally a family of computational models which are motivated by the biological evolution. These algorithms encode a powerful solution to a particular problem on a simple chromosome i.e. data structure and use genetic operators to these structures so as to preserve severe information.  Genetic algorithms are usually viewed as a function optimizer.  Genetic algorithms can be used to a broad range of problems.  For solving the issue by genetic algorithm the first step is to generate the chromosomes population (random). Then these chromosomes are estimated in such a manner that the chromosome which shows a better solution for the problem will be provided more opportunities than the poorer solution.  The genetic algorithms are part of the evolutionary algorithms family, which are computational models, motivated in the Nature. GAs are more reliable as compared to other most search techniques because they need only information related to the quality of the solution created by every parameter set (objective function values) and not like other optimization techniques which needs derivative information, or worse yet, entire knowledge of the parameters and problem structure[9].There are some difference between GA’s and other optimization/conventional searching algorithms [14] . They are briefly explained as follows 1) GAs work with a coding of the parameter set, not the parameters themselves. Thus GAs can easily manage the discrete or integer variables. 2) GAs search within a points population, not a single point. Thus GAs can offer a globally optimal solution.
  • 2. For More Info Https://www.ThesisScientist.com 3) GAs employ only objective function information, not derivatives or other auxiliary knowledge. Thus GAs can manage the non-continuous, non-smooth and non- differentiable functions which are actually available in a practical optimization issue. 4) GAs employ probabilistic transition rules, not deterministic rules, Although GAs appear to be a good mechanism to solve optimization issue, sometimes the solution achieved from GAs is only a near global optimal solution. 3.2 BASIC FEATURES OF GA GA is a sub division of artificial intelligence.  AI (Artificial intelligence) is a computer science branch by which researchers implement an intelligent computer system that has intelligence same as human being.  GA comes in the category of search algorithms that are based on computer and are random in nature. These algorithms are obtained from the natural theory of “survival of the fittest” being specified by Darwin.  The mechanization of intelligent nature is a pre concern of this branch.  GA is also appropriate for complicated problems.  It generates the best of the best solutions. The aim of GA is to increase the candidate solutions payoff in the population against an objective function from problem domain. The scheme for the GA is to repeatedly use surrogates for the mutation and recombination genetic processes on the population of candidate solutions, where the objective function used to a decoded representation of a candidate governs the probabilistic contributions a provided candidate solution can build the subsequent generation of candidate solutions. 3.3 HISTORY OF GENETIC ALGORITHM John Holland is assumed as the father of Genetic Algorithm. He discovered it in the early 1970's.and after that he and his students contribute much to the growth of this field. Holland research was not concentrated on domain and optimization specific practical problem but was on the adaptation concept as viewed in nature [6] and [7]. Other
  • 3. For More Info Https://www.ThesisScientist.com significant contributions were performed by Frantz in 1972 who inquired what were known as Genetic Algorithm for Search and in 1971 Holstein inquired genetic plans for adaptive control and function optimization. Several people involved biologists, are amazed that life at the level of complexity that we realize could have emerged in the relatively short time proposed by the fossil record [20]. Several human inventions were motivated by the natural selection. Genetic algorithm is one of them. The main concept of this is the fittest survival or in other words it is called natural selection. As evidently in nature the individual that has better chances for survival will survive for a larger period of time. This in turn offers a better chance to create offspring with its genetic material. In other words They can say that the fittest candidate will survive and unfit will not. This force of nature is as known natural selection and on this principle GA operates for solving optimization problems. 3.4BASICTERMINOLOGYofGA Before beginning a discussion on Genetic Algorithms, it is essential to be familiar with some basic terminology which will be used throughout this tutorial.  Population − It is a subset of all the possible (encoded) solutions to the given problem. The population for a GA is analogous to the population for human beings except that instead of human beings, we have Candidate Solutions representing human beings.  Chromosomes − A chromosome is one such solution to the given problem.  Gene − A gene is one element position of a chromosome.  Allele − It is the value a gene takes for a particular chromosome.  Genotype − Genotype is the population in the computation space. In the computation space, the solutions are represented in a way which can be easily understood and manipulated using a computing system.  Phenotype − Phenotype is the population in the actual real world solution space in which solutions are represented in a way they are represented in real world situations.  Decoding and Encoding − For simple problems, the phenotype and genotype spaces are the same. However, in most of the cases, the phenotype and genotype spaces are different. Decoding is a process of transforming a solution
  • 4. For More Info Https://www.ThesisScientist.com from the genotype to the phenotype space, while encoding is a process of transforming from the phenotype to genotype space. Decoding should be fast as it is carried out repeatedly in a GA during the fitness value . Figure 3.1: represent structure of Gene, Genome, Chromosome  Fitness Function − A fitness function simply defined is a function which takes the solution as input and produces the suitability of the solution as the output. In some cases, the fitness function and the objective function may be the same, while in others it might be different based on the problem.  Figure 3.2: structure of Fitness Computation  Genetic Operators − These alter the genetic composition of the offspring. These include crossover, mutation, selection, etc.
  • 5. For More Info Https://www.ThesisScientist.com 3.5 OPERATORS OF GA GA begins with random creation of initial population and then the selection, crossover and mutation operations are conducted until best population is determined. Gas are practical and simple algorithm and easy to be implemented in power system. In other words, considering an initial random population generated and measured, genetic evolution happens by means of three basic genetic operators [22]. 1) Parent selection. 2) Crossover. 3) Mutation. The descriptions of these genetic operators are provided below [23]: 1. Parent Selection/Selection Strategy: The selection of parents to generate successive generations plays a significant role in the GA. This permits the fitter individuals to be chosen more usually to reproduce. There is a no. of selection techniques introduced in the literature [24]. In this technique, n individuals are copied from the population randomly and the best of the n is introduced into population for further genetic processing. This process is repeated until the mating pool is filled. TournamentSelection In K-Way tournament selection, It select K individuals from the population at random and select the best out of these to become a parent. The same process is repeated for selecting the next parent. Tournament Selection is also extremely popular in literature as it can even work with negative fitness values.
  • 6. For More Info Https://www.ThesisScientist.com Figure 3.3: Tournament Selection Scheme 2. Crossover: Crossover is a significant operator of the GA. The primary aim of crossover is to reorganize the information of two different individuals and create a new one. It is a structured, yet randomized method of exchanging formation between strings. It encourages the exploration of new fields in search space. Cross swapping operator is used on the chosen individuals. Here, two different cross sites of parent chromosomes are selected randomly. The cross over operation is finished by exchanging the middle substring between strings. Figure 3.4: working of Crossover
  • 7. For More Info Https://www.ThesisScientist.com 3. Mutation: Mutation consists of securing the procedure of reproduction and crossover efficiently without much loss of the potentially helpful genetic material. Mutation is by itself a random walk through the string space and offers for occasional interference in the crossover operation by introducing one or more genetic elements during reproduction. This operation assures diversity in the genetic strings over large period of time and prevents stagnation in the emergence of optimal individuals. Bit wise mutation changes 1 to 0 and vice-versa. The above specified operations of selection, crossover and mutation are repeated until the best individual is detected. Figure 3.5: Working of Mutation 3.6 BASIC STRUCTUREofGA The basic structure of a GA is as follows − Figure 3.6: Flow Chart of Genetic Algorithm
  • 8. For More Info Https://www.ThesisScientist.com 3.6.1 ALGORITHM A simple genetic algorithm of above discussion is provided as follow: 1. Create a population of binary string randomly 2. Compute the fitness for every string in the population 3. Generate offspring strings through reproduction, crossover and mutation operation. 4. Measure the new strings and compute the fitness for every string (chromosome). 5. If the search objective is fulfilled, or an allowable generation is achieved, return the best chromosome as the solution; else go to step 3. FLOWCHART Figure 3.7 (a) Starting phase of Genetic Algorithm
  • 9. For More Info Https://www.ThesisScientist.com Fig 3.7(b): Flowchart of Simple Genetic Algorithm The FF (fitness function) evaluation and genetic evolution take part in an iterative process, which finishes when a maximum no. of generations is arrived, as illustrated in Fig.3.7.
  • 10. For More Info Https://www.ThesisScientist.com Figure 3.8 cost estimation in GA
  • 11. For More Info Https://www.ThesisScientist.com Figure 3.9 crossover and mutation in GA
  • 12. For More Info Https://www.ThesisScientist.com Figure 3.10 Fitness function estimation in GA 3.7 ADVANTAGES OF GENETIC ALGORITHM Genetic algorithms differ from traditional search and optimization methods by some significant points:  Genetic algorithms search parallel from a population of points. Therefore, it has the ability to avoid being trapped in local optimal solution like traditional methods, which search from a single point.  Genetic algorithms use probabilistic selection rules, not deterministic ones.  Genetic algorithms work on the Chromosome, which is encoded version of potential solutions’ parameters, rather the parameters themselves.  Genetic algorithms use fitness score, which is obtained from objective functions, without other derivative or auxiliary information  Genetic algorithms can be employed for a wide variety of optimization problems. They perform very well for large scale optimization problems which may be very difficult or impossible to solve by other traditional methods.
  • 13. For More Info Https://www.ThesisScientist.com 3.8 VANET Routing Protocols Routing is a mechanism to establish and to select a specific path in order to send data from source to destination [14, 16]. There are various routing algorithm designed for ad-hoc networks. Classification of various VANET routing protocols can be divided in two broad categories: proactive or Table Driven Routing Protocols (DSDV, OLSR, FSR) and reactive or On-demand routing protocols (AODV, DSR, TORA) that shown in figure 3.11. In the next section describes a detail overview of various reactive routing protocols (AODV, DSR). Figure 3.11 VANET Routing Protocols 3.9 Reactive/On Demand Routing Protocols Reactive routing protocols were designed to reduce the overheads by maintaining information for active routes at each node [8]. This means that each node determined and maintained routes only when it requires sending data to a particular destination. It using two main mechanisms for route establishment: Route discovery and Route maintenance [17, 25]. Route discovery mechanism uses two messages: Route Request (RREQ) and Route Reply (RREP).
  • 14. For More Info Https://www.ThesisScientist.com Figure 3.12: Route Request Propagation in Reactive Routing Protocols The basic approach is when a node needs to send a message to a particular destination, it broadcasts the RREQ message in the network that shown in figure 3.12 When RREQ message found a destination node then destination node send a RREP message to source node that shown in figure 3.13. Figure 3.13: Route Reply Propagation in Reactive Routing Protocols Ad hoc On Demand Distance Vector (AODV): Ad hoc On Demand Distance Vector (AODV) is a pure reactive routing protocol which is capable of both unicasting and multicasting. In Ad hoc On Demand Distance Vector (AODV), like all reactive protocols, it works on demand basis when it is required by the nodes within the network [8, 14]. When source node has to send some data to destination node then initially it propagates Route Request (RREQ) message which is forwarded by intermediate nodes until
  • 15. For More Info Https://www.ThesisScientist.com destination is reached. A route reply message is unicasted back to the source node if the receiver is either the node using the requested address, or it has a valid route to the requested address that is shown is figure 3.14. (a) (b) Figure 3.14: AODV Route Discovery Process. (a) Propagation of the RREQ. (b) Path of the RREP to the source. Working of Ad Hoc On Demand Distance Vector Routing (AODV): In this type of routing [14, 16] allows the communication between two nodes via intermediated nodes, if those two nodes are not within the range of each other. To establish a route between source to the destination, AODV using route discovery phase, along which Route Request message (RREQ) messages are broadcasted to all its neighbouring nodes. This phase makes sure that these routes do not forms any loops and find only the shortest possible route to the destination node. It also uses destination sequence number for each route entry, which ensures the loop free route, this is the one of the main benefit of AODV routing protocol. For example if two different sources send two different requests to a same destination node, then a requesting node selects the one with greatest sequence number. In the route discovery phase several control messages are defined in AODV that are defined as follows. a) RREQ (Route Request): When any node wants to communicate with other node then it broadcast route request message (RREQ) to its neighbouring nodes [14, 16]. This message is forwarded by all intermediate nodes until destination is reached.
  • 16. For More Info Https://www.ThesisScientist.com The route request messages (RREQ) contains the some information such as RREQ id or broadcast id, source and destination IP address, source and destination sequence number and a counter. b) RREP (Route Reply): When any intermediate nodes received Route Request (RREQ) message then it unicast the route reply message (RREP) to source node either it is valid destination or it has path to destination and reverse path is constructed between source and destination [14, 16]. Each route reply message (RREP) packet consist of some information such as hop count, destination sequence number, source and destination IP address. c) RERR (Route Error): Whenever there is any link failure arises in the routing process then route error message (RERR) is used for link failure notifications. The route error message (RERR) consist of some information such as Unreachable Destination node IP Address, Unreachable Destination node Sequence Number. Routing in AODV: There are various mechanisms which are followed in AODV routing approach: a) AODV Route Discovery phase: To establish a route between source node to the destination node, AODV using route discovery phase, along which the Route Request message (RREQ) messages are broadcasted to all its neighbouring nodes [14]. This phase makes sure that these routes do not forms any loops and find only the shortest possible path to the destination node. It also uses destination sequence number for each route entry that ensures the loop free route, this is the one of the main benefit of AODV routing protocol. For example if two different sources sends two different request to a same destination node, then a destination node selects only that node having largest sequence number. In the route discovery phase several control messages are defined in AODV protocol. b) AODV Route Table Management: In AODV, Routing table management is required to avoid those entities of nodes that do not exist or having invalid route from source to destination. The need for routing table management is important to
  • 17. For More Info Https://www.ThesisScientist.com make communication loop free. It consists of following characteristics to maintain the route table for each node. • Destination IP address • Total number of hops to the destination • Destination sequence numbers • Number of active neighbours • Route expiration time c) AODV Route Maintenance: In AODV, when any node in the network detects that a route is not valid anymore for communication it delete all the related entries from the routing table .And it sends the Route reply message (RREP) to all current active neighbouring nodes to inform that the route is not valid anymore for communication purpose. Dynamic Source Routing Protocol (DSR) Dynamic Source Routing is a reactive routing protocol that is based on the concept of source routing [8, 16]. Source routing means source has the complete knowledge of entire route to the destination before transmitting data. In DSR each node maintains a route cache where it records all possible learned routes. It using two main mechanisms: Route discovery and Route maintenance. Route Discovery: Whenever a source node wants to send a data packet to destination node in the network, it first looks in its Route Cache to find a valid hop sequence to the destination [1].
  • 18. For More Info Https://www.ThesisScientist.com Figure 3.15: Route Request Propagation in DSR If such a route exists, the source node attaches to the packet header the complete route to the destination and forwards the packet to the next node. The next node checks the packet header and forwards the packet to the next node. The process terminates when the packet reaches the destination. If the source node cannot find a valid hop sequence to the destination in its Route Cache then it initiates a route discovery process [17]. In route discovery process a route request (RREQ) message is broadcasts to all its neighbouring nodes, adding a unique request ID to each request to prevent Figure 3.16: Route Reply Propagation in DSR
  • 19. For More Info Https://www.ThesisScientist.com  Figure 3.15 shows the RREQ message propagation in the network. And figure 3.16 shows the propagation of RREP message that carries the entire hop sequence. a) Route Maintenance: Route Maintenance is done by the propagation of route error message (RERR). Whenever any active node sees or detects the link failure, it propagates the route error message to its upstream neighbours along the reverse path till it reaches the source node. To verify the correct operation of the router links, HELLO messages and acknowledgement messages can be used. 3.10 Classification of the VANET Applications: The applications of Vehicular Ad hoc Networks (VANET) are classified into three major groups: 1)comfort oriented applications 2) convenience-oriented applications and 3)safety oriented applications [11]. Safety oriented related applications look for the increasing security of passengers by exchanging relevant information through vehicle-to- infrastructure and vehicle-to-vehicle. And comfort and convenience applications improve passenger’s comfort and traffic efficiency. 3.10.1 Safety-Oriented Applications: These types of applications help the driver to avoid potential dangers through the exchange of information among vehicles. They are the important applications because they serve to avoid accidents [11]. Figure 3.17: Safety Applications provided by VANET
  • 20. For More Info Https://www.ThesisScientist.com They can take control of the vehicle in case of hazardous conditions, as in the case of the automatic braking and only send warning/emergency messages to drivers. Some safety oriented application shown in Table 3.1[11]. Table 3.1: Examples of Safety-Oriented Applications Name Description Intersection violation warning Intersection violation warns drivers when they are going to pass over a traffic red light . On-coming traffic warning It assists the driver during over taking manoeuvres Electronic brake warning It alerts to the driver that a preceding vehicle has performed a emergent braking. Vehicle stability warning It reports drivers that they should activate the vehicle stability control system. Post-crash notification A vehicle involved in an accident sends warning /emergency messages in broadcast to approaching vehicles. Traffic signal violation warning A roadside unit (RSU) sends messages in broadcast to warn drivers of potential violations of traffic signals. Lane change warning It assists drivers to perform a safe lane change 3.10.2 Convenience-Oriented Applications: These types of applications improve the efficiency of the roads and to save drivers time . Various Convenience oriented application shown in Table 3.2[11]. Some examples of Convenience Oriented Applications in VANET as shown in table 3.2. Table 3.2: Examples of Convenience-Oriented Applications Name Description Intersection management Vehicle to vehicle and Vehicle to RSU communications allow a better intersections management
  • 21. For More Info Https://www.ThesisScientist.com Limited access and detour warning A roadside unit (RSU) sends information in broadcast about limited access network areas or detours. Electronic toll collection A vehicle founds unicast communication with a toll gate road side unit( RSU) and pays the toll without stopping vehicle. Parking availability notification A vehicle asks to a roadside unit (RSU) for a list of available parking areas or parking spaces, and the roadside unit (RSU) sends the list to the vehicle. Congested road notification A vehicle in a congested road forwards information to other vehicles. Figure 3.18: Convenience Oriented Application Provided by VANET 3.10.3 Commercial-Oriented Applications: These types of applications serve to make the travelling more comfortable for example, by means of the internet connection. Few Commercial oriented application shown in Table 3.3[11]. Table 3.3: Examples of Commercial-Oriented Applications
  • 22. For More Info Https://www.ThesisScientist.com Name Description Remote diagnosis The vehicle driver can start a wireless connection with the dealer to upload the vehicle diagnostics information to identify the possible problems. Media or map download A vehicle can start a wireless connection with the hot-spot network and home network to download multimedia contents and location map. Service announcement Restaurants and other businesses can use a roadside unit(RSU) to send promotional messages to the drivers that are in their communication range.