Evolutionary computation in cryptography and security

Size: px
Start display at page:

Download "Evolutionary computation in cryptography and security"

Transcription

1 Evolutionary computation in cryptography and security SoSySec seminar: Artificial Intelligence and Security Rennes, Domagoj Jakobović FER, University of Zagreb

2 Overview What about EC? Cryptographic motivation Genetic programming Boolean functions S-boxes One-class intrusion detection Software gp.zemris.fer.hr 2/38

3 Evolutionary computation EC: a research area within computer science that draws inspiration from the process of natural evolution Evolutionary algorithms: subset of EC, population based metaheuristic optimization methods that use biology inspired mechanisms like selection, crossover or mutation Genetic Algorithm (GA), Holland, Tree based Genetic Programming (GP), Koza, Cartesian Genetic Programming (CGP), Miller, Evolution Strategy (ES), Rechenberg, Schwefel, 1970s. found application in numerous fields the topic today: cryptography and security gp.zemris.fer.hr 3/38

4 Optimization of cryptographic primitives Cryptographic primitive is a part of a cryptographic tool used to provide information security (a low-level cryptographic component that is frequently used) modern cryptography relies mostly on definitions and proofs, but there are nevertheless many primitives used today that do not have rigorous proofs examples of primitives: Boolean functions S-boxes (substitution boxes) PRNGs (pseudo-random number generators) addition chains primitives designed/optimized for information security and resilience to attacks gp.zemris.fer.hr 4/38

5 Side channel attacks Implementation attacks: all attacks that do not aim at the weaknesses of the algorithm itself, but on the actual implementations on cryptographic devices sources: power, sound, light, electromagnetic radiation, etc. among the most powerful known attacks against cryptographic devices common types: side channel attacks and fault injection attacks Side channel attacks are passive and non-invasive attacks examples: power analysis attacks to infer the key or plaintext properties may be known that increase resilience to these attacks gp.zemris.fer.hr 5/38

6 Problem 1: Boolean functions important cryptographic primitive, often used in stream ciphers as the source of nonlinearity in cryptography, a Boolean function needs to fulfill a number of properties: to be used in filter generators: balancedness, high nonlinearity, high algebraic degree, high algebraic immunity, high fast algebraic immunity to be used in combiner generators, additionally required a good value of correlation immunity as a part of the side-channel attack countermeasure (masking) it needs to have low Hamming weight and high correlation immunity to be of practical importance: at least 13 inputs three main design options: algebraic constructions, random search, heuristics gp.zemris.fer.hr 6/38

7 Boolean function optimization search space size: 2^(2^n) How to represent a function? truth table form: string of bits of length 2^n Boolean function with 8 inputs: search space size is 2^(256) larger inputs: very hard to optimize in truth table form the best results: using genetic programming (GP) Boolean function with 2 inputs gp.zemris.fer.hr 7/38

8 Digression: : Genetic programming What is GP? an attempt of automatic programming How does it work? maintains a set (population) of possible solutions programs (individuals) every individual has a quality assesment the fitness What does it do? simulates evolution: worse individuals are eliminated, better ones survive simulates genetic material exchange: better individuals make new ones with time, population gets better and better When does it end? when a good enough solution is found when we're out of time gp.zemris.fer.hr 8/38

9 Solution representation most common: tree based tree elements: leaves (terminals) input variables (as given), constants, actions (turn, move, operate ) tree value program output inner nodes (function) need to be chosen/defined! function examples: arithmetic (+,-,*,/,sin,cos, log, sqrt, pow, exp ), logical (AND, OR, NOT ), conditional (ifgte, IF ), loops... gp.zemris.fer.hr 9/38

10 Initial population most often: created randomly * * + cos * + cos x 1 x gp.zemris.fer.hr 10/38

11 Evolution! each solution is evaluated according to the fitness function programs usually simulated over a number of test cases apply selection many variants, same idea: better solutions have a greater probability of surviving and then the most important element: genetic operators crossover: creating new solutions with existing ones combining (good?) parts of individuals intensification: exploiting promising regions of seach space mutation: random change diversification: finding new regions of search space many many variants for both operators gp.zemris.fer.hr 11/38

12 Crossover: create something new at tleast two individuals (parents) combine and make a new solution (child) gp.zemris.fer.hr 12/38

13 Crossover: create something new most often: exchange randomly selected subtrees (subtree crossover) gp.zemris.fer.hr 13/38

14 Mutation: can it get any better most often: replace a randomly selected subtree (subtree mutation) gp.zemris.fer.hr 14/38

15 GP for Boolean functions terminals: input variables (x 1,..., x n ) inner nodes: Boolean primitives (AND, OR, NOT, XOR, IF,...) set the desired cryptographic properties a problem of its own: designing efficient fitness function repeat many times! beats any other representation at least for reasonable number of inputs gp.zemris.fer.hr 15/38

16 Boolean function optimization example gp.zemris.fer.hr 16/38

17 Evolving constructions of Boolean functions Could we use evolutionary computation to evolve algebraic constructions? Example: evolve secondary algebraic constructions that result in bent (max. nonlinearity) Boolean functions take 4 existing bent functions of 4 inputs (easy to construct) add two inputs combine in a function totalling in 6 inputs (slightly less easy to construct) an example construction: ((((v1 XNOR f0) OR (f3 AND f0)) XOR ((f1 XOR v0) XNOR v1)) AND2 ((v0 AND2 f2) AND2 ((f0 XNOR f3) XOR (f1 AND2 v1)))) optimize the evolved construction to maximize nonlinearity and show that it holds for any existing input functions! and for any number of inputs! empirically proven for up to 24 inputs gp.zemris.fer.hr 17/38

18 Boolean function construction evolution example gp.zemris.fer.hr 18/38

19 Problem 2: S-boxesS natural extension from the Boolean function case S-boxes (Substitution Boxes): vectorial Boolean functions often used in block ciphers as a source of nonlinearity design problem: much more difficult! S-box of dimension m x n has m inputs and n output Boolean functions 2 x 2 S-box gp.zemris.fer.hr 19/38

20 S-box properties many properties of interest: balancedness, high nonlinearity, low δ-uniformity, high algebraic degree, etc. there are properties that algebraic constructions do not consider properties related with the side-channel resistance will usually have poor values if S-boxes are constructed with algebraic constructions the task: evolve S-boxes that have good side channel resistance while maintaining other properties optimal gp.zemris.fer.hr 20/38

21 S-boxes side channel related properties Transparency order: cryptographic property of S-boxes introduced by Prouff in the higher the transparency order is, the lower is the S-box resistance to the DPA attacks new definition in 2015! Confusion coefficient low confusion coecient values (also referred to as high collision values) make side-channel attacks harder, i.e. they may require greater number of traces or SNR to yield the correct key candidate gp.zemris.fer.hr 21/38

22 S-box properties we are also interested in implementation properties like power, area, and latency algebraic constructions usually do not consider such properties evolve S-boxes with good cryptographic properties that are hardware-friendly multiobjective problems (trade-off in different properties) gp.zemris.fer.hr 22/38

23 S-box optimization when m = n, we can represent S-boxes as permutations, i.e., with all values between 0 and 2^n -1 (where n is the dimension of the S-box) the S-box is always bijective and we do not need to concern with the balancedness property when m > n, permutation encoding is not adequate GP to the rescue: m x n S-box represented as n independent trees good results when m >> n another variant: CGP Cartesian GP instead of a tree, solution represented as a graph offers multiple outputs natural mapping to S-box gp.zemris.fer.hr 23/38

24 CGP structure resulting genotype: gp.zemris.fer.hr 24/38

25 CGP structure (primjer CGP) gp.zemris.fer.hr 25/38

26 Cellular automata defined S-boxesS another approach: evolve S-boxes in form of cellular automata (CA) rules also used in practice (Keccak cipher) GP evolves a Boolean function that is used as a local CA rule example rule: v i (t+1) = v i (t) OR v i-1 (t) v3 v2 v1 v0 t t better results than permutation and basic GP/CGP for some S-box sizes (5x5, 6x6, 7x7) additional benefit: optimize for smaller number of gates (smaller area, power, latency) gp.zemris.fer.hr 26/38

27 example evolved rule: ((v2 NOR NOT(v4)) XOR v1) 5x5 rule with optimal nonlinearity and di fferential uniformity gp.zemris.fer.hr 27/38

28 CA rule evolution Evolved CA rule for the 5x5 S-box gp.zemris.fer.hr 28/38

29 Problem 3: Security application intrusion detection Intrusion detection: process of monitoring the events occurring in a computer system or network and analyzing them for intrusions attempts to bypass the security mechanisms of a computer or network common approaches: supervised/unsupervised classification (machine learning) GP can be used in classification, with either decision tree classifier regression tree classifier our example: use regression GP as a one-class classifier gp.zemris.fer.hr 29/38

30 Digression: : Symbolic regression Problem example: physical process modelling electronic circuit response model (Arbitrary-Angle Unmitered Microstrip Bend) short term load forecasting cryptographic element response if the model is known: choose/optimize model parameters somewhat simpler problem what if the model is not known? surrogate model: neural net, SVM, expert system... building a model with genetic programming symbolic regression gp.zemris.fer.hr 30/38

31 The symbolic regression problem task: discover the symbolic form of the model no assumptions of the unknown function! (right ) x? f(x) f(x) x gp.zemris.fer.hr 31/38

32 Symbolic regression with GP evolve individuals using arithmetic functions as tree elements individuals (models) are evaluated on input data measures: MSE, RMSE, MAE, MAPE... many uses and application examples popular software packages: Eureqa, DTReg, different solvers example: SRM application gp.zemris.fer.hr 32/38

33 One-class classification for intrusion detection use regression GP as one-class classifier assumption: only 'normal' class data available for training learn a model (function) that forces the output to a certain output range e.g. [1, 2], [4, 5], [8, 9]; same range for all normal examples also, penalize 'trivial' models reward the use of all features test the model on unseen data containing anomalies (intrusions) outputs falling outside the defined range are classified as anomalies! results: comparable to one-class SVM (mainly) median of F1 measure ~0.82 (this weekend) improve reliability with ensembles under heavy construction gp.zemris.fer.hr 33/38

34 Available software How do I test all these examples myself? ECF Evolutionary computation framework ECF is a C++ framework intended for application of any type of evolutionary computation: project concerning evolutionary computation and cryptology: (under constant development) gp.zemris.fer.hr 34/38

35 Instead of a conclusion... EC proved to be successful in cryptography: when there exist no other, specialized approaches to include new properties of interest to optimize to assess the quality of some other method to produce "good-enough'' solutions not a magic wand requires both experience and some knowledge of the problem to produce competitive results outlook: combination with machine learning approaches for security applications gp.zemris.fer.hr 35/38

36 Acknowledgements Thanks to: Stjepan Picek Annelie Heuser EC team at FER Zagreb gp.zemris.fer.hr 36/38

37 References General Evolutionary Computation Framework ( EC group at FER/UNIZG ( Boolean functions Picek, Stjepan; Carlet, Claude; Guilley, Sylvain; Miller, Julian F.; Jakobović, Domagoj. Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography // Evolutionary computation. 24 (2016), 4; Picek, Stjepan; Jakobović, Domagoj; Miller, Julian; Batina, Lejla; Čupić, Marko. Cryptographic Boolean functions: One output, many design criteria // Applied soft computing. 40 (2016) ; Picek, Stjepan; Batina, Lejla; Jakobović, Domagoj. Evolving DPA-Resistant Boolean Functions // Lecture Notes in Computer Science (2014) ; Picek, Stjepan; Jakobović, Domagoj. Evolving Algebraic Constructions for Designing Bent Boolean Functions // Proceedings of the Genetic and Evolutionary Computation Conference GECCO ACM Picek, Stjepan; Marchiori, Elena; Batina, Lejla; Jakobović, Domagoj. Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography- Relevant Boolean Functions. // Lecture Notes in Computer Science (2014); gp.zemris.fer.hr 37/38

38 References S-boxes Stjepan Picek, Marko Cupic, and Leon Rotim. A New Cost Function for Evolution of S-boxes. Evolutionary Computation, Winter 2016, Vol. 24, No. 4, Picek, Stjepan; Jakobovic, Domagoj; Miller, Julian; Batina, Lejla. Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes // Genetic and Evolutionary Computation Conf. GECCO Picek, Stjepan; Ege, Baris; Papagiannopoulos, Kostas; Batina, Lejla; Jakobović, Domagoj. Optimality and beyond: The case of 4 4 S-boxes // IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2014) Picek, Stjepan; Ege, Baris; Batina, Lejla; Jakobović, Domagoj; Chmielewski, Lukasz; Golub, Marin. On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box // Proceedings of the First Workshop on Cryptography and Security in Computing Systems. ACM Stjepan Picek, Luca Mariot, Domagoj Jakobovic, Alberto Leporati. Evolving S- boxes Based on Cellular Automata with Genetic Programming. GECCO-2017 (accepted) Stjepan Picek, Luca Mariot, Domagoj Jakobovic, Bohan Yang, Nele Mentens. Design of S-boxes Defined with Cellular Automata Rules. MAL-IoT 2017 (accepted) K. Chakraborty, S. Sarkar, S. Maitra, B. Mazumdar, D. Mukhopadhyay, and E Prouff. Redefining the transparency order. In Coding and Cryptography, International Workshop, gp.zemris.fer.hr 38/38

Evolutionary Methods for the Construction of Cryptographic Boolean Functions

Evolutionary Methods for the Construction of Cryptographic Boolean Functions Evolutionary Methods for the Construction of Cryptographic Boolean Functions No Author Given No Institute Given Abstract. Boolean functions represent an important primitive when constructing many stream

More information

Evolving DPA-resistant Boolean Functions

Evolving DPA-resistant Boolean Functions Evolving DPA-resistant Boolean Functions Stjepan Picek 1,2, Lejla Batina 1 and Domagoj Jakobovic 2 1 Radboud University Nijmegen, Institute for Computing and Information Sciences Postbus 9010, 6500 GL

More information

Cryptographic Boolean Functions: One Output, Many Design Criteria

Cryptographic Boolean Functions: One Output, Many Design Criteria Cryptographic Boolean Functions: One Output, Many Design Criteria Stjepan Picek a,b, Domagoj Jakobovic b, Julian F. Miller c, Lejla Batina d, Marko Cupic b a KU Leuven, ESAT/COSIC and iminds, Kasteelpark

More information

Evolving Algebraic Constructions for Designing Bent Boolean Functions

Evolving Algebraic Constructions for Designing Bent Boolean Functions Evolving Algebraic Constructions for Designing Bent Boolean Functions ABSTRACT Stjepan Picek KU Leuven, ESAT/COSIC and iminds Kasteelpark Arenberg 10, bus 2452, B-3001 Leuven-Heverlee, Belgium and LAGA,

More information

A New Cost Function for Evolution of S-boxes

A New Cost Function for Evolution of S-boxes A New Cost Function for Evolution of S-boxes Stjepan Picek stjepan@computer.org KU Leuven, ESAT/COSIC and iminds, Kasteelpark Arenberg 10, bus 2452, B-3001 Leuven-Heverlee, Belgium and LAGA, UMR 7539,

More information

Introduction to Optimization

Introduction to Optimization Introduction to Optimization Approximation Algorithms and Heuristics November 21, 2016 École Centrale Paris, Châtenay-Malabry, France Dimo Brockhoff Inria Saclay Ile-de-France 2 Exercise: The Knapsack

More information

Contents. Index... 11

Contents. Index... 11 Contents 1 Modular Cartesian Genetic Programming........................ 1 1 Embedded Cartesian Genetic Programming (ECGP)............ 1 1.1 Cone-based and Age-based Module Creation.......... 1 1.2 Cone-based

More information

Lecture 6: Genetic Algorithm. An Introduction to Meta-Heuristics, Produced by Qiangfu Zhao (Since 2012), All rights reserved

Lecture 6: Genetic Algorithm. An Introduction to Meta-Heuristics, Produced by Qiangfu Zhao (Since 2012), All rights reserved Lecture 6: Genetic Algorithm An Introduction to Meta-Heuristics, Produced by Qiangfu Zhao (Since 2012), All rights reserved Lec06/1 Search and optimization again Given a problem, the set of all possible

More information

De Cifris incontra Milano Milano-Bicocca 11 settembre 2018

De Cifris incontra Milano Milano-Bicocca 11 settembre 2018 De Cifris incontra Milano Milano-Bicocca 11 settembre 2018 Alberto Leporati Università degli Studi di Milano Bicocca Dip. di Informatica, Sistemistica e Comunicazione (DISCo) Viale Sarca 336/14 Milano

More information

Evolving Cryptographic Pseudorandom Number Generators

Evolving Cryptographic Pseudorandom Number Generators Evolving Cryptographic Pseudorandom Number Generators Stjepan Picek 1, Dominik Sisejkovic 2, Vladimir Rozic 1, Bohan Yang 1, Nele Mentens 1, and Domagoj Jakobovic 2 1 KU Leuven, ESAT/COSIC and iminds,

More information

Introduction to Optimization

Introduction to Optimization Introduction to Optimization Approximation Algorithms and Heuristics November 6, 2015 École Centrale Paris, Châtenay-Malabry, France Dimo Brockhoff INRIA Lille Nord Europe 2 Exercise: The Knapsack Problem

More information

Genetic Algorithms and Genetic Programming. Lecture 9: (23/10/09)

Genetic Algorithms and Genetic Programming. Lecture 9: (23/10/09) Genetic Algorithms and Genetic Programming Lecture 9: (23/10/09) Genetic programming II Michael Herrmann michael.herrmann@ed.ac.uk, phone: 0131 6 517177, Informatics Forum 1.42 Overview 1. Introduction:

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

A Weight Based Attack on the CIKS-1 Block Cipher

A Weight Based Attack on the CIKS-1 Block Cipher A Weight Based Attack on the CIKS-1 Block Cipher Brian J. Kidney, Howard M. Heys, Theodore S. Norvell Electrical and Computer Engineering Memorial University of Newfoundland {bkidney, howard, theo}@engr.mun.ca

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

Kyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming

Kyrre Glette INF3490 Evolvable Hardware Cartesian Genetic Programming Kyrre Glette kyrrehg@ifi INF3490 Evolvable Hardware Cartesian Genetic Programming Overview Introduction to Evolvable Hardware (EHW) Cartesian Genetic Programming Applications of EHW 3 Evolvable Hardware

More information

Genetic Programming. and its use for learning Concepts in Description Logics

Genetic Programming. and its use for learning Concepts in Description Logics Concepts in Description Artificial Intelligence Institute Computer Science Department Dresden Technical University May 29, 2006 Outline Outline: brief introduction to explanation of the workings of a algorithm

More information

On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven

On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven On the Optimality of Mutual Information Analysis for Discrete Leakages Cryptarchi June 29-30, 2015 Leuven Éloi de Chérisey*, Annelie Heuser**, Sylvain Guilley** and Olivier Rioul** * ENS Cachan, **Telecom

More information

Evolutionary Computation Algorithms for Cryptanalysis: A Study

Evolutionary Computation Algorithms for Cryptanalysis: A Study Evolutionary Computation Algorithms for Cryptanalysis: A Study Poonam Garg Information Technology and Management Dept. Institute of Management Technology Ghaziabad, India pgarg@imt.edu Abstract The cryptanalysis

More information

Application of Genetic Algorithms to CFD. Cameron McCartney

Application of Genetic Algorithms to CFD. Cameron McCartney Application of Genetic Algorithms to CFD Cameron McCartney Introduction define and describe genetic algorithms (GAs) and genetic programming (GP) propose possible applications of GA/GP to CFD Application

More information

Automatic Creation of Digital Fast Adder Circuits by Means of Genetic Programming

Automatic Creation of Digital Fast Adder Circuits by Means of Genetic Programming 1 Automatic Creation of Digital Fast Adder Circuits by Means of Genetic Programming Karim Nassar Lockheed Martin Missiles and Space 1111 Lockheed Martin Way Sunnyvale, CA 94089 Karim.Nassar@lmco.com 408-742-9915

More information

Mutations for Permutations

Mutations for Permutations Mutations for Permutations Insert mutation: Pick two allele values at random Move the second to follow the first, shifting the rest along to accommodate Note: this preserves most of the order and adjacency

More information

Genetic Algorithms Variations and Implementation Issues

Genetic Algorithms Variations and Implementation Issues Genetic Algorithms Variations and Implementation Issues CS 431 Advanced Topics in AI Classic Genetic Algorithms GAs as proposed by Holland had the following properties: Randomly generated population Binary

More information

Evolving SQL Queries for Data Mining

Evolving SQL Queries for Data Mining Evolving SQL Queries for Data Mining Majid Salim and Xin Yao School of Computer Science, The University of Birmingham Edgbaston, Birmingham B15 2TT, UK {msc30mms,x.yao}@cs.bham.ac.uk Abstract. This paper

More information

An Evolutionary Multiobjective Approach to Design Highly Non-linear Boolean Functions

An Evolutionary Multiobjective Approach to Design Highly Non-linear Boolean Functions An Evolutionary Multiobjective Approach to Design Highly Non-linear Boolean Functions Hernán Aguirre Hiroyuki Okazaki Yasushi Fuwa ahernan@shinshu-u.ac.jp okazaki@cs.shinshu-u.ac.jp fuwa@cs.shinshu-u.ac.jp

More information

Power Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18

Power Analysis of MAC-Keccak: A Side Channel Attack. Advanced Cryptography Kyle McGlynn 4/12/18 Power Analysis of MAC-Keccak: A Side Channel Attack Advanced Cryptography Kyle McGlynn 4/12/18 Contents Side-Channel Attack Power Analysis Simple Power Analysis (SPA) Differential Power Analysis (DPA)

More information

Evolutionary Methods for State-based Testing

Evolutionary Methods for State-based Testing Evolutionary Methods for State-based Testing PhD Student Raluca Lefticaru Supervised by Florentin Ipate University of Piteşti, Romania Department of Computer Science Outline Motivation Search-based software

More information

DESIGNING OF STREAM CIPHER ARCHITECTURE USING THE CELLULAR AUTOMATA

DESIGNING OF STREAM CIPHER ARCHITECTURE USING THE CELLULAR AUTOMATA DESIGNING OF STREAM CIPHER ARCHITECTURE USING THE CELLULAR AUTOMATA 1 Brundha K A MTech Email: 1 brundha1905@gmail.com Abstract Pseudo-random number generators (PRNGs) are a key component of stream ciphers

More information

Regularization of Evolving Polynomial Models

Regularization of Evolving Polynomial Models Regularization of Evolving Polynomial Models Pavel Kordík Dept. of Computer Science and Engineering, Karlovo nám. 13, 121 35 Praha 2, Czech Republic kordikp@fel.cvut.cz Abstract. Black box models such

More information

Lecture 8: Genetic Algorithms

Lecture 8: Genetic Algorithms Lecture 8: Genetic Algorithms Cognitive Systems - Machine Learning Part II: Special Aspects of Concept Learning Genetic Algorithms, Genetic Programming, Models of Evolution last change December 1, 2010

More information

CHAPTER 5. CHE BASED SoPC FOR EVOLVABLE HARDWARE

CHAPTER 5. CHE BASED SoPC FOR EVOLVABLE HARDWARE 90 CHAPTER 5 CHE BASED SoPC FOR EVOLVABLE HARDWARE A hardware architecture that implements the GA for EHW is presented in this chapter. This SoPC (System on Programmable Chip) architecture is also designed

More information

Genetic Image Network for Image Classification

Genetic Image Network for Image Classification Genetic Image Network for Image Classification Shinichi Shirakawa, Shiro Nakayama, and Tomoharu Nagao Graduate School of Environment and Information Sciences, Yokohama National University, 79-7, Tokiwadai,

More information

Genetic Programming Part 1

Genetic Programming Part 1 Genetic Programming Part 1 Evolutionary Computation Lecture 11 Thorsten Schnier 06/11/2009 Previous Lecture Multi-objective Optimization Pareto optimality Hyper-volume based indicators Recent lectures

More information

Stream Ciphers An Overview

Stream Ciphers An Overview Stream Ciphers An Overview Palash Sarkar Indian Statistical Institute, Kolkata email: palash@isicalacin stream cipher overview, Palash Sarkar p1/51 Classical Encryption Adversary message ciphertext ciphertext

More information

An Introduction to Evolutionary Algorithms

An Introduction to Evolutionary Algorithms An Introduction to Evolutionary Algorithms Karthik Sindhya, PhD Postdoctoral Researcher Industrial Optimization Group Department of Mathematical Information Technology Karthik.sindhya@jyu.fi http://users.jyu.fi/~kasindhy/

More information

Genetic Programming. Modern optimization methods 1

Genetic Programming. Modern optimization methods 1 Genetic Programming Developed in USA during 90 s Patented by J. Koza Solves typical problems: Prediction, classification, approximation, programming Properties Competitor of neural networks Need for huge

More information

Vulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions

Vulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions Vulnerability of Certain Stream Ciphers Based on k-normal Boolean Functions Miodrag Mihaljevic RCIS-AIST, Tokyo A Seminar Lecture at CCRG School of Physics and Mathematical Sciences Nanyang Technological

More information

Genetic Programming for Multiclass Object Classification

Genetic Programming for Multiclass Object Classification Genetic Programming for Multiclass Object Classification by William Richmond Smart A thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master

More information

ELECTRONICS DEPARTMENT

ELECTRONICS DEPARTMENT ELECTRONICS DEPARTMENT By Eng. 28 th Mar MUSTAFA 2012 M. Efficient SHIPLEImplementation of AES Algorithm Immune to DPA Attack Cryptography processing plaintext cipher text format Block Cipher Stream Cipher

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 10, October-2017 ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 10, October-2017 ISSN 194 Prime Number Generation Using Genetic Algorithm Arpit Goel 1, Anuradha Brijwal 2, Sakshi Gautam 3 1 Dept. Of Computer Science & Engineering, Himalayan School of Engineering & Technology, Swami Rama

More information

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AUTOMATIC TEST CASE GENERATION FOR PERFORMANCE ENHANCEMENT OF SOFTWARE THROUGH GENETIC ALGORITHM AND RANDOM TESTING Bright Keswani,

More information

JEvolution: Evolutionary Algorithms in Java

JEvolution: Evolutionary Algorithms in Java Computational Intelligence, Simulation, and Mathematical Models Group CISMM-21-2002 May 19, 2015 JEvolution: Evolutionary Algorithms in Java Technical Report JEvolution V0.98 Helmut A. Mayer helmut@cosy.sbg.ac.at

More information

Ensemble Image Classification Method Based on Genetic Image Network

Ensemble Image Classification Method Based on Genetic Image Network Ensemble Image Classification Method Based on Genetic Image Network Shiro Nakayama, Shinichi Shirakawa, Noriko Yata and Tomoharu Nagao Graduate School of Environment and Information Sciences, Yokohama

More information

Secret Key Cryptography (Spring 2004)

Secret Key Cryptography (Spring 2004) Secret Key Cryptography (Spring 2004) Instructor: Adi Shamir Teaching assistant: Eran Tromer 1 Background Lecture notes: DES Until early 1970 s: little cryptographic research in industry and academcy.

More information

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor

More information

DERIVATIVE-FREE OPTIMIZATION

DERIVATIVE-FREE OPTIMIZATION DERIVATIVE-FREE OPTIMIZATION Main bibliography J.-S. Jang, C.-T. Sun and E. Mizutani. Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence. Prentice Hall, New Jersey,

More information

External Encodings Do not Prevent Transient Fault Analysis

External Encodings Do not Prevent Transient Fault Analysis External Encodings Do not Prevent Transient Fault Analysis Christophe Clavier Gemalto, Security Labs CHES 2007 Vienna - September 12, 2007 Christophe Clavier CHES 2007 Vienna September 12, 2007 1 / 20

More information

A New Crossover Technique for Cartesian Genetic Programming

A New Crossover Technique for Cartesian Genetic Programming A New Crossover Technique for Cartesian Genetic Programming Genetic Programming Track Janet Clegg Intelligent Systems Group, Department of Electronics University of York, Heslington York, YO DD, UK jc@ohm.york.ac.uk

More information

Course Business. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Allowed to bring one index card (double sided) Location: Right here

Course Business. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Allowed to bring one index card (double sided) Location: Right here Course Business Midterm is on March 1 Allowed to bring one index card (double sided) Final Exam is Monday, May 1 (7 PM) Location: Right here 1 Cryptography CS 555 Topic 18: AES, Differential Cryptanalysis,

More information

S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?

S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? Lejla Batina 1, Domagoj Jakobovic 2, Nele Mentens 3, Stjepan Picek 1,2, Antonio de la Piedra 1, and

More information

Summary on Crypto Primitives and Protocols

Summary on Crypto Primitives and Protocols Summary on Crypto Primitives and Protocols Levente Buttyán CrySyS Lab, BME www.crysys.hu 2015 Levente Buttyán Basic model of cryptography sender key data ENCODING attacker e.g.: message spatial distance

More information

Outline. Motivation. Introduction of GAs. Genetic Algorithm 9/7/2017. Motivation Genetic algorithms An illustrative example Hypothesis space search

Outline. Motivation. Introduction of GAs. Genetic Algorithm 9/7/2017. Motivation Genetic algorithms An illustrative example Hypothesis space search Outline Genetic Algorithm Motivation Genetic algorithms An illustrative example Hypothesis space search Motivation Evolution is known to be a successful, robust method for adaptation within biological

More information

Genetic Algorithms. Kang Zheng Karl Schober

Genetic Algorithms. Kang Zheng Karl Schober Genetic Algorithms Kang Zheng Karl Schober Genetic algorithm What is Genetic algorithm? A genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization

More information

Heuristic Optimisation

Heuristic Optimisation Heuristic Optimisation Part 10: Genetic Algorithm Basics Sándor Zoltán Németh http://web.mat.bham.ac.uk/s.z.nemeth s.nemeth@bham.ac.uk University of Birmingham S Z Németh (s.nemeth@bham.ac.uk) Heuristic

More information

Masking as a Side-Channel Countermeasure in Hardware

Masking as a Side-Channel Countermeasure in Hardware Masking as a Side-Channel Countermeasure in Hardware 6. September 2016 Ruhr-Universität Bochum 1 Agenda Physical Attacks and Side Channel Analysis Attacks Measurement setup Power Analysis Attacks Countermeasures

More information

The Davies-Murphy Power Attack. Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab

The Davies-Murphy Power Attack. Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab The Davies-Murphy Power Attack Sébastien Kunz-Jacques Frédéric Muller Frédéric Valette DCSSI Crypto Lab Introduction Two approaches for attacking crypto devices traditional cryptanalysis Side Channel Attacks

More information

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate

More information

CS5401 FS2015 Exam 1 Key

CS5401 FS2015 Exam 1 Key CS5401 FS2015 Exam 1 Key This is a closed-book, closed-notes exam. The only items you are allowed to use are writing implements. Mark each sheet of paper you use with your name and the string cs5401fs2015

More information

Hybrid Adaptive Evolutionary Algorithm Hyper Heuristic

Hybrid Adaptive Evolutionary Algorithm Hyper Heuristic Hybrid Adaptive Evolutionary Algorithm Hyper Heuristic Jonatan Gómez Universidad Nacional de Colombia Abstract. This paper presents a hyper heuristic that is able to adapt two low level parameters (depth

More information

Previous Lecture Genetic Programming

Previous Lecture Genetic Programming Genetic Programming Previous Lecture Constraint Handling Penalty Approach Penalize fitness for infeasible solutions, depending on distance from feasible region Balanace between under- and over-penalization

More information

A More Stable Approach To LISP Tree GP

A More Stable Approach To LISP Tree GP A More Stable Approach To LISP Tree GP Joseph Doliner August 15, 2008 Abstract In this paper we begin by familiarising ourselves with the basic concepts of Evolutionary Computing and how it can be used

More information

Metaheuristic Development Methodology. Fall 2009 Instructor: Dr. Masoud Yaghini

Metaheuristic Development Methodology. Fall 2009 Instructor: Dr. Masoud Yaghini Metaheuristic Development Methodology Fall 2009 Instructor: Dr. Masoud Yaghini Phases and Steps Phases and Steps Phase 1: Understanding Problem Step 1: State the Problem Step 2: Review of Existing Solution

More information

Evolutionary Art with Cartesian Genetic Programming

Evolutionary Art with Cartesian Genetic Programming Evolutionary Art with Cartesian Genetic Programming Laurence Ashmore 1, and Julian Francis Miller 2 1 Department of Informatics, University of Sussex, Falmer, BN1 9QH, UK emoai@hotmail.com http://www.gaga.demon.co.uk/

More information

Investigating the Application of Genetic Programming to Function Approximation

Investigating the Application of Genetic Programming to Function Approximation Investigating the Application of Genetic Programming to Function Approximation Jeremy E. Emch Computer Science Dept. Penn State University University Park, PA 16802 Abstract When analyzing a data set it

More information

Metaheuristic Optimization with Evolver, Genocop and OptQuest

Metaheuristic Optimization with Evolver, Genocop and OptQuest Metaheuristic Optimization with Evolver, Genocop and OptQuest MANUEL LAGUNA Graduate School of Business Administration University of Colorado, Boulder, CO 80309-0419 Manuel.Laguna@Colorado.EDU Last revision:

More information

Introduction to Evolutionary Computation

Introduction to Evolutionary Computation Introduction to Evolutionary Computation The Brought to you by (insert your name) The EvoNet Training Committee Some of the Slides for this lecture were taken from the Found at: www.cs.uh.edu/~ceick/ai/ec.ppt

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2 EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.

More information

Program Synthesis. SWE 795, Spring 2017 Software Engineering Environments

Program Synthesis. SWE 795, Spring 2017 Software Engineering Environments Program Synthesis SWE 795, Spring 2017 Software Engineering Environments Today HW3 is due next week in class! Part 1 (Lecture)(~50 mins) Break! Part 2 (Discussion)(~60 mins) Discussion of readings Part

More information

Genetic programming. Lecture Genetic Programming. LISP as a GP language. LISP structure. S-expressions

Genetic programming. Lecture Genetic Programming. LISP as a GP language. LISP structure. S-expressions Genetic programming Lecture Genetic Programming CIS 412 Artificial Intelligence Umass, Dartmouth One of the central problems in computer science is how to make computers solve problems without being explicitly

More information

Multiobjective Optimization Using Adaptive Pareto Archived Evolution Strategy

Multiobjective Optimization Using Adaptive Pareto Archived Evolution Strategy Multiobjective Optimization Using Adaptive Pareto Archived Evolution Strategy Mihai Oltean Babeş-Bolyai University Department of Computer Science Kogalniceanu 1, Cluj-Napoca, 3400, Romania moltean@cs.ubbcluj.ro

More information

Hybridization EVOLUTIONARY COMPUTING. Reasons for Hybridization - 1. Naming. Reasons for Hybridization - 3. Reasons for Hybridization - 2

Hybridization EVOLUTIONARY COMPUTING. Reasons for Hybridization - 1. Naming. Reasons for Hybridization - 3. Reasons for Hybridization - 2 Hybridization EVOLUTIONARY COMPUTING Hybrid Evolutionary Algorithms hybridization of an EA with local search techniques (commonly called memetic algorithms) EA+LS=MA constructive heuristics exact methods

More information

Introduction to Genetic Algorithms. Based on Chapter 10 of Marsland Chapter 9 of Mitchell

Introduction to Genetic Algorithms. Based on Chapter 10 of Marsland Chapter 9 of Mitchell Introduction to Genetic Algorithms Based on Chapter 10 of Marsland Chapter 9 of Mitchell Genetic Algorithms - History Pioneered by John Holland in the 1970s Became popular in the late 1980s Based on ideas

More information

entire search space constituting coefficient sets. The brute force approach performs three passes through the search space, with each run the se

entire search space constituting coefficient sets. The brute force approach performs three passes through the search space, with each run the se Evolving Simulation Modeling: Calibrating SLEUTH Using a Genetic Algorithm M. D. Clarke-Lauer 1 and Keith. C. Clarke 2 1 California State University, Sacramento, 625 Woodside Sierra #2, Sacramento, CA,

More information

Computational Intelligence

Computational Intelligence Computational Intelligence Module 6 Evolutionary Computation Ajith Abraham Ph.D. Q What is the most powerful problem solver in the Universe? ΑThe (human) brain that created the wheel, New York, wars and

More information

Evolutionary Computation. Chao Lan

Evolutionary Computation. Chao Lan Evolutionary Computation Chao Lan Outline Introduction Genetic Algorithm Evolutionary Strategy Genetic Programming Introduction Evolutionary strategy can jointly optimize multiple variables. - e.g., max

More information

ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS

ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS ARTIFICIAL INTELLIGENCE (CSCU9YE ) LECTURE 5: EVOLUTIONARY ALGORITHMS Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ OUTLINE Optimisation problems Optimisation & search Two Examples The knapsack problem

More information

Genetic Algorithm Based Template Optimization for a Vision System: Obstacle Detection

Genetic Algorithm Based Template Optimization for a Vision System: Obstacle Detection ISTET'09 Umair Ali Khan, Alireza Fasih, Kyandoghere Kyamakya, Jean Chamberlain Chedjou Transportation Informatics Group, Alpen Adria University, Klagenfurt, Austria. Genetic Algorithm Based Template Optimization

More information

Genetic Programming of Autonomous Agents. Functional Requirements List and Performance Specifi cations. Scott O'Dell

Genetic Programming of Autonomous Agents. Functional Requirements List and Performance Specifi cations. Scott O'Dell Genetic Programming of Autonomous Agents Functional Requirements List and Performance Specifi cations Scott O'Dell Advisors: Dr. Joel Schipper and Dr. Arnold Patton November 23, 2010 GPAA 1 Project Goals

More information

Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach

Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach 1 Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach David Greiner, Gustavo Montero, Gabriel Winter Institute of Intelligent Systems and Numerical Applications in Engineering (IUSIANI)

More information

An empirical study of the efficiency of learning boolean functions using a Cartesian Genetic Programming approach

An empirical study of the efficiency of learning boolean functions using a Cartesian Genetic Programming approach An empirical study of the efficiency of learning boolean functions using a Cartesian Genetic Programming approach Julian F. Miller School of Computing Napier University 219 Colinton Road Edinburgh, EH14

More information

Reusing Code in Genetic Programming

Reusing Code in Genetic Programming Reusing Code in Genetic Programming Edgar Galván López 1, Riccardo Poli 1, and Carlos A. Coello Coello 2 1 University of Essex, Colchester, CO4 3SQ, UK egalva,rpoli@essex.ac.uk 2 Depto. Ing. Eléctrica,

More information

A Comparative Study of Linear Encoding in Genetic Programming

A Comparative Study of Linear Encoding in Genetic Programming 2011 Ninth International Conference on ICT and Knowledge A Comparative Study of Linear Encoding in Genetic Programming Yuttana Suttasupa, Suppat Rungraungsilp, Suwat Pinyopan, Pravit Wungchusunti, Prabhas

More information

Genetic Programming Prof. Thomas Bäck Nat Evur ol al ut ic o om nar put y Aling go rg it roup hms Genetic Programming 1

Genetic Programming Prof. Thomas Bäck Nat Evur ol al ut ic o om nar put y Aling go rg it roup hms Genetic Programming 1 Genetic Programming Prof. Thomas Bäck Natural Evolutionary Computing Algorithms Group Genetic Programming 1 Genetic programming The idea originated in the 1950s (e.g., Alan Turing) Popularized by J.R.

More information

Glitch it if you can: parameter search strategies for successful fault injection

Glitch it if you can: parameter search strategies for successful fault injection Glitch it if you can: parameter search strategies for successful fault injection Rafael Boix Carpi 1, Stjepan Picek 2,3, Lejla Batina 2, Federico Menarini 1, Domagoj Jakobovic 3 and Marin Golub 3 1 Riscure

More information

Escaping Local Optima: Genetic Algorithm

Escaping Local Optima: Genetic Algorithm Artificial Intelligence Escaping Local Optima: Genetic Algorithm Dae-Won Kim School of Computer Science & Engineering Chung-Ang University We re trying to escape local optima To achieve this, we have learned

More information

NEW COMPRESSION FUNCTION TO SHA-256 BASED ON THE TECHNIQUES OF DES.

NEW COMPRESSION FUNCTION TO SHA-256 BASED ON THE TECHNIQUES OF DES. NEW COMPRESSION FUNCTION TO SHA-256 BASED ON THE TECHNIQUES OF DES. 1 ZAKARIA KADDOURI, 2 FOUZIA OMARY, 3 ABDOLLAH ABOUCHOUAR, 4 MOHSSIN DAARI, 5 KHADIJA ACHKOUN. LRI Laboratory (Ex: Networks and Data

More information

MULTIOBJECTIVE INTRINSIC HARDWARE EVOLUTION. Paul Kaufmann, Marco Platzner

MULTIOBJECTIVE INTRINSIC HARDWARE EVOLUTION. Paul Kaufmann, Marco Platzner MULTIOBJECTIVE INTRINSIC HARDWARE EVOLUTION Paul Kaufmann, Marco Platzner University of Paderborn Warburger Str. 00 33098 Paderborn, Germany email: {paul.kaufmann,platzner}@upb.de ABSTRACT Evolutionary

More information

Encryption and Decryption Image Using Multiobjective Soft Computing Algorithm. Table 4.1 The History of Soft Computing Algorithms Development

Encryption and Decryption Image Using Multiobjective Soft Computing Algorithm. Table 4.1 The History of Soft Computing Algorithms Development CHAPTER IV ENCRYPTION IMAGE USING GENETIC ALGORITHM 4.1. Introduction to Soft Computing Algorithms The soft computing algorithms are a set of techniques covering many fields that belong to various categories

More information

Finding Effective Software Security Metrics Using A Genetic Algorithm

Finding Effective Software Security Metrics Using A Genetic Algorithm International Journal of Software Engineering. ISSN 0974-3162 Volume 4, Number 2 (2013), pp. 1-6 International Research Publication House http://www.irphouse.com Finding Effective Software Security Metrics

More information

Toward Self-adaptive Embedded Systems: Multi-objective Hardware Evolution

Toward Self-adaptive Embedded Systems: Multi-objective Hardware Evolution Toward Self-adaptive Embedded Systems: Multi-objective Hardware Evolution Paul Kaufmann and Marco Platzner University of Paderborn Abstract. Evolutionary hardware design reveals the potential to provide

More information

Outline of the module

Outline of the module Evolutionary and Heuristic Optimisation (ITNPD8) Lecture 2: Heuristics and Metaheuristics Gabriela Ochoa http://www.cs.stir.ac.uk/~goc/ Computing Science and Mathematics, School of Natural Sciences University

More information

Automata Construct with Genetic Algorithm

Automata Construct with Genetic Algorithm Automata Construct with Genetic Algorithm Vít Fábera Department of Informatics and Telecommunication, Faculty of Transportation Sciences, Czech Technical University, Konviktská 2, Praha, Czech Republic,

More information

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 27 CHAPTER 2 LITERATURE SURVEY 2.1 INTRODUCTION There have been many researches done on genetic algorithms and their application to various problems, there are relatively few papers that apply genetic

More information

Artificial Intelligence Application (Genetic Algorithm)

Artificial Intelligence Application (Genetic Algorithm) Babylon University College of Information Technology Software Department Artificial Intelligence Application (Genetic Algorithm) By Dr. Asaad Sabah Hadi 2014-2015 EVOLUTIONARY ALGORITHM The main idea about

More information

A New Crossover Technique for Cartesian Genetic Programming

A New Crossover Technique for Cartesian Genetic Programming A New Crossover Technique for Cartesian Genetic Programming Genetic Programming Track Janet Clegg Intelligent Systems Group, Department of Electronics University of York, Heslington York,YODD,UK jc@ohm.york.ac.uk

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

A Memetic Heuristic for the Co-clustering Problem

A Memetic Heuristic for the Co-clustering Problem A Memetic Heuristic for the Co-clustering Problem Mohammad Khoshneshin 1, Mahtab Ghazizadeh 2, W. Nick Street 1, and Jeffrey W. Ohlmann 1 1 The University of Iowa, Iowa City IA 52242, USA {mohammad-khoshneshin,nick-street,jeffrey-ohlmann}@uiowa.edu

More information

The Genetic Algorithm for finding the maxima of single-variable functions

The Genetic Algorithm for finding the maxima of single-variable functions Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 46-54 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com The Genetic Algorithm for finding

More information