Genetic algorithms for credit card fraud detection

Size: px
Start display at page:

Download "Genetic algorithms for credit card fraud detection"

Transcription

1 Genetic algorithms for credit card fraud detection SATVIK VATS*, SURYA KANT DUBEY, NAVEEN KUMAR PANDEY Institute of Technology and Management AL-1, Sector-7 GIDA, Gorakhpur, Uttar Pradesh, INDIA address- Abstract: - Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In real life, fraudulent transactions are scattered with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. Many modern techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, Genetic Programming etc., has evolved in detecting various credit card fraudulent transactions. A genetic algorithm is an evolutionary search and optimisation technique that Mimics natural evolution to find the best solution to a problem. Here the characteristics of credit card transactions undergo evolution to allow a modelled credit card fraud detection system to be tested. Key- Words:- Electronic commerce, fraud, credit card, genetic algorithms, detection 1 Introduction In recent history information technology has become far more pervasive in everyone s lives. As reliance on software products increases, so does the pressure to ensure that they work reliably and as expected. This is why software testing has risen to the forefront of public attention, with notable instances such as the iphone alarm bug [3]. In 1998, the Data Protection Act changed the way data can be used [13]. Until this time, developers in the UK working in industry have simply made copies of customer data and used it in an often less secure development environment. The Act introduces legislation intended to give more rights to individuals whose data is being held, and restricts uses to which it can be put. For example a company wishing to outsource some of its development may not have the right to pass on its customers data, hence doing so would be a 42

2 violation of the Act. The company Grid-Tools Limited is our industrial partner for this project. They offer professional solutions for automatic test data generation in the form of a tool called Data Maker. This tool was originally written to address the increasing size of data sets required by industry. As the set size increases it becomes impractical to create the data by hand, so automatic methods had to be found. Data Maker is capable of generating synthetic data that conforms to the requirements of a test engineer s specification. The data created is not regulated by the Data Protection Act, because it has been generated rather than gathered. Thus it is not related to any individual and hence not covered in legislation. The use of synthetic data has advantages in its own right: large sets of data can be created, with their composition tailored to meet test coverage criteria. A set of real-world data may not do this, as it is likely to be of relatively constant composition, so not testing all aspects of the program. A limitation of Data Maker is that it can only produce linear sets of data from its built-in functions. The systematic testing of some software, however, requires data sets with trends. A typical example of such a system is a credit card fraud detection system. To thoroughly test such a system one would require a large set of realistic transactions, both legitimate and fraudulent. For reasons discussed above real data should not be used, so instead a way to generate such data must be found. 2 Related work Genetic algorithms are a heuristic used to solve high-complexity computational problems. Apart from modeling the phenomena occurring in nature, they help in optimization, simulation, modeling, design and prediction purposes in science, medicine, technology, and everyday life [14]. A recent survey of the state of the art was carried out for the Materials and Manufacturing Processes journal in 2009, by Paszkowicz [14]. As the name of the journal suggests they were only concerned with the application of genetic algorithms to problems in chemistry and physics, but nonetheless they highlighted some innovative uses. One cited example was to help the design process of new materials, in particular with regards to a reverse heat transfer problem. The problem consists of finding a material with desirable thermal properties that give rise to a good temperature field profile. For a particular material well known equations can be used to calculate the temperature profile, but because of their complex nature the process cannot easily be reversed to find optimal parameters. This is an area where evolutionary search often excels, as we will see in the next example where the search is applied to an NP complete problem. The algorithm used in this case modeled a liquid material that was being heated linearly on its surface. The input to the algorithm, its initial population, was properties of already known similar liquids. The output computed for each liquid was the temperature field and the cooling rate. Good results were returned by the algorithm, which were later confirmed to be correct experimentally. Still in the same materials engineering survey, evolutionary search has been applied to the mechanical process of welding. To produce a strong weld several parameters have to be optimized, such as current, voltage, torch speed, arc gap, shielding gas and its flow rate, type and geometry of the electrode. It can already be seen how this optimization process could lend itself to the application of a genetic algorithm, and once again good results were found for what would have been an expensive experimental process. Not only did the results of the optimization provide a better set of welding parameters, they also shed light on 43

3 the transformation of the metal during the weld. This had already been described theoretically, but the results from the algorithm helped to bring calculations and experimental results closer together. In a purely theoretical area, genetic algorithms have been applied to find approximate solutions to the travelling salesman problem. Scaling became an issue as the number of cities the salesman had to visit increased. Braun [4] reported that the algorithm could generate very good but not optimal solutions for travelling salesman problems with 442 to 531 cities. Using a standard SUN workstation they could optimally solve problems with up to 442 cities in under thirty minutes. The biggest problem examined was 666 cities, which could be solved approximately with a journey 0.04% longer than the optimum route. Potvin also analyzed Travelling Salesman with genetic algorithms [6]. The biggest problem reported in his survey was one million cities, solved to within 4% of an optimal route. This took four hours on a powerful computer. He identified the role played by the crossover operator on the outcome, with performance being significantly affected by the reordering of the tour. Perhaps the most well known application of machine learning is robotic movement. Schultz [1] applied the algorithm so that autonomous robots could navigate and perform collision avoidance of obstacles in their path. An innovative part of his work was once again aimed at cost and time saving, similar to the previously detailed welding example. The task set for the autonomous robot was to navigate from a start to end point down no pre planned route, avoiding randomly placed obstacles on its way. 3. Fraud Detection using Genetic Algorithm Genetic algorithms are evolutionary algorithms which aim at obtaining better solutions as time progresses. Since their first introduction by Holland [5], they have been successfully applied to many problem domains from astronomy to sports [2], from optimization [8] to computer science [7], etc. They have also been used in data mining mainly for variable selection [10] and are mostly coupled with other data mining algorithms. In this study, we try to solve our classification problem by using only a genetic algorithm solution. In this module the system must detect whether any fraud has been occurred in the transaction or not. It must also display the user about the result. In the following we make clear the concept of genetic algorithms by using an own example over boundary value testing. We implemented this algorithm in Java and can successfully generate inputs for the test. A genetic algorithm is a paradigm often used to search vast and poorly understood search spaces. With well defined functions the algorithm will converge into one area of the search space which holds the optimal solution. This example is a very simple instance of the algorithm that searches for a set of optimum inputs for black box testing. The function being tested checks whether or not a value x is within the range 0 x 8. Boundary value testing is concerned with selecting the following input Values: Maximum. 44

4 Maximum minus one. Nominal middle value. mutation ; perform crossover and evaluate population ; Minimum plus one. Minimum. In the same way as a chromosome is the basic building block of nature, so it is of a genetic algorithm. The chromosome is an encoded statement of the data which one wishes to optimise. In our example the chromosome would represent a tuple of all of the input values, and it is encoded as a binary string. The reason for this choice will become clear when further genetic operators are considered. In our example, the inputs 8, 7, 3, 1 and Fig.1 Selection of inputs for 0 x 8 These test cases will exercise the program to detect any errors, particularly those that are off by one. For simplicity we will assume that the correct input values are known. A generic genetic algorithm [11] SimpleGeneticAlgorithm ( ) initialise population ; evaluate population ; 0 would be encoded as their binary equivalent, and concatenated: The second task is to write a function to compare the relative merit of chromosomes... The fallowing pseudo code shows, pseudo-code for fitness calculation over an encoding of five bytes, each representing an input integer. A set of chromosomes goes to make up the population of the algorithm. Our algorithm is started with a randomly generated population of chromosomes. Evaluation of the fitness of a chromosome met ) nextgeneration ; while ( termination criteria not select solutions for Int fitness ( Chromosome input ) int fitness = 0 ; int [ ] ideal = new int [A : E ] ;// Array of ideal inputs A to E. 45

5 int [ ] actual = input. to Array ( ) ; // Retrieved at a from chromosome. ; for ( int i = A : E ; i++) fitness = absolute ( actual ideal ) return fitness ; should make it clear that the bit string is simply crossed, as the name suggests. Depending on the encoding, crossing in the middle of the chromosome may not be likely to give rise to fit progeny, where this is the case other points may be chosen, or indeed more than one point. Another common solution is to select a random point up to the length of the chromosome, and cross there. Crossover pseudo-code Chromosome crossover ( Chromosome parentx, Chromosome parenty ) int c r o s s P o i n t = 8 ; String x First Half = parentx. substring ( 0, cross Point ) ; Fig.2 Diagram of crossover. Crossover is the operator used to reproduce chromosomes. This works by taking a pair of encoded chromosomes - the parents - and combining them to produce two different chromosomes - the progeny. When applied across two fit chromosomes this method aims to produce progeny that have inherited the best attributes of its parents, though this is not always the case. To illustrate the principal, let s consider two chromosomes and assume a central crossover: If the parents are 0011 and 1100 the two progeny will be 0000 and 1111 respectively - see Figure 4. This String x Second Half = parentx. sub string ( cross Point, parentx. length ) ; String y First Half = parenty. sub string ( 0, cross Point ) ; String y Second Half = parenty. sub string ( cross Point, parenty. length ) ; Chromosome crossed X = x First Half + y Second Half ; Chromosome crossed Y = y First Half + x Second Half ; Mutation is essential to a true genetic algorithm. In popular culture mutation is often viewed in a negative light - simply consider how many horror films are based around some kind of mutant! In fact without mutation neither the world as we know it 46

6 nor our algorithms would evolve efficiently. Mutation is defined as a minimal change to a chromosome, so when one is using a binary string representation often a single bit is flipped. These changes are usually applied at the end of each generation before the breeding pool and population are combined again, but only with a very small probability of each chromosome being affected. If this was not done then no new genetic information would be produced after the initial population - note that crossover doesn t create anything, rather just recombine existing chromosomes. Without new chromosomes the algorithm is likely to cease with a suboptimal population, or run infinitely never converging on a solution. If, on the other hand, mutation levels are set too high the stream of new chromosomes could be too large, disrupting any convergent progress. If mutation was set to affect every chromosome in each generation and crossover removed, then the search has become completely stochastic. Mutation pseudo-code Chromosome mutate (Chromosome) int randomvalue = new Random( Chromosome. length ) ; i f ( Chromosome. valueat ( randomvalue ) == 0 ) == 1 ; Chromosome. valueat ( randomvalue ) else Chromosome. valueat ( randomvalue ) == 0 ; return Chromosome ; 3.1 Mathematical model Chromosome is the logical unit of information transmission to the next generation [12]. The definition of a chromosome can be taken a little deeper. Usually the chromosome holds a binary encoding of the optimization subject. Where this is the case the genetic algorithm is considered discrete, as clearly only a set number of values can be assumed. In some cases the encoding involves the real numbers instead, creating a continuous genetic algorithm. In other cases, such as modeling temperature, the use of a continuous chromosome is more appropriate. For natural selection to take place, some way of comparing one chromosome to the other must be available. In the algorithm this is modeled as a fitness or cost function, where a lower cost chromosome is favored over a higher cost. Cost function is mapping such that: chromosome R, where a value closer to zero shows a better optimized chromosome. The formalization that follows has been drawn from work by B ck [1] and Vose [9]. Wea begin by considering the algorithm at the highest level. It can be considered a finite state machine, where each state represents an arbitrary generation of the population at a time t. Between these states there is a transition, τ, to the next generation. The algorithm can be considered as a function with parameters, as shown in Equation (1). 47

7 Genetic Algorithm = (I, Φ, Ω, s, µ, λ, τ, ι) (1) In this representation, the following notation is used: I is the space of chromosomes, or the underlying search space. Each chromosome is of length l. Φ is a cost function I R. Ω represents a set of probabilistic genetic operators. We will specify these shortly. s represents a deterministic selection operator. A side affect of this operator is ensuring population size remains constant. µ is the number of parent individuals to include in reproduction. λ is the number of offspring individuals from reproduction. τ represents the complete process of transitioning from one generation to the next. This will be expanded shortly. ι represents an arbitrary termination condition. Initialization of I is carried out by a function randomly sampling the range Z (0,2). This is done l µ times. To relate this model to the finite state machine outlined above, we will clarify the operation of τ. Consider the population P at a generation t, P (t): with an average cost value, a relative improvement or a threshold standard deviation of the population. We now return our analysis to the genetic operators, Ω. In the set of reproductive functions we have recombination (crossover), and mutation. These can be considered as sexual and asexual operators respectively, characterized by the number of input chromosomes used. Because of its simpler nature we will first consider mutation. It can be modeled as a function ω: I p I q, where the chromosome I is shown as a binary vector. This means an arbitrary I can be shown as (a1,..., al ), where l is the length of the binary string. Mutation is the smallest unique change that can be made to a chromosome. By Definition of the mutation over a binary chromosome should be the random change of one bit. To model this, a random bit should be selected in the chromosome, 0 k l, k N, and that bit flipped. The function then looks like this: (a1,..., al ) (a1,..., ak..., al ) (3) Crossover is recombination of two chromosomes without loss of information. Crossover works by taking two chromosomes and swapping over the values after a random cross point. To do this, once again a random is selected, 0 k l, k N, and the function looks like this: t 1 : P (t + 1) = τ (P (t)) (2) The termination condition, ι, can be as simple or complex as required. For this analysis we will assume it is simply a maximum generation count, and that functionality to maintain this count is provided. In implementation this can be combined (a1,..., al ), (b1,..., bl ) (a1,..., ak, bk+1,...bl ), (b1,..., bk, ak+1,...al ) (4) Elitism is a property preventing current best chromosomes participating in mutation. Many algorithms implement elitism, as it prevents the fitness of a population decaying. If the population is in a suboptimal area of the search space the best solution is retained until mutation makes a 48

8 selection closer to the global optimum. From here normal evolution can continue. 3.2 Example run To illustrate better the operation of a genetic algorithm, we shall dry run an own example. For simplicity we will use a five by five grid, as shown in Figure 3. The optimal square is shaded in the centre. Chromosomes. Four chromosome will be defined, each of which is a coordinate x,y on the grid. Cost function. The number of squares the chromosome is away from the optimum square is used. Fig.4 End of generation one. In generation one the initial population is shown in Figure 4. To progress to generation two, the two best chromosomes are unchanged, and two new ones created by crossover. This is shown in Figure 5. Clearly the chromosome of cost one is selected, and as the remaining three have the same cost, we select the first, 5, and 4. The same process is iterated again, creating generation three, and giving rise to one optimal chromosome. This is in Figure 6. (a) Chromosomes. (b) Search space. Fig.3 Search space. Crossover. Two most optimal chromosomes go to the next generation unchanged, two new ones are created as: (x1, y1 ), (x2, y2 ) (y2, x1 ), (y1, x2 ) (5) Mutation. Not implemented. Initial population. Randomly instantiated. Elitism. Implemented. Fig.5 End of generation two. (a) Chromosomes. (b) Search space. (a) Chromosomes. (b) Search space. 49

9 The new population is generated and undergoes the same process it maximum number of generation is reached. 4.1 Selection process Selection is used for choosing the best individuals, that is, for selecting those chromosomes with higher fitness values. The Fig.6 End of generation three. One can see from this that the search space is systematically sampled, the best chromosomes selected, and their traits passed on into the next generation. The algorithms do work without mutation being implemented; in this case it was left out in the interests of minimizing generation count. In the case of a larger example it would become necessary to prevent the evolution stagnating in a suboptimal area, as without this convergence cannot be proven. 4. Flow of Genetic algorithm Initially the initial population is selected randomly from the sample space which has many populations. The fitness value is calculated for each chromosome in each population and is sorted out. In selection process two parent chromosomes are selected through tournament method. The Crossover forms new offspring (children) from the parent chromosomes using single point probability. Mutation mutates the new offspring using uniform probability measure. In elitism selection the best solution are passed to the further generation. selection operation takes the current population and produces a mating pool which contains the individuals which are going to reproduce. There are several selection methods, like biased selection, random selection, roulette wheel selection, tournament selection. In this work the following selection mechanisms are used. 4.2 Tournament Selection Tournament selection has been used in this as it selects optimal individuals from diverse groups. It selects t individuals from the current population uniformly at random, forms a tournament and the best individual of a group wins the tournament and is put into the mating pool for recombination. This process is repeated the number of times necessary to achieve the desired size of intermediate population. The tournament size controls the selection strength. The larger the tournament size, the stronger is the selection process. 4.3 Elitist Selection 50

10 In order to make sure that the best individuals of the solution are passed to further generations, and should not be lost in random selection, this selection operator is used. So we used a few best chromosomes from each generation, based on the higher fitness value and are passed to the next generation of population. 4.4 Reproduction by this procedure for the population, since only the best organisms from the first generation are selected for breeding, along with a small proportion of less fit solutions, for reasons already mentioned above. Although Crossover and Mutation are known as the main genetic operators, it is possible to use other operators such as regrouping, colonization-extinction, or migration in genetic algorithms. To generate a second generation population of solutions from those selected through genetic operators: crossover (also called recombination), and/or mutation. For each new solution to be produced, a pair of "parent" solutions is selected for breeding from the pool selected previously. By producing a "child" solution using the above methods of crossover and mutation, a new solution is created which typically shares many of the characteristics of its "parents". New parents are selected for each new child, and the process continues until a new population of solutions of appropriate size is generated. Although reproduction methods that are based on the use of two parents are more "biology inspired", some research suggests more than two "parents" are better to be used to reproduce a good quality chromosome. These processes ultimately result in the next generation population of chromosomes that is different from the initial generation. Generally the average fitness will have increased 4.5 Termination This generational process is repeated until a termination condition has been reached. Common terminating conditions are: A solution is found that satisfies minimum criteria Fixed number of generations reached Allocated budget (computation time/money) reached The highest ranking solution's fitness is reaching or has reached a plateau such that successive iterations no longer produce better results Manual inspection Combinations of the above 5. Conclusion This method proves accurate in deducting fraudulent transaction and minimizing the number 51

11 of false alert. Genetic algorithm is a novel one in this literature in terms of application domain. If this algorithm is applied into bank credit card fraud detection system, the probability of fraud transactions can be predicted soon after credit card transactions. And a series of anti-fraud strategies can be adopted to prevent banks from great losses and reduce risks. The objective of the study was taken differently than the typical classification problems in that we had a variable misclassification cost. As the standard data mining algorithms does not fit well with this situation we decided to use multi population genetic algorithm to obtain an optimized parameter. Future Enhancements The findings obtained here may not be generalized to the global fraud detection problem. As future work, some effective algorithm which can perform well for the classification problem with variable misclassification costs could be developed. REFERENCES [1] Alan C Schultz. Learning robot behaviours using genetic algorithms. Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory, Washington, [2] Charbonneau P., Genetic Algorithms in Astronomy and Astrophysics High Altitude Observatory. National Center for Athmospheric Research, pp , [3] Dr Markus Roggenbach. CS364 Software testing slides. Swansea University, [4] Heinrich Braun. On solving travelling salesman problems by genetic algorithms. Springer Berlin / Heidelberg, [5] Holland J., Adaptation in Natural and Artificial Systems. Ann Harbor, MI: University of Michigan Press [6] Jean-Yves Potvin. Genetic Algorithms for the Travelling Salesman Problem. Centre de Recherche sur les Transports, [7] Kaya M., Autonomous Classifiers with Understanable Rule Using Multi-objective Genetic Algorithms. Expert Systems with Applications. Vol. 37, no. 4, pp , [8] Levi M., Burrows J., Fleming M., Hopkins M., The Nature, Extent and Economic Impact of Fraud in the UK. Report for the Association of Chief Police Officers' Economic Crime Portfolio [9] Michael Vose. The Simple Genetic Algorithm. Massachusetts Institute of Technology, [10] Minaei-Bidgoli B., Kashy D., Kortemeyer G., Punch W., Predicting Student Performance: An Application of Data Mining Methods with the Educational Web-based System LON CAPA. Proceedings of ASEEIIEEE Frontiers in Education Conference [11] Srinivas M., Patnaik L., Genetic algorithms - a survey. IEEE Computer Society, [12] Thomas Back. Evolutionary Algorithms in Theory and Practice. Oxford University Press,1996. [13] UK Statute Law. Data Protection Act Office of Public Sector Information, [23] Wojciech Paszkowicz. Genetic Algorithms, a Nature-Inspired Tool: Survey of Applications in 52

12 Materials Science and Related Fields. Taylor and Francis Group,

Alpha Cut based Novel Selection for Genetic Algorithm

Alpha Cut based Novel Selection for Genetic Algorithm Alpha Cut based Novel for Genetic Algorithm Rakesh Kumar Professor Girdhar Gopal Research Scholar Rajesh Kumar Assistant Professor ABSTRACT Genetic algorithm (GA) has several genetic operators that can

More information

Introduction To Genetic Algorithms

Introduction To Genetic Algorithms 1 Introduction To Genetic Algorithms Dr. Rajib Kumar Bhattacharjya Department of Civil Engineering IIT Guwahati Email: rkbc@iitg.ernet.in References 2 D. E. Goldberg, Genetic Algorithm In Search, Optimization

More information

Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve

Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve Outline Selection methods Replacement methods Variation operators Selection Methods

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013 Transistor Level Fault Finding in VLSI Circuits using Genetic Algorithm Lalit A. Patel, Sarman K. Hadia CSPIT, CHARUSAT, Changa., CSPIT, CHARUSAT, Changa Abstract This paper presents, genetic based algorithm

More information

College of information technology Department of software

College of information technology Department of software University of Babylon Undergraduate: third class College of information technology Department of software Subj.: Application of AI lecture notes/2011-2012 ***************************************************************************

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Asexual Versus Sexual Reproduction in Genetic Algorithms 1

Asexual Versus Sexual Reproduction in Genetic Algorithms 1 Asexual Versus Sexual Reproduction in Genetic Algorithms Wendy Ann Deslauriers (wendyd@alumni.princeton.edu) Institute of Cognitive Science,Room 22, Dunton Tower Carleton University, 25 Colonel By Drive

More information

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity

More information

Genetic Algorithm. Based on Darwinian Paradigm. Intrinsically a robust search and optimization mechanism. Conceptual Algorithm

Genetic Algorithm. Based on Darwinian Paradigm. Intrinsically a robust search and optimization mechanism. Conceptual Algorithm 24 Genetic Algorithm Based on Darwinian Paradigm Reproduction Competition Survive Selection Intrinsically a robust search and optimization mechanism Slide -47 - Conceptual Algorithm Slide -48 - 25 Genetic

More information

Evolutionary SAT Solver (ESS)

Evolutionary SAT Solver (ESS) Ninth LACCEI Latin American and Caribbean Conference (LACCEI 2011), Engineering for a Smart Planet, Innovation, Information Technology and Computational Tools for Sustainable Development, August 3-5, 2011,

More information

GA as a Data Optimization Tool for Predictive Analytics

GA as a Data Optimization Tool for Predictive Analytics GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, chandra.j@christunivesity.in

More information

CHAPTER 6 GENETIC ALGORITHM OPTIMIZED FUZZY CONTROLLED MOBILE ROBOT

CHAPTER 6 GENETIC ALGORITHM OPTIMIZED FUZZY CONTROLLED MOBILE ROBOT 77 CHAPTER 6 GENETIC ALGORITHM OPTIMIZED FUZZY CONTROLLED MOBILE ROBOT 6.1 INTRODUCTION The idea of evolutionary computing was introduced by (Ingo Rechenberg 1971) in his work Evolutionary strategies.

More information

Original Article Efficient Genetic Algorithm on Linear Programming Problem for Fittest Chromosomes

Original Article Efficient Genetic Algorithm on Linear Programming Problem for Fittest Chromosomes International Archive of Applied Sciences and Technology Volume 3 [2] June 2012: 47-57 ISSN: 0976-4828 Society of Education, India Website: www.soeagra.com/iaast/iaast.htm Original Article Efficient Genetic

More information

A Robust Method for Solving Transcendental Equations

A Robust Method for Solving Transcendental Equations www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,

More information

Volume 3, Issue 2, February 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 2, February 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Genetic Algorithms and Sudoku

Genetic Algorithms and Sudoku Genetic Algorithms and Sudoku Dr. John M. Weiss Department of Mathematics and Computer Science South Dakota School of Mines and Technology (SDSM&T) Rapid City, SD 57701-3995 john.weiss@sdsmt.edu MICS 2009

More information

New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem

New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem New Modifications of Selection Operator in Genetic Algorithms for the Traveling Salesman Problem Radovic, Marija; and Milutinovic, Veljko Abstract One of the algorithms used for solving Traveling Salesman

More information

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, 07ee055@ms.dendai.ac.jp

More information

Numerical Research on Distributed Genetic Algorithm with Redundant

Numerical Research on Distributed Genetic Algorithm with Redundant Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,

More information

Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects

Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Journal of Computer Science 2 (2): 118-123, 2006 ISSN 1549-3636 2006 Science Publications Estimation of the COCOMO Model Parameters Using Genetic Algorithms for NASA Software Projects Alaa F. Sheta Computers

More information

A Fast Computational Genetic Algorithm for Economic Load Dispatch

A Fast Computational Genetic Algorithm for Economic Load Dispatch A Fast Computational Genetic Algorithm for Economic Load Dispatch M.Sailaja Kumari 1, M.Sydulu 2 Email: 1 Sailaja_matam@Yahoo.com 1, 2 Department of Electrical Engineering National Institute of Technology,

More information

A Genetic Algorithm Processor Based on Redundant Binary Numbers (GAPBRBN)

A Genetic Algorithm Processor Based on Redundant Binary Numbers (GAPBRBN) ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 3910 A Genetic Algorithm Processor Based on Redundant Binary Numbers (GAPBRBN) Miss: KIRTI JOSHI Abstract A Genetic Algorithm (GA) is an intelligent search

More information

CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM

CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM ABSTRACT: Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an

More information

Lab 4: 26 th March 2012. Exercise 1: Evolutionary algorithms

Lab 4: 26 th March 2012. Exercise 1: Evolutionary algorithms Lab 4: 26 th March 2012 Exercise 1: Evolutionary algorithms 1. Found a problem where EAs would certainly perform very poorly compared to alternative approaches. Explain why. Suppose that we want to find

More information

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm

Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Journal of Al-Nahrain University Vol.15 (2), June, 2012, pp.161-168 Science Memory Allocation Technique for Segregated Free List Based on Genetic Algorithm Manal F. Younis Computer Department, College

More information

Simple Population Replacement Strategies for a Steady-State Multi-Objective Evolutionary Algorithm

Simple Population Replacement Strategies for a Steady-State Multi-Objective Evolutionary Algorithm Simple Population Replacement Strategies for a Steady-State Multi-Objective Evolutionary Christine L. Mumford School of Computer Science, Cardiff University PO Box 916, Cardiff CF24 3XF, United Kingdom

More information

Effect of Using Neural Networks in GA-Based School Timetabling

Effect of Using Neural Networks in GA-Based School Timetabling Effect of Using Neural Networks in GA-Based School Timetabling JANIS ZUTERS Department of Computer Science University of Latvia Raina bulv. 19, Riga, LV-1050 LATVIA janis.zuters@lu.lv Abstract: - The school

More information

Genetic algorithms for changing environments

Genetic algorithms for changing environments Genetic algorithms for changing environments John J. Grefenstette Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory, Washington, DC 375, USA gref@aic.nrl.navy.mil Abstract

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

Optimum Design of Worm Gears with Multiple Computer Aided Techniques

Optimum Design of Worm Gears with Multiple Computer Aided Techniques Copyright c 2008 ICCES ICCES, vol.6, no.4, pp.221-227 Optimum Design of Worm Gears with Multiple Computer Aided Techniques Daizhong Su 1 and Wenjie Peng 2 Summary Finite element analysis (FEA) has proved

More information

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

More information

Genetic Algorithm Performance with Different Selection Strategies in Solving TSP

Genetic Algorithm Performance with Different Selection Strategies in Solving TSP Proceedings of the World Congress on Engineering Vol II WCE, July 6-8,, London, U.K. Genetic Algorithm Performance with Different Selection Strategies in Solving TSP Noraini Mohd Razali, John Geraghty

More information

A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II

A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II 182 IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 6, NO. 2, APRIL 2002 A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II Kalyanmoy Deb, Associate Member, IEEE, Amrit Pratap, Sameer Agarwal,

More information

Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science

Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science Selection Procedures for Module Discovery: Exploring Evolutionary Algorithms for Cognitive Science Janet Wiles (j.wiles@csee.uq.edu.au) Ruth Schulz (ruth@csee.uq.edu.au) Scott Bolland (scottb@csee.uq.edu.au)

More information

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013 About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director

More information

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,

More information

New binary representation in Genetic Algorithms for solving TSP by mapping permutations to a list of ordered numbers

New binary representation in Genetic Algorithms for solving TSP by mapping permutations to a list of ordered numbers Proceedings of the 5th WSEAS Int Conf on COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS, Venice, Italy, November 0-, 006 363 New binary representation in Genetic Algorithms for solving

More information

Evolutionary Detection of Rules for Text Categorization. Application to Spam Filtering

Evolutionary Detection of Rules for Text Categorization. Application to Spam Filtering Advances in Intelligent Systems and Technologies Proceedings ECIT2004 - Third European Conference on Intelligent Systems and Technologies Iasi, Romania, July 21-23, 2004 Evolutionary Detection of Rules

More information

Research on a Heuristic GA-Based Decision Support System for Rice in Heilongjiang Province

Research on a Heuristic GA-Based Decision Support System for Rice in Heilongjiang Province Research on a Heuristic GA-Based Decision Support System for Rice in Heilongjiang Province Ran Cao 1,1, Yushu Yang 1, Wei Guo 1, 1 Engineering college of Northeast Agricultural University, Haerbin, China

More information

Model-based Parameter Optimization of an Engine Control Unit using Genetic Algorithms

Model-based Parameter Optimization of an Engine Control Unit using Genetic Algorithms Symposium on Automotive/Avionics Avionics Systems Engineering (SAASE) 2009, UC San Diego Model-based Parameter Optimization of an Engine Control Unit using Genetic Algorithms Dipl.-Inform. Malte Lochau

More information

Nonlinear Model Predictive Control of Hammerstein and Wiener Models Using Genetic Algorithms

Nonlinear Model Predictive Control of Hammerstein and Wiener Models Using Genetic Algorithms Nonlinear Model Predictive Control of Hammerstein and Wiener Models Using Genetic Algorithms Al-Duwaish H. and Naeem, Wasif Electrical Engineering Department/King Fahd University of Petroleum and Minerals

More information

NEUROEVOLUTION OF AUTO-TEACHING ARCHITECTURES

NEUROEVOLUTION OF AUTO-TEACHING ARCHITECTURES NEUROEVOLUTION OF AUTO-TEACHING ARCHITECTURES EDWARD ROBINSON & JOHN A. BULLINARIA School of Computer Science, University of Birmingham Edgbaston, Birmingham, B15 2TT, UK e.robinson@cs.bham.ac.uk This

More information

ECONOMIC GENERATION AND SCHEDULING OF POWER BY GENETIC ALGORITHM

ECONOMIC GENERATION AND SCHEDULING OF POWER BY GENETIC ALGORITHM ECONOMIC GENERATION AND SCHEDULING OF POWER BY GENETIC ALGORITHM RAHUL GARG, 2 A.K.SHARMA READER, DEPARTMENT OF ELECTRICAL ENGINEERING, SBCET, JAIPUR (RAJ.) 2 ASSOCIATE PROF, DEPARTMENT OF ELECTRICAL ENGINEERING,

More information

HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE

HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE Subodha Kumar University of Washington subodha@u.washington.edu Varghese S. Jacob University of Texas at Dallas vjacob@utdallas.edu

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

LOAD BALANCING IN CLOUD COMPUTING

LOAD BALANCING IN CLOUD COMPUTING LOAD BALANCING IN CLOUD COMPUTING Neethu M.S 1 PG Student, Dept. of Computer Science and Engineering, LBSITW (India) ABSTRACT Cloud computing is emerging as a new paradigm for manipulating, configuring,

More information

Genetic Algorithm Evolution of Cellular Automata Rules for Complex Binary Sequence Prediction

Genetic Algorithm Evolution of Cellular Automata Rules for Complex Binary Sequence Prediction Brill Academic Publishers P.O. Box 9000, 2300 PA Leiden, The Netherlands Lecture Series on Computer and Computational Sciences Volume 1, 2005, pp. 1-6 Genetic Algorithm Evolution of Cellular Automata Rules

More information

Cellular Automaton: The Roulette Wheel and the Landscape Effect

Cellular Automaton: The Roulette Wheel and the Landscape Effect Cellular Automaton: The Roulette Wheel and the Landscape Effect Ioan Hălălae Faculty of Engineering, Eftimie Murgu University, Traian Vuia Square 1-4, 385 Reşiţa, Romania Phone: +40 255 210227, Fax: +40

More information

An innovative application of a constrained-syntax genetic programming system to the problem of predicting survival of patients

An innovative application of a constrained-syntax genetic programming system to the problem of predicting survival of patients An innovative application of a constrained-syntax genetic programming system to the problem of predicting survival of patients Celia C. Bojarczuk 1, Heitor S. Lopes 2 and Alex A. Freitas 3 1 Departamento

More information

CSCI-8940: An Intelligent Decision Aid for Battlefield Communications Network Configuration

CSCI-8940: An Intelligent Decision Aid for Battlefield Communications Network Configuration CSCI-8940: An Intelligent Decision Aid for Battlefield Communications Network Configuration W.D. Potter Department of Computer Science & Artificial Intelligence Center University of Georgia Abstract The

More information

Evolutionary Prefetching and Caching in an Independent Storage Units Model

Evolutionary Prefetching and Caching in an Independent Storage Units Model Evolutionary Prefetching and Caching in an Independent Units Model Athena Vakali Department of Informatics Aristotle University of Thessaloniki, Greece E-mail: avakali@csdauthgr Abstract Modern applications

More information

AS part of the development process, software needs to

AS part of the development process, software needs to Dynamic White-Box Software Testing using a Recursive Hybrid Evolutionary Strategy/Genetic Algorithm Ashwin Panchapakesan, Graduate Student Member, Rami Abielmona, Senior Member, IEEE, and Emil Petriu,

More information

An evolutionary learning spam filter system

An evolutionary learning spam filter system An evolutionary learning spam filter system Catalin Stoean 1, Ruxandra Gorunescu 2, Mike Preuss 3, D. Dumitrescu 4 1 University of Craiova, Romania, catalin.stoean@inf.ucv.ro 2 University of Craiova, Romania,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

USING GENETIC ALGORITHM IN NETWORK SECURITY

USING GENETIC ALGORITHM IN NETWORK SECURITY USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:

More information

The Dynamics of a Genetic Algorithm on a Model Hard Optimization Problem

The Dynamics of a Genetic Algorithm on a Model Hard Optimization Problem The Dynamics of a Genetic Algorithm on a Model Hard Optimization Problem Alex Rogers Adam Prügel-Bennett Image, Speech, and Intelligent Systems Research Group, Department of Electronics and Computer Science,

More information

Towards Heuristic Web Services Composition Using Immune Algorithm

Towards Heuristic Web Services Composition Using Immune Algorithm Towards Heuristic Web Services Composition Using Immune Algorithm Jiuyun Xu School of Computer & Communication Engineering China University of Petroleum xujiuyun@ieee.org Stephan Reiff-Marganiec Department

More information

A Multi-Objective Performance Evaluation in Grid Task Scheduling using Evolutionary Algorithms

A Multi-Objective Performance Evaluation in Grid Task Scheduling using Evolutionary Algorithms A Multi-Objective Performance Evaluation in Grid Task Scheduling using Evolutionary Algorithms MIGUEL CAMELO, YEZID DONOSO, HAROLD CASTRO Systems and Computer Engineering Department Universidad de los

More information

Spatial Interaction Model Optimisation on. Parallel Computers

Spatial Interaction Model Optimisation on. Parallel Computers To appear in "Concurrency: Practice and Experience", 1994. Spatial Interaction Model Optimisation on Parallel Computers Felicity George, Nicholas Radcliffe, Mark Smith Edinburgh Parallel Computing Centre,

More information

Programming Risk Assessment Models for Online Security Evaluation Systems

Programming Risk Assessment Models for Online Security Evaluation Systems Programming Risk Assessment Models for Online Security Evaluation Systems Ajith Abraham 1, Crina Grosan 12, Vaclav Snasel 13 1 Machine Intelligence Research Labs, MIR Labs, http://www.mirlabs.org 2 Babes-Bolyai

More information

Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk

Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk BMAS 2005 VHDL-AMS based genetic optimization of a fuzzy logic controller for automotive active suspension systems Leran Wang and Tom Kazmierski {lw04r,tjk}@ecs.soton.ac.uk Outline Introduction and system

More information

The Binary Genetic Algorithm

The Binary Genetic Algorithm CHAPTER 2 The Binary Genetic Algorithm 2.1 GENETIC ALGORITHMS: NATURAL SELECTION ON A COMPUTER If the previous chapter whet your appetite for something better than the traditional optimization methods,

More information

SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD

SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD SOFTWARE TESTING STRATEGY APPROACH ON SOURCE CODE APPLYING CONDITIONAL COVERAGE METHOD Jaya Srivastaval 1 and Twinkle Dwivedi 2 1 Department of Computer Science & Engineering, Shri Ramswaroop Memorial

More information

Non-Uniform Mapping in Binary-Coded Genetic Algorithms

Non-Uniform Mapping in Binary-Coded Genetic Algorithms Non-Uniform Mapping in Binary-Coded Genetic Algorithms Kalyanmoy Deb, Yashesh D. Dhebar, and N. V. R. Pavan Kanpur Genetic Algorithms Laboratory (KanGAL) Indian Institute of Technology Kanpur PIN 208016,

More information

A Review And Evaluations Of Shortest Path Algorithms

A Review And Evaluations Of Shortest Path Algorithms A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing

More information

Evolutionary Algorithms using Evolutionary Algorithms

Evolutionary Algorithms using Evolutionary Algorithms Evolutionary Algorithms using Evolutionary Algorithms Neeraja Ganesan, Sowmya Ravi & Vandita Raju S.I.E.S GST, Mumbai, India E-mail: neer.ganesan@gmail.com, Abstract A subset of AI is, evolutionary algorithm

More information

Comparative Study: ACO and EC for TSP

Comparative Study: ACO and EC for TSP Comparative Study: ACO and EC for TSP Urszula Boryczka 1 and Rafa l Skinderowicz 1 and Damian Świstowski1 1 University of Silesia, Institute of Computer Science, Sosnowiec, Poland, e-mail: uboryczk@us.edu.pl

More information

Genetic algorithms for solving portfolio allocation models based on relative-entropy, mean and variance

Genetic algorithms for solving portfolio allocation models based on relative-entropy, mean and variance Journal of Scientific Research and Development 2 (12): 7-12, 2015 Available online at www.jsrad.org ISSN 1115-7569 2015 JSRAD Genetic algorithms for solving portfolio allocation models based on relative-entropy,

More information

Learning in Abstract Memory Schemes for Dynamic Optimization

Learning in Abstract Memory Schemes for Dynamic Optimization Fourth International Conference on Natural Computation Learning in Abstract Memory Schemes for Dynamic Optimization Hendrik Richter HTWK Leipzig, Fachbereich Elektrotechnik und Informationstechnik, Institut

More information

Genetic Algorithm TOOLBOX. For Use with MATLAB. Andrew Chipperfield Peter Fleming Hartmut Pohlheim Carlos Fonseca. Version 1.2.

Genetic Algorithm TOOLBOX. For Use with MATLAB. Andrew Chipperfield Peter Fleming Hartmut Pohlheim Carlos Fonseca. Version 1.2. Genetic Algorithm TOOLBOX For Use with MATLAB Andrew Chipperfield Peter Fleming Hartmut Pohlheim Carlos Fonseca Version 1.2 User s Guide Acknowledgements The production of this Toolbox was made possible

More information

BMOA: Binary Magnetic Optimization Algorithm

BMOA: Binary Magnetic Optimization Algorithm International Journal of Machine Learning and Computing Vol. 2 No. 3 June 22 BMOA: Binary Magnetic Optimization Algorithm SeyedAli Mirjalili and Siti Zaiton Mohd Hashim Abstract Recently the behavior of

More information

E190Q Lecture 5 Autonomous Robot Navigation

E190Q Lecture 5 Autonomous Robot Navigation E190Q Lecture 5 Autonomous Robot Navigation Instructor: Chris Clark Semester: Spring 2014 1 Figures courtesy of Siegwart & Nourbakhsh Control Structures Planning Based Control Prior Knowledge Operator

More information

Chapter 6. The stacking ensemble approach

Chapter 6. The stacking ensemble approach 82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described

More information

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering DOI: 10.15662/ijareeie.2014.0307061 Economic Dispatch of Power System Optimization with Power Generation Schedule Using Evolutionary Technique Girish Kumar 1, Rameshwar singh 2 PG Student [Control system],

More information

MIDLAND ISD ADVANCED PLACEMENT CURRICULUM STANDARDS AP ENVIRONMENTAL SCIENCE

MIDLAND ISD ADVANCED PLACEMENT CURRICULUM STANDARDS AP ENVIRONMENTAL SCIENCE Science Practices Standard SP.1: Scientific Questions and Predictions Asking scientific questions that can be tested empirically and structuring these questions in the form of testable predictions SP.1.1

More information

CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING

CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING 60 CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING 3.1 INTRODUCTION Optimal short-term hydrothermal scheduling of power systems aims at determining optimal hydro and thermal generations

More information

Stock Market Index Prediction by Hybrid Neuro- Genetic Data Mining Technique

Stock Market Index Prediction by Hybrid Neuro- Genetic Data Mining Technique Stock Market Index Prediction by Hybrid Neuro- Genetic Data Mining Technique Ganesh V. Kumbhar 1, Rajesh V. Argiddi 2 Research Scholar, Computer Science & Engineering Department, WIT, Sholapur, India 1

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

Inventory Optimization in Efficient Supply Chain Management

Inventory Optimization in Efficient Supply Chain Management International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE IV, DECEMBER 2011] [ISSN: 2231-4946] Inventory Optimization in Efficient Supply Chain Management S.R. Singh 1, Tarun

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

Enhanced data mining analysis in higher educational system using rough set theory

Enhanced data mining analysis in higher educational system using rough set theory African Journal of Mathematics and Computer Science Research Vol. 2(9), pp. 184-188, October, 2009 Available online at http://www.academicjournals.org/ajmcsr ISSN 2006-9731 2009 Academic Journals Review

More information

SCHEDULING MULTIPROCESSOR TASKS WITH GENETIC ALGORITHMS

SCHEDULING MULTIPROCESSOR TASKS WITH GENETIC ALGORITHMS SCHEDULING MULTIPROCESSOR TASKS WITH GENETIC ALGORITHMS MARIN GOLUB Department of Electronics, Microelectronics, Computer and Intelligent Systems Faculty of Electrical Engineering and Computing University

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system

An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system An Efficient load balancing using Genetic algorithm in Hierarchical structured distributed system Priyanka Gonnade 1, Sonali Bodkhe 2 Mtech Student Dept. of CSE, Priyadarshini Instiute of Engineering and

More information

A Sarsa based Autonomous Stock Trading Agent

A Sarsa based Autonomous Stock Trading Agent A Sarsa based Autonomous Stock Trading Agent Achal Augustine The University of Texas at Austin Department of Computer Science Austin, TX 78712 USA achal@cs.utexas.edu Abstract This paper describes an autonomous

More information

Stock price prediction using genetic algorithms and evolution strategies

Stock price prediction using genetic algorithms and evolution strategies Stock price prediction using genetic algorithms and evolution strategies Ganesh Bonde Institute of Artificial Intelligence University Of Georgia Athens,GA-30601 Email: ganesh84@uga.edu Rasheed Khaled Institute

More information

CPO Science and the NGSS

CPO Science and the NGSS CPO Science and the NGSS It is no coincidence that the performance expectations in the Next Generation Science Standards (NGSS) are all action-based. The NGSS champion the idea that science content cannot

More information

COMPARISON OF GENETIC OPERATORS ON A GENERAL GENETIC ALGORITHM PACKAGE HUAWEN XU. Master of Science. Shanghai Jiao Tong University.

COMPARISON OF GENETIC OPERATORS ON A GENERAL GENETIC ALGORITHM PACKAGE HUAWEN XU. Master of Science. Shanghai Jiao Tong University. COMPARISON OF GENETIC OPERATORS ON A GENERAL GENETIC ALGORITHM PACKAGE By HUAWEN XU Master of Science Shanghai Jiao Tong University Shanghai, China 1999 Submitted to the Faculty of the Graduate College

More information

Introduction to Logistic Regression

Introduction to Logistic Regression OpenStax-CNX module: m42090 1 Introduction to Logistic Regression Dan Calderon This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 3.0 Abstract Gives introduction

More information

Solving Banana (Rosenbrock) Function Based on Fitness Function

Solving Banana (Rosenbrock) Function Based on Fitness Function Available online at www.worldscientificnews.com WSN 6 (2015) 41-56 EISSN 2392-2192 Solving Banana (Rosenbrock) Function Based on Fitness Function Lubna Zaghlul Bashir 1,a, Rajaa Salih Mohammed Hasan 2,b

More information

A Framework for Genetic Algorithms in Games

A Framework for Genetic Algorithms in Games A Framework for Genetic Algorithms in Games Vinícius Godoy de Mendonça Cesar Tadeu Pozzer Roberto Tadeu Raiitz 1 Universidade Positivo, Departamento de Informática 2 Universidade Federal de Santa Maria,

More information

Improving the Performance of a Computer-Controlled Player in a Maze Chase Game using Evolutionary Programming on a Finite-State Machine

Improving the Performance of a Computer-Controlled Player in a Maze Chase Game using Evolutionary Programming on a Finite-State Machine Improving the Performance of a Computer-Controlled Player in a Maze Chase Game using Evolutionary Programming on a Finite-State Machine Maximiliano Miranda and Federico Peinado Departamento de Ingeniería

More information

Evaluation of Crossover Operator Performance in Genetic Algorithms With Binary Representation

Evaluation of Crossover Operator Performance in Genetic Algorithms With Binary Representation Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation Stjepan Picek, Marin Golub, and Domagoj Jakobovic Faculty of Electrical Engineering and Computing, Unska 3,

More information

The Use of Evolutionary Algorithms in Data Mining. Khulood AlYahya Sultanah AlOtaibi

The Use of Evolutionary Algorithms in Data Mining. Khulood AlYahya Sultanah AlOtaibi The Use of Evolutionary Algorithms in Data Mining Ayush Joshi Jordan Wallwork Khulood AlYahya Sultanah AlOtaibi MScISE BScAICS MScISE MScACS 1 Abstract With the huge amount of data being generated in the

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

A Binary Model on the Basis of Imperialist Competitive Algorithm in Order to Solve the Problem of Knapsack 1-0

A Binary Model on the Basis of Imperialist Competitive Algorithm in Order to Solve the Problem of Knapsack 1-0 212 International Conference on System Engineering and Modeling (ICSEM 212) IPCSIT vol. 34 (212) (212) IACSIT Press, Singapore A Binary Model on the Basis of Imperialist Competitive Algorithm in Order

More information

A Study of Crossover Operators for Genetic Algorithm and Proposal of a New Crossover Operator to Solve Open Shop Scheduling Problem

A Study of Crossover Operators for Genetic Algorithm and Proposal of a New Crossover Operator to Solve Open Shop Scheduling Problem American Journal of Industrial and Business Management, 2016, 6, 774-789 Published Online June 2016 in SciRes. http://www.scirp.org/journal/ajibm http://dx.doi.org/10.4236/ajibm.2016.66071 A Study of Crossover

More information

Integer Programming: Algorithms - 3

Integer Programming: Algorithms - 3 Week 9 Integer Programming: Algorithms - 3 OPR 992 Applied Mathematical Programming OPR 992 - Applied Mathematical Programming - p. 1/12 Dantzig-Wolfe Reformulation Example Strength of the Linear Programming

More information

Study of Various Load Balancing Techniques in Cloud Environment- A Review

Study of Various Load Balancing Techniques in Cloud Environment- A Review International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-04 E-ISSN: 2347-2693 Study of Various Load Balancing Techniques in Cloud Environment- A Review Rajdeep

More information