Unavailability and Cost Minimization in a Parallel-Series System using Multi-Objective Evolutionary Algorithms

Similar documents
Generalized Multiobjective Multitree model solution using MOEA

Multi-objective Optimization

Evolutionary Algorithms: Lecture 4. Department of Cybernetics, CTU Prague.

Multi-objective Optimization

Evolutionary Algorithm for Embedded System Topology Optimization. Supervisor: Prof. Dr. Martin Radetzki Author: Haowei Wang

Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem

AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING

The Genetic Algorithm for finding the maxima of single-variable functions

Lamarckian Repair and Darwinian Repair in EMO Algorithms for Multiobjective 0/1 Knapsack Problems

An Evolutionary Algorithm for the Multi-objective Shortest Path Problem

Multi-Objective Pipe Smoothing Genetic Algorithm For Water Distribution Network Design

Incorporation of Scalarizing Fitness Functions into Evolutionary Multiobjective Optimization Algorithms

A Genetic Algorithm-Based Approach for Energy- Efficient Clustering of Wireless Sensor Networks

GT HEURISTIC FOR SOLVING MULTI OBJECTIVE JOB SHOP SCHEDULING PROBLEMS

Sparse Matrices Reordering using Evolutionary Algorithms: A Seeded Approach

Evolutionary Multi-objective Optimization of Business Process Designs with Pre-processing

NCGA : Neighborhood Cultivation Genetic Algorithm for Multi-Objective Optimization Problems

Multiobjective Job-Shop Scheduling With Genetic Algorithms Using a New Representation and Standard Uniform Crossover

Recombination of Similar Parents in EMO Algorithms

DCMOGADES: Distributed Cooperation model of Multi-Objective Genetic Algorithm with Distributed Scheme

Towards Understanding Evolutionary Bilevel Multi-Objective Optimization Algorithm

Grid Scheduling Strategy using GA (GSSGA)

Comparison of Evolutionary Multiobjective Optimization with Reference Solution-Based Single-Objective Approach

Finding Sets of Non-Dominated Solutions with High Spread and Well-Balanced Distribution using Generalized Strength Pareto Evolutionary Algorithm

An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL., NO., MONTH YEAR 1

CHAPTER 6 REAL-VALUED GENETIC ALGORITHMS

Unsupervised Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Word Recognition

WORKFLOW ENGINE FOR CLOUDS

Genetic Algorithms Variations and Implementation Issues

Bi-Objective Optimization for Scheduling in Heterogeneous Computing Systems

Multi-objective Optimization Algorithm based on Magnetotactic Bacterium

METAHEURISTICS Genetic Algorithm

Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you?

DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES

A New Selection Operator - CSM in Genetic Algorithms for Solving the TSP

Multiobjective Prototype Optimization with Evolved Improvement Steps

Intelligent Risk Identification and Analysis in IT Network Systems

Evolutionary Algorithms and the Cardinality Constrained Portfolio Optimization Problem

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN

Multi-Objective Optimization using Evolutionary Algorithms

INTERACTIVE MULTI-OBJECTIVE GENETIC ALGORITHMS FOR THE BUS DRIVER SCHEDULING PROBLEM

A Genetic Algorithm for Multiprocessor Task Scheduling

Automata Construct with Genetic Algorithm

Evolutionary Computation Algorithms for Cryptanalysis: A Study

Optimal Facility Layout Problem Solution Using Genetic Algorithm

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

Improving interpretability in approximative fuzzy models via multi-objective evolutionary algorithms.

Design of Curves and Surfaces Using Multi-Objective Optimization

Multi-Objective Optimization using Evolutionary Algorithms

Time Complexity Analysis of the Genetic Algorithm Clustering Method

Optimization of fuzzy multi-company workers assignment problem with penalty using genetic algorithm

A genetic algorithms approach to optimization parameter space of Geant-V prototype

Evolutionary multi-objective algorithm design issues

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Multi-Objective Optimization Using Genetic Algorithms

CHAPTER 6 ORTHOGONAL PARTICLE SWARM OPTIMIZATION

Fast Efficient Clustering Algorithm for Balanced Data

Crew Scheduling Problem: A Column Generation Approach Improved by a Genetic Algorithm. Santos and Mateus (2007)

DEMO: Differential Evolution for Multiobjective Optimization

SPEA2+: Improving the Performance of the Strength Pareto Evolutionary Algorithm 2

GENETIC ALGORITHM METHOD FOR COMPUTER AIDED QUALITY CONTROL

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances

DERIVATIVE-FREE OPTIMIZATION

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

MULTI-OBJECTIVE GENETIC LOCAL SEARCH ALGORITHM FOR SUPPLY CHAIN SIMULATION OPTIMISATION

A THREAD BUILDING BLOCKS BASED PARALLEL GENETIC ALGORITHM

A Genetic Algorithm Framework

QUT Digital Repository:

C 1 Modified Genetic Algorithm to Solve Time-varying Lot Sizes Economic Lot Scheduling Problem

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Models and Algorithms for Shortest Paths in a Time Dependent Network

Handling Constraints in Multi-Objective GA for Embedded System Design

The movement of the dimmer firefly i towards the brighter firefly j in terms of the dimmer one s updated location is determined by the following equat

A Similarity-Based Mating Scheme for Evolutionary Multiobjective Optimization

Multi-Objective Memetic Algorithm using Pattern Search Filter Methods

Reference Point Based Evolutionary Approach for Workflow Grid Scheduling

Genetic algorithms for job shop scheduling problems with alternative routings

Network Routing Protocol using Genetic Algorithms

MINIMAL EDGE-ORDERED SPANNING TREES USING A SELF-ADAPTING GENETIC ALGORITHM WITH MULTIPLE GENOMIC REPRESENTATIONS

The study of comparisons of three crossover operators in genetic algorithm for solving single machine scheduling problem. Quan OuYang, Hongyun XU a*

Mechanical Component Design for Multiple Objectives Using Elitist Non-Dominated Sorting GA

A GENETIC ALGORITHM FOR CLUSTERING ON VERY LARGE DATA SETS

THIS PAPER proposes a hybrid decoding to apply with

Finding a preferred diverse set of Pareto-optimal solutions for a limited number of function calls

System of Systems Architecture Generation and Evaluation using Evolutionary Algorithms

A Web-Based Evolutionary Algorithm Demonstration using the Traveling Salesman Problem

An Evolutionary Multi-Objective Crowding Algorithm (EMOCA): Benchmark Test Function Results

Evolutionary Computation. Chao Lan

Using Genetic Algorithm to Find the Optimal Shopping Policy for 1-out-of-n Active-Redundancy Series Systems under Budget Constraint

Real Coded Genetic Algorithm Particle Filter for Improved Performance

Graphical User Interface For Multi-Objective Decision Support

Coalition formation in multi-agent systems an evolutionary approach

Extending MATLAB and GA to Solve Job Shop Manufacturing Scheduling Problems

Solving Multi-objective Optimisation Problems Using the Potential Pareto Regions Evolutionary Algorithm

The Parallel Software Design Process. Parallel Software Design

ScienceDirect. Differential Search Algorithm for Multiobjective Problems

Application of a Genetic Algorithm to a Scheduling Assignement Problem

Transcription:

Unavailability and Cost Minimization in a Parallel-Series System using Multi-Objective Evolutionary Algorithms Ferney A. Maldonado-Lopez, Jorge Corchuelo, and Yezid Donoso Systems and Computer Engineering Universidad de los Andes Bogotá D.C., Colombia Email: {fa.maldonado897, corchuelo, ydonoso}@uniandes.edu.co Abstract Communications networks have become a key component to all aspects of a modern organization. Network service disruption can compromise normal operation, even it can threaten survivability of business or enterprise. Because of business risk generated by communication lost, organizations have to planning a dependable infrastructure and configure an architecture that guarantees survivability. This work is focused on tasks that a system has to deploy for assuring continuity on its communications by redundancy. This paper affords a point of view for modelling a redundant network based on graphs. This is proposal of using multi objective genetic algorithms for figuring out an optimal configuration of a communication network taking into account two particular objectives. First, it is related to cost to implement and maintains redundant devices on a network. Second, the availability measured in terms of probability of damage and mean time to fail. Keywords-availability; Multi-Objective Evolutionary Algorithms; Parallel-series System; Spare System; I. INTRODUCTION Critical infrastructure is a fundamental system needed for keeping in function an organization. Those including: electricity, communications, supply, operations, and so on. The communication is essential and one of the most important subsystem in a modern organization. The reliance on networks became the IT infrastructure on a fundamental asset. Manteining it on correct function is a guarantee of business operations survivability along time. Nowadays, resilience communication network is an important topic in most enterprises. Of course, it is an interesting thread of research; several scientists have focused their attention to this problem and have proposed different alternatives facing this challenge. Whereas several researches have studied topics related to resilience and survivability on a network; we define resilience as the characteristic of a network that can continue in operation and maintain an acceptable level of Quality of Service, even when it is under adverse conditions. Some failure conditions are associated to external or internal sources. Internal disorders are consequences of failures in a component of the system, unintentional misconfiguration, operational errors and misuse. Whereas external changes causing disruption like: natural disasters, malicious attacks to hardware or software network infrastructure, network s environment changes like mobility or fulfilment new services, unusual traffic but legitimate through the network caused by peak demand of a service in a short period of time. As a result, there are different causes of disruption or disorder on normal operations of a network. If it is focused on offering redundancy as alternative of resilience, it is necessary to answer two questions. First, what is the best redundancy configuration for an organization or system? This work center its attention on two major objectives: cost and availability, what must be the network infrastructure that makes a correct balance between those purposes? It may be modelled as a multi objective problem. There are available techniques for solving that kind of problems; however, the evolutionary algorithms are suitable for this situation. This paper shows how this algorithm fits and solves this problem, and illustrates additional considerations relatives to resilience in networking. This paper is organized as follow; first, we documented previous works, different techniques such as dynamic programming and genetic algorithms too. The third section includes the definition of parallel-series system and the notation of availability and unavailability. The fourth section presents a model for depicting a secure infrastructure network on a model based on a graph. The fifth section shows how genetic algorithms are interesting methods for solving that multi objective problems. The final section exposes how was implemented the algorithm and there are conclusions and results. II. RELATED WORKS First to all, it is necessary to create an abstract model of resilience and establish a set of characteristics related to capacity of recovery. Sterbenz et al proposed a method to characterize the resilience []. They created a twodimensional state model with the goal of developing quantifiable metrics to determine the degree of the network s resilience. They identified fundamental properties that affect performance and resilience of a network. Also, they included density, mobility, channels, node resources, network traffic, delay and queuing. They established a model based on three ISBN: 978--684--5

levels of network operation: normal, partially degraded and severely degraded; and three levels of service requirements: acceptable, impaired and unacceptable. They represent a network as a state on two-dimensional model, and they showed how a transition between two nodes is caused by an incident that compromises network survivability. The goal is try to solve the problem of optimization of security cost function proposed by Olovsson [] where exists a proportion between cost and security. Increasing the security of the system implies to increase cost, delay of response, system complexity; moreover, also decrease performance. The Fig. depicts a the security cost function has an inherent multi-objective optimization problem and was demonstrated that this problem is a NP-hard problem []. The goal is to achieve a solution win-win, the best balance between security and cost. However, a security schema does not have an only factor; it is composed of an arrangement of factors that influences cost and performance. We can model a security system as a graph composed of vertices and edges that represent a function into the system. Other works have implemented methods for finding an optimal solution including a set of nodes or multi objective problem. Using genetic algorithm for optimization is not new. Coit and Smith developed a model for a specific problem using genetic algorithm, analysing series-parallel systems and determining the optimal design configuration when there are multiple component choices available for each of several subsystems. The problem was to select components and redundancy-levels to optimize the objective function, given system-level constraints on reliability, cost, and/or weight [4]. For securing critical infrastructure of information network, Kivimaa et. al. have developed a hybrid expert system that enables a user to select security measures in a rational way based on the Pareto optimality computation using the dynamic programming for finding points into an optimal Pareto curve. Also, their model is based three characteristics of security: confidence, redundancy and user training [5]. Recently Kirt and Kivimaa implemented a discrete dy- Figure. Parallel-Series System namic programming method for finding optimal solutions using genetic algorithms [6]. Their result displays variants of security profiles for each cost level previously established. Furthermore, Xiaoli presents a spare optimization models for systems with components connected in series and parallel. The component availability at any time is obtained through Poisson process theory and the availability of the series-parallel system is written by system reliability analysis method. The objective of the optimization problem is to maximize the availability of the system satisfying the constraint on cost. Genetic algorithms are used to find the optimal amount of spares for each component [7]. III. NETWORK RESILIENCE MODEL The security model for networking is constituted by a series of parallel systems. Each of parallel subsystems represents an only device and its redundant components. The details of the system are explained ahead. A. Security Model ) Parallel-Series System: The Fig. illustrates a parallel-series system. It consists of an independent group s of subsystems each one with a maximal number of components n. In the Parallel-Series Systems a subsystem is available if at least one of its subcomponents is working properly. ) Availability and unavailability: Availability is the probability in that a system is operating properly when it is requested for using [8]. The notation used is presented in the Table. I. The availability of a system can be calculate by the equation. Figure. Security cost function by Olovsson A = MBT F MBT F + MT T R Unavailability is defined as the probability in that a system cannot operate correctly when it is requested for use. It () ISBN: 978--684--5 4

Table I THE NOTATION OF AVAILABILITY/UNAVAILABILITY Symbol A U MTTR MBTF Definition Availability Unavailability Meantime to Repair is the total time spent performing all corrective maintenance divided by the number of repairs performed. Mean Time Between Failures is the average time (hours) estimated between failures. a) opposes availability. The Unavailability of a system can be calculated by the expression. U = ( A) () ) Availability/Unavailability in a parallel or series system: Calculating availability (or unavailability) of a system is given by its topology network. When the devices in the system are in series the availability is calculated as the expression. s t A s = A A () Firewall Server Router DataBase Link When two devices are in redundancy(parallel) availability is calculated as: b) A s = A + (U A ) If both devices have the same availability then Figure. Network representation, a) redundant network example and b) Network representation by graph and paths A s = A + (U A) = ( U) + (U ( U)) = ( U) + (U U ) = U (4) Therefore, the unavailability of a system with two identical devices is redundant and can be expressed as U, This can be reduced from A s = U. B. Model application example A parallel-series system, for example, is composed of 5 subsystems designed to carry data out from a source s to destination t. Each subsystem is designed to remaining itself available as much time as possible because it contains 4 components, which allows a level of redundancy of n +. A network redundant design was adapted to a parallelseries system model. This adaptation establishes a useful model able to be optimized by a multi-objective algorithm. The example model proposed is illustrated in Fig.. This system was designed using the following principles: ) The system is composed of 5 subsystems, each of which can operate properly if at least one of its components is operational. ) The operational status and unavailability values of components in a subsystem are independent of all other components throughout the system. It avoids representing the model as a Markov Chain of events none related one each other. ) At least one component of a subsystem is connected to one component of the next subsystem. 4) The graph has to get a unique path from the source s and destination t.thus t can only be reached by a unique component of each subsystem. The Fig. illustrates an example how a redundant network design can be represented by a path of nodes into our graph abstraction. Associated to this representation, it is necessary to establish how the system is affected by cost and unavailability. Table II exhibits an example of connection between redundancy and unavailability; Table III indicates how cost is affected respectively. In this model links represent the components of each subsystem and nodes represent a state of the component with an associated cost and unavailability value. C. Abstract Model The purposed model of network is based on a graph and it was adapted to an optimization model. Optimization model ISBN: 978--684--5 5

Table II UNAVAILABILITY VALUES BY SUBSYSTEM AND COMPONENT Device.5..7...8.4...9...5... 4.8.6.4. Table III COST OF USING REDUNDANT COMPONENTS IN A SUBSYSTEM Device 4 5 5 4 6 48 44 4 8 6 requires definitions of a variable or array of variables, an objective function and restrictions over the system. ) Variable Definition: First to all, It is needed to have a variable that allows to know when a link is being used on the path. Variable x means utilization of link between two nodes. The variable x (i,j) can take binary values. { when the link is used from node i to node j, x (i,j) = in other case. ) Objective Function: Objective function in this case consist minimizing cost and maximizing availability. The expression can be transformed from a min-max problem to a min-min problem using the unavailability definition. Then optimal function is described as: min i,j min i,j x (i,j) u (i,j) x (i,j) c (i,j) (Cost) (Unavailability) Where u (i,j) and c (i,j) corresponds to unavailability and cost of using the link from node i to node j respectively. Those values are calculated for each subsystem individually. D. Constraints for source, final and intermediate nodes Continuing with the model, constrains guarantee to find only one path from source s to destination t. This only path will be used as a chromosome solution on the next section. Two constrains apply to this model: first, only one path came out from source node s; second, there is only one way to reach the destination node t. x (s,j) = j E x (i,t) = i E Constraints for all intermediate nodes have the goal of limiting to only one input; this input is processed and produce only one output to the next subsystem. The constraint for intermediate nodes is showed in next expression. Note that k s and k t. i E x (i,k) j E x (k,j) = There is a complete model that includes: an objective function composed of two different expressions cost and unavailability, constraints for source, destination and intermediate nodes. IV. EVOLUTIONARY ALGORITHM Genetic algorithm (GA) is a stochastic search method based on states. An state or chromosome represents a valid solution. Successor states are generated by combining two parent states or modifying a single one analogue to natural selection [9]. GA initiates a set of states generated randomly called population. Each chromosome is rated by the objective function or fitness function. After, a pair of solutions or individuals are selected and produce an offspring by mixing their genetic information. Finally, each chromosome has a random mutation with independent probability. Therefore, a new population we generated for the next iteration. There are two kind of evolutionary algorithms, nonelitist and elitist ones. Non-elitist algorithms use whole latter population for the next iteration; also, this procedure allows exploit non-dominated solutions, it means, found Pareto-optimal solutions. Second, elitist algorithm gives an opportunity of preserve the best solutions, or elite solutions, directly to next generation. A. Strength Pareto Evolutionary Algorithm Zitzler and Thiele proposed an evolutionary algorithm called SPEA []. This algorithm maintains elitism by an external population. This population is a collection of nondominated solutions. At new generation, the algorithm finds solutions non-dominated and compares with previous external population until segregate a new external population. Thus, the algorithm preserves elitist population. Clustering is an important component in Multi objective evolutionary algorithm. It has been used widely at solving networks problems related to network optimization []. This particular problem was faced from two phases. First, we used a high-level modelling system for mathematical optimization which allows to solve linear, nonlinear, and mixedinteger optimization problems. Second, a SPEA genetic algorithm was implemented. This method have demonstrated to have polynomial computational complexity O(MN ) ISBN: 978--684--5 6

[] getting better results than a problem considered NPhard []. The algorithm specification implemented for experimental results is described in Algorithm. create initial population; for i to numgenerations do P t find non-dominated (P t ); if P t > N then clustering(p t ); end P t+ P t ; calculate Fitness (P t+ ); calculate Strengh (P t+ ); selection by roulette (P t+ ); crossover; mutation; P t+ create new population; end Algorithm : SPEA algorithm V. SIMULATION AND RESULTS This section contains basic aspects of software simulation. The implementation and the outcomes obtained were developed following the algorithm shown above. Simulator and its modules were developed on Java and the following results were gotten. A. Implementation A software of Strength Pareto Evolutionary Algorithm was implemented with the follow components. First, it was necessary to establish the initial population. The software generated nodes randomly and those are set to chromosome. After, the chromosome s validity is checked, if the chromosome is a solution, may be optimal or not, it is recorded into population. ) Chromosome: While parallel-series system as defined in section III, a subsystem is represented as a number that means the redundancy degree for that device. The chromosome is an arrangement of integers that stores the redundancy value for each subsystem. Whole network is mapped into a collection of participants nodes, those nodes build a path from source s to destination t. ) Selection: What are the best chromosomes for getting next generation? Before the non-dominated solutions from population are found. The first time this is the initial population. After, the software calculates fitness function and ranks the chromosomes by the strength of its solutions. Subsequently best ranked chromosomes are inserted into a roulette. The best chromosomes have higher probability of being chosen because are copied more times into roulette. Later solutions are randomly selected from the roulette for generating new chromosomes. Figure 4. Illustration of a chromosome, a) representation of a redundancy value for a general chromosome, b) path representation chromosome corresponds to Fig b. ) Clustering: After obtain non-dominated solutions, the elite population size must be filtered. Clustering do this task. The algorithm uses the minimal Euclidean distances ideology, points belong to a group because they have minimal distances between them. Clustering makes as many groups as limit of elite population, later extracts the most representative solution for each set. 4) Crossover: The crossover and mutation are mechanisms for finding new chromosomes from the existing ones. A crossover probability is set for determining whether the crossover take place. It is possible to select a cutting point by random in the chromosome. Two chromosomes are selected and generate offspring by mixing their alleles. The left part of the first parent chromosome is selected and the right part of the second parent chromosome is selected too; then both are combined to produce a new offspring. The Figure 5 shows the offspring process, here is obtained a new redundant network infrastructure configuration. 5) Mutation: The process of mutation consists in a random change at only one allele of the chromosome. Mutation probability is set by a parameter of simulation input, it means, it possible to choose an allele and generate a new value for that allele randomly. This method creates a new chromosome changing only a component. Finally, it is mandatory to verify that novel chromosome corresponds to a feasible solution. B. Outcomes After build the model and run the simulator, it was decided to execute a total of sixty iterations. This number was reached after analysing the solution distance between one generation to another. Also, the population size was set as a result of previous experiences with similar space of solution. Moreover, crossover and mutation probabilities are the intention to included heuristic for creating new offspring. ISBN: 978--684--5 7

Chromosome n- n n- n Offspring.5 n- n n- n Figure 5. Crossover operation Cost 6 8 4 6 8 a negotiation with cost and availability benefits. This type of solution allows to make a robust outline of a redundancy infrastructure in little time. The advantages are the ability of take decisions and evaluate several scenarios what if. This work could spread to include more decision variables. Also, future works could consider systems that have increasing or decreasing failure rates, planning scenarios for multiple or intermittent failures. This work has open perspectives for tackling other problems associated to pandemic on networks and bio-inspired mechanisms for facing them like autonomic networks, self-organization and dynamic environments. REFERENCES [] J. P. Sterbenz, D. Hutchison, E. K. Cetinkaya, A. Jabbar, J. P. Rohrer, M. Schöller, and P. Smith, Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, Computer Networks, vol. 54, no. 8, pp. 45 65,, resilient and Survivable networks. [Online]. Available: http://www.sciencedirect.com/science/article/pii/s898684 [] T. Olovsson, A structured approach to computer security, 99. Unavailability.5.5.5 [] M.-S. Chern, On the computational complexity of reliability redundancy allocation in a series system, Operations Research Letters, pp. 9 5, 99. [4] D. Coit and A. Smith, Reliability optimization of seriesparallel systems using a genetic algorithm, IEEE Transactions on Reliability, pp. 54 6, 66, 996. [5] J. Kivimaa, A. Ojamaa, and E. Tyugu, Critical Information Infrastructure Security. Springer, 9, ch. Graded Security Expert System, pp. 79 86. [6] T. Kirt and J. Kivimaa, Optimizing it security costs by evolutionary algorithms, in Conference on Cyber Conflict Proceedings,, pp. 45 6. [7] Z. Xiaoli, Spare optimization using genetic algorithms, in Intelligent Systems and Applications (ISA), nd International Workshop on,, pp. 4. 5E 5 Figure 6. 6 Solutions found by generation Figure 6 shows the solutions found that belong to Paretooptimal front on the last iteration. It is clear, algorithm finds better solutions generation by generation until locate solutions of Pareto front. VI. CONCLUSION AND FUTURE WORKS Is was implemented a SPEA genetic algorithm and verified. The algorithm can locate those solutions that include [8] K. B. Misra and D. L. Milan, Optimal reliability design of a system: A new look, IEEE Transactions on Reliability, pp. 55 58, 97. [9] S. Russell and P. Norving, Artificial Intelligence A modern approach. Pearson Education, 9. [] E. Zitzler and L. Thiele, Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach, Evolutionary Computation, IEEE Transactions on, vol., no. 4, pp. 57 7, nov 999. [] Y. Donoso and R. Fabregat, Multi-Objective Optimization in Computer Networks Using Metaheuristics. Auerbach Publications, 7. [] K. Deb, Multi-Objective Optimization Using Evolutionary Algorithms. Wiley,. ISBN: 978--684--5 8