# A Genetic Algorithm Framework

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Fast, good, cheap. Pick any two. The Project Triangle 3 A Genetic Algorithm Framework In this chapter, we develop a genetic algorithm based framework to address the problem of designing optimal networks under multiple efficiency and robustness constraints. We use this framework to evolve optimal topologies that form optimal topology spaces (OTS). We start by discussing the features of the problems we address in this thesis. 49

2 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 50 Consider a network, G (V, E), where the number of nodes is, V = n. The problem of optimal network design is to find the set of edges or connections, E, by adding which an objective function, Ω (G (V, E)) is maximized, while satisfying a set of constraints, Γ (G (V, E)). Below we list the assumptions under which we address the network design problem in this thesis: 1. We design both directed and undirected networks. However, for an instance of the design problem, edges are exclusively either directed or undirected. We do not allow mixed networks. 2. We design unlabelled directed and undirected networks. The ordering of nodes and edges is not important. 3. We address designing connected undirected networks and strongly connected directed networks. We do not deal with designing disconnected networks. 4. We address designing unweighted networks. That is, we do not consider node and/or edge weights. 5. Finally, in our networks, there exists at most one edge between a pair of nodes. And an edge connects exactly two distinct nodes. In other words, we do not allow multigraphs, self-loops and hypergraphs. Some of the above assumptions are not limitations of our framework: the framework supports mixed networks, disconnected components and weighted net-

3 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 51 works. However, a limitation of the framework is that it cannot model a real world weighted network without substantial extensions. For instance, the framework does not support heterogeneous nodes and links. Also, it does not model domain specific requirements such as turn restrictions in road networks. 3.1 Network Design: Optimization Problem Given a graph, G (V, E), there are n (n 1) potential directed edges or connections that can be added to G. The maximum number of edges in a directed graph, e directed max = n (n 1). If the edges are undirected, then there are n n 1 2 potential connections. The maximum number of edges in an undirected graph is, e undirected max = n n 1. The minimum number of directed edges required to design 2 a strongly connected directed network, e directed min = n. The minimum number of undirected edges required to design a connected undirected network, e undirected min = n 1. Given this, the network design problem is to chose a set of edges, E, where, e directed min E e directed max : if G is directed e undirected min E e undirected max : if G is undirected, to maximize an objective function, Ω (G (V, E)), such that a set of constraints, Γ (G (V, E)), are satisfied. In the unconstrained version of the above problem, every connected graph, G,

4 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 52 with E edges is a candidate. The G that maximizes Ω is the optimal network. The problem of counting all graphs of a certain kind in this case, all graphs with a given number of vertices and edges falls in the field of graph enumeration [Harary and Palmer, 1973]. Graphs can be vertex labelled, i.e., every vertex in the graph has a label that distinguishes it from other vertices for the purpose of enumeration, or unlabelled. The number of directed labelled graphs with n nodes and m edges is ( ) n(n 1) m ; the number of undirected labelled graphs with n nodes and m edges is ( ) n(n 1)/2 m. We are interested in unlabelled graphs, since it is the structure or topology of the network that is important to us and not the ordering of the nodes. In general, unlabelled enumeration problems are tougher to solve than labelled enumeration problems. Pòlya s Enumeration Theorem [Harary and Palmer, 1973] gives the number of unlabelled non-isomorphic graphs with a given number of nodes and edges. Generating all non-isomorphic unlabelled graphs is a different problem altogether. There are no known polynomial time algorithms to resolve isomorphism of two graphs. Further, as we discussed previously, one or more constraints exist for a given network design problem. In the constrained version of the above problem, the candidates are an enumeration of all graphs that satisfy a set of constraints. An immediate constraint is that all graphs should be connected. In addition, there may be constraints on the degree of nodes. While the number of candidate solutions comes down as a result of constraints, there are no known ways of enumerating and/or generating arbitrarily large graphs that satisfy a given set of constraints to

5 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 53 the best of our knowledge. Below, we define an instance of the optimal network design problem under multiple constraints. Problem Instance 1. Given a network, G (V, E), of n nodes, each having a maximum permissible degree of p, where, 2 p n 1, add a maximum of e undirected edges to minimize the diameter d of the network. Ensure that the degree skew in the resulting network, p skew, i.e. the difference between the maximum degree in the network, ˆp, and the average degree of the network, p, is no more than δ, where 0 δ < n 2. We need to chose an E, where E e, from the set of all possible undirected edges, whose size is, e undirected max = n(n 1) 2. Let x T be an n(n 1) 2 vector, representing all undirected edges in G: x T = {x ij : i, j V} x ij = 0 : edge (i, j) / V 1 : edge (i, j) V Since the diameter is determined by the arrangement of the edges, d = f ( x T ), the following is the mathematical programming model for Problem Instance 1. arg min f ( x T) (Ω-1) x T

6 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 54 subject to, x ii = 0, x ij + x ji = 1 (Γ 1.1) x ij e i,j x ji + x ij, i V p j j (Γ 1.2) (Γ 1.3) The diameter of a network is defined as the longest of the all pairs shortest paths. Therefore, we need to define our objective function further. Let P ij denote the shortest path between nodes i and j. f ( x ) T = d = max P ij i,j P ij = min(p ij, min ij (P ik + x kj )) Further, the constraint on degree skew is defined as follows. Let p i be the degree of the i th node. ˆp = max i p i p = i,j p i n p skew = ˆp p δ (Γ 1.4)

7 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK Optimization Framework What we described in the previous section is an instance of a combinatorial optimization problem we need to find an optimal object (optimal set of edges) in a large but finite set of objects. In other words, an optimization process has to search a large discrete solution space to find the optimal solution. The solution space can be formed by graphical enumeration under a given set of constraints. Each solution is then evaluated to find the optimal solution. However, this approach is not feasible as we discussed earlier. Therefore, we propose an evolutionary optimization based framework to address the kind of network design problems defined previously. Our approach for the exploration of optimal topology spaces is called topology breeding. It relies on genetic algorithms as the optimization technique to aid in this exploration. In this section, we formally define the topology breeding setup. [Venkatasubramanian et al., 2004] propose that performance of a network depends on three critical system parameters: efficiency, robustness and cost. In their work, efficiency is defined in terms of the average path length of the resulting graph topology and robustness in terms of the number (and size) of connected components a node deletion causes in the graph. A selection pressure variable decides the relative importance of efficiency and robustness. Using these measures, they let topologies evolve under different trade-offs through a genetic algorithm process. We extend the above formalism to accommodate multiple constraints and op-

8 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 56 timality objectives to study different classes of networks. We define efficiency (η) in terms of properties such as diameter, average path length and closeness centrality. We define robustness (ρ) in terms of properties such as degree centrality, node betweenness centrality and edge connectivity. We design topologies with an arbitrary number of edges. Edges in a network can be directed or undirected. The trade-off between robustness and efficiency is decided by an environmental variable, α. A variable, β, is used as a cost control parameter Performance Metrics Different combinations of design metrics are applicable in different scenarios. In DHTs, minimizing lookup complexity (minimal diameter) while maintaining small and symmetric finger tables across machines (degree symmetry) is a design objective. To handle traffic flow, designing networks with low average path lengths while balancing load on the nodes (node betweenness symmetry) to avoid congestion is important. In case of NCW and supply chains, having alternate paths when a communication link fails (optimal edge connectivity) is a design requirement.

9 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 57 We use a genetic algorithm optimization process called topology breeding to address the problems such as above. Topology breeding is governed by a fitness function. Fitness of a graph, φ (G (V, E)), is defined in terms of the optimization parameters: efficiency (η), robustness (ρ) and infrastructure cost (κ). The maximum permissible degree (p) is also a design constraint. We model efficiency, robustness and cost in terms of structural or graph theoretic properties. A structural metric models only certain aspects of network performance. Therefore, we use multiple metrics to model performance. The specific structural metrics that we use to model a network depends on the network s performance characteristics. Below we note some useful metrics in network design and analysis. For a comprehensive account of metrics used in network design and analysis, please refer to [Costa et al., 2007] Efficiency Efficiency measures the cost of communication in a network. There are a number of ways in which efficiency can be defined. The diameter of a network is the upper bound on the communication cost in the network. The average path length (APL) gives the communication cost on average. Maximizing the symmetry in the distribution of distances between pairs of nodes can also serve as a useful measure of efficiency. Therefore, per node eccentricity (longest of all shortest paths from a node) and closeness centrality values can also be used to define efficiency. In this thesis, we use efficiency based on two metrics in the design process diameter and average path length.

10 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 58 Efficiency based on Diameter The worst diameter (dia max ) for a connected undirected graph of n nodes is n 1, which is the diameter of a straight line graph. The best diameter (dia min ) is 1, which is the diameter of a clique (complete graph). In other words, a topology is most efficient if the diameter is 1, and least efficient if it is n 1. We map a diameter, d, that falls in the interval, [n 1, 1], to a value of efficiency, η d, in the interval, [0, 1], as: η d = 1 d 1 n 2 (3.1) In case of a strongly connected directed graph with n nodes, the worst diameter is n 1, which occurs for a circle topology. The best diameter is 1, which is the diameter of a directed complete graph. Since both the upper and lower bounds of diameter are the same as in undirected graphs, the expression for η d in case of directed graphs is the same as above. Expression (3.1) is due to the following mapping function. For a graph G, with a diameter, dia G : η d (G) = 1 dia G dia min dia max dia min (3.2) By this definition, an undirected straight line topology has an η d of 0, a directed circular topology has an η d of 0, a clique has an η d of 1 and so on. Efficiency based on APL It can be shown that, the worst APL, l max for a connected undirected graph of n nodes, which occurs again for a straight line, is n+1 3. The best APL, l min is 1,

11 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 59 which occurs for a clique. We map an APL, l, that falls in the interval, [ n+1 3, 1], to a value of efficiency, η l, in the interval, [0, 1], as: η l = 1 3 l 1 n 2 (3.3) Similarly, for strongly connected directed graphs, the worst case APL, the APL of the directed circle, is n. The best case APL is again 1, for the directed 2 clique. Thus, the expression for efficiency of directed graphs, in terms of APL is: η l = 1 2 l 1 n 2 (3.4) Expressions (3.3) and (3.4) are due to the following mapping function. For a graph G, with an APL, l G : η l (G) = 1 l G l min l max l min (3.5) Robustness Robustness measures the resilience of a network in the face of perturbations such as: node and edge failures; and, variable network load. Robustness is often defined in terms of the skew in the importance of nodes and edges. As such, centrality measures, viz; degree, node betweenness and edge betweenness sequences can be used. When there is a skew in the centrality measures, a small number of nodes and/or edges are more important than the others. Thus, their failure affects the

12 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 60 network s performance much more than failures in the rest of the network. On the other hand, a symmetric centrality sequence ensures robustness to random failures as well as targeted attacks of nodes/edges. Connectivity of a network is also indicative of robustness. If a network has a vertex connectivity of m, it implies there are m vertex independent paths between any pair of nodes in the network. Similarly, there is a notion of edge connectivity. Menger s theorem states that the size of the minimum vertex (or edge) cut of a graph is equal to the maximum number of pairwise vertex (or edge) independent paths in the graph [Harary, 1994]. Thus, connectivity has an important role in networks prone to failures. In this work, we use several definitions of robustness to cover different perspectives: 1. Degree Centrality (ρ p ): Measure ρ p is based on the skew in degree centrality, to cover the symmetric load perspective (as in DHTs). 2. Node Betweenness (ρ nb ): Measure ρ nb is based on node betweenness, to cover the perspectives of targeted attacks as well as congestion (as in CDNs). 3. Edge Connectivity (ρ λ ): Measure ρ λ is based on edge connectivity, to cover the targeted attack perspective (as in NCW). 4. Node Deletions (ρ fn ): Measure ρ fn is based on the effect of random or targeted node deletions.

13 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 61 Robustness based on Degree Centrality For connected undirected graphs, we define skew in degree centrality as the difference between the maximum degree in the graph (ˆp) and the mean degree of the nodes ( p). For a connected undirected graph of n nodes, the worst skew (skew max ) occurs for the star topology. The central node has a degree of n 1 and all the nodes surrounding it have a degree of 1. Therefore, the worst skew is (n 1)(n 2). The best skew (skew n min ) is 0, which is when all the nodes have the same degree. This occurs when the topologies are regular graph topologies as in a circular topology or a clique. ρ p = 1 n(ˆp p) (n 1)(n 2) (3.6) In case of strongly connected directed graphs, we consider outdegrees. Again, the worst skew occurs for a directed graph in which the central node has an outdegree of n 1. All other nodes have an outdegree of 1. Like undirected graphs, the worst skew in degree centrality is (n 1)(n 2). The best skew, which is 0, occurs n for circular topologies or for a clique. As a result, the above relation continues to hold for directed graphs. Expression (3.6) is due to the following mapping function. For a graph G, with a degree skew, skew G : ρ p (G) = 1 skew G skew min skew max skew min (3.7)

14 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 62 Robustness based on Node Betweenness Centrality Similar to the skew in degree centrality, we define the skew in node betweenness centrality (nbskew) as the difference between the maximum node betweenness ( ˆnb) and the average node betweenness ( nb) in a graph. For a connected undirected graph, the worst skew (nbskew max ) occurs for a star topology. In this case, all the shortest paths pass through the central hub of the star topology, and none through the rest of the nodes. Therefore, nbskew max = n 1. The best skew n occurs when an equal number of shortest paths pass through each node in the graph, nbskew min = 0, as in a circle. Thus: ρ nb = 1 n ˆnb nb n 1 (3.8) In case of strongly connected directed graphs, the above relation continues to hold. Expression (3.8) is due to the following mapping function. For a graph G, with a node betweenness skew, nbskew G : ρ nb (G) = 1 nbskew G nbskew min nbskew max nbskew min (3.9) Robustness based on Edge Connectivity A third way to measure robustness, ρ λ, is in terms of edge connectivity (λ). Edge connectivity is the minimum number of edges whose removal renders a network disconnected. In case of an undirected graph, the tree topologies have the worst connectivity (connectivity min ) of 1; the clique has the best connectivity

15 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 63 (connectivity max ), n 1. Thus, robustness, when defined in terms of connectivity is: ρ λ = λ 1 n 2 (3.10) In case of directed graphs, the circle has the worst connectivity of 1. Again, the directed clique has the best connectivity, n 1. Hence, the above result continues to hold. The expression for robustness with respect to connectivity, ρ λ, is due to the following mapping function. For a graph G, with connectivity, connectivity G : ρ λ (G) = connectivity G connectivity min connectivity max connectivity min (3.11) Functional Robustness based on Node Deletions We also develop certain measures that we call functional robustness. Functional robustness indicates how well a network is doing after one or more nodes/edges stop working, either due to random failures or targeted attacks. When a node v is deleted from a (strongly) connected graph, G, the remaining network, G v has one or more (strongly) connected components, C, where 1 C n 1. Let Ĉ be the largest (strongly) connected component after a single node deletion. We define the following quantities: (1) nwsize = Ĉ, the biggest fraction of n 1 the total remaining network that remains (strongly) connected after a node deletion, (2) failure = 1.0 nwsize, fraction of the network that has failed after a

16 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 64 node deletion. We derive a robustness measure based on the above that holds for both directed and undirected graphs. The minimum failure occurs when a node deletion does not add any connected components to the network, that is the rest of the network remains intact. Therefore, failure min = 0. The maximum failure occurs in case of a star network when its central node is deleted, resulting in n 1 components of size 1 each. Therefore, failure max = n 2. The functional robustness of a graph, n 1 G is defined as: ρ fn (G) = 1.0 failure G failure min failure max failure min (3.12) We use this measure in our experiments to measure the effect of random node deletions as well as targeted attacks Cost We divide cost into two components: (1) infrastructure cost as a function of the number of edges, e, in the network, and (2) node level maintenance/ bookkeeping cost, as a function of the node s degree, p (in case of directed graphs, outdegree, p out ). We place upper bounds on both these in our topology design. Infrastructure Cost (κ): The minimum number of edges (e undirected min ) required to have a connected undirected graph is n 1. We associate a cost, κ = 0, to a minimally connected graph. Any extra edge has an associated cost. All extra edges cost the same. An undirected clique has the highest cost, with e undirected max =

17 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 65 n(n 1) 2 number of edges. We define the cost of an undirected topology with e edges as the ratio of the number of extra edges in a topology to the number of extra edges in the clique with the same number of nodes: κ = e e undirected min e undirected max e undirected min (3.13) In case of a directed graph, the minimum number of edges (e directed min ) required to have a strongly connected graph is n, corresponding to the circle topology. And the maximum number of edges in a directed graph is, e directed max = n(n 1), for a directed clique. The cost of a directed topology with e edges is: κ = e e directed min e directed max e directed min (3.14) Maximum Permissible Degree (p): The Maximum Permissible Degree, p, is an upper limit on the number of edges that can be incident on a node. In case of a directed graph, p out, is the upper limit on the number of outgoing edges. Degree is a measure of the local bookkeeping cost. It can also be thought of as the amount of load a node is handling through edges incident on it.

18 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK Fitness The general fitness function is as follows: φ = αρ + (1 α)η βκ (3.15) Here, 0 α 1, is an application dependent parameter that acts as a slider between efficiency and robustness. A high value of α indicates that a high emphasis should be placed on the robustness of topologies during topology breeding. The parameter β, 0 β 1, is used for additional cost control (in addition to the upper bound, κ). When set a high value, β helps the evolutionary process to squeeze out the most cost-effective topology that achieves a certain efficiency and robustness (controlled by α) by removing as many superfluous edges as possible. Thus, the global optimization objective is to find the set of edges to construct the fittest graph: arg max φ (G (V, E)) (3.16) E The rationale for defining fitness as a linear function over η, ρ and κ is that a linear combination is the least biased expression of the trade-offs. There is no clear way of correlating efficiency, robustness and cost to the best of our knowledge. While efficiency is non-decreasing with increasing cost, we can also find highly efficient (η 1) topologies such as the star topology at low (κ = 0) costs. In case of robustness, the effect of cost depends on the metric used to measure robustness.

19 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 67 If degree symmetry is the robustness measure, topologies such as the straight line and the circle have high robustness (ρ p 1) even at low costs (κ = 0). In fact, addition of a few edges might reduce the robustness in such networks, due to degree asymmetry. If edge connectivity is the measure of robustness, robustness is non-decreasing with increasing cost. Similarly, the trade-offs between efficiency and robustness are also not clear. As a result, we use a simple linear function for fitness. We present results from our experiments using several combinations of efficiency, robustness and cost measures (Chapter 4). Below, we give two examples in order to illustrate the fitness function: 1. Parameters: efficiency in terms of diameter (η d ), robustness in terms of degree centrality (ρ p ), cost, κ Fitness Function: φ d,p = αρ p + (1 α)η d βκ 2. Parameters: efficiency in terms of diameter (η d ), robustness in terms of edge connectivity (ρ λ ), cost, κ Fitness Function: φ d,λ = αρ λ + (1 α)η d βκ. 3.3 Genetic Algorithm Formulation Genetic algorithm (GA) is a search technique developed to imitate the process of evolution through natural selection. We employ a GA process in our work to evolve or breed optimal topologies that are the fittest in terms of predefined

20 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 68 performance requirements starting from random graphs with arbitrary fitness. A genetic algorithm process runs through the following stages: initialization, selection, reproduction and termination. Typically, there is only one stage of initialization followed by several iterations of selection and reproduction until a convergence is reached, at which stage the process enters termination. Below, we discuss this process with respect to our problem Initialization We start with a large number of seed graphs (typically 1000s). The seed graphs are generated randomly under the p and e constraints. These seed graphs form the chromosomal strings for the genetic algorithm. Thus, a chromosome consists of edges under the p and e constraints. In other words, a chromosome (or a seed graph) is a combination over the set of all possible edges in a n node network, such that the the number of edges in the combination is at most e, and each node gets a degree of at most p. Table 3.1 shows a sample of chromosomal strings corresponding to undirected topologies. We represent chromosomes as edge lists instead of binary strings for the sake of convenience. These seed graphs were randomly generated with the following parameters: n = 10, e 14 and p 5.

21 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 69 Chromosome Edge List Topology Seed Graph-1 [10 5, 1 6, 4 10, 6 9, 3 9, 5 8, 7 10, 8 7, 10 3, 4 3, 2 1, 5 7, 4 9, 6 4] Seed Graph-2 [2 5, 2 7, 8 2, 8 1, 6 5, 8 9, 2 10, 3 10, 9 5, 1 7, 2 1, 7 3] Figure 3.1: GA Initialization: Sample Chromosomal Strings

22 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK Selection We retain only the connected seed graphs. After retaining the connected seed graphs, we sort them based on their fitness. Fitness is computed using the fitness function corresponding to a particular experiment. A mating pool of a certain size is formed such that 80% of the mates are chosen based on fitness using the fitness proportionate selection or roulette wheel selection [Bäck, 1996]. In a fitness proportionate selection method, the fitness of an individual chromosome (seed graph) determines the probability of its being selected. Given a population of N, the probability, P i, of a seed graph with fitness, φ i, being selected is: P i = φ i N φ j j=1 The remaining 20% of the mating pool is formed by choosing randomly from amongst the lesser fit seed graphs. Mixing some less fit offspring in the population is an effort towards reducing the chances of local minima Reproduction We do an all-pairs cross-over over the mating pool. We use a number of crossover (CO) operators, some of them standard and some defined by us. Table 3.1 lists the crossover operators we use along with their descriptions. The crossover operators are chosen randomly for every pair of mates. During crossover, it is ensured that the p and e constraints are not breached. Also, duplicate edges are removed. Figure 3.2 shows an example offspring resulting from the crossover of Seed Graph-1 and Seed Graph 2 when the single point equal edges

23 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 71 Operator Clone One Point with Equal Edges Cut and Splice One Point with Equal Nodes Two Point Copy Edges Transfer Edges Best Fit Edges Best Fit Nodes Description Offspring are produced by simply cloning the parents Both parents contribute half their edges to produce two offspring A variant of the above wherein the parents have different crossover points, resulting in offspring of different lengths Both parents contribute half their nodes, along with edges incident on them, to produce two offspring Parents edge lists are cut at two points and two offspring created using the six portions A random number of nodes are chosen from both the parents and offspring are formed by copying the edges incident on those nodes A variant of the above in which offspring are formed by replacing randomly chosen edges from one parent with edges from another parent Offspring are created by choosing a greater fraction of edges from the fitter parent Offspring are created by choosing a greater fraction of nodes, along with the edges incident on them, from the fitter parent Table 3.1: GA Reproduction: List of crossover operators used in topology breeding

24 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK 72 Figure 3.2: Single Point Equal Edges crossover of Seed Graph-1 (Parent-1) and Seed Graph-2 (Parent-2) to form two offspring crossover operator is used. At the end of the crossover phase, we have a large number of offspring, (2 (mating pool size) 2 ). A small percentage (typically, 5%) of the offspring generated by crossover undergo random mutations. Mutations include addition, deletion or replacement of edges. It is ensured that the constraints on maximum degree and the maximum number of edges is not breached during mutation. The offspring, some of which are mutated, form the seed graphs for the next round of selection. The whole process is repeated over several generations until convergence is reached. At the end of the process, we get an optimal topology for a given experiment.

25 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK Termination We determine convergence using the following two parameters: (1) iter, which is the minimum number of iterations of the GA, and (2) convergence, which is the difference between the maximum fitness and minimum fitness in a generation of offspring. The GA proceeds until the number of iterations is iter or convergence ɛ, where ɛ is a small positive value, whichever is later. When convergence ɛ, essentially all offspring have the same fitness (most of them have the same topology). A topology with the highest fitness is then chosen as the optimal topology. We observe that convergence is reached fast, within 20 iterations. The rate and quality of convergence depends on the number of seed graphs we use initially. For a small number of seed graphs, we observe that convergence is neither fast nor are the topologies generated very fit. Therefore, for our experiments, we have used a large number of seed graphs (1000s of seed graphs). There is a possibility that a GA converges by ending up in a local minimum. We have tried to reduce the chances of local minima by inducing as much randomness in the GA as possible. Specifically, we take the following steps: (1) implement a large number of crossover operators and chose them randomly, (2) mutate a small percentage of a generation of offspring by random addition, deletion and replacement of edges, and (3) during the selection stage, choose 80% of the next mating pool by roulette wheel selection and the remaining 20% uniformly randomly from the least fit offspring.

26 CHAPTER 3. A GENETIC ALGORITHM FRAMEWORK Topology Breeding To conduct experiments, we have developed a tool called Topology Analysis and visualization (TopAZ) as part of this work. TopAZ is a set of graph design, analysis and visualization libraries. Specifically, the genetic algorithm is implemented in a library called TopBreed. TopAZ is available in Python and Java versions. Our experimental setup is called topology breeding: we breed or evolve optimal topologies under various constraints. We conducted topology breeding experiments using different design metrics for networks with up to 200 nodes. Different types of structures emerge at different points in spaces of optimal topologies defined by the optimization parameters. In the next chapter, we present our main findings.

### A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2

Chapter 5 A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Graph Matching has attracted the exploration of applying new computing paradigms because of the large number of applications

### GENETIC ALGORITHM with Hands-On exercise

GENETIC ALGORITHM with Hands-On exercise Adopted From Lecture by Michael Negnevitsky, Electrical Engineering & Computer Science University of Tasmania 1 Objective To understand the processes ie. GAs Basic

### Introduction to Genetic Algorithms

Advanced Topics in Image Analysis and Machine Learning Introduction to Genetic Algorithms Week 3 Faculty of Information Science and Engineering Ritsumeikan University Today s class outline Genetic Algorithms

### 2. CONNECTIVITY Connectivity

2. CONNECTIVITY 70 2. Connectivity 2.1. Connectivity. Definition 2.1.1. (1) A path in a graph G = (V, E) is a sequence of vertices v 0, v 1, v 2,..., v n such that {v i 1, v i } is an edge of G for i =

### Comparison of TSP Algorithms

Comparison of TSP Algorithms Project for Models in Facilities Planning and Materials Handling December 1998 Participants: Byung-In Kim Jae-Ik Shim Min Zhang Executive Summary Our purpose in this term project

### Reducing Graphic Conflict In Scale Reduced Maps Using A Genetic Algorithm

Reducing Graphic Conflict In Scale Reduced Maps Using A Genetic Algorithm Dr. Ian D. Wilson School of Technology, University of Glamorgan, Pontypridd CF37 1DL, UK Dr. J. Mark Ware School of Computing,

### An Evolutionary Algorithm for the Multi-objective Shortest Path Problem

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem Fangguo He Huan Qi Qiong Fan Institute of Systems Engineering, Huazhong University of Science & Technology, Wuhan 430074, P. R. China

### A New Selection Operator - CSM in Genetic Algorithms for Solving the TSP

A New Selection Operator - CSM in Genetic Algorithms for Solving the TSP Wael Raef Alkhayri Fahed Al duwairi High School Aljabereyah, Kuwait Suhail Sami Owais Applied Science Private University Amman,

### Evolutionary Computation Algorithms for Cryptanalysis: A Study

Evolutionary Computation Algorithms for Cryptanalysis: A Study Poonam Garg Information Technology and Management Dept. Institute of Management Technology Ghaziabad, India pgarg@imt.edu Abstract The cryptanalysis

### A Steady-State Genetic Algorithm for Traveling Salesman Problem with Pickup and Delivery

A Steady-State Genetic Algorithm for Traveling Salesman Problem with Pickup and Delivery Monika Sharma 1, Deepak Sharma 2 1 Research Scholar Department of Computer Science and Engineering, NNSS SGI Samalkha,

### Part II. Graph Theory. Year

Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 53 Paper 3, Section II 15H Define the Ramsey numbers R(s, t) for integers s, t 2. Show that R(s, t) exists for all s,

### Figure : Example Precedence Graph

CS787: Advanced Algorithms Topic: Scheduling with Precedence Constraints Presenter(s): James Jolly, Pratima Kolan 17.5.1 Motivation 17.5.1.1 Objective Consider the problem of scheduling a collection of

### Genetic Algorithms for Vision and Pattern Recognition

Genetic Algorithms for Vision and Pattern Recognition Faiz Ul Wahab 11/8/2014 1 Objective To solve for optimization of computer vision problems using genetic algorithms 11/8/2014 2 Timeline Problem: Computer

### Automated Test Data Generation and Optimization Scheme Using Genetic Algorithm

2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Automated Test Data Generation and Optimization Scheme Using Genetic Algorithm Roshni

### CS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri

CS 598CSC: Approximation Algorithms Lecture date: March, 011 Instructor: Chandra Chekuri Scribe: CC Local search is a powerful and widely used heuristic method (with various extensions). In this lecture

### Genetic Algorithms: Setting Parmeters and Incorporating Constraints OUTLINE OF TOPICS: 1. Setting GA parameters. 2. Constraint Handling (two methods)

Genetic Algorithms: Setting Parmeters and Incorporating Constraints OUTLINE OF TOPICS: 1. Setting GA parameters general guidelines for binary coded GA (some can be extended to real valued GA) estimating

### Evolutionary Algorithms. CS Evolutionary Algorithms 1

Evolutionary Algorithms CS 478 - Evolutionary Algorithms 1 Evolutionary Computation/Algorithms Genetic Algorithms l Simulate natural evolution of structures via selection and reproduction, based on performance

### Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks

Summary of Coverage Problems in Wireless Ad-hoc Sensor Networks Laura Kneckt 21th of March, 2005 Abstract This paper presents a brief summary of the article about Coverage Problems in Wireless Ad-hoc Sensor

### Genetic Algorithm for Network Design Problem-An Empirical Study of Crossover Operator with Generation and Population Variation

International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 605-611 Genetic Algorithm for Network Design Problem-An Empirical Study of Crossover Operator

### Outline. Motivation. Introduction of GAs. Genetic Algorithm 9/7/2017. Motivation Genetic algorithms An illustrative example Hypothesis space search

Outline Genetic Algorithm Motivation Genetic algorithms An illustrative example Hypothesis space search Motivation Evolution is known to be a successful, robust method for adaptation within biological

### Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

### Using Genetic Algorithms to Solve the Box Stacking Problem

Using Genetic Algorithms to Solve the Box Stacking Problem Jenniffer Estrada, Kris Lee, Ryan Edgar October 7th, 2010 Abstract The box stacking or strip stacking problem is exceedingly difficult to solve

### CHAPTER 4 GENETIC ALGORITHM

69 CHAPTER 4 GENETIC ALGORITHM 4.1 INTRODUCTION Genetic Algorithms (GAs) were first proposed by John Holland (Holland 1975) whose ideas were applied and expanded on by Goldberg (Goldberg 1989). GAs is

### Multi-objective Optimization

Jugal K. Kalita Single vs. Single vs. Single Objective Optimization: When an optimization problem involves only one objective function, the task of finding the optimal solution is called single-objective

### MATH3016: OPTIMIZATION

MATH3016: OPTIMIZATION Lecturer: Dr Huifu Xu School of Mathematics University of Southampton Highfield SO17 1BJ Southampton Email: h.xu@soton.ac.uk 1 Introduction What is optimization? Optimization is

### Computational complexity

Computational complexity Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Definitions: problems and instances A problem is a general question expressed in

### Neural Network Weight Selection Using Genetic Algorithms

Neural Network Weight Selection Using Genetic Algorithms David Montana presented by: Carl Fink, Hongyi Chen, Jack Cheng, Xinglong Li, Bruce Lin, Chongjie Zhang April 12, 2005 1 Neural Networks Neural networks

### Complexity Results on Graphs with Few Cliques

Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

### Lecture Notes on Karger s Min-Cut Algorithm. Eric Vigoda Georgia Institute of Technology Last updated for Advanced Algorithms, Fall 2013.

Lecture Notes on Karger s Min-Cut Algorithm. Eric Vigoda Georgia Institute of Technology Last updated for 4540 - Advanced Algorithms, Fall 2013. Today s topic: Karger s min-cut algorithm [3]. Problem Definition

### Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

### Genetic Algorithms. Kang Zheng Karl Schober

Genetic Algorithms Kang Zheng Karl Schober Genetic algorithm What is Genetic algorithm? A genetic algorithm (or GA) is a search technique used in computing to find true or approximate solutions to optimization

### What is GOSET? GOSET stands for Genetic Optimization System Engineering Tool

Lecture 5: GOSET 1 What is GOSET? GOSET stands for Genetic Optimization System Engineering Tool GOSET is a MATLAB based genetic algorithm toolbox for solving optimization problems 2 GOSET Features Wide

### Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem

etic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem R. O. Oladele Department of Computer Science University of Ilorin P.M.B. 1515, Ilorin, NIGERIA

### On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness

On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness by Elaheh Fata A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree

### The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

### Beyond Interference Avoidance: Distributed Sub-network Scheduling in Wireless Networks with Local Views

Beyond Interference Avoidance: Distributed Sub-network Scheduling in Wireless etworks with Local Views Pedro E. Santacruz, Vaneet Aggarwal, and Ashutosh Sabharwal Abstract In most wireless networks, nodes

Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

### Solving problems on graph algorithms

Solving problems on graph algorithms Workshop Organized by: ACM Unit, Indian Statistical Institute, Kolkata. Tutorial-3 Date: 06.07.2017 Let G = (V, E) be an undirected graph. For a vertex v V, G {v} is

### Simplified clustering algorithms for RFID networks

Simplified clustering algorithms for FID networks Vinay Deolalikar, Malena Mesarina, John ecker, Salil Pradhan HP Laboratories Palo Alto HPL-2005-163 September 16, 2005* clustering, FID, sensors The problem

### On Computing the Centroid of the Vertices of an Arrangement and Related Problems

On Computing the Centroid of the Vertices of an Arrangement and Related Problems Deepak Ajwani, Saurabh Ray, Raimund Seidel, and Hans Raj Tiwary Max-Planck-Institut für Informatik, Saarbrücken, Germany

### Approximation Algorithms: The Primal-Dual Method. My T. Thai

Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the

### Using an outward selective pressure for improving the search quality of the MOEA/D algorithm

Comput Optim Appl (25) 6:57 67 DOI.7/s589-5-9733-9 Using an outward selective pressure for improving the search quality of the MOEA/D algorithm Krzysztof Michalak Received: 2 January 24 / Published online:

### Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

### Properties of Biological Networks

Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

### EVOLVING ENGINEERING DESIGN TRADE-OFFS. Yizhen Zhang Collective Robotics Group

Proceedings of DETC 3 ASME 23 Design Engineering Technical Conferences and Computers and Information in Engineering Conference Chicago, Illinois USA, September 2-6, 23 DETC23/DTM-48676 EVOLVING ENGINEERING

### Heuristics in MILP. Group 1 D. Assouline, N. Molyneaux, B. Morén. Supervisors: Michel Bierlaire, Andrea Lodi. Zinal 2017 Winter School

Heuristics in MILP Group 1 D. Assouline, N. Molyneaux, B. Morén Supervisors: Michel Bierlaire, Andrea Lodi Zinal 2017 Winter School 0 / 23 Primal heuristics Original paper: Fischetti, M. and Lodi, A. (2011).

### Edge and local feature detection - 2. Importance of edge detection in computer vision

Edge and local feature detection Gradient based edge detection Edge detection by function fitting Second derivative edge detectors Edge linking and the construction of the chain graph Edge and local feature

### NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

### Greedy Approximations

CS 787: Advanced Algorithms Instructor: Dieter van Melkebeek Greedy Approximations Approximation algorithms give a solution to a problem in polynomial time, at most a given factor away from the correct

### An Introduction to Evolutionary Algorithms

An Introduction to Evolutionary Algorithms Karthik Sindhya, PhD Postdoctoral Researcher Industrial Optimization Group Department of Mathematical Information Technology Karthik.sindhya@jyu.fi http://users.jyu.fi/~kasindhy/

### arxiv: v2 [math.co] 13 Aug 2013

Orthogonality and minimality in the homology of locally finite graphs Reinhard Diestel Julian Pott arxiv:1307.0728v2 [math.co] 13 Aug 2013 August 14, 2013 Abstract Given a finite set E, a subset D E (viewed

### MINIMAL EDGE-ORDERED SPANNING TREES USING A SELF-ADAPTING GENETIC ALGORITHM WITH MULTIPLE GENOMIC REPRESENTATIONS

Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 5 th, 2006 MINIMAL EDGE-ORDERED SPANNING TREES USING A SELF-ADAPTING GENETIC ALGORITHM WITH MULTIPLE GENOMIC REPRESENTATIONS Richard

### Algorithm Design and Analysis

Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation

### A Parallel Architecture for the Generalized Travelling Salesman Problem: Project Proposal

A Parallel Architecture for the Generalized Travelling Salesman Problem: Project Proposal Max Scharrenbroich, maxfs at umd.edu Dr. Bruce Golden, R. H. Smith School of Business, bgolden at rhsmith.umd.edu

### GRAPHS, GRAPH MODELS, GRAPH TERMINOLOGY, AND SPECIAL TYPES OF GRAPHS

GRAPHS, GRAPH MODELS, GRAPH TERMINOLOGY, AND SPECIAL TYPES OF GRAPHS DR. ANDREW SCHWARTZ, PH.D. 10.1 Graphs and Graph Models (1) A graph G = (V, E) consists of V, a nonempty set of vertices (or nodes)

### GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM

Journal of Al-Nahrain University Vol.10(2), December, 2007, pp.172-177 Science GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM * Azhar W. Hammad, ** Dr. Ban N. Thannoon Al-Nahrain

### Introduction to Combinatorial Algorithms

Fall 2009 Intro Introduction to the course What are : Combinatorial Structures? Combinatorial Algorithms? Combinatorial Problems? Combinatorial Structures Combinatorial Structures Combinatorial structures

### Fast oriented bounding box optimization on the rotation group SO(3, R)

Fast oriented bounding box optimization on the rotation group SO(3, R) Chia-Tche Chang 1, Bastien Gorissen 2,3 and Samuel Melchior 1,2 chia-tche.chang@uclouvain.be bastien.gorissen@cenaero.be samuel.melchior@uclouvain.be

### Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

### Selecting the Best Spanning Tree in Metro Ethernet Networks using Genetic Algorithm

106 Selecting the Best Spanning Tree in Metro Ethernet Networks using Genetic Algorithm Farhad Faghani and Ghasem Mirjalily, faghani_farhad@yahoo.com mirjalily@yazduni.ac.ir Instructor, Electrical Engeering

### CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

### 4 Factor graphs and Comparing Graphical Model Types

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms for Inference Fall 2014 4 Factor graphs and Comparing Graphical Model Types We now introduce

### Line Graphs and Circulants

Line Graphs and Circulants Jason Brown and Richard Hoshino Department of Mathematics and Statistics Dalhousie University Halifax, Nova Scotia, Canada B3H 3J5 Abstract The line graph of G, denoted L(G),

### Introduction to Design Optimization: Search Methods

Introduction to Design Optimization: Search Methods 1-D Optimization The Search We don t know the curve. Given α, we can calculate f(α). By inspecting some points, we try to find the approximated shape

### On the Min-Max 2-Cluster Editing Problem

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 29, 1109-1120 (2013) On the Min-Max 2-Cluster Editing Problem LI-HSUAN CHEN 1, MAW-SHANG CHANG 2, CHUN-CHIEH WANG 1 AND BANG YE WU 1,* 1 Department of Computer

### Small Survey on Perfect Graphs

Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families

### Introduction to Approximation Algorithms

Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background

### What is a Graphon? Daniel Glasscock, June 2013

What is a Graphon? Daniel Glasscock, June 2013 These notes complement a talk given for the What is...? seminar at the Ohio State University. The block images in this PDF should be sharp; if they appear

### Source. Sink. Chapter 10: Iterative Programming Maximum Flow Problem. CmSc250 Intro to Algorithms

Chapter 10: Iterative Programming Maximum Flow Problem CmSc20 Intro to Algorithms A flow network is a model of a system where some material is produced at its source, travels through the system, and is

### ABSTRACT THE MINIMUM LABELING SPANNING TREE PROBLEM AND SOME VARIANTS. Yupei Xiong, Doctor of Philosophy, 2005

ABSTRACT Title of dissertation: THE MINIMUM LABELING SPANNING TREE PROBLEM AND SOME VARIANTS Yupei Xiong, Doctor of Philosophy, 2005 Dissertation directed by: Dr. Bruce Golden Robert H. Smith School of

### Machine Evolution. Machine Evolution. Let s look at. Machine Evolution. Machine Evolution. Machine Evolution. Machine Evolution

Let s look at As you will see later in this course, neural networks can learn, that is, adapt to given constraints. For example, NNs can approximate a given function. In biology, such learning corresponds

### Topology and Topological Spaces

Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

### A Novel Approach to Planar Mechanism Synthesis Using HEEDS

AB-2033 Rev. 04.10 A Novel Approach to Planar Mechanism Synthesis Using HEEDS John Oliva and Erik Goodman Michigan State University Introduction The problem of mechanism synthesis (or design) is deceptively

### Insensitive Traffic Splitting in Data Networks

Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

### Approximation Algorithms for the Dubins' Traveling Salesman Problem

June, 2005 LIDS Publication # 2654 Research supported in part by: Air Force-DARPA-MURI award 009628001 Navy-ONR award N00014-03-1-0171 The University of California award 025-G-CB222 Approximation Algorithms

### 4/22/2014. Genetic Algorithms. Diwakar Yagyasen Department of Computer Science BBDNITM. Introduction

4/22/24 s Diwakar Yagyasen Department of Computer Science BBDNITM Visit dylycknow.weebly.com for detail 2 The basic purpose of a genetic algorithm () is to mimic Nature s evolutionary approach The algorithm

### Introduction (7.1) Genetic Algorithms (GA) (7.2) Simulated Annealing (SA) (7.3) Random Search (7.4) Downhill Simplex Search (DSS) (7.

Chapter 7: Derivative-Free Optimization Introduction (7.1) Genetic Algorithms (GA) (7.2) Simulated Annealing (SA) (7.3) Random Search (7.4) Downhill Simplex Search (DSS) (7.5) Jyh-Shing Roger Jang et al.,

### Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems Problems, Hints, and Solutions Chapter 1 Searching and Sorting Problems 1 1.1 Array with One Missing 1.1.1 Problem Let A = A[1],..., A[n] be an array

### Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars

Empirical analysis of procedures that schedule unit length jobs subject to precedence constraints forming in- and out-stars Samuel Tigistu Feder * Abstract This paper addresses the problem of scheduling

### FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

### Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

### MAXIMUM LIKELIHOOD ESTIMATION USING ACCELERATED GENETIC ALGORITHMS

In: Journal of Applied Statistical Science Volume 18, Number 3, pp. 1 7 ISSN: 1067-5817 c 2011 Nova Science Publishers, Inc. MAXIMUM LIKELIHOOD ESTIMATION USING ACCELERATED GENETIC ALGORITHMS Füsun Akman

### 1. a graph G = (V (G), E(G)) consists of a set V (G) of vertices, and a set E(G) of edges (edges are pairs of elements of V (G))

10 Graphs 10.1 Graphs and Graph Models 1. a graph G = (V (G), E(G)) consists of a set V (G) of vertices, and a set E(G) of edges (edges are pairs of elements of V (G)) 2. an edge is present, say e = {u,

### CMSC 380. Graph Terminology and Representation

CMSC 380 Graph Terminology and Representation GRAPH BASICS 2 Basic Graph Definitions n A graph G = (V,E) consists of a finite set of vertices, V, and a finite set of edges, E. n Each edge is a pair (v,w)

### Graphs. Introduction To Graphs: Exercises. Definitions:

Graphs Eng.Jehad Aldahdooh Introduction To Graphs: Definitions: A graph G = (V, E) consists of V, a nonempty set of vertices (or nodes) and E, a set of edges. Each edge has either one or two vertices associated

### WUCT121. Discrete Mathematics. Graphs

WUCT121 Discrete Mathematics Graphs WUCT121 Graphs 1 Section 1. Graphs 1.1. Introduction Graphs are used in many fields that require analysis of routes between locations. These areas include communications,

### Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University

Hyperplane Ranking in Simple Genetic Algorithms D. Whitley, K. Mathias, and L. yeatt Department of Computer Science Colorado State University Fort Collins, Colorado 8523 USA whitley,mathiask,pyeatt@cs.colostate.edu

### Bilinear Programming

Bilinear Programming Artyom G. Nahapetyan Center for Applied Optimization Industrial and Systems Engineering Department University of Florida Gainesville, Florida 32611-6595 Email address: artyom@ufl.edu

### of optimization problems. In this chapter, it is explained that what network design

CHAPTER 2 Network Design Network design is one of the most important and most frequently encountered classes of optimization problems. In this chapter, it is explained that what network design is? The

### Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple

### Generalized Multiobjective Multitree model solution using MOEA

Generalized Multiobjective Multitree model solution using MOEA BENJAMÍN BARÁN *, RAMON FABREGAT +, YEZID DONOSO ±, FERNANDO SOLANO + and JOSE L. MARZO + * CNC. National University of Asuncion (Paraguay)

### Lecture 4. Convexity Robust cost functions Optimizing non-convex functions. 3B1B Optimization Michaelmas 2017 A. Zisserman

Lecture 4 3B1B Optimization Michaelmas 2017 A. Zisserman Convexity Robust cost functions Optimizing non-convex functions grid search branch and bound simulated annealing evolutionary optimization The Optimization

### Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach

1 Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach David Greiner, Gustavo Montero, Gabriel Winter Institute of Intelligent Systems and Numerical Applications in Engineering (IUSIANI)

### AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING

International Journal of Latest Research in Science and Technology Volume 3, Issue 3: Page No. 201-205, May-June 2014 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 AN EVOLUTIONARY APPROACH

### ROUTING ALGORITHMS FOR RING NETWORKS

ROUTING ALGORITHMS FOR RING NETWORKS by Yong Wang B.Sc., Peking University, 1999 a thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Computing

### Extremal results for Berge-hypergraphs

Extremal results for Berge-hypergraphs Dániel Gerbner Cory Palmer Abstract Let G be a graph and H be a hypergraph both on the same vertex set. We say that a hypergraph H is a Berge-G if there is a bijection

### On the Max Coloring Problem

On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

### Automata Construct with Genetic Algorithm

Automata Construct with Genetic Algorithm Vít Fábera Department of Informatics and Telecommunication, Faculty of Transportation Sciences, Czech Technical University, Konviktská 2, Praha, Czech Republic,