...Classification Using Genetic Algorithm N. Suguna1, and Dr. K. Thanushkodi2 1 Professor in Computer Science and Engg, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India. 2 Director, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India. Abstract k-Nearest Neighbor (KNN) is one of the most popular algorithms for pattern recognition. Many researchers have found that the KNN algorithm accomplishes very good performance in their experiments on different data sets. The traditional KNN text classification algorithm has three limitations: (i) calculation complexity due to the usage of all the training samples for classification, (ii) the performance is solely dependent on the training set, and (iii) there is no weight difference between samples. To overcome these limitations, an improved version of KNN is proposed in this paper. Genetic Algorithm (GA) is combined with KNN to improve its classification performance. Instead of considering all the training samples and taking k-neighbors, the GA is employed to take k-neighbors straightaway and then calculate the distance to classify the test samples. Before classification, initially the reduced feature set is received from a novel method based on Rough set theory hybrid with Bee Colony Optimization (BCO) as we have discussed in our earlier work. The performance is compared with the traditional KNN, CART and SVM classifiers. Keywords: k-Nearest Neighbor, Genetic Algorithm, Support Vector...
Words: 3528 - Pages: 15
...Lockett, Roblee Page 1 of 48 6/3/2003 GENETIC ALGORITHM BASED DESIGN AND IMPLEMENTATION OF MULTIPLIERLESS TWODIMENSIONAL IMAGE FILTERS by Douglas J. Lockett and Christopher D. Roblee ********* Senior Capstone Design Project Submitted in partial fulfillment of the requirements for the degree of Bachelor of Science Department of Electrical and Computer Engineering Union College Steinmetz Hall Schenectady, New York 12308 U.S.A. Submitted May 30, 2003 Final Project Report Senior Capstone Design Project, Department of Electrical and Computer Engineering Union College, 2003. © 2003 Douglas Lockett, Christopher Roblee Lockett, Roblee Page 2 of 48 6/3/2003 Table of Contents: Abstract……………………………………………………………………………….3 1. Introduction…………………………………………………………………………..4 2. Theory of Multiplierless Arithmetic………………………………………………...5 3. Image Filters 3.1. Motivations for IIR vs. FIR……………………………………………………....7 3.2. Edge Detection …………………………………………………………………..8 3.3. Canny Edge Detection……………………………………………………………9 4. Genetic Algorithms 4.1. Motivations……………………………………………………………………...10 4.2. Basic Theory…………………………………………………………………….10 4.3. Description of the Designed Genetic Algorithm………………………………..13 4.3.1. Fitness Function Definition and Crossover Selection…………………...17 4.3.2. Magnitude Response and Relative Error………………………………...19 4.3.3. GA Parameters…………………………………………………………...19 5. Results 5.1. Magnitude Frequency Analysis ……………………………………………...…21 5.2. Spatial Analysis…………………………………………………………………24...
Words: 9389 - Pages: 38
...Optimization of biometric Fingerprint Recognition parameters using Genetic Algorithms Report submitted for CPSC - 6126 Fall 2014 Term Paper By Krishna Sindhuri Nagavolu 13th December, 2014 Optimization of biometric fingerprint recognition parameters using Genetic Algorithms Abstract This research paper discusses about parameter optimization for biometric fingerprint recognition with the use of genetic algorithms. An accurate access control system is very important in domains like identification checks at airports, government organizations, FBI’s, scientific working groups like NASA, US defense department and driver’s license office. The main reason these organizations prefer Biometrics is because it measures physiological characteristics like fingerprints, iris patterns, facial recognition, retina recognition, ear recognition and DNA analysis. Based on the features of the biometric sensors used, the system can detect whether a person is an authorized user or not. Though there are many other methods for identification, biometric sensors are considered to be very reliable and accurate. The main objective of this paper is to build a fingerprint recognizer that is fully automatic and can minimize the errors caused while matching the fingerprints. Keywords: Biometrics, genetic algorithms, Parameter optimization, fingerprints 2|Page Optimization ...
Words: 2966 - Pages: 12
...TECHNOLOGY A seminar report on GENETIC ALGORITHMS Submitted by Pranesh S S 2SD06CS061 8th semester DEPARTMENT OF COMPUTER SCIENCE ENGINEERING 2009-10 1 VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE ENGINEERING CERTIFICATE Certified that the seminar work entitled “GENETIC ALGORITHMS” is a bona fide work presented by Pranesh S S bearing USN NO 2SD06CS061 in a partial fulfilment for the award of degree of Bachelor of Engineering in Computer Science Engineering of the Vishveshwaraiah Technological University, Belgaum during the year 2009-10. The seminar report has been approved as it satisfies the academic requirements with respect to seminar work presented for the Bachelor of Engineering Degree. Staff in charge SANTOSH DESHPANDE SIR Name: Pranesh S S USN: 2SD06CS061 H.O.D 2 INDEX 1. INTRODUCTION 2. HISTORY 3. DEFINITION AND EXPLANATION 4. NEED FOR GENETIC ALGORITHM 5. IMPORTANCE OF GAOVER OTHER TECHNIQUES? 6. WORKING OF GA 6.1 BASIC DESCRIPTION 6.2 GENERAL ALGORITHM 7. IMPLEMENTATION 8. EXAMPLE-A SIMULATION BY HAND 9. ADVANTAGES AND DISADVANTAGES 10. CONCLUSION 11. REFERENCES 4 4 5 5 6 6 7 7 8 11 12 13 13 3 Abstract Genetic Algorithms have recently become a popular artificial technique for solving complex optimization problems and a sophisticated tool for machine learning. This paper provides an introduction to genetic algorithms and brief applicability to problems...
Words: 2516 - Pages: 11
...2.4.6 Genetic Algorithms. Genetic algorithms (GAs) are techniques that can be applied in the solution of optimization issues that are centered on combinations and search. Over ages, natural populaces develop in accordance with the standards of “natural selection and survival of the fittest”, in light of the hereditary process of living creatures. For imitation of the procedure of development of living creatures, genetic algorithms are suited for working with a vast kind of true issues. Ordinarily, in nature, there is dependably competition between individuals who belong to a particular population, as a rule is brought about by the shortage of resources, females, domain, hierarchy and so forth. The creatures likewise compete for different reasons: one is sustenance. At the point when the resource is rare or when there is an upsurge in the number of individuals in a particular population, the battle for sustenance is more noteworthy. This will eradicate the weakest or less attuned people. This competition normally has an effect on the quest of partner for reproduction purposes, individuals who are more fruitful in this quest are those that are more prone to create posterity. As the best adjusted individuals sustain their posterity in progressive eras, driving thusly to great individuals to consolidate their qualities, enhancing the species; those individuals without accomplishment in this journey, they will create less posterity Genetic Algorithms utilize an immediate comparability...
Words: 1655 - Pages: 7
...Introduction TSP (Travelling salesman problem) is an optimization problem that it is difficult to solve using classical methods. Different Genetic Algorithm (GA) have been right to solve the TSP each with advantages and disadvantages (Davis, 2005) In this research paper, I highlight a new algorithm by merging different genetic Algorithm results to the better solution for TSP. In amalgam algorithm, appropriateness of algorithm and traveled distance for TSP has been considered. Results obtained suggest that it does not quickly establish in the local optimum and enjoys a good speed for an inclusive answer (Fogel, 2010). New methods such as GAs, refrigeration algorithms, Artificial Neural Networks, and ACO (Ant Colony Optimization) to solve TSP problem, in recent past have been suggested. Both ACO and GAs is centered on repetitive (Goldenberg, 2005) ACO system was unfilled for the first time by Dorigoat al. to solve TSP. In ACO algorithms, people work together to find the solution. In collective intelligence algorithms, it uses the real life of creatures without putting in consideration the complex mechanisms in run their day to day life in all aspects as best as possible. GA is an iterative procedure that contains a population of individuals or chromosomes. Coding of randomly or heuristic by a string of symbols as a gene in possible solution is done. All possible solution in this search space is examined. When search space is large, GAs usually are used. People can select an...
Words: 3446 - Pages: 14
...International Journal of Advanced Science and Technology Vol. 29, April, 2011 A Mutual Construction for IDS Using GA S. Selvakani Kandeeban Professor and Head, MCA Department, Francis Xavier Engineering College, Tirunelveli, Tamilnadu, India sselvakani@hotmail.com R. S. Rajesh Reader, Department of CSE, Manonmanium Sundaranar University,, Tirunelveli, Tamilnadu, India rs_rajesh@yahoo.co.in Abstract A variety of intrusion prevention techniques, such as user authentication using passwords, avoidance of programming errors and information protection, has been used to protect computer systems. However information prevention alone is not sufficient to protect our systems as those systems become even more complex with the rapid growth and expansion of Internet technology and local network systems. Moreover, programming errors, firewall configuration errors and ambiguous or undefined security policies add to the system’s complexity. An Intrusion Detection system (IDS) is therefore needed as another layer to protect computer systems. The IDS is one of the most important techniques of information dynamic security technology. It is defined as a process of monitoring the events occurring in a computer system or network and analyzing them to differentiate between normal activities of the system and behaviors that can be classified as suspicious or intrusive. Current Intrusion Detection Systems have several known shortcomings, such as low accuracy (registering high False Positives and...
Words: 2519 - Pages: 11
...CHAPTER: 1 INTRODUCTION 1.1 Some basics elements of communication systems: In [1] [21], it is mentioned that communication system means a system where transmission of data or information is done from one point to another by several processes. The processes consist of generation of an information signal, description of the information signal through a defined set of symbols, encoding of the symbols through communication channels, decoding and reproduction of original symbols and finally re-creation of the original information signal. All these features of a communication system can be described by three basic elements such as transmitter, channel and receiver. Figure 1.1: Basic structure of communication system 1.2 Wireless communication background In 1921, Detroit Michigan Police Dept. made the earliest significant use of Mobile radio in a vehicle in the United States. The system operated at a frequency close to 2 MHz. The channels soon became overcrowded. In 1940, new frequencies between 30 and 40 MHz were made available. Increasing the available channels encouraged a substantial buildup of police systems. Shortly thereafter other users found a need for this form of communication. Private individuals, companies and public agencies purchased and operated their own mobile units. In 1945, first public mobile telephone system in the U.S. was inaugurated in St. Louis, Missouri with three channels at 150 MHz. Six channels spaced 60 kHz apart were allocated for this service...
Words: 15258 - Pages: 62
...Genetic Algorithms Basic Genetic Algorithm – Flow Chart 1. Initial Population 1. Initial Population ON ON | | GENERATE RANDOM POPULATION (POSSIBLE SOLUTIONS) | 2. Fitness Evaluation 2. Fitness Evaluation 3. Selection 3. Selection | | EVALUATE THE FITNESS OF EACH (BASED ON THE FITNESS FUNCTION) | | | CHOOSE PARENT FACTORS (BETTER FITNESS = BETTER CHANCE) | 4. Crossover 4. Crossover 5. Mutation 5. Mutation | | CROSSOVER THE PARENT TRAITS TO FORM NEW CHILDREN. (PROBABILITY) | | | MUTATION PROBABILITY APPLIED (MAINTAINS GENETIC DIVERSITY) | Acceptable? Acceptable? | | IF OPTIMIZATION CONDITIONS ARE NOT MET(REPEAT STEPS 2-5) * OR | Yes Yes End Process End Process | | IF THE MAXIMUM GENERATIONS ARE MET (TERMINATE) * OR | | | IF SATISFACTORY FITNESS LEVEL IS REACHED (END THE PROCESS) | KEY TERMS * INDIVIDUAL Any possible solution to the problem at hand, usually expressed in binary code * POPULATION Group of all individuals * CHROMOSOME Blueprint for an individual usually expressed in binary code. (Ex: 011011) * GENE An individual value in a chromosome, usually expressed as a “1” or “0” * PARENTS An original “individual” solution in the GA process that has passed the fitness function * CHILDREN A new solution to the problem formed through crossover and mutation from the parent solutions * SEARCH SPACE All possible solutions to the problem...
Words: 261 - Pages: 2
...multi-objective multi-mode model for solving discrete time–cost–quality trade-off problems (DTCQTPs) with preemption and generalized precedence relations. The proposed model has three unique features: (1) preemption of activities (with some restrictions as a minimum time before the first interruption, a maximum number of interruptions for each activity, and a maximum time between interruption and restarting); (2) simultaneous optimization of conflicting objectives (i.e., time, cost, and quality); and (3) generalized precedence relations between activities. These assumptions are often consistent with real-life projects. A customized, dynamic, and self-adaptive version of a multiobjective evolutionary algorithm is proposed to solve the scheduling problem. The proposed multi-objective evolutionary algorithm is...
Words: 11435 - Pages: 46
...multi-objective multi-mode model for solving discrete time–cost–quality trade-off problems (DTCQTPs) with preemption and generalized precedence relations. The proposed model has three unique features: (1) preemption of activities (with some restrictions as a minimum time before the first interruption, a maximum number of interruptions for each activity, and a maximum time between interruption and restarting); (2) simultaneous optimization of conflicting objectives (i.e., time, cost, and quality); and (3) generalized precedence relations between activities. These assumptions are often consistent with real-life projects. A customized, dynamic, and self-adaptive version of a multiobjective evolutionary algorithm is proposed to solve the scheduling problem. The proposed multi-objective evolutionary algorithm is...
Words: 11435 - Pages: 46
...A COMPARITIVE STUDY OF CLUSTER ANALYSIS WITH NATURE INSPIRED ALGORITHMS A PROJECT REPORT Submitted by K.Vinodini 310126510043 I.Harshavardhan 310126510039 B.Prasanth kumar 310126510013 K.Sai Sivani 310126510042 in Partial Fulfillment of the requirements for the Award of the Degree of BACHELOR OF TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND SYSTEMS ENGINEERING Anil Neerukonda Institute of Technology and Science (ANITS) ANDHRA UNIVERSITY : VISAKHAPATNAM – 530003 APRIL 2014 ANIL NEERUKONDA INSTITUTE OF TECHNOLOGY AND SCIENCES ANDHRA UNIVERSITY : VISAKHAPATNAM-530 003 BONAFIDE CERTIFICATE Certified that this project report “A Comparative study of cluster analaysis with Nature Inspired Algorithms”is the bonafide work of “K.Vinodini, I.Harsha, B.V.PrasanthKumar, K.SaiSivani”who carried out the project work under my supervision. Signature Signature Dr S C Satapathy Dr S C Satapathy HEAD OF THE DEPARTMENT ...
Words: 9404 - Pages: 38
...Technological University, Hyderabad) Himayathnagar, C.B.Post, Moinabad, Hyderabad-5000 2 075. CERTIFICATE This is to certify that the Seminar Report on “Ant Colony Optimization”, is a bonafide Seminar work done by Ranjith Kumar A (06J11A0534), in partial fulfillment for the award of the degree Bachelor of Technology in “Computer Science engineering” J.N.T.U Hyderabad during the year 2010. Y.V.S Pragathi M.Tech Head of CSE Department 3 Abstract Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build solutions step by step adding solution components that are represented by graph nodes. The existing ACO algorithms are suitable when the graph is not very large (thousands of nodes) but is not useful when the graph size can be a challenge for the computer memory and cannot be completely generated or stored in it. In this paper we study a new ACO model that overcomes the difficulties found when working with a huge construction graph. In addition to the description of the model, we analyze in the experimental section one technique used for dealing with this huge graph exploration. The results of the analysis can help to understand the meaning of the new parameters introduced and to decide which parameterization is more suitable for a given problem. For the experiments we use one real problem with capital importance in Software Engineering: refutation...
Words: 5585 - Pages: 23
...482 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 42, NO. 2, APRIL 2012 An Adaptive Differential Evolution Algorithm With Novel Mutation and Crossover Strategies for Global Numerical Optimization Sk. Minhazul Islam, Swagatam Das, Member, IEEE, Saurav Ghosh, Subhrajit Roy, and Ponnuthurai Nagaratnam Suganthan, Senior Member, IEEE Abstract—Differential evolution (DE) is one of the most powerful stochastic real parameter optimizers of current interest. In this paper, we propose a new mutation strategy, a fitnessinduced parent selection scheme for the binomial crossover of DE, and a simple but effective scheme of adapting two of its most important control parameters with an objective of achieving improved performance. The new mutation operator, which we call DE/current-to-gr_best/1, is a variant of the classical DE/current-to-best/1 scheme. It uses the best of a group (whose size is q% of the population size) of randomly selected solutions from current generation to perturb the parent (target) vector, unlike DE/current-to-best/1 that always picks the best vector of the entire population to perturb the target vector. In our modified framework of recombination, a biased parent selection scheme has been incorporated by letting each mutant undergo the usual binomial crossover with one of the p top-ranked individuals from the current population and not with the target vector with the same index as used in all variants of DE. A DE variant obtained...
Words: 11062 - Pages: 45
...MEXICO a Abstract Motivated by the recent success of diverse approaches based on Differential Evolution (DE) to solve constrained numerical optimization problems, in this paper, the performance of this novel evolutionary algorithm is evaluated. Three experiments are designed to study the behavior of different DE variants on a set of benchmark problems by using different performance measures proposed in the specialized literature. The first experiment analyzes the behavior of four DE variants in 24 test functions considering dimensionality and the type of constraints of the problem. The second experiment presents a more in-depth analysis on two DE variants by varying two parameters (the scale factor F and the population size NP ), which control the convergence of the algorithm. From the results obtained, a simple but competitive combination of two DE variants is proposed and compared against state-of-the-art DE-based algorithms for constrained optimization in the third experiment. The study in this paper shows (1) important information about the behavior of DE in constrained search spaces and (2) the role of this knowledge in the correct combination of variants, based on their capabilities, to generate simple but competitive approaches. Keywords: Evolutionary Algorithms, Differential Evolution, Constrained Email addresses: emezura@lania.mx (Efr´n Mezura-Montes), e emiranda@bianni.unistmo.edu.mx (Mariana Edith...
Words: 22303 - Pages: 90