SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011



         A Genetic Algorithm for the Constrained Forest
                           Problem
                                           Michael Laszlo1, and Sumitra Mukherjee2
    1
      Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, USA.
                                                 Email: mjl@nova.edu
    2
      Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, USA.
                                               Email: sumitra@nova.edu

Abstract— Given a graph with positive edge weights and a                  Bar-Yehuda et al. [2] present a version of this method using
positive integer m, the Constrained Forest Problem (CFP)                  the local ratio framework. Results on complexity and
problem seeks a minimum-weight spanning subgraph each of                  approximation of the CFP are presented in [3]. This paper
whose components contains at least m vertices. Such a subgraph
                                                                          presents a genetic algorithm (GA) to identify good solutions
is called an m-forest. We present a genetic algorithm (GA) for
CFP, which is NP-hard for me”4. Our GA evolves good spanning              to CFP. The greedy HEF algorithm [12] achieves its 2-
trees, as determined by the weight of the m-forest into which             approximate performance guarantee by operating on the
it can be partitioned by a simple greedy algorithm. Genetic               edges of the graph’s minimum spanning tree (MST). We show
operators include mutation, which replaces a spanning tree                that there exist spanning trees that serve as better starting
edge by a different edge that connects the same pair of                   points, indeed, that there exist spanning trees that yield
components, and recombination, which combines the edge sets               optimal solutions under HEF. Our GA is designed to evolve
of two spanning trees to produce two new spanning trees. The              such spanning trees. Each individual in a population encodes
GA discovers m-forests that are significantly better than those           a spanning tree of the input graph whose fitness reflects the
identified by best-known approximation algorithms for CFP,
                                                                          quality of the m-forest partition that results under greedy
and identifies optimal solutions in small problems.
                                                                          HEF. Genetic operators include mutation, which replaces a
Index Terms— Genetic Algorithms, Spanning Forests,                        spanning tree edge by a different edge that crosses the same
Constrained Forest Problem, Network Design Problems,                      cut, and recombination, which combines the edge sets of
Combinatorial Optimization.                                               two spanning trees to produce two new spanning trees. Other
                                                                          studies have employed similar chromosome representations
                        I. INTRODUCTION                                   for GAs targeting network design problems (for example see
                                                                          [1], [11], [15], and [16]). Notably, our GA differs from other
    Given a graph with positive edge weights, the Constrained
                                                                          approaches in its choice of genotype-to-phenotype mapping
Forest Problem (CFP) problem seeks a minimum-weight
                                                                          and in its recombination operator. The paper is organized as
spanning subgraph each of whose components contains at
                                                                          follows. Section 2 motivates our use of the GA for this
least m>1 vertices. CFP belongs to a class of network design
                                                                          problem. Section 3 describes the GA. Section 4 presents
problems that have applications in such domains as VLSI
                                                                          examples on small data sets to illustrate our method. Section
layout and telecommunications network design. Network
                                                                          5 presents and discusses the results of experiments designed
design problems assume this form: Given an edge-weighted
                                                                          to evaluate the GA’s efficacy. Section 6 concludes with some
graph G=(V,E) and a demand function f: 2V{0,1}, find a
                                                                          observations.
minimum-weight set of edges that for all SV, contains at
least f(S) edges from (S), where (S) contains exactly one
                                                                                                  II. MOTIVATION
endpoint in S. The CFP is modeled by the demand function
f(S)=1 if and only if 0<|S|<m. A forest is feasible if and only if            A forest is called an m-forest if each of its trees contains
f(T)=0 for every tree T. Imeliénska et al. [9] show that CFP is           at least m vertices for given m>1. The heaviest-edge-first
NP-hard for m4 and present a greedy heuristic for CFP that               (HEF) algorithm partitions a spanning tree T=(V,E) into an m-
produces solutions within a factor of two of the optimum.                 forest spanning vertex set V [12]. This greedy algorithm
Laszlo and Mukherjee [12] present a second greedy heuristic               iteratively processes spanning tree edges in decreasing
(which we refer to as HEF for heaviest edge first) that                   weight order, and removes an edge if and only if it connects
produces solutions at least as good as and often better than              two components of size at least m (see Figure 1). The input is
those produced by [9], and then locate both greedy heuristics             the edge set E and integer m>1; the output is a subset of E
within a family of heuristics all of which are 2-approximate for          representing an m-forest spanning vertex set V. We use HEF(T)
CFP [13]. Goemans and Williamson [6] treat CFP as a special               to denote the m-forest produced by applying HEF to spanning
case of network design problems with demand functions that                tree T where the value of m is assumed.
are downwards monotone. They show their generalization of
the greedy method of [9] to be 2-approximate. Goemans and
Williamson [7] subsequently obtain a (2–1/|V|)-approximation
method for CFP using a primal-dual approximation framework.

© 2011 ACEEE                                                         47
DOI: 0.IJIT.01.03. 8
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


                                                                         If e is a bridge edge, it connects some tree Ti to the
                                                                        component C that contains tree T1. Ti is large because it
                                                                        belongs to an m-forest (F*), and C is large because its
                                                                        subgraph T1 is large; accordingly, edge e is removed by HEF.
                                                                        It follows that the HEF(T)=F*. 
                                                                             A spanning tree T for which HEF(T) is optimal is referred
                                                                        to as HEF-optimal. The tree construction of the previous
                                                                        proof can be generalized to show that multiple HEF-optimal
                                                                        trees may exist for a given input graph. The genetic algorithm
          Figure 1. Heaviest edge first (HEF) algorithm.                described in the following section seeks an HEF-optimal tree
We can use the HEF algorithm in a 2-approximate greedy                  in the search space of trees that span the input graph. Each
heuristic for CFP: First compute the MST of the input graph,            chromosome represents a spanning tree T, and its fitness is a
and then apply HEF to the MST edges. Although the m-                    function of the weight of the m-forest HEF(T). The genetic
forests produced by this heuristic are no worse than twice              operators are designed to move the search from the initial
optimal, in practice they may weigh close to this upper bound           population, made up of copies of the input graph’s MST,
and it is not difficult to construct examples that do so. This          toward the HEF-optimal trees in the search space.
suggests that there may exist spanning trees other than the
MST which yield m-forests of less weight under HEF. In the                                III. GENETIC ALGORITHM
remainder of this section, we show that for any input graph                 Genetic algorithms find wide use in combinatorial
G, there exists a spanning tree T of G such that the m-forest           optimization problems [8]. A GA evolves a population of
HEF(T) is optimal. This motivates the use of a genetic                  chromosomes (or individuals) that represent feasible
algorithm to find such HEF-optimal trees in the search space            solutions. Each chromosome stores a set of genes whose
of all spanning trees of G.. Let us say that a tree is small if it      values collectively determine the chromosome’s fitness.
contains fewer than m vertices, and large otherwise. An edge            During each generation, genetic operators—selection,
e in tree T is removable if each of the two trees in the graph          recombination, mutation, and replacement—are applied to
T–{e} is large. We refer to a tree or a forest as irreducible if        the current population to produce the next generation.
it contains no removable edges (an irreducible forest                   Selection selects individuals from the current population with
comprises only irreducible trees). It is evident that the forests       probability proportional to their fitness values.
F produced by HEF are irreducible. Suppose to the contrary              Recombination operates on two selected chromosomes,
that F contains some tree T that is not irreducible, and let            swapping portions of each to produce two new chromosomes.
edge eÎT be some removable edge that connects two large                 Mutation alters the value of a gene. Replacement merges the
subtrees C1 and C2. When HEF processed edge e, e must                   current population and its offspring from which it selects the
have connected two subtrees C’1 and C’2 containing C1 and               set of individuals to make up the next generation.
C2 as subgraphs, implying that both C’1 and C’2 are large.              Recombination focuses the search on promising
Consequently, edge e would have been removed by HEF,                    neighborhoods of the feasible region while mutation widens
contradicting our choice of edge e. We refer to a tree as star-         the search to unexplored regions, thereby minimizing the risk
shaped if it contains some vertex v such that every subtree to          of premature convergence to inferior solutions. The goal of a
which v is connected by an edge is small. Vertex v is called a          GA is to identify good solutions through this evolutionary
center vertex of the tree. It is shown in [14] that a tree is           process. We summarize the GA, then elaborate each phase,
irreducible if and only if it is star-shaped. We use this result        and then address time complexity.
to prove the following theorem: Theorem 1: Given graph G,               Given a graph G, create the initial population of m
there exists some spanning tree T of G such that applying               chromosomes.
HEF to T yields an optimal m-forest. Proof: Given an optimal            For each of N generations {
m-forest F*, we construct a tree T such that HEF(T) yields                    Selection: Select m parents based on the fitness, with
F*. Suppose that F* contains the trees T1,…,Tk. Let vertex vi                          replacement.
be some center vertex of tree Ti for i=1,…,k. First, add the                  Recombination: Pair parents randomly and perform
edges of F* to T. Then, for i=2,…k, add an edge connecting                             recombination to produce offspring.
vertex vi to v1. To see that HEF(T)=F*, let us refer to the edges             Mutation: Mutate offspring.
of F* as original edges, and the edges (vi,v1) that join two                  Replacement: Combine parents and offspring, and
center vertices as bridge edges. Consider applying HEF to                              form the next generation of size m.
tree T, and let e be the current edge HEF is processing. There             }
are two cases:                                                          Representation: Each chromosome represents a spanning
 If e is an original edge, suppose eTi. Edge e connects               tree of the input graph. The storage requirement for
two components one of which contains the center vertex vi               chromosomes is linear in the number of vertices in the graph.
and the other of which, call it Cw, does not. Since tree Ti is          Initialization: The initial generation consists of µ copies of
irreducible, Cw is small, implying that edge e is retained by           MSTs. The MST is likely to contribute much of the genetic
HEF.
© 2011 ACEEE                                                       48
DOI: 01.IJIT.01.03.8
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


material (i.e., edges) comprising an optimal solution. We can             ces. Cost of initialization depends on the cost of MST con-
rely on mutation to supply new genetic material not present               struction. A single MST of G can be constructed in O(|E| + |V|
in the MST.                                                               log |V|) time using Prim’s algorithm and Fibonacci heaps. Fit
Fitness: The weight of the m-forest that results when HEF is
applied to the set of edges represented by a chromosome is                 ness calculation is dominated by the cost of applying HEF
taken to be the chromosome’s raw fitness. To obtain a scaled              to a spanning tree, which takes O(m|E|) time. Given popula-
fitness value, we subtract the raw fitness from the total cost            tion size , formation of the offspring population via selec-
of the MST, and then linearly scale this value such that the              tion takes O( log ) time, and elitist replacement also takes
maximum scaled fitness in the population is f times the average           O( log ) time. Recombination of two spanning trees with
scaled fitness, where we use the value f=1.8 [8].                         edge sets E1 and E2 adds an edge eE1–E2 to E2, and then
Selection: Using roulette-wheel sampling with replacement,                traverses the resulting cycle to discover an edge of E2–E1 to
we select  chromosomes from the current population and                   replace e. Such edge exchange may take O(|V|) time since the
place them in a mating buffer to serve as parents. The                    cycle may be as large as (|V|). Moreover, since O(|V|) pairs
probability of a chromosome being selected in any trial is                of edges may be exchanged in this way, recombination takes
proportional to its scaled fitness value.                                 O(|V|2) time in the worst-case sense. Mutation replaces an
Recombination: Given two spanning trees with edge sets E1                 edge e by another edge that crosses the same cut as e. If
and E2 that serve as parents, our recombination operator                  each of the two components that e connects are size (|V|),
produces as offspring two spanning trees over the same set                there may be as many as O(|V|2) edges to consider. However,
of edges E1E2. Each offspring retains the set of edges E1E2              because mutation considers only a fixed proportion of the
common to both parents while exchanging some of the edges                 candidate edges, the constant implicit in O(|V|2) can be made
belonging to the symmetric difference (E1E2) (E2E1).                   small.
The recombination operator works as follows. First generate
a uniform random number ps between 0 and 0.5, and then                                             IV. EXAMPLE
create an edge set F containing a proportion ps of the edges
                                                                              We ran our GA on some small data sets to provide an
of E1E2 selected at random. For each edge eF, remove e
                                                                          illustration of the solutions it produces, and to compare the
from E1, thereby separating E1 into two trees. Assign the
                                                                          solutions to those obtained by the HEF method alone.
label A to one of the trees and the label B to the other (the
labels represent a partition or cut of the vertex set into two
nonempty classes). Next, add edge e to edge set E2, and then
traverse the unique cycle in E2 to which e belongs in order to
discover some edge f, distinct from e, that connects an A
vertex to a B vertex. Lastly, remove edge f from edge set E2
and add it to E1. By construction, E1 and E2 remain spanning
trees, and edge f is drawn from the edge set E2E1. Each of
the two offspring resulting from recombination represents a
spanning tree and hence encodes a feasible solution.
Mutation: With a small probability, each edge in a
chromosome is removed and the two resulting components
into which the spanning tree is partitioned are reconnected
using a randomly selected edge. We bias the mutation
operator to increase the likelihood of obtaining spanning
trees with two desirable properties: First, spanning trees                             Figure 2. Optimal 4-forests with n=13.
should be of low degree; vertices with high degree result in              Figure 2 shows optimal 4-forests obtained by our GA on two
large star-shaped trees that restrict the number of edges HEF             different complete 13-vertex graphs (panels a and b) using
can remove. We facilitate this in our mutation operator by                the Euclidean metric; it also presents the corresponding 4-
removing edges connected to vertices of high degree with                  forests produced by applying HEF to the graphs’ MSTs.
higher probability. Secondly, since the optimal m-forest is               Edges removed from the spanning trees by HEF are shown
likely to contain mostly edges of low weight, we use a mutation           as broken lines. Notice that the optimal solutions retain a
operator that is biased toward selecting light edges to replace           subset of edges from the MSTs but also include non-MST
mutated edges as follows: Randomly choose a fixed                         edges. For n=13 and m=4 the number of feasible m-forests is
proportion of the vertices from each of the two components;               48,764 (see the appendix of [14] for a method to compute the
call the subsets of selected vertices A and B. Select the lightest        number of feasible m-forests); the number of distinct spanning
of the c edges connecting A and B to bridge the components.               trees is over 1.79E+12. With an initial population of 20 MSTs,
Replacement: Replacement follows the elitist strategy.                    our GA found the optimal solution within 40 generations (thus
Specifically, the best µ/2 parents and best µ/2 offspring are             exploring at most 800 spanning trees) in each of 20 consecutive
merged to form the population for the next generation.                    runs. Each run took less than 2 seconds on a Pentium
Complexity: Assume that graph G has |E| edges and |V| verti               processor running Java bytecode at 2.5 Ghz.
© 2011 ACEEE                                                         49
DOI: 0.IJIT.01.03. 8
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


                          V.   RESULTS                                   operator to replace mutated edges by edges of low weight.
                                                                          Figure 5 demonstrates the effect of selectively adding edges
    This section summarizes the results of our investigations
                                                                         of low weight during mutation. The thin lines present the best
for larger data sets. We used the TSP-1060 benchmark dataset
                                                                         solutions found over 800 generations on 3 runs of our GA
taken from [18] to investigate the effectiveness of our
                                                                         under the following biased mutation scheme: The lightest
recombination and mutation operators. The dataset contains
                                                                         edge bridging 40% randomly selected sample of vertices in
1060 two-dimensional points. Each point represents a vertex
                                                                         each component resulting from the removal of an edge replaces
in a complete graph where edge weight is the Euclidean
                                                                         the removed edge. The thick lines present the best solutions
distance between pairs of vertices.
                                                                         found when an arbitrary edge spanning the two components
A. Recombination operator                                                is selected. Notice that a bias towards introducing lighter edges
    Figure 3 presents the best solutions found by the GA                 results in better quality solutions.
over 800 generations in 6 different runs. The thin lines present
the results of three runs where the recombination operator
was applied with probability 0.8; the thick lines present results
of runs without recombination. All other GA parameters are
identical for both sets of runs. Notably, recombination
consistently yields better quality solutions; over 30 GA runs,
the mean decrease in weight in the best m-forests identified
was 2.16 times greater when recombination was used.



                                                                          Figure 4. Biased mutation replaces edges connected to vertices of
                                                                                                    high degree.




         Figure 3. Best solutions found with recombination.

B. Biased mutation to reduce high degree vertices
     We hypothesize that better quality solutions result when
edges connected to vertices of high degree are selectively
removed since high-degree vertices result in large star shaped                 Figure 5. Biased mutation introduces low weight edges.
trees and restrict the number of edges that HEF can remove.
Results of our computational experiments to investigate this                                     V. CONCLUSIONS
hypothesis are presented in Figure 4. We define edge degree
to be the maximum of the degree of an edge’s two endpoints.                  Our paper presents a genetic algorithm for finding good
We bias mutation to favor removal of edges of high degree.               solutions for the NP-hard CFP problem. The GA exploits an
Specifically, edges of degree two are mutated with probability           existing heuristic for CFP in the mapping from genotype
plow, edges of highest degree with probability phigh, and all            (spanning trees) to phenotype (m-forests), while
remaining edges with probability pmed. In Figure 4, the thin             outperforming the best-known heuristics when applied to
line represents the best m-forest found over successive                  large problems. When applied to small problems, the GA
generations for the parameters plow=0.001, pmed=0.002, and               rapidly converges to an optimal solution. The representation
phigh=0.004. For comparison, the thick lines present results             of individuals and the choice of genetic operators that act on
with the mutation probability set to constant                            that representation are critical decisions in the design of a
plow=pmed=phigh=0.001 and plow=pmed=phigh=0.004, respectively.           GA. We have chosen to represent individuals as edge sets
Results on 30 runs of the GA produced results consistent                 that comprise spanning trees. This representation maps to
with our hypothesis. The mean decrease in weight in the best             an m-forest under the greedy HEF heuristic. Our primary
m-forests identified was 2.12 times greater when the mutation            genetic operators are recombination and mutation. Our
was biased as to reduce high degree vertices.                            recombination operator is a novel method for combining two
                                                                         individuals to form two new offspring composed of the same
C. Biased mutation to introduce low-weight edges                         set of edges as their parents—the resulting offspring are
   We also conjecture that the optimal m-forest is likely to             feasible yet different from their parents. Mutation, which we
contain mostly edges of low weight and bias our mutation                 explore in both biased and unbiased variants, transforms an
© 2011 ACEEE                                                        50
DOI: 01.IJIT.01.03.8
ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011


 individual into another by exchanging edges while ensuring              [7] Goemans, M., and D. Williamson (1995), “A general
the feasibility of the new individual. The representation of             approximation technique for constrained forest problems”, SIAM
spanning trees as edge sets has been used to solve other                 Journal of Computing, 24, 2, 296–317.
intractable problems such as the degree-constrained minimum              [8] Goldberg, D. (1989). Genetic Algorithms in Search,
                                                                         Optimization and Machine Learning. Reading, MA: Addison-
 spanning tree [16] and minimum routing cost spanning tree
                                                                         Wesley, 1989.
[10] problems. Our GA’s use of edge sets for CFP differs from            [9] Imieliñska, C., B. Kalantari, and L. Khachiyan, (1993) “A
prior use in two respects. First, because the genotype                   greedy heuristic for a minimum weight forest problem”, Operations
(spanning trees) and phenotype (m-forests) are of different              Research Letters,14, 65–71.
type, the genotype-to-phenotype mapping is nontrivial.                   [10] Julstrom B.A., “The blob code is competitive with edge-sets
Second, the GA employs an innovative recombination operator              in genetic algorithms for the minimum routing cost spanning tree
on edge sets. These two novelties suggest that GAs of similar            problem”, Proceedings of the Genetic and Evolutionary
design might be useful for other optimization problems                   Computation Conference, GECCO-2005 (Hans-Georg Beyer et
involving forests and other graph structures derivable from              al., Editors), Volume 1, pp.585-590. New York: ACM Press.
                                                                         [11] Knowles, J., and D. Corne (2000), “A new evolutionary
spanning trees.
                                                                         approach to the degree constrained minimum spanning tree
                                                                         problem”, IEEE Transactions on Evolutionary Computation, 4,
                          REFERENCES                                     125-134.
[1] Arnold B.C., N. Balakrishnan, and H.N. Nagaraja (1992), A            [12] Laszlo, M., and S. Mukherjee, (2005) “Another greedy
First Course in Order Statistics, Wiley, New York.                       heuristic for the constrained forest problem”, Operations Research
[2] Bar-Yehuda, R., K. Bendel, A. Freund, and D. Rawitz (2004),          Letters, 33(6), 629 – 633.
“Local ratio: A unified framework for approximation algorithms”,         [13] Laszlo, M., and S. Mukherjee, (2006) “A class of heuristics
ACM Computing Surveys, 36, 4, 422–463.                                   for the constrained forest problem”, Discrete Applied Mathematics,
[3] Bazgana C., Couëtouxa B. and Tuza Z. (2011). “Complexity             154(1), 6-14.
and approximation of the Constrained Forest problem”, Theoretical        [14] Laszlo, M., and S. Mukherjee, (2005), “Minimum spanning
Computer Science, 412 (32), 22 4081-4091.                                tree partitioning algorithm for microaggregation”, IEEE Transactions
[4] Chou, H., G. Premkumar, and C.-H. Chu (2001), “Genetic               on Knowledge and Data Engineering, 17(7), 902-911.
algorithms for communications network design—an empirical study          [15] Palmer, C., and A. Kershenbaum, (1994), “Representing trees
of the factors that influence performance,” IEEE Transactions on         in genetic algorithms”, Proc. 1st IEEE Conf. Evolutionary
Evolutionary Computation, 5, 236-249.                                    Computation, 379-384.
[5] Cordone, R., and F. Maffioli (2004), “On the complexity of           [16] Raidl, G. R., and B. A. Julstrom. (2003) “Edge sets: an effective
graph tree partition problems”, Discrete Applied Mathematics,            evolutionary coding of spanning trees”, IEEE Transactions on
134, 51 – 65.                                                            Evolutionary Computation, 7(3), 225-239.
[6] Goemans, M., and D. Williamson (1994), “Approximating                [17] Raidl, G. R., and B. A. Julstrom (2002) “Initialization is robust
minimum-cost graph problems with spanning tree edges”,                   in evolutionary algorithms that encode spanning trees as sets of
Operations Research Letters, 16, 183–189.                                edges”, Proceedings of the 2002 ACM symposium on Applied
                                                                         computing, Madrid, Spain, 547-552.
                                                                         [18] Reinelt, G., (1991) “TSP-LIB A traveling salesman library”,
                                                                         ORSA Journal of Computing, 3, 376-384.




© 2011 ACEEE                                                        51
DOI: 0.IJIT.01.03. 8

Weitere ähnliche Inhalte

Was ist angesagt?

Fuzzy clustering Approach in segmentation of T1-T2 brain MRI
Fuzzy clustering Approach in segmentation of T1-T2 brain MRIFuzzy clustering Approach in segmentation of T1-T2 brain MRI
Fuzzy clustering Approach in segmentation of T1-T2 brain MRIIDES Editor
 
Compressing the dependent elements of multiset
Compressing the dependent elements of multisetCompressing the dependent elements of multiset
Compressing the dependent elements of multisetIRJET Journal
 
Csr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansenCsr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansenCSR2011
 
Improving Machine Learning Approaches to Coreference Resolution
Improving Machine Learning Approaches to Coreference ResolutionImproving Machine Learning Approaches to Coreference Resolution
Improving Machine Learning Approaches to Coreference Resolutionbutest
 
Fuzzified pso for multiobjective economic load dispatch problem
Fuzzified pso for multiobjective economic load dispatch problemFuzzified pso for multiobjective economic load dispatch problem
Fuzzified pso for multiobjective economic load dispatch problemeSAT Journals
 
A mathematical model and a heuristic memory allocation problem
A mathematical model and a heuristic memory allocation problemA mathematical model and a heuristic memory allocation problem
A mathematical model and a heuristic memory allocation problemDiego Montero
 
Deleting to Structured Trees
Deleting to Structured TreesDeleting to Structured Trees
Deleting to Structured TreesNeeldhara Misra
 
Meta back translation
Meta back translationMeta back translation
Meta back translationHyunKyu Jeon
 
llorma_jmlr copy
llorma_jmlr copyllorma_jmlr copy
llorma_jmlr copyGuy Lebanon
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...IOSRJECE
 

Was ist angesagt? (11)

Fuzzy clustering Approach in segmentation of T1-T2 brain MRI
Fuzzy clustering Approach in segmentation of T1-T2 brain MRIFuzzy clustering Approach in segmentation of T1-T2 brain MRI
Fuzzy clustering Approach in segmentation of T1-T2 brain MRI
 
Compressing the dependent elements of multiset
Compressing the dependent elements of multisetCompressing the dependent elements of multiset
Compressing the dependent elements of multiset
 
Csr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansenCsr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansen
 
Improving Machine Learning Approaches to Coreference Resolution
Improving Machine Learning Approaches to Coreference ResolutionImproving Machine Learning Approaches to Coreference Resolution
Improving Machine Learning Approaches to Coreference Resolution
 
Fuzzified pso for multiobjective economic load dispatch problem
Fuzzified pso for multiobjective economic load dispatch problemFuzzified pso for multiobjective economic load dispatch problem
Fuzzified pso for multiobjective economic load dispatch problem
 
A mathematical model and a heuristic memory allocation problem
A mathematical model and a heuristic memory allocation problemA mathematical model and a heuristic memory allocation problem
A mathematical model and a heuristic memory allocation problem
 
Deleting to Structured Trees
Deleting to Structured TreesDeleting to Structured Trees
Deleting to Structured Trees
 
Meta back translation
Meta back translationMeta back translation
Meta back translation
 
ssc_icml13
ssc_icml13ssc_icml13
ssc_icml13
 
llorma_jmlr copy
llorma_jmlr copyllorma_jmlr copy
llorma_jmlr copy
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
 

Andere mochten auch

A New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC ConverterA New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC ConverterIDES Editor
 
Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...
Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...
Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...IDES Editor
 
Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...
Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...
Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...IDES Editor
 
An Index Based K-Partitions Multiple Pattern Matching Algorithm
An Index Based K-Partitions Multiple Pattern Matching AlgorithmAn Index Based K-Partitions Multiple Pattern Matching Algorithm
An Index Based K-Partitions Multiple Pattern Matching AlgorithmIDES Editor
 
Detection of Transmission Line Faults by Wavelet Based Transient Extraction
Detection of Transmission Line Faults by Wavelet Based Transient ExtractionDetection of Transmission Line Faults by Wavelet Based Transient Extraction
Detection of Transmission Line Faults by Wavelet Based Transient ExtractionIDES Editor
 
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...IDES Editor
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyIDES Editor
 
A CHS based PID Controller for Unified Power Flow Controller
A CHS based PID Controller for Unified Power Flow ControllerA CHS based PID Controller for Unified Power Flow Controller
A CHS based PID Controller for Unified Power Flow ControllerIDES Editor
 
Architecting Secure Service Oriented Web Services
Architecting Secure Service Oriented Web ServicesArchitecting Secure Service Oriented Web Services
Architecting Secure Service Oriented Web ServicesIDES Editor
 
Reactive power control of three phase grid-connected pv system during grid fa...
Reactive power control of three phase grid-connected pv system during grid fa...Reactive power control of three phase grid-connected pv system during grid fa...
Reactive power control of three phase grid-connected pv system during grid fa...I3E Technologies
 
modeling and control a d-statcom with sugeno and mamdani fuzzy logic control...
 modeling and control a d-statcom with sugeno and mamdani fuzzy logic control... modeling and control a d-statcom with sugeno and mamdani fuzzy logic control...
modeling and control a d-statcom with sugeno and mamdani fuzzy logic control...John Here
 
Wavelet based analysis for transmission line fault location
Wavelet based analysis for transmission line fault locationWavelet based analysis for transmission line fault location
Wavelet based analysis for transmission line fault locationAlexander Decker
 

Andere mochten auch (12)

A New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC ConverterA New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC Converter
 
Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...
Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...
Modified Whitening Rotation based Joint Semi-blind Channel and Data Estimatio...
 
Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...
Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...
Diametrical Mesh of Tree (D2D-MoT) Architecture: A Novel Routing Solution for...
 
An Index Based K-Partitions Multiple Pattern Matching Algorithm
An Index Based K-Partitions Multiple Pattern Matching AlgorithmAn Index Based K-Partitions Multiple Pattern Matching Algorithm
An Index Based K-Partitions Multiple Pattern Matching Algorithm
 
Detection of Transmission Line Faults by Wavelet Based Transient Extraction
Detection of Transmission Line Faults by Wavelet Based Transient ExtractionDetection of Transmission Line Faults by Wavelet Based Transient Extraction
Detection of Transmission Line Faults by Wavelet Based Transient Extraction
 
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
Shift Invariant Ear Feature Extraction using Dual Tree Complex Wavelet Transf...
 
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyA Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
 
A CHS based PID Controller for Unified Power Flow Controller
A CHS based PID Controller for Unified Power Flow ControllerA CHS based PID Controller for Unified Power Flow Controller
A CHS based PID Controller for Unified Power Flow Controller
 
Architecting Secure Service Oriented Web Services
Architecting Secure Service Oriented Web ServicesArchitecting Secure Service Oriented Web Services
Architecting Secure Service Oriented Web Services
 
Reactive power control of three phase grid-connected pv system during grid fa...
Reactive power control of three phase grid-connected pv system during grid fa...Reactive power control of three phase grid-connected pv system during grid fa...
Reactive power control of three phase grid-connected pv system during grid fa...
 
modeling and control a d-statcom with sugeno and mamdani fuzzy logic control...
 modeling and control a d-statcom with sugeno and mamdani fuzzy logic control... modeling and control a d-statcom with sugeno and mamdani fuzzy logic control...
modeling and control a d-statcom with sugeno and mamdani fuzzy logic control...
 
Wavelet based analysis for transmission line fault location
Wavelet based analysis for transmission line fault locationWavelet based analysis for transmission line fault location
Wavelet based analysis for transmission line fault location
 

Ähnlich wie Genetic Algorithm Solves Constrained Forest Problem

2014 on exact solutions for the minmax regret aspanning tree problem
2014   on exact solutions for the minmax regret aspanning tree problem2014   on exact solutions for the minmax regret aspanning tree problem
2014 on exact solutions for the minmax regret aspanning tree problemFrancisco Pérez
 
Tree net and_randomforests_2009
Tree net and_randomforests_2009Tree net and_randomforests_2009
Tree net and_randomforests_2009Matthew Magistrado
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEijscmcj
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEijscmc
 
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Varad Meru
 
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to MatchingsMaximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchingssagark4
 
Discovering Novel Information with sentence Level clustering From Multi-docu...
Discovering Novel Information with sentence Level clustering  From Multi-docu...Discovering Novel Information with sentence Level clustering  From Multi-docu...
Discovering Novel Information with sentence Level clustering From Multi-docu...irjes
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set ProblemCHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set ProblemIJECEIAES
 
20070702 Text Categorization
20070702 Text Categorization20070702 Text Categorization
20070702 Text Categorizationmidi
 
An Improved Ant-Based Algorithm for Minimum Degree Spanning Tree Problems
An Improved Ant-Based Algorithm for Minimum Degree  Spanning Tree Problems An Improved Ant-Based Algorithm for Minimum Degree  Spanning Tree Problems
An Improved Ant-Based Algorithm for Minimum Degree Spanning Tree Problems IOSR Journals
 
Hybrid Approach to Economic Load Dispatch
Hybrid Approach to Economic Load DispatchHybrid Approach to Economic Load Dispatch
Hybrid Approach to Economic Load DispatchSatyendra Singh
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzerbutest
 
2014 vulnerability assesment of spatial network - models and solutions
2014   vulnerability assesment of spatial network - models and solutions2014   vulnerability assesment of spatial network - models and solutions
2014 vulnerability assesment of spatial network - models and solutionsFrancisco Pérez
 
Minimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applicationsMinimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applicationsLuis Galárraga
 

Ähnlich wie Genetic Algorithm Solves Constrained Forest Problem (20)

2014 on exact solutions for the minmax regret aspanning tree problem
2014   on exact solutions for the minmax regret aspanning tree problem2014   on exact solutions for the minmax regret aspanning tree problem
2014 on exact solutions for the minmax regret aspanning tree problem
 
Tree net and_randomforests_2009
Tree net and_randomforests_2009Tree net and_randomforests_2009
Tree net and_randomforests_2009
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
 
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREEA NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
A NEW PARALLEL ALGORITHM FOR COMPUTING MINIMUM SPANNING TREE
 
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
Subproblem-Tree Calibration: A Unified Approach to Max-Product Message Passin...
 
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to MatchingsMaximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchings
 
Discovering Novel Information with sentence Level clustering From Multi-docu...
Discovering Novel Information with sentence Level clustering  From Multi-docu...Discovering Novel Information with sentence Level clustering  From Multi-docu...
Discovering Novel Information with sentence Level clustering From Multi-docu...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set ProblemCHN and Swap Heuristic to Solve the Maximum Independent Set Problem
CHN and Swap Heuristic to Solve the Maximum Independent Set Problem
 
20070702 Text Categorization
20070702 Text Categorization20070702 Text Categorization
20070702 Text Categorization
 
An Improved Ant-Based Algorithm for Minimum Degree Spanning Tree Problems
An Improved Ant-Based Algorithm for Minimum Degree  Spanning Tree Problems An Improved Ant-Based Algorithm for Minimum Degree  Spanning Tree Problems
An Improved Ant-Based Algorithm for Minimum Degree Spanning Tree Problems
 
D111823
D111823D111823
D111823
 
Hybrid Approach to Economic Load Dispatch
Hybrid Approach to Economic Load DispatchHybrid Approach to Economic Load Dispatch
Hybrid Approach to Economic Load Dispatch
 
Dycops2019
Dycops2019 Dycops2019
Dycops2019
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzer
 
2014 vulnerability assesment of spatial network - models and solutions
2014   vulnerability assesment of spatial network - models and solutions2014   vulnerability assesment of spatial network - models and solutions
2014 vulnerability assesment of spatial network - models and solutions
 
Minimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applicationsMinimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applications
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Genetic Algorithm Solves Constrained Forest Problem

  • 1. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 A Genetic Algorithm for the Constrained Forest Problem Michael Laszlo1, and Sumitra Mukherjee2 1 Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, USA. Email: mjl@nova.edu 2 Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, USA. Email: sumitra@nova.edu Abstract— Given a graph with positive edge weights and a Bar-Yehuda et al. [2] present a version of this method using positive integer m, the Constrained Forest Problem (CFP) the local ratio framework. Results on complexity and problem seeks a minimum-weight spanning subgraph each of approximation of the CFP are presented in [3]. This paper whose components contains at least m vertices. Such a subgraph presents a genetic algorithm (GA) to identify good solutions is called an m-forest. We present a genetic algorithm (GA) for CFP, which is NP-hard for me”4. Our GA evolves good spanning to CFP. The greedy HEF algorithm [12] achieves its 2- trees, as determined by the weight of the m-forest into which approximate performance guarantee by operating on the it can be partitioned by a simple greedy algorithm. Genetic edges of the graph’s minimum spanning tree (MST). We show operators include mutation, which replaces a spanning tree that there exist spanning trees that serve as better starting edge by a different edge that connects the same pair of points, indeed, that there exist spanning trees that yield components, and recombination, which combines the edge sets optimal solutions under HEF. Our GA is designed to evolve of two spanning trees to produce two new spanning trees. The such spanning trees. Each individual in a population encodes GA discovers m-forests that are significantly better than those a spanning tree of the input graph whose fitness reflects the identified by best-known approximation algorithms for CFP, quality of the m-forest partition that results under greedy and identifies optimal solutions in small problems. HEF. Genetic operators include mutation, which replaces a Index Terms— Genetic Algorithms, Spanning Forests, spanning tree edge by a different edge that crosses the same Constrained Forest Problem, Network Design Problems, cut, and recombination, which combines the edge sets of Combinatorial Optimization. two spanning trees to produce two new spanning trees. Other studies have employed similar chromosome representations I. INTRODUCTION for GAs targeting network design problems (for example see [1], [11], [15], and [16]). Notably, our GA differs from other Given a graph with positive edge weights, the Constrained approaches in its choice of genotype-to-phenotype mapping Forest Problem (CFP) problem seeks a minimum-weight and in its recombination operator. The paper is organized as spanning subgraph each of whose components contains at follows. Section 2 motivates our use of the GA for this least m>1 vertices. CFP belongs to a class of network design problem. Section 3 describes the GA. Section 4 presents problems that have applications in such domains as VLSI examples on small data sets to illustrate our method. Section layout and telecommunications network design. Network 5 presents and discusses the results of experiments designed design problems assume this form: Given an edge-weighted to evaluate the GA’s efficacy. Section 6 concludes with some graph G=(V,E) and a demand function f: 2V{0,1}, find a observations. minimum-weight set of edges that for all SV, contains at least f(S) edges from (S), where (S) contains exactly one II. MOTIVATION endpoint in S. The CFP is modeled by the demand function f(S)=1 if and only if 0<|S|<m. A forest is feasible if and only if A forest is called an m-forest if each of its trees contains f(T)=0 for every tree T. Imeliénska et al. [9] show that CFP is at least m vertices for given m>1. The heaviest-edge-first NP-hard for m4 and present a greedy heuristic for CFP that (HEF) algorithm partitions a spanning tree T=(V,E) into an m- produces solutions within a factor of two of the optimum. forest spanning vertex set V [12]. This greedy algorithm Laszlo and Mukherjee [12] present a second greedy heuristic iteratively processes spanning tree edges in decreasing (which we refer to as HEF for heaviest edge first) that weight order, and removes an edge if and only if it connects produces solutions at least as good as and often better than two components of size at least m (see Figure 1). The input is those produced by [9], and then locate both greedy heuristics the edge set E and integer m>1; the output is a subset of E within a family of heuristics all of which are 2-approximate for representing an m-forest spanning vertex set V. We use HEF(T) CFP [13]. Goemans and Williamson [6] treat CFP as a special to denote the m-forest produced by applying HEF to spanning case of network design problems with demand functions that tree T where the value of m is assumed. are downwards monotone. They show their generalization of the greedy method of [9] to be 2-approximate. Goemans and Williamson [7] subsequently obtain a (2–1/|V|)-approximation method for CFP using a primal-dual approximation framework. © 2011 ACEEE 47 DOI: 0.IJIT.01.03. 8
  • 2. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011  If e is a bridge edge, it connects some tree Ti to the component C that contains tree T1. Ti is large because it belongs to an m-forest (F*), and C is large because its subgraph T1 is large; accordingly, edge e is removed by HEF. It follows that the HEF(T)=F*.  A spanning tree T for which HEF(T) is optimal is referred to as HEF-optimal. The tree construction of the previous proof can be generalized to show that multiple HEF-optimal trees may exist for a given input graph. The genetic algorithm Figure 1. Heaviest edge first (HEF) algorithm. described in the following section seeks an HEF-optimal tree We can use the HEF algorithm in a 2-approximate greedy in the search space of trees that span the input graph. Each heuristic for CFP: First compute the MST of the input graph, chromosome represents a spanning tree T, and its fitness is a and then apply HEF to the MST edges. Although the m- function of the weight of the m-forest HEF(T). The genetic forests produced by this heuristic are no worse than twice operators are designed to move the search from the initial optimal, in practice they may weigh close to this upper bound population, made up of copies of the input graph’s MST, and it is not difficult to construct examples that do so. This toward the HEF-optimal trees in the search space. suggests that there may exist spanning trees other than the MST which yield m-forests of less weight under HEF. In the III. GENETIC ALGORITHM remainder of this section, we show that for any input graph Genetic algorithms find wide use in combinatorial G, there exists a spanning tree T of G such that the m-forest optimization problems [8]. A GA evolves a population of HEF(T) is optimal. This motivates the use of a genetic chromosomes (or individuals) that represent feasible algorithm to find such HEF-optimal trees in the search space solutions. Each chromosome stores a set of genes whose of all spanning trees of G.. Let us say that a tree is small if it values collectively determine the chromosome’s fitness. contains fewer than m vertices, and large otherwise. An edge During each generation, genetic operators—selection, e in tree T is removable if each of the two trees in the graph recombination, mutation, and replacement—are applied to T–{e} is large. We refer to a tree or a forest as irreducible if the current population to produce the next generation. it contains no removable edges (an irreducible forest Selection selects individuals from the current population with comprises only irreducible trees). It is evident that the forests probability proportional to their fitness values. F produced by HEF are irreducible. Suppose to the contrary Recombination operates on two selected chromosomes, that F contains some tree T that is not irreducible, and let swapping portions of each to produce two new chromosomes. edge eÎT be some removable edge that connects two large Mutation alters the value of a gene. Replacement merges the subtrees C1 and C2. When HEF processed edge e, e must current population and its offspring from which it selects the have connected two subtrees C’1 and C’2 containing C1 and set of individuals to make up the next generation. C2 as subgraphs, implying that both C’1 and C’2 are large. Recombination focuses the search on promising Consequently, edge e would have been removed by HEF, neighborhoods of the feasible region while mutation widens contradicting our choice of edge e. We refer to a tree as star- the search to unexplored regions, thereby minimizing the risk shaped if it contains some vertex v such that every subtree to of premature convergence to inferior solutions. The goal of a which v is connected by an edge is small. Vertex v is called a GA is to identify good solutions through this evolutionary center vertex of the tree. It is shown in [14] that a tree is process. We summarize the GA, then elaborate each phase, irreducible if and only if it is star-shaped. We use this result and then address time complexity. to prove the following theorem: Theorem 1: Given graph G, Given a graph G, create the initial population of m there exists some spanning tree T of G such that applying chromosomes. HEF to T yields an optimal m-forest. Proof: Given an optimal For each of N generations { m-forest F*, we construct a tree T such that HEF(T) yields Selection: Select m parents based on the fitness, with F*. Suppose that F* contains the trees T1,…,Tk. Let vertex vi replacement. be some center vertex of tree Ti for i=1,…,k. First, add the Recombination: Pair parents randomly and perform edges of F* to T. Then, for i=2,…k, add an edge connecting recombination to produce offspring. vertex vi to v1. To see that HEF(T)=F*, let us refer to the edges Mutation: Mutate offspring. of F* as original edges, and the edges (vi,v1) that join two Replacement: Combine parents and offspring, and center vertices as bridge edges. Consider applying HEF to form the next generation of size m. tree T, and let e be the current edge HEF is processing. There } are two cases: Representation: Each chromosome represents a spanning  If e is an original edge, suppose eTi. Edge e connects tree of the input graph. The storage requirement for two components one of which contains the center vertex vi chromosomes is linear in the number of vertices in the graph. and the other of which, call it Cw, does not. Since tree Ti is Initialization: The initial generation consists of µ copies of irreducible, Cw is small, implying that edge e is retained by MSTs. The MST is likely to contribute much of the genetic HEF. © 2011 ACEEE 48 DOI: 01.IJIT.01.03.8
  • 3. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 material (i.e., edges) comprising an optimal solution. We can ces. Cost of initialization depends on the cost of MST con- rely on mutation to supply new genetic material not present struction. A single MST of G can be constructed in O(|E| + |V| in the MST. log |V|) time using Prim’s algorithm and Fibonacci heaps. Fit Fitness: The weight of the m-forest that results when HEF is applied to the set of edges represented by a chromosome is ness calculation is dominated by the cost of applying HEF taken to be the chromosome’s raw fitness. To obtain a scaled to a spanning tree, which takes O(m|E|) time. Given popula- fitness value, we subtract the raw fitness from the total cost tion size , formation of the offspring population via selec- of the MST, and then linearly scale this value such that the tion takes O( log ) time, and elitist replacement also takes maximum scaled fitness in the population is f times the average O( log ) time. Recombination of two spanning trees with scaled fitness, where we use the value f=1.8 [8]. edge sets E1 and E2 adds an edge eE1–E2 to E2, and then Selection: Using roulette-wheel sampling with replacement, traverses the resulting cycle to discover an edge of E2–E1 to we select  chromosomes from the current population and replace e. Such edge exchange may take O(|V|) time since the place them in a mating buffer to serve as parents. The cycle may be as large as (|V|). Moreover, since O(|V|) pairs probability of a chromosome being selected in any trial is of edges may be exchanged in this way, recombination takes proportional to its scaled fitness value. O(|V|2) time in the worst-case sense. Mutation replaces an Recombination: Given two spanning trees with edge sets E1 edge e by another edge that crosses the same cut as e. If and E2 that serve as parents, our recombination operator each of the two components that e connects are size (|V|), produces as offspring two spanning trees over the same set there may be as many as O(|V|2) edges to consider. However, of edges E1E2. Each offspring retains the set of edges E1E2 because mutation considers only a fixed proportion of the common to both parents while exchanging some of the edges candidate edges, the constant implicit in O(|V|2) can be made belonging to the symmetric difference (E1E2) (E2E1). small. The recombination operator works as follows. First generate a uniform random number ps between 0 and 0.5, and then IV. EXAMPLE create an edge set F containing a proportion ps of the edges We ran our GA on some small data sets to provide an of E1E2 selected at random. For each edge eF, remove e illustration of the solutions it produces, and to compare the from E1, thereby separating E1 into two trees. Assign the solutions to those obtained by the HEF method alone. label A to one of the trees and the label B to the other (the labels represent a partition or cut of the vertex set into two nonempty classes). Next, add edge e to edge set E2, and then traverse the unique cycle in E2 to which e belongs in order to discover some edge f, distinct from e, that connects an A vertex to a B vertex. Lastly, remove edge f from edge set E2 and add it to E1. By construction, E1 and E2 remain spanning trees, and edge f is drawn from the edge set E2E1. Each of the two offspring resulting from recombination represents a spanning tree and hence encodes a feasible solution. Mutation: With a small probability, each edge in a chromosome is removed and the two resulting components into which the spanning tree is partitioned are reconnected using a randomly selected edge. We bias the mutation operator to increase the likelihood of obtaining spanning trees with two desirable properties: First, spanning trees Figure 2. Optimal 4-forests with n=13. should be of low degree; vertices with high degree result in Figure 2 shows optimal 4-forests obtained by our GA on two large star-shaped trees that restrict the number of edges HEF different complete 13-vertex graphs (panels a and b) using can remove. We facilitate this in our mutation operator by the Euclidean metric; it also presents the corresponding 4- removing edges connected to vertices of high degree with forests produced by applying HEF to the graphs’ MSTs. higher probability. Secondly, since the optimal m-forest is Edges removed from the spanning trees by HEF are shown likely to contain mostly edges of low weight, we use a mutation as broken lines. Notice that the optimal solutions retain a operator that is biased toward selecting light edges to replace subset of edges from the MSTs but also include non-MST mutated edges as follows: Randomly choose a fixed edges. For n=13 and m=4 the number of feasible m-forests is proportion of the vertices from each of the two components; 48,764 (see the appendix of [14] for a method to compute the call the subsets of selected vertices A and B. Select the lightest number of feasible m-forests); the number of distinct spanning of the c edges connecting A and B to bridge the components. trees is over 1.79E+12. With an initial population of 20 MSTs, Replacement: Replacement follows the elitist strategy. our GA found the optimal solution within 40 generations (thus Specifically, the best µ/2 parents and best µ/2 offspring are exploring at most 800 spanning trees) in each of 20 consecutive merged to form the population for the next generation. runs. Each run took less than 2 seconds on a Pentium Complexity: Assume that graph G has |E| edges and |V| verti processor running Java bytecode at 2.5 Ghz. © 2011 ACEEE 49 DOI: 0.IJIT.01.03. 8
  • 4. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 V. RESULTS operator to replace mutated edges by edges of low weight. Figure 5 demonstrates the effect of selectively adding edges This section summarizes the results of our investigations of low weight during mutation. The thin lines present the best for larger data sets. We used the TSP-1060 benchmark dataset solutions found over 800 generations on 3 runs of our GA taken from [18] to investigate the effectiveness of our under the following biased mutation scheme: The lightest recombination and mutation operators. The dataset contains edge bridging 40% randomly selected sample of vertices in 1060 two-dimensional points. Each point represents a vertex each component resulting from the removal of an edge replaces in a complete graph where edge weight is the Euclidean the removed edge. The thick lines present the best solutions distance between pairs of vertices. found when an arbitrary edge spanning the two components A. Recombination operator is selected. Notice that a bias towards introducing lighter edges Figure 3 presents the best solutions found by the GA results in better quality solutions. over 800 generations in 6 different runs. The thin lines present the results of three runs where the recombination operator was applied with probability 0.8; the thick lines present results of runs without recombination. All other GA parameters are identical for both sets of runs. Notably, recombination consistently yields better quality solutions; over 30 GA runs, the mean decrease in weight in the best m-forests identified was 2.16 times greater when recombination was used. Figure 4. Biased mutation replaces edges connected to vertices of high degree. Figure 3. Best solutions found with recombination. B. Biased mutation to reduce high degree vertices We hypothesize that better quality solutions result when edges connected to vertices of high degree are selectively removed since high-degree vertices result in large star shaped Figure 5. Biased mutation introduces low weight edges. trees and restrict the number of edges that HEF can remove. Results of our computational experiments to investigate this V. CONCLUSIONS hypothesis are presented in Figure 4. We define edge degree to be the maximum of the degree of an edge’s two endpoints. Our paper presents a genetic algorithm for finding good We bias mutation to favor removal of edges of high degree. solutions for the NP-hard CFP problem. The GA exploits an Specifically, edges of degree two are mutated with probability existing heuristic for CFP in the mapping from genotype plow, edges of highest degree with probability phigh, and all (spanning trees) to phenotype (m-forests), while remaining edges with probability pmed. In Figure 4, the thin outperforming the best-known heuristics when applied to line represents the best m-forest found over successive large problems. When applied to small problems, the GA generations for the parameters plow=0.001, pmed=0.002, and rapidly converges to an optimal solution. The representation phigh=0.004. For comparison, the thick lines present results of individuals and the choice of genetic operators that act on with the mutation probability set to constant that representation are critical decisions in the design of a plow=pmed=phigh=0.001 and plow=pmed=phigh=0.004, respectively. GA. We have chosen to represent individuals as edge sets Results on 30 runs of the GA produced results consistent that comprise spanning trees. This representation maps to with our hypothesis. The mean decrease in weight in the best an m-forest under the greedy HEF heuristic. Our primary m-forests identified was 2.12 times greater when the mutation genetic operators are recombination and mutation. Our was biased as to reduce high degree vertices. recombination operator is a novel method for combining two individuals to form two new offspring composed of the same C. Biased mutation to introduce low-weight edges set of edges as their parents—the resulting offspring are We also conjecture that the optimal m-forest is likely to feasible yet different from their parents. Mutation, which we contain mostly edges of low weight and bias our mutation explore in both biased and unbiased variants, transforms an © 2011 ACEEE 50 DOI: 01.IJIT.01.03.8
  • 5. ACEEE Int. J. on Information Technology, Vol. 01, No. 03, Dec 2011 individual into another by exchanging edges while ensuring [7] Goemans, M., and D. Williamson (1995), “A general the feasibility of the new individual. The representation of approximation technique for constrained forest problems”, SIAM spanning trees as edge sets has been used to solve other Journal of Computing, 24, 2, 296–317. intractable problems such as the degree-constrained minimum [8] Goldberg, D. (1989). Genetic Algorithms in Search, Optimization and Machine Learning. Reading, MA: Addison- spanning tree [16] and minimum routing cost spanning tree Wesley, 1989. [10] problems. Our GA’s use of edge sets for CFP differs from [9] Imieliñska, C., B. Kalantari, and L. Khachiyan, (1993) “A prior use in two respects. First, because the genotype greedy heuristic for a minimum weight forest problem”, Operations (spanning trees) and phenotype (m-forests) are of different Research Letters,14, 65–71. type, the genotype-to-phenotype mapping is nontrivial. [10] Julstrom B.A., “The blob code is competitive with edge-sets Second, the GA employs an innovative recombination operator in genetic algorithms for the minimum routing cost spanning tree on edge sets. These two novelties suggest that GAs of similar problem”, Proceedings of the Genetic and Evolutionary design might be useful for other optimization problems Computation Conference, GECCO-2005 (Hans-Georg Beyer et involving forests and other graph structures derivable from al., Editors), Volume 1, pp.585-590. New York: ACM Press. [11] Knowles, J., and D. Corne (2000), “A new evolutionary spanning trees. approach to the degree constrained minimum spanning tree problem”, IEEE Transactions on Evolutionary Computation, 4, REFERENCES 125-134. [1] Arnold B.C., N. Balakrishnan, and H.N. Nagaraja (1992), A [12] Laszlo, M., and S. Mukherjee, (2005) “Another greedy First Course in Order Statistics, Wiley, New York. heuristic for the constrained forest problem”, Operations Research [2] Bar-Yehuda, R., K. Bendel, A. Freund, and D. Rawitz (2004), Letters, 33(6), 629 – 633. “Local ratio: A unified framework for approximation algorithms”, [13] Laszlo, M., and S. Mukherjee, (2006) “A class of heuristics ACM Computing Surveys, 36, 4, 422–463. for the constrained forest problem”, Discrete Applied Mathematics, [3] Bazgana C., Couëtouxa B. and Tuza Z. (2011). “Complexity 154(1), 6-14. and approximation of the Constrained Forest problem”, Theoretical [14] Laszlo, M., and S. Mukherjee, (2005), “Minimum spanning Computer Science, 412 (32), 22 4081-4091. tree partitioning algorithm for microaggregation”, IEEE Transactions [4] Chou, H., G. Premkumar, and C.-H. Chu (2001), “Genetic on Knowledge and Data Engineering, 17(7), 902-911. algorithms for communications network design—an empirical study [15] Palmer, C., and A. Kershenbaum, (1994), “Representing trees of the factors that influence performance,” IEEE Transactions on in genetic algorithms”, Proc. 1st IEEE Conf. Evolutionary Evolutionary Computation, 5, 236-249. Computation, 379-384. [5] Cordone, R., and F. Maffioli (2004), “On the complexity of [16] Raidl, G. R., and B. A. Julstrom. (2003) “Edge sets: an effective graph tree partition problems”, Discrete Applied Mathematics, evolutionary coding of spanning trees”, IEEE Transactions on 134, 51 – 65. Evolutionary Computation, 7(3), 225-239. [6] Goemans, M., and D. Williamson (1994), “Approximating [17] Raidl, G. R., and B. A. Julstrom (2002) “Initialization is robust minimum-cost graph problems with spanning tree edges”, in evolutionary algorithms that encode spanning trees as sets of Operations Research Letters, 16, 183–189. edges”, Proceedings of the 2002 ACM symposium on Applied computing, Madrid, Spain, 547-552. [18] Reinelt, G., (1991) “TSP-LIB A traveling salesman library”, ORSA Journal of Computing, 3, 376-384. © 2011 ACEEE 51 DOI: 0.IJIT.01.03. 8