SlideShare a Scribd company logo
A Combined Genetic Adaptive Search (GeneAS)
          for Engineering Design



    Kalyanmoy Deb and Mayank Goyal (India)

       Journal of Computer Science and Informatics, 1996
                    volume 26, page 30-45



                          Reviewed by

                      Paskorn Champrasert
                      paskorn@cs.umb.edu
                      http://dssg.cs.umb.edu
Outline
• Introduction
• Genetic Operations
    – Crossover (Binary Crossover, SBX Crossover)
    – Mutation
• GeneAS Algorithms
• Experiment Results
• Conclusion



 October 24, 08         DSSG Group Meeting          2/31
Introduction
• The aim in an engineering design problem is to
  minimize or maximize a design objective and
  satisfy constraints.
• The optimization problem can be expressed in the
  following form:

• The variable
  vector X
  represents a set
  of variables.
                       xi , i = 1, 2, , N
October 24, 08       DSSG Group Meeting          3/31
A Simple Cantilever beam design problem:
• A cantilever beam is a beam that is rigidly supported at
  one end and carries a certain load on the other end.
                      Design possibilities:
                      - Shape (circular or square)
                           binary design variable (0/1)
                      - Size
                        Diameter of circular shape
                        Side of square shape
                           discrete variable
                        because size are not available in any sizes
                      - Length
                           real variable
                        because we can cut beams at any length
                      - Material
                            discrete variable
                         (cast iron, aluminum, steel, brass)
  October 24, 08           DSSG Group Meeting                         4/31
Research Issues
• The optimization problem is involving with different types of
  variables.
  E.g.,
  - For the material variable
    if the steel is represented as 1 and cast iron is represented as 2,
         no intermediate value (e.g., 1.4 ) is allowed.
             binary-coded variable should be used.
  - For the beam length variable (0-100)
    if the length is represented by using 4 bit binary-coded variable
  (0000-1111). The precision of the variable is only 100/16 = 6.25
        no more precise value (e.g., 2.5) is allowed
            real-coded variable should be used.
• Designers must rely on an optimization algorithms which is
  flexible enough to handle a mixed type of variables

 October 24, 08               DSSG Group Meeting                          5/31
GeneAS
• The algorithm restricts its search only to the permissible
  values of the design variables.

• GeneAS uses a combination of binary-coded and real-
  coded GA, depending on the nature of the design
  variables.
     – Variables are coded differently
     – Genetic Operations (crossover and mutation) are performed
       differently for each variable.
        E.g.,
        - Beam length is real-coded variable
             real value crossover and real value mutation are used.
        - Beam diameter is binary-coded variable
            binary value crossover and real value mutation are used.

October 24, 08                DSSG Group Meeting                       6/31
Binary-Coded GA
• In a binary-coded GA, the variables are
  represented in binary strings formed with 1 and 0.
• Variables can be expressed as :
            ( b1b2b3…bn ) , bi is ether 1 or 0
• E.g., 7-bit string representing the diameter in the
  range of (3,130) mm, the precision in the solution
  is 1 mm
    (130-3)/(1111111B-0000000B)
    = 127/127 = 1mm

  October 24, 08        DSSG Group Meeting              7/31
Binary Genetic Operations
                               One-point Crossover
1       0        0      1
                                   1) A single crossover point on both parents
1       1        1      0          string is selected.
                                   2) All data beyond that crossover point in
                 Crossover point
                                   either parent is swapped between the two
1       0        1      0          parent organisms.

1       1        0      1          The resulting organisms are the offspring:



                                   Binary Mutation
1       1        1      0
                                    Each bit of offspring has a probability
1       1        0      0           (mutation rate) to flip (0 1 or 1 0)

October 24, 08                           DSSG Group Meeting                      8/31
Important Property of One-Point Crossover
1) The average of the decoded parameter values is
  the same before and after the crossover
  operation.

  1       0      0   1   9
                                    Average = 11.5
  1       1      1   0 14

  1       0      1   0   10
                                    Average = 11.5
  1       1      0   1   13

October 24, 08                DSSG Group Meeting     9/31
October 24, 08   DSSG Group Meeting   10/31
Important Property of One-Point Crossover
2) Spread factor:
   Spread factor β is defined as the ratio of the spread of
   offspring points to that of the parent points:
                              c1 −c2
                   β=       | p1 −p2 |
                                                                 c1   c2

- Contracting Crossover       β<1                          p1              p2
    The offspring points are enclosed by the parent points.

- Expanding Crossover         β>1                     c1                        c2

    The offspring points enclose the parent points.        p1              p2

- Stationary Crossover       β=1                                c1              c2
     The offspring points are the same as parent points         p1              p2
 October 24, 08               DSSG Group Meeting                            11/31
Spread Factor Property
• Assume parents strings are two strings:
     p1= (a1a2a3…a15)
     p2 = (b1b2b3…b15).
• The crossover point is varied from (0,15)
                     The probability distribution:
                     -- The probability of occurrence of β ≈ 1 is more likely than
                     any other β value.
                         If the parents are closer, the spread of the two likely
                     offspring is also smaller.
                         If the spread of parents is more, the spread of likely
                     offspring is also large.




  October 24, 08                 DSSG Group Meeting                             12/31
Real-Coded GA
• In a real-coded GA, the variables are represented in continuous
  variables.
• Variables can be expressed as :
               X , X is any number in [XL,XU]
               XL is lower bound ,XU is upper bound

• The binary-coded genetic operations cannot be used for real-coded
  variables.

• The genetic operations have to be modified in order to handle real-
  coded variables
  However, the proposed real-coded genetic operations should
  reserve the binary-coded genetic operation properties.


   October 24, 08             DSSG Group Meeting                      13/31
SBX
             Simulated Binary Crossover
• Simulated Binary Crossover (SBX) was proposed in
  1995 by Deb and Agrawal.

• SBX was designed with respect to the one-point
  crossover properties in binary-coded GA.
     – Average Property:
       The average of the decoded parameter values is the same
       before and after the crossover operation.
     – Spread Factor Property:
       The probability of occurrence of spread factor β ≈ 1 is more
       likely than any other β value.


October 24, 08               DSSG Group Meeting                       14/31
SBX – Offspring Value
To reserve the average property, the offspring values
 are calculated as:
  Offspring:                                                  c1   c2

            c1 = x − 1 β(p2 − p1 )
                 ¯ 2                  β<1                p1              p2

            c2 = x + 1 β(p2 − p1 )
                 ¯ 2
                                                   c1                    c2
    By,                               β>1
                   1
          x=
          ¯        2 (p1
                  + p2 )                                p1              p2
          p2 > p1
                                                        c1              c2
      So,
                                       β=1              p1              p2
            c=x
            ¯ ¯
  October 24, 08              DSSG Group Meeting                              15/31
Spread Factor (β) in SBX
• The probability distribution of β in SBX should be similar (e.g.
  same shape) to the probability distribution of β in Binary-coded
  crossover.
• This paper proposed probability                        c(β) = 0.5(n + 1)β n , β ≤ 1
  distribution function as:                                                   1
                                                         c(β) = 0.5(n + 1) β n+2 , β > 1
                                                                  1.6
                                                                  1.4




                                       Probability Distribution
                                                                  1.2
                                                                  1.0                   n=2
                                                                  0.8
                                                                  0.6
                                                                  0.4
                                                                  0.2
                                                                  0.0
                                                                        0   1   2   3    4    5   6     7
                                                                                    β



October 24, 08              DSSG Group Meeting                                                        16/31
A large value of n gives a higher
                              probability for creating ‘near-parent’
contracting                   solutions.
   c(β) = 0.5(n + 1)β n , β ≤ 1



                      expanding
                                            1
                       c(β) = 0.5(n + 1) β n+2 , β > 1




                                                 Mostly, n=2 to 5
October 24, 08              DSSG Group Meeting                    17/31
Spread Factor (β) as a random number
          • β is a random number that follows the proposed
            probability distribution function:
                           1.6
                           1.4
                                                                         To get a β value,
Probability Distribution




                           1.2
                                                                         1) A unified random number u
                                                     n=2
                                                                            is generated [0,1]
                           1.0
                           0.8
                           0.6                                           2) Get β value that makes the
                           0.4
                           0.2
                                                                            area under the curve = u
                           0.0
                                     u
                                 0   1       2   3    4    5   6     7
                                                 β                          Offspring:
                                         β
                                                                                    c1 = x − 1 β(p2 − p1 )
                                                                                         ¯ 2
                                                                                    c2 = x + 1 β(p2 − p1 )
                                                                                         ¯ 2
                    October 24, 08                                 DSSG Group Meeting                   18/31
Real Mutation
• Mutation probability (pm) in (0,1) is applied to each
  variable.
• For each variable
      If a unified random number um in (0,1) < pm
  mutation operator is performed for the variable.
                                                 p: parent
                                                 c: offspring

                         It represent the maximum permissible change
                         in the parent

    ¯
    δ      is a random number. Its probability distribution function is:


October 24, 08                  DSSG Group Meeting                         19/31
¯
     ± is generated the same process as the      β

October 24, 08              DSSG Group Meeting       20/31
Combined GA (GeneAS)
• GeneAS
     – Each variable is coded depending on its nature.
     – The crossover operator and mutation operator have
       to be applied variable by variable.
           • If it is a binary-coded variable, the binary-genetic
             operations are performed
           • If it is a real-coded variable, the real-genetic operations are
             performed.
     – The fitness function and constraint function are
       calculated as normal.


October 24, 08                   DSSG Group Meeting                       21/31
*reproduction = selection mechanism
October 24, 08   DSSG Group Meeting                    22/31
Experiments
• Two different problems are solved using GeneAS.
• Two different problems were solved using different
  traditional optimization algorithms.
      - Lagrange multiplier method
           by Kannan and Kramer 1993
      - Branch and Bound method
             by Sandgren 1988
• GeneAS
      Crossover Probability =0.9
       Mutation Probability =0
      Selection mechanism = ?
      Population size =50
      Max generation =?

October 24, 08         DSSG Group Meeting              23/31
Gear Train Design




October 24, 08        DSSG Group Meeting   24/31
• Since, all the four variables are discrete, each
  variable is coded in six-bit binary string (64
  values), so that variables take values between 12
  and 75.
• Four constraints are added to the objective
  function.




October 24, 08       DSSG Group Meeting           25/31
Result




GeneAS have found much better solutions than the
 previously known optimal solutions.
October 24, 08      DSSG Group Meeting         26/31
Welded Beam Design
• A rectangular beam needs to be welded as a
  cantilever beam to carry a certain load.
• The objective of the design of the welded beam
  is to minimize the overall cost of the fabrication
  which involves the cost of beam material and the
  cost of weld deposit.
• Two different welding configurations can be
  applied.
    (1 is used for four-sided welding and 0 is used
  for two-sided welding) : X1
October 24, 08         DSSG Group Meeting          27/31
• One of the four materials can be used
     – (00-steel, 01-cast iron, 10-aluminum, 11-brass): X2
•   h : X3
•   t : X4
•   b : X5
•   l : X6




October 24, 08            DSSG Group Meeting                 28/31
October 24, 08   DSSG Group Meeting   29/31
Results
 X1          = Four-sided X2 =Steel
 X3          =0.1875 X4 =8.2500 X5 =0.2500 X6 =1.6849

 g1(x)       =380.1660
 g2(x)       =402.0473
 g3(x)       = 0.2346
 g4(x)       = 0.1621

     F(x) =1.9622




October 24, 08             DSSG Group Meeting           30/31
Conclusions
• This paper presents a proposed genetic
  algorithms for engineering optimization
  problems.
• The type variable can be different.
• SBX and real-mutation is proposed.
• The results show that GeneAS can find very
  good optimal solutions.



October 24, 08      DSSG Group Meeting         31/31
Discrete Variables




October 24, 08         DSSG Group Meeting   32/31
SBX




October 24, 08   DSSG Group Meeting   33/31
BLX-α
    • Blend Crossover (BLX-α) was proposed by Eshelman and
      Schaffer (1993)
    • BLX-α operator is used for real-parameter GAs.
    • α represents a constant. (0,1)
    • For two parents x1 and x2 (assume x1 < x2)
    • BLX-α randomly picks a solution in the range
      [x1- α(x2-x1) , x2+ α(x2-x1) ]
                                                 Possible offspring

                              x1       x2
                      α(x2-x1)           α(x2-x1)

    • The investigators have reported that BLX-0.5 (α=0.5)
    performs better than BLX operators with other α value.

October 24, 08              DSSG Group Meeting                        34/31

More Related Content

What's hot

Genetic algorithms
Genetic algorithmsGenetic algorithms
Genetic algorithms
zamakhan
 
Cuckoo Optimization ppt
Cuckoo Optimization pptCuckoo Optimization ppt
Cuckoo Optimization ppt
Anuja Joshi
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimization
Suman Chatterjee
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
Karthik Sankar
 
Multi Objective Optimization
Multi Objective OptimizationMulti Objective Optimization
Multi Objective Optimization
Nawroz University
 
PSO and Its application in Engineering
PSO and Its application in EngineeringPSO and Its application in Engineering
PSO and Its application in Engineering
Prince Jain
 
Genetic algorithm raktim
Genetic algorithm raktimGenetic algorithm raktim
Genetic algorithm raktim
Raktim Halder
 
Particle Swarm Optimization by Rajorshi Mukherjee
Particle Swarm Optimization by Rajorshi MukherjeeParticle Swarm Optimization by Rajorshi Mukherjee
Particle Swarm Optimization by Rajorshi Mukherjee
Rajorshi Mukherjee
 
Genetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial IntelligenceGenetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial Intelligence
Sahil Kumar
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
SHIMI S L
 
Optimization and particle swarm optimization (O & PSO)
Optimization and particle swarm optimization (O & PSO) Optimization and particle swarm optimization (O & PSO)
Optimization and particle swarm optimization (O & PSO)
Engr Nosheen Memon
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
garima931
 
Ga
GaGa
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimization
Mahesh Tibrewal
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Ahmed Gad
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
SEKHARREDDYAMBATI
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by Example
Nobal Niraula
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
Mohamed Talaat
 
Introduction to Transformer Model
Introduction to Transformer ModelIntroduction to Transformer Model
Introduction to Transformer Model
Nuwan Sriyantha Bandara
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
Syed Muhammad Zeejah Hashmi
 

What's hot (20)

Genetic algorithms
Genetic algorithmsGenetic algorithms
Genetic algorithms
 
Cuckoo Optimization ppt
Cuckoo Optimization pptCuckoo Optimization ppt
Cuckoo Optimization ppt
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimization
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
 
Multi Objective Optimization
Multi Objective OptimizationMulti Objective Optimization
Multi Objective Optimization
 
PSO and Its application in Engineering
PSO and Its application in EngineeringPSO and Its application in Engineering
PSO and Its application in Engineering
 
Genetic algorithm raktim
Genetic algorithm raktimGenetic algorithm raktim
Genetic algorithm raktim
 
Particle Swarm Optimization by Rajorshi Mukherjee
Particle Swarm Optimization by Rajorshi MukherjeeParticle Swarm Optimization by Rajorshi Mukherjee
Particle Swarm Optimization by Rajorshi Mukherjee
 
Genetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial IntelligenceGenetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial Intelligence
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Optimization and particle swarm optimization (O & PSO)
Optimization and particle swarm optimization (O & PSO) Optimization and particle swarm optimization (O & PSO)
Optimization and particle swarm optimization (O & PSO)
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Ga
GaGa
Ga
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimization
 
Genetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step ExampleGenetic Algorithm (GA) Optimization - Step-by-Step Example
Genetic Algorithm (GA) Optimization - Step-by-Step Example
 
Genetic Algorithm
Genetic AlgorithmGenetic Algorithm
Genetic Algorithm
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by Example
 
Particle Swarm Optimization - PSO
Particle Swarm Optimization - PSOParticle Swarm Optimization - PSO
Particle Swarm Optimization - PSO
 
Introduction to Transformer Model
Introduction to Transformer ModelIntroduction to Transformer Model
Introduction to Transformer Model
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 

Similar to Simulated Binary Crossover

Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Masahiro Kanazaki
 
Self Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary CrossoverSelf Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary Crossover
paskorn
 
PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...
Jinwon Lee
 
Condition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating EquipmentCondition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating Equipment
Jordan McBain
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
Tokyo Tech (Tokyo Institute of Technology)
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductors
wtyru1989
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
gueste63bd9
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
ganuraga
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
Gianmario Spacagna
 
28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad
Media4math
 
Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...
Till Blume
 
From FVS to F-Deletion
From FVS to F-DeletionFrom FVS to F-Deletion
From FVS to F-Deletion
Neeldhara Misra
 
On recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEKOn recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEK
edadk
 
Lecture6
Lecture6Lecture6
Lecture6
voracle
 
R02410651069
R02410651069R02410651069
R02410651069
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative RecommendersOn the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
Jérôme KUNEGIS
 
GRUPO 5 : novel fuzzy logic based edge detection technique
GRUPO 5 :  novel fuzzy logic based edge detection techniqueGRUPO 5 :  novel fuzzy logic based edge detection technique
GRUPO 5 : novel fuzzy logic based edge detection technique
viisonartificial2012
 
study Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processingstudy Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processing
Chiamin Hsu
 
Attention is All You Need (Transformer)
Attention is All You Need (Transformer)Attention is All You Need (Transformer)
Attention is All You Need (Transformer)
Jeong-Gwan Lee
 

Similar to Simulated Binary Crossover (20)

Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
Multidisciplinary Design Optimization of Supersonic Transport Wing Using Surr...
 
Self Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary CrossoverSelf Adaptive Simulated Binary Crossover
Self Adaptive Simulated Binary Crossover
 
PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...PR-297: Training data-efficient image transformers & distillation through att...
PR-297: Training data-efficient image transformers & distillation through att...
 
Condition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating EquipmentCondition Monitoring Of Unsteadily Operating Equipment
Condition Monitoring Of Unsteadily Operating Equipment
 
Interactive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social GraphsInteractive High-Dimensional Visualization of Social Graphs
Interactive High-Dimensional Visualization of Social Graphs
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductors
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
 
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
A Measure Of Independence For A Multifariate Normal Distribution And Some Con...
 
TunUp final presentation
TunUp final presentationTunUp final presentation
TunUp final presentation
 
28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad28. distance formulatemplatetouchpad
28. distance formulatemplatetouchpad
 
Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...Incremental and parallel computation of structural graph summaries for evolvi...
Incremental and parallel computation of structural graph summaries for evolvi...
 
From FVS to F-Deletion
From FVS to F-DeletionFrom FVS to F-Deletion
From FVS to F-Deletion
 
On recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEKOn recent improvements in the conic optimizer in MOSEK
On recent improvements in the conic optimizer in MOSEK
 
Lecture6
Lecture6Lecture6
Lecture6
 
R02410651069
R02410651069R02410651069
R02410651069
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative RecommendersOn the Scalability of Graph Kernels Applied to Collaborative Recommenders
On the Scalability of Graph Kernels Applied to Collaborative Recommenders
 
GRUPO 5 : novel fuzzy logic based edge detection technique
GRUPO 5 :  novel fuzzy logic based edge detection techniqueGRUPO 5 :  novel fuzzy logic based edge detection technique
GRUPO 5 : novel fuzzy logic based edge detection technique
 
study Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processingstudy Domain Transform for Edge-Aware Image and Video Processing
study Domain Transform for Edge-Aware Image and Video Processing
 
Attention is All You Need (Transformer)
Attention is All You Need (Transformer)Attention is All You Need (Transformer)
Attention is All You Need (Transformer)
 

Recently uploaded

"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 

Recently uploaded (20)

"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 

Simulated Binary Crossover

  • 1. A Combined Genetic Adaptive Search (GeneAS) for Engineering Design Kalyanmoy Deb and Mayank Goyal (India) Journal of Computer Science and Informatics, 1996 volume 26, page 30-45 Reviewed by Paskorn Champrasert paskorn@cs.umb.edu http://dssg.cs.umb.edu
  • 2. Outline • Introduction • Genetic Operations – Crossover (Binary Crossover, SBX Crossover) – Mutation • GeneAS Algorithms • Experiment Results • Conclusion October 24, 08 DSSG Group Meeting 2/31
  • 3. Introduction • The aim in an engineering design problem is to minimize or maximize a design objective and satisfy constraints. • The optimization problem can be expressed in the following form: • The variable vector X represents a set of variables. xi , i = 1, 2, , N October 24, 08 DSSG Group Meeting 3/31
  • 4. A Simple Cantilever beam design problem: • A cantilever beam is a beam that is rigidly supported at one end and carries a certain load on the other end. Design possibilities: - Shape (circular or square) binary design variable (0/1) - Size Diameter of circular shape Side of square shape discrete variable because size are not available in any sizes - Length real variable because we can cut beams at any length - Material discrete variable (cast iron, aluminum, steel, brass) October 24, 08 DSSG Group Meeting 4/31
  • 5. Research Issues • The optimization problem is involving with different types of variables. E.g., - For the material variable if the steel is represented as 1 and cast iron is represented as 2, no intermediate value (e.g., 1.4 ) is allowed. binary-coded variable should be used. - For the beam length variable (0-100) if the length is represented by using 4 bit binary-coded variable (0000-1111). The precision of the variable is only 100/16 = 6.25 no more precise value (e.g., 2.5) is allowed real-coded variable should be used. • Designers must rely on an optimization algorithms which is flexible enough to handle a mixed type of variables October 24, 08 DSSG Group Meeting 5/31
  • 6. GeneAS • The algorithm restricts its search only to the permissible values of the design variables. • GeneAS uses a combination of binary-coded and real- coded GA, depending on the nature of the design variables. – Variables are coded differently – Genetic Operations (crossover and mutation) are performed differently for each variable. E.g., - Beam length is real-coded variable real value crossover and real value mutation are used. - Beam diameter is binary-coded variable binary value crossover and real value mutation are used. October 24, 08 DSSG Group Meeting 6/31
  • 7. Binary-Coded GA • In a binary-coded GA, the variables are represented in binary strings formed with 1 and 0. • Variables can be expressed as : ( b1b2b3…bn ) , bi is ether 1 or 0 • E.g., 7-bit string representing the diameter in the range of (3,130) mm, the precision in the solution is 1 mm (130-3)/(1111111B-0000000B) = 127/127 = 1mm October 24, 08 DSSG Group Meeting 7/31
  • 8. Binary Genetic Operations One-point Crossover 1 0 0 1 1) A single crossover point on both parents 1 1 1 0 string is selected. 2) All data beyond that crossover point in Crossover point either parent is swapped between the two 1 0 1 0 parent organisms. 1 1 0 1 The resulting organisms are the offspring: Binary Mutation 1 1 1 0 Each bit of offspring has a probability 1 1 0 0 (mutation rate) to flip (0 1 or 1 0) October 24, 08 DSSG Group Meeting 8/31
  • 9. Important Property of One-Point Crossover 1) The average of the decoded parameter values is the same before and after the crossover operation. 1 0 0 1 9 Average = 11.5 1 1 1 0 14 1 0 1 0 10 Average = 11.5 1 1 0 1 13 October 24, 08 DSSG Group Meeting 9/31
  • 10. October 24, 08 DSSG Group Meeting 10/31
  • 11. Important Property of One-Point Crossover 2) Spread factor: Spread factor β is defined as the ratio of the spread of offspring points to that of the parent points: c1 −c2 β= | p1 −p2 | c1 c2 - Contracting Crossover β<1 p1 p2 The offspring points are enclosed by the parent points. - Expanding Crossover β>1 c1 c2 The offspring points enclose the parent points. p1 p2 - Stationary Crossover β=1 c1 c2 The offspring points are the same as parent points p1 p2 October 24, 08 DSSG Group Meeting 11/31
  • 12. Spread Factor Property • Assume parents strings are two strings: p1= (a1a2a3…a15) p2 = (b1b2b3…b15). • The crossover point is varied from (0,15) The probability distribution: -- The probability of occurrence of β ≈ 1 is more likely than any other β value. If the parents are closer, the spread of the two likely offspring is also smaller. If the spread of parents is more, the spread of likely offspring is also large. October 24, 08 DSSG Group Meeting 12/31
  • 13. Real-Coded GA • In a real-coded GA, the variables are represented in continuous variables. • Variables can be expressed as : X , X is any number in [XL,XU] XL is lower bound ,XU is upper bound • The binary-coded genetic operations cannot be used for real-coded variables. • The genetic operations have to be modified in order to handle real- coded variables However, the proposed real-coded genetic operations should reserve the binary-coded genetic operation properties. October 24, 08 DSSG Group Meeting 13/31
  • 14. SBX Simulated Binary Crossover • Simulated Binary Crossover (SBX) was proposed in 1995 by Deb and Agrawal. • SBX was designed with respect to the one-point crossover properties in binary-coded GA. – Average Property: The average of the decoded parameter values is the same before and after the crossover operation. – Spread Factor Property: The probability of occurrence of spread factor β ≈ 1 is more likely than any other β value. October 24, 08 DSSG Group Meeting 14/31
  • 15. SBX – Offspring Value To reserve the average property, the offspring values are calculated as: Offspring: c1 c2 c1 = x − 1 β(p2 − p1 ) ¯ 2 β<1 p1 p2 c2 = x + 1 β(p2 − p1 ) ¯ 2 c1 c2 By, β>1 1 x= ¯ 2 (p1 + p2 ) p1 p2 p2 > p1 c1 c2 So, β=1 p1 p2 c=x ¯ ¯ October 24, 08 DSSG Group Meeting 15/31
  • 16. Spread Factor (β) in SBX • The probability distribution of β in SBX should be similar (e.g. same shape) to the probability distribution of β in Binary-coded crossover. • This paper proposed probability c(β) = 0.5(n + 1)β n , β ≤ 1 distribution function as: 1 c(β) = 0.5(n + 1) β n+2 , β > 1 1.6 1.4 Probability Distribution 1.2 1.0 n=2 0.8 0.6 0.4 0.2 0.0 0 1 2 3 4 5 6 7 β October 24, 08 DSSG Group Meeting 16/31
  • 17. A large value of n gives a higher probability for creating ‘near-parent’ contracting solutions. c(β) = 0.5(n + 1)β n , β ≤ 1 expanding 1 c(β) = 0.5(n + 1) β n+2 , β > 1 Mostly, n=2 to 5 October 24, 08 DSSG Group Meeting 17/31
  • 18. Spread Factor (β) as a random number • β is a random number that follows the proposed probability distribution function: 1.6 1.4 To get a β value, Probability Distribution 1.2 1) A unified random number u n=2 is generated [0,1] 1.0 0.8 0.6 2) Get β value that makes the 0.4 0.2 area under the curve = u 0.0 u 0 1 2 3 4 5 6 7 β Offspring: β c1 = x − 1 β(p2 − p1 ) ¯ 2 c2 = x + 1 β(p2 − p1 ) ¯ 2 October 24, 08 DSSG Group Meeting 18/31
  • 19. Real Mutation • Mutation probability (pm) in (0,1) is applied to each variable. • For each variable If a unified random number um in (0,1) < pm mutation operator is performed for the variable. p: parent c: offspring It represent the maximum permissible change in the parent ¯ δ is a random number. Its probability distribution function is: October 24, 08 DSSG Group Meeting 19/31
  • 20. ¯ ± is generated the same process as the β October 24, 08 DSSG Group Meeting 20/31
  • 21. Combined GA (GeneAS) • GeneAS – Each variable is coded depending on its nature. – The crossover operator and mutation operator have to be applied variable by variable. • If it is a binary-coded variable, the binary-genetic operations are performed • If it is a real-coded variable, the real-genetic operations are performed. – The fitness function and constraint function are calculated as normal. October 24, 08 DSSG Group Meeting 21/31
  • 22. *reproduction = selection mechanism October 24, 08 DSSG Group Meeting 22/31
  • 23. Experiments • Two different problems are solved using GeneAS. • Two different problems were solved using different traditional optimization algorithms. - Lagrange multiplier method by Kannan and Kramer 1993 - Branch and Bound method by Sandgren 1988 • GeneAS Crossover Probability =0.9 Mutation Probability =0 Selection mechanism = ? Population size =50 Max generation =? October 24, 08 DSSG Group Meeting 23/31
  • 24. Gear Train Design October 24, 08 DSSG Group Meeting 24/31
  • 25. • Since, all the four variables are discrete, each variable is coded in six-bit binary string (64 values), so that variables take values between 12 and 75. • Four constraints are added to the objective function. October 24, 08 DSSG Group Meeting 25/31
  • 26. Result GeneAS have found much better solutions than the previously known optimal solutions. October 24, 08 DSSG Group Meeting 26/31
  • 27. Welded Beam Design • A rectangular beam needs to be welded as a cantilever beam to carry a certain load. • The objective of the design of the welded beam is to minimize the overall cost of the fabrication which involves the cost of beam material and the cost of weld deposit. • Two different welding configurations can be applied. (1 is used for four-sided welding and 0 is used for two-sided welding) : X1 October 24, 08 DSSG Group Meeting 27/31
  • 28. • One of the four materials can be used – (00-steel, 01-cast iron, 10-aluminum, 11-brass): X2 • h : X3 • t : X4 • b : X5 • l : X6 October 24, 08 DSSG Group Meeting 28/31
  • 29. October 24, 08 DSSG Group Meeting 29/31
  • 30. Results X1 = Four-sided X2 =Steel X3 =0.1875 X4 =8.2500 X5 =0.2500 X6 =1.6849 g1(x) =380.1660 g2(x) =402.0473 g3(x) = 0.2346 g4(x) = 0.1621 F(x) =1.9622 October 24, 08 DSSG Group Meeting 30/31
  • 31. Conclusions • This paper presents a proposed genetic algorithms for engineering optimization problems. • The type variable can be different. • SBX and real-mutation is proposed. • The results show that GeneAS can find very good optimal solutions. October 24, 08 DSSG Group Meeting 31/31
  • 32. Discrete Variables October 24, 08 DSSG Group Meeting 32/31
  • 33. SBX October 24, 08 DSSG Group Meeting 33/31
  • 34. BLX-α • Blend Crossover (BLX-α) was proposed by Eshelman and Schaffer (1993) • BLX-α operator is used for real-parameter GAs. • α represents a constant. (0,1) • For two parents x1 and x2 (assume x1 < x2) • BLX-α randomly picks a solution in the range [x1- α(x2-x1) , x2+ α(x2-x1) ] Possible offspring x1 x2 α(x2-x1) α(x2-x1) • The investigators have reported that BLX-0.5 (α=0.5) performs better than BLX operators with other α value. October 24, 08 DSSG Group Meeting 34/31