SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Control and Automation
Vol. 11, No. 6 (2018), pp.109-122
http//dx.doi.org/10.14257/ijca.2018.11.6.11
ISSN: 2005-4297 IJCA
Copyright © 2018 SERSC Australia
Prim and GeneticAlgorithms Performance in Determining Optimum
Route on Graph
1
Andysah Putera Utama Siahaan1,4*
, Rusiadi2
, Phak Len Eh Kan3
, Ku Nurul Fazira
Ku Azir3
and Amiza Amir3
1
Faculty of Science and Technology, Universitas Pembangunan Panca Budi,
Medan, Indonesia
2
Faculty of Social Science, Universitas Pembangunan Panca Budi,
Medan, Indonesia
3
School of Computer & Communication Engineering, Universiti Malaysia Perlis,
Perlis, Malaysia
4
Postgraduate of School of Computer & Communication Engineering,
Universiti Malaysia Perlis, Perlis, Malaysia
andiesiahaan@gmail.com, rusiadi@dosen.pancabudi.ac.id,
phaklen@unimap.edu.my, fazira@unimap.edu.my, amizaamir@unimap.edu.my
Abstract
Performance is a process of assessment of the algorithm. Speed and security is the
performance to be achieved in determining which algorithm is better to use. In determining
the optimum route, there are two algorithms that can be used for comparison. The Genetic
and Primary algorithms are two very popular algorithms for determining the optimum
route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine
the best route based on active vertex. This algorithm is especially useful when applied in a
minimum spanning tree case. Genetics works with probability properties. Genetics cannot
determine which route has the maximum value. However, genetics can determine the
overall optimum route based on appropriate parameters. Each algorithm can be used for
the case of the shortest path, minimum spanning tree or traveling salesman problem. The
Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm
lies in the number of generations and population generated as well as the selection,
crossover and mutation processes as the resultant support. The disadvantage of the Genetic
algorithm is spending to much time to get the desired result. Overall, the Prim algorithm
has better performance than Genetic especially for a large number of vertices.
Keyword: Artificial Intelligent, Prim, Genetic Algorithm, MST, Shortest Path
1. Introduction
The need for electrical resources is very rapidly growing mainly in the field of network
[1]. One of the examples is the installation of fiber optic cable [2]. These expensive cables
need to be appropriately calculated and optimally to avoid excessive use of costs. The use
of minimal weight can speed up data transmission and improve security [3][4][5][6][7]and
comfort [8][9][10]. The minimum spanning tree algorithm can calculate optimal cable
usage. Optimization is a significant thing to achieve. It relates to the use of operational
costs. Speaking of optimization, this is a fuzzy thing [11][12][13]. By doing the
optimization, some essential parts can be saved and minimized. Prim and Genetic
algorithms have the same function. These algorithms aim to optimize a given weight. The
optimal weight is the ultimate weight obtained from all sorts of the repeated search effort
Received (February 16, 2018), Review Result (May 17, 2018), Accepted (May 29, 2018)
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
110 Copyright © 2018 SERSC Australia
[14]. The weight is not the maximum weight, but the weight is the result of the most optimal
calculation is proportional to the amount of time used. Genetic Algorithms work by using
probability theory [15][16]. The longer the algorithm works, the better the result will be.
However, the amount of time required to achieve optimal results will be longer [17].
Not much difference between Prim and Genetics algorithm. Determining a good
algorithm is a step that should be generated in decision making [18][19]. Both of these
algorithms find the smallest distance from a weighted graph [20]. Pattern recognition on
the graph can be done by determining the algorithm used [21]. The fundamental difference
is that the Prim algorithm can have branching while the Genetic algorithm does not allow
travel back to nodes that have been previously explored. This study will test how the ability
of both algorithms can compete in determining the shortest route of a graph and also the
minimum weight in the minimum spanning tree model. The fundamental difference
between the traveling salesman problem and the minimum spanning tree is the minimum
spanning tree; the problem is how to connect all the nodes with the least weight of the linked
edge of the interconnected. Branching from one node to several other nodes will be possible
to minimize cost. While in the traveling salesman problem, the main problem is how to
explore all the nodes on the graph with the smallest weights and back to the starting point.
The Prim algorithm has several options when selecting the next node while genetics does
not have that option. Genetics only expect opportunities from random numbers that appear.
Selection, crossover, and mutation are some processes that can increase the value of fitness
to the best.
Figure 1. Connected Weighted Graph
Figure 1 explains the graph can be solved with either the Prim or the Genetic algorithm.
There are seven interconnected nodes. Some opportunities can be created for each
algorithm. On the optimum route search, "V1" can go to "V2, V3, V4" but can not go to
"V5, V6, V7" because it has no direct relationship [22].
2. Related Works
2.1 Ansari Research
The Traveling Salesman Problem is an optimal route problem that must be solved in a
combinatorial way. For a small number of combination, this problem can be solved quickly
and maximally with brute-force [23][24][25][26]. But if the number of nodes used is very
large, there is no single algorithm that can calculate it maximally. Optimization aims to
determine the optimal route that can be obtained from the calculation algorithm. The TSP
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
Copyright © 2018 SERSC Australia 111
case simulates a salesman visiting every city and after the last city he has to return to his
hometown [27]. Traveling salesmen problem is a complex calculation. Several manual
techniques have been performed to determine the optimal route with conventional
techniques. Computational methods provide a better solution to this problem as it is largely
based on prior knowledge. The authors propose four optimization techniques presented
such as Ant Colony Cptimization (ACO), Genetic Algorithm (GA), hybrid technique of
Ant Colony Optimization (ACO) and Genetic Algorithm (GA) and hybrid technique of Ant
Colony Optimization (ACO) and Cuckoo Search (CS) algorithm is proposed and
implemented for travelling salesman problem. The result shows that shortest efficient tour
is obtained by new hybrid algorithm.
Table 1. Genetic Algorithm Result
Number of Cities Best Path Worst Path Average Path
15 158 245 163
20 231 299 239
25 1889 2132 1923
30 433 984 451
42 2114 2312 2121
50 542 1041 542
Table 2. Ant Colony Optimization Result
Number of Cities Best Path Worst Path Average Path
15 167 260 173
20 321 389 330
25 2113 2481 2186
30 543 887 602
42 2543 2865 2590
50 669 987 700
Table 3. Ant Colony Optimization - Genetic Algorithm Result
Number of Cities Best Path Worst Path Average Path
15 146 208 149
20 199 247 205
25 1430 1891 1441
30 402 480 411
42 1807 1903 1832
50 449 576 453
Table 4. Ant Colony Optimization - Cuckoo Search Result
Number of Cities Best Path Worst Path Average Path
15 158 249 161
20 229 290 229
25 1902 2117 1917
30 425 988 433
42 2032 2329 2061
50 538 981 540
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
112 Copyright © 2018 SERSC Australia
Table 5. Summary of Distance
Number of Cities GA ACO ACO-GA ACO-CS
15 158 167 146 158
20 231 321 199 229
25 1889 2113 1430 1902
30 433 543 402 425
42 2114 2543 1807 2032
50 542 669 449 538
Tables 1 through 5 are experimental results and a summary of the four algorithms.
Hybrid algorithms are developed by combining Ant Colony algorithms with Genetic
algorithm and Cuckoo search. It aims to improve the ability and produce better output.
According to test results, ACO-GA provides better results than GA and ACO-CS. All of
these techniques have tremendous prospects and application scope in science, engineering
and even in real-world optimization problems because of less computing time with
increased efficiency and optimization especially on traveling salesman problems.
2.2 Pepper Research
Some general optimization algorithms based on the demon algorithm of statistical
physics have been developed and tested on some traveling salesman problems with good
results [28][29]. The decision in determining the answer to the problem is significant to do
to determine the optimal results [30][31][32]. The authors undertook a computational study
of more than 11 heuristics based on annealing for mobile salesman problems. They encode
annealing simulation versions, threshold acceptance, record travel to record, and eight
heuristics based on a demon algorithm. The authors apply each heuristic to the 29 traveling
salesman problems taken from a well-known online library. The results are compared with
the accuracy and running time. It provides insight and advice for future work.
Table 6. Average Percent of the Optimal Solution
Performance SA TA RRT BD RBD AD RAD ABD RABD ADH ABDH
Saverage 2,76 5,37 4,22 5,26 4,33 3,24 2,82 2,65 2,63 2,97 2,69
Maverage 3,25 4,18 6,79 4,44 9,38 3,27 4,38 2,77 3,64 2,95 2,89
Laverage 3,7 9,95 13,96 7,73 13,59 10,4 10,94 9,15 4,13 9,19 8,52
Average 3,09 5,75 6,78 5,4 7,66 4,49 4,76 3,81 3,24 4,03 3,76
Running Time 33,33 41,86 33,81 53,83 24,67 58,11 47,81 35,83 29,47 61,75 36,61
Table 7 describes 29 that SA is the most accurate algorithm. This algorithm yields a
solution that is 3.09% above the optimal solution. Three demon algorithms do almost as
well as SA. RABD, ABDH and ABD yield solutions 3.24%, 3.76% and 3.81% above the
optimal solution. RBD and RRT have a poor performance with an average solution of
7.66% and 6.78% above the optimal solution. Average accuracy in the range of 3.1% to
3.8% for SA, RABD, ABDH, and ABD is proportional to the results on the same 29
problems. Over 29 instances, RBD has the shortest total operating time (24.67 hours),
followed by RABD (29.47 hours) and SA (33.33 hours). ADH has the longest running time
(61.75 hours).
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
Copyright © 2018 SERSC Australia 113
3. Result and Discussion
This section is testing the graph against both algorithms. This test involves six nodes
with different coordinate positions. The following table describes the coordinate position
of the nodes to be tested. Each node is interconnected to be able to calculate the traveling
salesman problem and minimum spanning tree.
Table 7. Coordinate Position
Coordinate X Y
0 90 29
1 46 76
2 80 118
3 150 40
4 99 73
5 140 105
Each node is calculated in distance to the other nodes. The following table is an
explanation of the distance between nodes.
Table 8. Distance between Nodes
0 1 2 3 4 5
0 0 64,38 89,56 61 44,91 90,97
1 64,38 0 54,04 110,05 53,08 98,37
2 89,56 54,04 0 104,8 48,85 61,39
3 61 110,05 104,8 0 60,75 65,76
4 44,91 53,08 48,85 60,75 0 52,01
5 90,97 98,37 61,39 65,76 52,01 0
The above values show the distance between nodes shown in the following figure.
Figure 2. Weighted Graph
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
114 Copyright © 2018 SERSC Australia
3.1 Genetic Algorithm
The following sections will test the six nodes using the Genetic algorithm. This algorithm
has several input parameters. These parameters are generation, population, crossover rate
and mutation rate. In testing the traveling salesman problem, the mutation rate variable is
not used because it avoids the same and repeated nodes in the population selection. Genetics
does not permit any recurring nodes in the route process.
The following example is the first experiment.
The parameters used are as follows:
Generation = 20
Population = 8
Crossover Rate = 0.8
Table 9. Initial Population
Population 1 0 5 1 2 4 3
Population 2 3 0 2 5 4 1
Population 3 3 1 2 4 5 0
Population 4 3 2 5 1 0 4
Population 5 5 2 1 0 4 3
Population 6 3 5 2 0 1 4
Population 7 5 1 3 0 2 4
Population 8 3 1 0 4 5 2
Population Distance Fitness
0 320 0,012345679
1 411 -0,1
2 401 ∞
3 411 -0,1
4 332 0,014492754
5 411 -0,1
6 332 0,014492754
7 401 ∞
Table 10. Population after Selection
Population 1 0 4 5 1 2 3
Population 2 1 0 4 2 3 5
Population 3 4 1 0 3 5 2
Population 4 1 0 4 2 3 5
Population 5 3 0 1 2 4 5
Population 6 1 0 4 2 3 5
Population 7 3 0 1 2 4 5
Population 8 4 1 0 3 5 2
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
Copyright © 2018 SERSC Australia 115
Table 11. Population after Mutation
Population 1 0 4 5 1 2 3
Population 2 2 0 1 4 3 5
Population 3 3 1 0 4 5 2
Population 4 2 0 1 4 3 5
Population 5 3 4 1 5 2 0
Population 6 2 0 1 4 3 5
Population 7 3 4 1 5 2 0
Population 8 3 1 0 4 5 2
Population Distance Fitness
0 320 0,012345679
1 408 -0,142857143
2 344 0,01754386
3 408 -0,142857143
4 323 0,012820513
5 408 -0,142857143
6 323 0,012820513
7 344 0,01754386
Table 12. Population after Elitism
Population 1 0 4 5 1 2 3
Population 2 2 0 1 4 3 5
Population 3 3 1 0 4 5 2
Population 4 2 0 1 4 3 5
Population 5 3 4 1 5 2 0
Population 6 2 0 1 4 3 5
Population 7 3 4 1 5 2 0
Population 8 3 1 0 4 5 2
The last generation shows the most optimum results for the whole generation and
population. It is visible from the displayed list. Population [0] is the best value of the five
populations. The route obtained is "0-4-5-1-2-3" which has a distance of 320 as shown in
the following figure.
Figure 3. First Test Optimal Route
The following example is the second experiment.
The parameters used are as follows:
Generation = 50
Population = 20
Crossover Rate = 0.5
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
116 Copyright © 2018 SERSC Australia
Table 13. Initial Population
Population 1 1 0 2 3 4 5
Population 2 4 1 0 5 3 2
Population 3 0 4 2 5 3 1
Population 4 1 4 5 0 2 3
Population 5 1 2 0 5 4 3
Population 6 2 0 1 5 4 3
Population 7 0 4 2 5 3 1
Population 8 3 0 5 1 2 4
Population 9 3 4 1 0 2 5
Population 10 3 0 4 2 5 1
Population 11 5 4 1 2 0 3
Population 12 2 0 4 3 5 1
Population 13 3 4 0 5 2 1
Population 14 4 0 1 2 3 5
Population 15 1 2 5 0 3 4
Population 16 1 3 5 2 4 0
Population 17 3 1 4 0 5 2
Population 18 1 0 5 3 4 2
Population 19 5 2 3 1 4 0
Population 20 0 4 5 2 1 3
Population Distance Fitness
0 318 0,012048193
1 415 -0,071428571
2 415 -0,071428571
3 397 0,25
4 397 0,25
5 346 0,018181818
6 346 0,018181818
7 348 0,018867925
8 400 1
9 346 0,018181818
10 402 -1
11 346 0,018181818
12 401 ∞
13 407 -0,166666667
14 407 -0,166666667
15 321 0,0125
16 415 -0,071428571
17 321 0,0125
18 383 0,055555556
19 397 0,25
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
Copyright © 2018 SERSC Australia 117
Table 14. Population after Selection
Population 1 3 2 1 4 5 0
Population 2 1 0 2 3 5 4
Population 3 1 0 2 3 5 4
Population 4 2 1 4 3 0 5
Population 5 2 1 4 3 0 5
Population 6 4 5 0 1 2 3
Population 7 4 5 0 1 2 3
Population 8 4 2 0 5 1 3
Population 9 2 3 0 1 5 4
Population 10 4 5 0 1 2 3
Population 11 2 5 0 3 1 4
Population 12 4 5 0 1 2 3
Population 13 2 0 3 4 5 1
Population 14 5 0 1 4 3 2
Population 15 5 0 1 4 3 2
Population 16 0 1 4 2 5 3
Population 17 1 0 2 3 5 4
Population 18 0 1 4 2 5 3
Population 19 0 4 1 5 3 2
Population 20 2 1 4 3 0 5
Table 15. Population after Mutation
Population 1 3 2 1 4 5 0
Population 2 3 1 5 2 0 4
Population 3 3 1 5 2 0 4
Population 4 2 1 0 3 4 5
Population 5 0 1 4 5 3 2
Population 6 5 4 0 2 1 3
Population 7 5 4 0 2 1 3
Population 8 4 2 0 3 1 5
Population 9 5 0 3 1 2 4
Population 10 5 4 0 2 1 3
Population 11 1 5 0 3 2 4
Population 12 5 4 0 2 1 3
Population 13 2 0 3 4 5 1
Population 14 0 4 1 5 3 2
Population 15 0 4 1 5 3 2
Population 16 4 1 3 2 0 5
Population 17 3 1 5 2 0 4
Population 18 4 1 3 2 0 5
Population 19 0 3 4 5 1 2
Population 20 0 1 4 5 3 2
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
118 Copyright © 2018 SERSC Australia
Population Distance Fitness
0 318 0,012048193
1 350 0,019607843
2 350 0,019607843
3 399 0,5
4 383 0,055555556
5 344 0,01754386
6 344 0,01754386
7 404 -0,333333333
8 404 -0,333333333
9 344 0,01754386
10 404 -0,333333333
11 344 0,01754386
12 401 ∞
13 383 0,055555556
14 383 0,055555556
15 412 -0,090909091
16 350 0,019607843
17 412 -0,090909091
18 377 0,041666667
19 383 0,055555556
Table 16. Population after Elitism
Population 1 3 2 1 4 5 0
Population 2 3 1 5 2 0 4
Population 3 3 1 5 2 0 4
Population 4 2 1 0 3 4 5
Population 5 0 1 4 5 3 2
Population 6 5 4 0 2 1 3
Population 7 5 4 0 2 1 3
Population 8 4 2 0 3 1 5
Population 9 5 0 3 1 2 4
Population 10 5 4 0 2 1 3
Population 11 1 5 0 3 2 4
Population 12 5 4 0 2 1 3
Population 13 2 0 3 4 5 1
Population 14 0 4 1 5 3 2
Population 15 0 4 1 5 3 2
Population 16 4 1 3 2 0 5
Population 17 3 1 5 2 0 4
Population 18 4 1 3 2 0 5
Population 19 0 3 4 5 1 2
Population 20 0 1 4 5 3 2
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
Copyright © 2018 SERSC Australia 119
The last generation shows the most optimum results for the whole generation and
population. It is visible from the displayed list. Population [0] is the best value of the five
populations. The route obtained is "3-2-1-4-5-0" which has a distance of 318 as shown in
the following figure.
Figure 4. Second Test Optimal Route
After undergoing both tests, the final test result produces a more optimal value than
before. In the first experiment, the optimal value obtained was 320 while in the second
experiment, the optimal value increased by 2 points ie 318. This states that the more
generations and populations applied to the Genetic algorithm, the better the results obtained.
3.2 Prim
This algorithm works greedily. If there are several nodes as an alternative, then the
selected node is the shortest node from the beginning.
Table 17. Distance of each Node
N0 N1 N2 N3 N4 N5
N0 0 64,38 89,56 61 44,91 90,97
N1 64,38 0 54,04 110,05 53,08 98,37
N2 89,56 54,04 0 104,8 48,85 61,39
N3 61 110,05 104,8 0 60,75 65,76
N4 44,91 53,08 48,85 60,75 0 52,01
N5 90,97 98,37 61,39 65,76 52,01 0
The following table is the result of the calculation of Prim algorithm. The trip was made
from N0 to N5. At N0, five possible nodes are eligible for the next destination. Node length
will be compared. It selects the shortest distance.
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
120 Copyright © 2018 SERSC Australia
Table 18. Prim Result
N0 0
N1 63.38
44.91 N4
N2 89.56
N3 61
N4 44.91
N5 90.97
N4 0
N1 53.08
48.85 N2
N2 48.85
N3 60.75
N5 52.01
N2 0
N1 54.04
54.04 N4N3 104.8
N5 61.39
N4 0
N1 53.08
53.08 N1N3 60.75
N5 98.37
N1 0
N3 110.05
98.37 N4
N5 98.37
N4 0
N3 60.75
52.01 N5
N5 52.01
N5 0 N3 65.76 65.76 N4
N4 0 N3 60.75 60.75 N3
The result of the prime calculation states that the route obtained is "N0-N4-N2-N4-N1-
N4-N5-N4-N3". The journey will return to the "N4" node because the journey from N4 to
the other node has fewer weights than the other nodes. The following figure is the result of
graph formation based on the results obtained in the previous calculation.
Figure 5. Route of Prim Algorithm Test
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
Copyright © 2018 SERSC Australia 121
4. Conclusion
Prim and Genetics have their respective advantages and disadvantages. Both of these
algorithms aim to find the smallest weights. The use of Genetic algorithms aims to explore
the entire node without returning to previously browsed nodes. Prim aims to connect the
entire node based on existing connections. Both of these algorithms can work together to
optimize the routes used and applied into the real world. These algorithms have a perfect
role for technological advancement.
References
[1] S. Aryza, M. Irwanto, Z. Lubis, A. P. U. Siahaan, R. Rahim and M. Furqan, “A Novelty Design of
Minimization of Electrical Losses in A Vector Controlled Induction Machine Drive”, IOP Conference
Series: Materials Science and Engineering, vol. 300, (2018), no. 1.
[2] M. Iqbal, A. P. U. Siahaan, N. E. Purba and D. Purwanto, “Prim’s Algorithm for Optimizing Fiber Optic
Trajectory Planning”, Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, (2017), pp. 504-509.
[3] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers”.
[4] V. Tasril, M. B. Ginting, Mardiana and A. P. U. Siahaan, “Threats of Computer System and its
Prevention”, Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, (2017), pp. 448-451.
[5] R. D. Sari, Supiyandi, A. P. U. Siahaan, M. Muttaqin and R. B. Ginting, “A Review of IP and MAC
Address Filtering in Wireless Network Security”, Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, pp. 470-473,
(2017).
[6] D. Kurnia, H. Dafitri, M. Sugianto and A. P. U. Siahaan, “RSA 32-bit Implementation Technique”, Int. J.
Recent Trends Eng. Res., vol. 3, no. 7, (2017) July, pp. 279-284.
[7] A. P. U. Siahaan, “Rail Fence Cryptography in Securing Information”.
[8] R. Rahim, “Searching Process with Raita Algorithm and its Application”, J. Phys. Conf. Ser., vol. 1007,
no. 1, (2018), pp. 1-7.
[9] A. P. U. Siahaan and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm”, Int. J.
Secur. Its Appl., vol. 10, no. 8, (2016) August, pp. 173-180.
[10] R. Rahim, “Combination Base64 Algorithm and EOF Technique for Steganography”, J. Phys. Conf. Ser.,
vol. 1007, no. 1, pp. 1-5, (2018).
[11] R. F. Wijaya, Y. M. Tondang and A. P. U. Siahaan, “Take Off and Landing Prediction using Fuzzy Logic”,
Int. J. Recent Trends Eng. Res., vol. 2, no. 12, (2016), pp. 127-134.
[12] S. Supiyandi, M. I. Perangin-angin, A. H. Lubis, A. Ikhwan, Mesran and A. P. U. Siahaan, “Association
Rules Analysis on FP-Growth Method in Predicting Sales”, Int. J. Recent Trends Eng. Res., vol. 3, no. 10,
(2017), pp. 58-65.
[13] M. Iswan Perangin-angin, Khairul and A. P. U. Siahaan, “Fuzzy Logic Concept in Technology, Society,
and Economy Areas in Predicting Smart City”, Int. J. Recent Trends Eng. Res., vol. 2, no. 12, (2016), pp.
176-181.
[14] S. Hartanto, M. Furqan, A. P. U. Siahaan and W. Fitriani, “Haversine Method in Looking for the Nearest
Masjid”, Int. J. Recent Trends Eng. Res., vol. 3, no. 8, (2017) August, pp. 187-195.
[15] A. P. U. Siahaan, “Genetic Algorithm in Hill Cipher Encryption”, Am. Int. J. Res. Sci. Technol. Eng.
Math., vol. 15, no. 1, (2016), pp. 84-89.
[16] A. P. U. Siahaan, “Adjustable Knapsack in Travelling Salesman Problem Using Genetic Process”. Int. J.
Sci. Technoledge, vol. 4, no. 9, (2016), pp. 46-55.
[17] A. P. U. Siahaan, “Scheduling Courses using Genetic Algorithms”, Int. J. Comput. Appl., vol. 153, no. 3,
(2016), pp. 20-25.
[18] I. Sumartono, D. Arisandi, A. P. U. Siahaan and Mesran, “Expert System of Catfish Disease Determinants
Using Certainty Factor Method”, Int. J. Recent Trends Eng. Res., vol. 3, no. 8, (2017) August, pp. 202-
209.
[19] A. P. U. Siahaan and W. Fitriani, “A Simple Comparison Between WEKA and Salford System in Data
Mining Software”.
[20] Z. Ramadhan, “Perbandingan Algoritma Prim dan Algoritma Floyd-Warshall dalam Menentukan Lintasan
Terpendek (Shortest Path Problem)”, Universitas Sumatera Utara, (2016).
[21] R. Meiyanti, A. Subandi, N. Fuqara, M. A. Budiman and A. P. U. Siahaan, “The Recognition of Female
Voice Based on Voice Registers in Singing Techniques in Real-Time using Hankel Transform Method
and Macdonald Function”, J. Phys. Conf. Ser., vol. 978, no. 1, (2018), pp. 1-6.
[22] A. Bloomfield, “Program and Data Representation”, 2018. [Online]. Available:
https://aaronbloomfield.github.io/pdr/slides/11-graphs.html?print-pdf#/cover. [Accessed: 21-May-2018].
[23] M. Iqbal, M. A. S. Pane and A. P. U. Siahaan, “SMS Encryption Using One-Time Pad Cipher”, IOSR J.
Comput. Eng., vol. 18, no. 6, (2016), pp. 54-58.
[24] A. P. U. Siahaan, “High Complexity Bit-Plane Security Enchancement in BPCS Steganography”, Int. J.
Comput. Appl., vol. 148, no. 3, (2016), pp. 17-22.
International Journal of Control and Automation
Vol. 11, No. 6 (2018)
122 Copyright © 2018 SERSC Australia
[25] A. P. U. Siahaan, “Securing Short Message ServiceUsing Vernam Cipher in Android Operating System”,
IOSR, (2016) April.
[26] W. Fitriani, R. Rahim, B. Oktaviana and A. P. U. Siahaan, “Vernam Encypted Text in End of File Hiding
Steganography Technique”, Int. J. Recent Trends Eng. Res., vol. 3, no. 7, (2017) July, pp. 214-219.
[27] A. Q. Ansari, Ibraheem and S. Katiyar, “Comparison and analysis of solving travelling salesman problem
using GA, ACO and hybrid of ACO with GA and CS”, 2015 IEEE Workshop on Computational
Intelligence: Theories, Applications and Future Directions (WCI), (2015), pp. 1-5.
[28] Z. Sitorus and A. P. U. Siahaan, “Heuristic Programming in Scheduling Problem Using A* Algorithm”,
IOSR J. Comput. Eng., vol. 18, no. 5, (2016), pp. 71-79.
[29] A. P. U. Siahaan, “Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem”,
IOSR J. Comput. Eng., vol. 18, no. 05, (2016) May, pp. 39-48.
[30] A. P. U. Siahaan, “Determination of Thesis Preceptor and Examiner Based on Specification of Teaching
Using Fuzzy Logic”.
[31] Z. Tharo and A. P. U. Siahaan, “Profile Matching in Solving Rank Problem”, IOSR J. Electron. Commun.
Eng., vol. 11, no. 05, (2016) May, pp. 73-76.
[32] H. A. Hasibuan, R. B. Purba and A. P. U. Siahaan, “Productivity Assessment (Performance, Motivation,
and Job Training) using Profile Matching”, Int. J. Econ. Manag. Stud., vol. 3, no. 6, (2016), pp. 73-77.

More Related Content

What's hot

Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...eSAT Journals
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicIRJET Journal
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...Cemal Ardil
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Kashif Mehmood
 
Tap changer optimisation using embedded differential evolutionary programming...
Tap changer optimisation using embedded differential evolutionary programming...Tap changer optimisation using embedded differential evolutionary programming...
Tap changer optimisation using embedded differential evolutionary programming...journalBEEI
 
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...Dr. Amarjeet Singh
 
IJCSI-2015-12-2-10138 (1) (2)
IJCSI-2015-12-2-10138 (1) (2)IJCSI-2015-12-2-10138 (1) (2)
IJCSI-2015-12-2-10138 (1) (2)Dr Muhannad Al-Hasan
 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...IAEME Publication
 
A Genetic Algorithm Based Approach for Solving Optimal Power Flow Problem
A Genetic Algorithm Based Approach for Solving Optimal Power Flow ProblemA Genetic Algorithm Based Approach for Solving Optimal Power Flow Problem
A Genetic Algorithm Based Approach for Solving Optimal Power Flow ProblemShubhashis Shil
 
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...IJERA Editor
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andeSAT Publishing House
 
Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...
Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...
Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...IJECEIAES
 
LOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATION
LOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATIONLOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATION
LOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATIONorajjournal
 
Artificial Intelligence based optimization of weld bead geometry in laser wel...
Artificial Intelligence based optimization of weld bead geometry in laser wel...Artificial Intelligence based optimization of weld bead geometry in laser wel...
Artificial Intelligence based optimization of weld bead geometry in laser wel...IJMER
 
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...csandit
 
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...csandit
 

What's hot (19)

Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
 
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
A weighted-sum-technique-for-the-joint-optimization-of-performance-and-power-...
 
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
Short Term Load Forecasting Using Bootstrap Aggregating Based Ensemble Artifi...
 
Tap changer optimisation using embedded differential evolutionary programming...
Tap changer optimisation using embedded differential evolutionary programming...Tap changer optimisation using embedded differential evolutionary programming...
Tap changer optimisation using embedded differential evolutionary programming...
 
Ijsea04031014
Ijsea04031014Ijsea04031014
Ijsea04031014
 
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
 
40620130101004
4062013010100440620130101004
40620130101004
 
IJCSI-2015-12-2-10138 (1) (2)
IJCSI-2015-12-2-10138 (1) (2)IJCSI-2015-12-2-10138 (1) (2)
IJCSI-2015-12-2-10138 (1) (2)
 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
 
A Genetic Algorithm Based Approach for Solving Optimal Power Flow Problem
A Genetic Algorithm Based Approach for Solving Optimal Power Flow ProblemA Genetic Algorithm Based Approach for Solving Optimal Power Flow Problem
A Genetic Algorithm Based Approach for Solving Optimal Power Flow Problem
 
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
Cost Aware Expansion Planning with Renewable DGs using Particle Swarm Optimiz...
 
C013141723
C013141723C013141723
C013141723
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 
Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...
Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...
Coordinated Placement and Setting of FACTS in Electrical Network based on Kal...
 
LOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATION
LOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATIONLOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATION
LOGNORMAL ORDINARY KRIGING METAMODEL IN SIMULATION OPTIMIZATION
 
Artificial Intelligence based optimization of weld bead geometry in laser wel...
Artificial Intelligence based optimization of weld bead geometry in laser wel...Artificial Intelligence based optimization of weld bead geometry in laser wel...
Artificial Intelligence based optimization of weld bead geometry in laser wel...
 
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...
AUTOMATIC GENERATION AND OPTIMIZATION OF TEST DATA USING HARMONY SEARCH ALGOR...
 
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...
COMPARING THE CUCKOO ALGORITHM WITH OTHER ALGORITHMS FOR ESTIMATING TWO GLSD ...
 

Similar to Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph

Comparative study of optimization algorithms on convolutional network for aut...
Comparative study of optimization algorithms on convolutional network for aut...Comparative study of optimization algorithms on convolutional network for aut...
Comparative study of optimization algorithms on convolutional network for aut...IJECEIAES
 
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...IRJET Journal
 
Job Scheduling on the Grid Environment using Max-Min Firefly Algorithm
Job Scheduling on the Grid Environment using Max-Min  Firefly AlgorithmJob Scheduling on the Grid Environment using Max-Min  Firefly Algorithm
Job Scheduling on the Grid Environment using Max-Min Firefly AlgorithmEditor IJCATR
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...csandit
 
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...Editor IJCATR
 
Optimal tuning proportional integral derivative controller on direct current ...
Optimal tuning proportional integral derivative controller on direct current ...Optimal tuning proportional integral derivative controller on direct current ...
Optimal tuning proportional integral derivative controller on direct current ...IJECEIAES
 
Efficient evaluation of flatness error from Coordinate Measurement Data using...
Efficient evaluation of flatness error from Coordinate Measurement Data using...Efficient evaluation of flatness error from Coordinate Measurement Data using...
Efficient evaluation of flatness error from Coordinate Measurement Data using...Ali Shahed
 
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNINGTRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNINGIRJET Journal
 
Path Optimization for Mobile Robot Using Genetic Algorithm
Path Optimization for Mobile Robot Using Genetic AlgorithmPath Optimization for Mobile Robot Using Genetic Algorithm
Path Optimization for Mobile Robot Using Genetic AlgorithmIRJET Journal
 
IRJET- Advanced Waypoints Analytics for Automated Drones
IRJET- Advanced Waypoints Analytics for Automated DronesIRJET- Advanced Waypoints Analytics for Automated Drones
IRJET- Advanced Waypoints Analytics for Automated DronesIRJET Journal
 
Machine Learning Based Traffic Volume Count Prediction
Machine Learning Based Traffic Volume Count PredictionMachine Learning Based Traffic Volume Count Prediction
Machine Learning Based Traffic Volume Count PredictionIRJET Journal
 
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...IOSR Journals
 
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONSAPPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONSVLSICS Design
 
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONSAPPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONSVLSICS Design
 
Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...TELKOMNIKA JOURNAL
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmIJMIT JOURNAL
 
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...IJCSIS Research Publications
 
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...TELKOMNIKA JOURNAL
 
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...ijmnct
 

Similar to Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph (20)

Comparative study of optimization algorithms on convolutional network for aut...
Comparative study of optimization algorithms on convolutional network for aut...Comparative study of optimization algorithms on convolutional network for aut...
Comparative study of optimization algorithms on convolutional network for aut...
 
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
 
Job Scheduling on the Grid Environment using Max-Min Firefly Algorithm
Job Scheduling on the Grid Environment using Max-Min  Firefly AlgorithmJob Scheduling on the Grid Environment using Max-Min  Firefly Algorithm
Job Scheduling on the Grid Environment using Max-Min Firefly Algorithm
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
 
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
 
Optimal tuning proportional integral derivative controller on direct current ...
Optimal tuning proportional integral derivative controller on direct current ...Optimal tuning proportional integral derivative controller on direct current ...
Optimal tuning proportional integral derivative controller on direct current ...
 
Efficient evaluation of flatness error from Coordinate Measurement Data using...
Efficient evaluation of flatness error from Coordinate Measurement Data using...Efficient evaluation of flatness error from Coordinate Measurement Data using...
Efficient evaluation of flatness error from Coordinate Measurement Data using...
 
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNINGTRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
TRAFFIC FORECAST FOR INTELLECTUAL TRANSPORTATION SYSTEM USING MACHINE LEARNING
 
Path Optimization for Mobile Robot Using Genetic Algorithm
Path Optimization for Mobile Robot Using Genetic AlgorithmPath Optimization for Mobile Robot Using Genetic Algorithm
Path Optimization for Mobile Robot Using Genetic Algorithm
 
Route optimization via improved ant colony algorithm with graph network
Route optimization via improved ant colony algorithm with  graph networkRoute optimization via improved ant colony algorithm with  graph network
Route optimization via improved ant colony algorithm with graph network
 
IRJET- Advanced Waypoints Analytics for Automated Drones
IRJET- Advanced Waypoints Analytics for Automated DronesIRJET- Advanced Waypoints Analytics for Automated Drones
IRJET- Advanced Waypoints Analytics for Automated Drones
 
Machine Learning Based Traffic Volume Count Prediction
Machine Learning Based Traffic Volume Count PredictionMachine Learning Based Traffic Volume Count Prediction
Machine Learning Based Traffic Volume Count Prediction
 
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...
 
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONSAPPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
 
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONSAPPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
APPROXIMATE ARITHMETIC CIRCUIT DESIGN FOR ERROR RESILIENT APPLICATIONS
 
Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithm
 
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
Parallel Evolutionary Algorithms for Feature Selection in High Dimensional Da...
 
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in...
 
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
SOLVING OPTIMAL COMPONENTS ASSIGNMENT PROBLEM FOR A MULTISTATE NETWORK USING ...
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmUniversitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp Algorithm
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...SeĂĄn Kennedy
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)lakshayb543
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
Visit to a blind student's school🧑‍🩯🧑‍🩯(community medicine)
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph

  • 1. International Journal of Control and Automation Vol. 11, No. 6 (2018), pp.109-122 http//dx.doi.org/10.14257/ijca.2018.11.6.11 ISSN: 2005-4297 IJCA Copyright © 2018 SERSC Australia Prim and GeneticAlgorithms Performance in Determining Optimum Route on Graph 1 Andysah Putera Utama Siahaan1,4* , Rusiadi2 , Phak Len Eh Kan3 , Ku Nurul Fazira Ku Azir3 and Amiza Amir3 1 Faculty of Science and Technology, Universitas Pembangunan Panca Budi, Medan, Indonesia 2 Faculty of Social Science, Universitas Pembangunan Panca Budi, Medan, Indonesia 3 School of Computer & Communication Engineering, Universiti Malaysia Perlis, Perlis, Malaysia 4 Postgraduate of School of Computer & Communication Engineering, Universiti Malaysia Perlis, Perlis, Malaysia andiesiahaan@gmail.com, rusiadi@dosen.pancabudi.ac.id, phaklen@unimap.edu.my, fazira@unimap.edu.my, amizaamir@unimap.edu.my Abstract Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices. Keyword: Artificial Intelligent, Prim, Genetic Algorithm, MST, Shortest Path 1. Introduction The need for electrical resources is very rapidly growing mainly in the field of network [1]. One of the examples is the installation of fiber optic cable [2]. These expensive cables need to be appropriately calculated and optimally to avoid excessive use of costs. The use of minimal weight can speed up data transmission and improve security [3][4][5][6][7]and comfort [8][9][10]. The minimum spanning tree algorithm can calculate optimal cable usage. Optimization is a significant thing to achieve. It relates to the use of operational costs. Speaking of optimization, this is a fuzzy thing [11][12][13]. By doing the optimization, some essential parts can be saved and minimized. Prim and Genetic algorithms have the same function. These algorithms aim to optimize a given weight. The optimal weight is the ultimate weight obtained from all sorts of the repeated search effort Received (February 16, 2018), Review Result (May 17, 2018), Accepted (May 29, 2018)
  • 2. International Journal of Control and Automation Vol. 11, No. 6 (2018) 110 Copyright © 2018 SERSC Australia [14]. The weight is not the maximum weight, but the weight is the result of the most optimal calculation is proportional to the amount of time used. Genetic Algorithms work by using probability theory [15][16]. The longer the algorithm works, the better the result will be. However, the amount of time required to achieve optimal results will be longer [17]. Not much difference between Prim and Genetics algorithm. Determining a good algorithm is a step that should be generated in decision making [18][19]. Both of these algorithms find the smallest distance from a weighted graph [20]. Pattern recognition on the graph can be done by determining the algorithm used [21]. The fundamental difference is that the Prim algorithm can have branching while the Genetic algorithm does not allow travel back to nodes that have been previously explored. This study will test how the ability of both algorithms can compete in determining the shortest route of a graph and also the minimum weight in the minimum spanning tree model. The fundamental difference between the traveling salesman problem and the minimum spanning tree is the minimum spanning tree; the problem is how to connect all the nodes with the least weight of the linked edge of the interconnected. Branching from one node to several other nodes will be possible to minimize cost. While in the traveling salesman problem, the main problem is how to explore all the nodes on the graph with the smallest weights and back to the starting point. The Prim algorithm has several options when selecting the next node while genetics does not have that option. Genetics only expect opportunities from random numbers that appear. Selection, crossover, and mutation are some processes that can increase the value of fitness to the best. Figure 1. Connected Weighted Graph Figure 1 explains the graph can be solved with either the Prim or the Genetic algorithm. There are seven interconnected nodes. Some opportunities can be created for each algorithm. On the optimum route search, "V1" can go to "V2, V3, V4" but can not go to "V5, V6, V7" because it has no direct relationship [22]. 2. Related Works 2.1 Ansari Research The Traveling Salesman Problem is an optimal route problem that must be solved in a combinatorial way. For a small number of combination, this problem can be solved quickly and maximally with brute-force [23][24][25][26]. But if the number of nodes used is very large, there is no single algorithm that can calculate it maximally. Optimization aims to determine the optimal route that can be obtained from the calculation algorithm. The TSP
  • 3. International Journal of Control and Automation Vol. 11, No. 6 (2018) Copyright © 2018 SERSC Australia 111 case simulates a salesman visiting every city and after the last city he has to return to his hometown [27]. Traveling salesmen problem is a complex calculation. Several manual techniques have been performed to determine the optimal route with conventional techniques. Computational methods provide a better solution to this problem as it is largely based on prior knowledge. The authors propose four optimization techniques presented such as Ant Colony Cptimization (ACO), Genetic Algorithm (GA), hybrid technique of Ant Colony Optimization (ACO) and Genetic Algorithm (GA) and hybrid technique of Ant Colony Optimization (ACO) and Cuckoo Search (CS) algorithm is proposed and implemented for travelling salesman problem. The result shows that shortest efficient tour is obtained by new hybrid algorithm. Table 1. Genetic Algorithm Result Number of Cities Best Path Worst Path Average Path 15 158 245 163 20 231 299 239 25 1889 2132 1923 30 433 984 451 42 2114 2312 2121 50 542 1041 542 Table 2. Ant Colony Optimization Result Number of Cities Best Path Worst Path Average Path 15 167 260 173 20 321 389 330 25 2113 2481 2186 30 543 887 602 42 2543 2865 2590 50 669 987 700 Table 3. Ant Colony Optimization - Genetic Algorithm Result Number of Cities Best Path Worst Path Average Path 15 146 208 149 20 199 247 205 25 1430 1891 1441 30 402 480 411 42 1807 1903 1832 50 449 576 453 Table 4. Ant Colony Optimization - Cuckoo Search Result Number of Cities Best Path Worst Path Average Path 15 158 249 161 20 229 290 229 25 1902 2117 1917 30 425 988 433 42 2032 2329 2061 50 538 981 540
  • 4. International Journal of Control and Automation Vol. 11, No. 6 (2018) 112 Copyright © 2018 SERSC Australia Table 5. Summary of Distance Number of Cities GA ACO ACO-GA ACO-CS 15 158 167 146 158 20 231 321 199 229 25 1889 2113 1430 1902 30 433 543 402 425 42 2114 2543 1807 2032 50 542 669 449 538 Tables 1 through 5 are experimental results and a summary of the four algorithms. Hybrid algorithms are developed by combining Ant Colony algorithms with Genetic algorithm and Cuckoo search. It aims to improve the ability and produce better output. According to test results, ACO-GA provides better results than GA and ACO-CS. All of these techniques have tremendous prospects and application scope in science, engineering and even in real-world optimization problems because of less computing time with increased efficiency and optimization especially on traveling salesman problems. 2.2 Pepper Research Some general optimization algorithms based on the demon algorithm of statistical physics have been developed and tested on some traveling salesman problems with good results [28][29]. The decision in determining the answer to the problem is significant to do to determine the optimal results [30][31][32]. The authors undertook a computational study of more than 11 heuristics based on annealing for mobile salesman problems. They encode annealing simulation versions, threshold acceptance, record travel to record, and eight heuristics based on a demon algorithm. The authors apply each heuristic to the 29 traveling salesman problems taken from a well-known online library. The results are compared with the accuracy and running time. It provides insight and advice for future work. Table 6. Average Percent of the Optimal Solution Performance SA TA RRT BD RBD AD RAD ABD RABD ADH ABDH Saverage 2,76 5,37 4,22 5,26 4,33 3,24 2,82 2,65 2,63 2,97 2,69 Maverage 3,25 4,18 6,79 4,44 9,38 3,27 4,38 2,77 3,64 2,95 2,89 Laverage 3,7 9,95 13,96 7,73 13,59 10,4 10,94 9,15 4,13 9,19 8,52 Average 3,09 5,75 6,78 5,4 7,66 4,49 4,76 3,81 3,24 4,03 3,76 Running Time 33,33 41,86 33,81 53,83 24,67 58,11 47,81 35,83 29,47 61,75 36,61 Table 7 describes 29 that SA is the most accurate algorithm. This algorithm yields a solution that is 3.09% above the optimal solution. Three demon algorithms do almost as well as SA. RABD, ABDH and ABD yield solutions 3.24%, 3.76% and 3.81% above the optimal solution. RBD and RRT have a poor performance with an average solution of 7.66% and 6.78% above the optimal solution. Average accuracy in the range of 3.1% to 3.8% for SA, RABD, ABDH, and ABD is proportional to the results on the same 29 problems. Over 29 instances, RBD has the shortest total operating time (24.67 hours), followed by RABD (29.47 hours) and SA (33.33 hours). ADH has the longest running time (61.75 hours).
  • 5. International Journal of Control and Automation Vol. 11, No. 6 (2018) Copyright © 2018 SERSC Australia 113 3. Result and Discussion This section is testing the graph against both algorithms. This test involves six nodes with different coordinate positions. The following table describes the coordinate position of the nodes to be tested. Each node is interconnected to be able to calculate the traveling salesman problem and minimum spanning tree. Table 7. Coordinate Position Coordinate X Y 0 90 29 1 46 76 2 80 118 3 150 40 4 99 73 5 140 105 Each node is calculated in distance to the other nodes. The following table is an explanation of the distance between nodes. Table 8. Distance between Nodes 0 1 2 3 4 5 0 0 64,38 89,56 61 44,91 90,97 1 64,38 0 54,04 110,05 53,08 98,37 2 89,56 54,04 0 104,8 48,85 61,39 3 61 110,05 104,8 0 60,75 65,76 4 44,91 53,08 48,85 60,75 0 52,01 5 90,97 98,37 61,39 65,76 52,01 0 The above values show the distance between nodes shown in the following figure. Figure 2. Weighted Graph
  • 6. International Journal of Control and Automation Vol. 11, No. 6 (2018) 114 Copyright © 2018 SERSC Australia 3.1 Genetic Algorithm The following sections will test the six nodes using the Genetic algorithm. This algorithm has several input parameters. These parameters are generation, population, crossover rate and mutation rate. In testing the traveling salesman problem, the mutation rate variable is not used because it avoids the same and repeated nodes in the population selection. Genetics does not permit any recurring nodes in the route process. The following example is the first experiment. The parameters used are as follows: Generation = 20 Population = 8 Crossover Rate = 0.8 Table 9. Initial Population Population 1 0 5 1 2 4 3 Population 2 3 0 2 5 4 1 Population 3 3 1 2 4 5 0 Population 4 3 2 5 1 0 4 Population 5 5 2 1 0 4 3 Population 6 3 5 2 0 1 4 Population 7 5 1 3 0 2 4 Population 8 3 1 0 4 5 2 Population Distance Fitness 0 320 0,012345679 1 411 -0,1 2 401 ∞ 3 411 -0,1 4 332 0,014492754 5 411 -0,1 6 332 0,014492754 7 401 ∞ Table 10. Population after Selection Population 1 0 4 5 1 2 3 Population 2 1 0 4 2 3 5 Population 3 4 1 0 3 5 2 Population 4 1 0 4 2 3 5 Population 5 3 0 1 2 4 5 Population 6 1 0 4 2 3 5 Population 7 3 0 1 2 4 5 Population 8 4 1 0 3 5 2
  • 7. International Journal of Control and Automation Vol. 11, No. 6 (2018) Copyright © 2018 SERSC Australia 115 Table 11. Population after Mutation Population 1 0 4 5 1 2 3 Population 2 2 0 1 4 3 5 Population 3 3 1 0 4 5 2 Population 4 2 0 1 4 3 5 Population 5 3 4 1 5 2 0 Population 6 2 0 1 4 3 5 Population 7 3 4 1 5 2 0 Population 8 3 1 0 4 5 2 Population Distance Fitness 0 320 0,012345679 1 408 -0,142857143 2 344 0,01754386 3 408 -0,142857143 4 323 0,012820513 5 408 -0,142857143 6 323 0,012820513 7 344 0,01754386 Table 12. Population after Elitism Population 1 0 4 5 1 2 3 Population 2 2 0 1 4 3 5 Population 3 3 1 0 4 5 2 Population 4 2 0 1 4 3 5 Population 5 3 4 1 5 2 0 Population 6 2 0 1 4 3 5 Population 7 3 4 1 5 2 0 Population 8 3 1 0 4 5 2 The last generation shows the most optimum results for the whole generation and population. It is visible from the displayed list. Population [0] is the best value of the five populations. The route obtained is "0-4-5-1-2-3" which has a distance of 320 as shown in the following figure. Figure 3. First Test Optimal Route The following example is the second experiment. The parameters used are as follows: Generation = 50 Population = 20 Crossover Rate = 0.5
  • 8. International Journal of Control and Automation Vol. 11, No. 6 (2018) 116 Copyright © 2018 SERSC Australia Table 13. Initial Population Population 1 1 0 2 3 4 5 Population 2 4 1 0 5 3 2 Population 3 0 4 2 5 3 1 Population 4 1 4 5 0 2 3 Population 5 1 2 0 5 4 3 Population 6 2 0 1 5 4 3 Population 7 0 4 2 5 3 1 Population 8 3 0 5 1 2 4 Population 9 3 4 1 0 2 5 Population 10 3 0 4 2 5 1 Population 11 5 4 1 2 0 3 Population 12 2 0 4 3 5 1 Population 13 3 4 0 5 2 1 Population 14 4 0 1 2 3 5 Population 15 1 2 5 0 3 4 Population 16 1 3 5 2 4 0 Population 17 3 1 4 0 5 2 Population 18 1 0 5 3 4 2 Population 19 5 2 3 1 4 0 Population 20 0 4 5 2 1 3 Population Distance Fitness 0 318 0,012048193 1 415 -0,071428571 2 415 -0,071428571 3 397 0,25 4 397 0,25 5 346 0,018181818 6 346 0,018181818 7 348 0,018867925 8 400 1 9 346 0,018181818 10 402 -1 11 346 0,018181818 12 401 ∞ 13 407 -0,166666667 14 407 -0,166666667 15 321 0,0125 16 415 -0,071428571 17 321 0,0125 18 383 0,055555556 19 397 0,25
  • 9. International Journal of Control and Automation Vol. 11, No. 6 (2018) Copyright © 2018 SERSC Australia 117 Table 14. Population after Selection Population 1 3 2 1 4 5 0 Population 2 1 0 2 3 5 4 Population 3 1 0 2 3 5 4 Population 4 2 1 4 3 0 5 Population 5 2 1 4 3 0 5 Population 6 4 5 0 1 2 3 Population 7 4 5 0 1 2 3 Population 8 4 2 0 5 1 3 Population 9 2 3 0 1 5 4 Population 10 4 5 0 1 2 3 Population 11 2 5 0 3 1 4 Population 12 4 5 0 1 2 3 Population 13 2 0 3 4 5 1 Population 14 5 0 1 4 3 2 Population 15 5 0 1 4 3 2 Population 16 0 1 4 2 5 3 Population 17 1 0 2 3 5 4 Population 18 0 1 4 2 5 3 Population 19 0 4 1 5 3 2 Population 20 2 1 4 3 0 5 Table 15. Population after Mutation Population 1 3 2 1 4 5 0 Population 2 3 1 5 2 0 4 Population 3 3 1 5 2 0 4 Population 4 2 1 0 3 4 5 Population 5 0 1 4 5 3 2 Population 6 5 4 0 2 1 3 Population 7 5 4 0 2 1 3 Population 8 4 2 0 3 1 5 Population 9 5 0 3 1 2 4 Population 10 5 4 0 2 1 3 Population 11 1 5 0 3 2 4 Population 12 5 4 0 2 1 3 Population 13 2 0 3 4 5 1 Population 14 0 4 1 5 3 2 Population 15 0 4 1 5 3 2 Population 16 4 1 3 2 0 5 Population 17 3 1 5 2 0 4 Population 18 4 1 3 2 0 5 Population 19 0 3 4 5 1 2 Population 20 0 1 4 5 3 2
  • 10. International Journal of Control and Automation Vol. 11, No. 6 (2018) 118 Copyright © 2018 SERSC Australia Population Distance Fitness 0 318 0,012048193 1 350 0,019607843 2 350 0,019607843 3 399 0,5 4 383 0,055555556 5 344 0,01754386 6 344 0,01754386 7 404 -0,333333333 8 404 -0,333333333 9 344 0,01754386 10 404 -0,333333333 11 344 0,01754386 12 401 ∞ 13 383 0,055555556 14 383 0,055555556 15 412 -0,090909091 16 350 0,019607843 17 412 -0,090909091 18 377 0,041666667 19 383 0,055555556 Table 16. Population after Elitism Population 1 3 2 1 4 5 0 Population 2 3 1 5 2 0 4 Population 3 3 1 5 2 0 4 Population 4 2 1 0 3 4 5 Population 5 0 1 4 5 3 2 Population 6 5 4 0 2 1 3 Population 7 5 4 0 2 1 3 Population 8 4 2 0 3 1 5 Population 9 5 0 3 1 2 4 Population 10 5 4 0 2 1 3 Population 11 1 5 0 3 2 4 Population 12 5 4 0 2 1 3 Population 13 2 0 3 4 5 1 Population 14 0 4 1 5 3 2 Population 15 0 4 1 5 3 2 Population 16 4 1 3 2 0 5 Population 17 3 1 5 2 0 4 Population 18 4 1 3 2 0 5 Population 19 0 3 4 5 1 2 Population 20 0 1 4 5 3 2
  • 11. International Journal of Control and Automation Vol. 11, No. 6 (2018) Copyright © 2018 SERSC Australia 119 The last generation shows the most optimum results for the whole generation and population. It is visible from the displayed list. Population [0] is the best value of the five populations. The route obtained is "3-2-1-4-5-0" which has a distance of 318 as shown in the following figure. Figure 4. Second Test Optimal Route After undergoing both tests, the final test result produces a more optimal value than before. In the first experiment, the optimal value obtained was 320 while in the second experiment, the optimal value increased by 2 points ie 318. This states that the more generations and populations applied to the Genetic algorithm, the better the results obtained. 3.2 Prim This algorithm works greedily. If there are several nodes as an alternative, then the selected node is the shortest node from the beginning. Table 17. Distance of each Node N0 N1 N2 N3 N4 N5 N0 0 64,38 89,56 61 44,91 90,97 N1 64,38 0 54,04 110,05 53,08 98,37 N2 89,56 54,04 0 104,8 48,85 61,39 N3 61 110,05 104,8 0 60,75 65,76 N4 44,91 53,08 48,85 60,75 0 52,01 N5 90,97 98,37 61,39 65,76 52,01 0 The following table is the result of the calculation of Prim algorithm. The trip was made from N0 to N5. At N0, five possible nodes are eligible for the next destination. Node length will be compared. It selects the shortest distance.
  • 12. International Journal of Control and Automation Vol. 11, No. 6 (2018) 120 Copyright © 2018 SERSC Australia Table 18. Prim Result N0 0 N1 63.38 44.91 N4 N2 89.56 N3 61 N4 44.91 N5 90.97 N4 0 N1 53.08 48.85 N2 N2 48.85 N3 60.75 N5 52.01 N2 0 N1 54.04 54.04 N4N3 104.8 N5 61.39 N4 0 N1 53.08 53.08 N1N3 60.75 N5 98.37 N1 0 N3 110.05 98.37 N4 N5 98.37 N4 0 N3 60.75 52.01 N5 N5 52.01 N5 0 N3 65.76 65.76 N4 N4 0 N3 60.75 60.75 N3 The result of the prime calculation states that the route obtained is "N0-N4-N2-N4-N1- N4-N5-N4-N3". The journey will return to the "N4" node because the journey from N4 to the other node has fewer weights than the other nodes. The following figure is the result of graph formation based on the results obtained in the previous calculation. Figure 5. Route of Prim Algorithm Test
  • 13. International Journal of Control and Automation Vol. 11, No. 6 (2018) Copyright © 2018 SERSC Australia 121 4. Conclusion Prim and Genetics have their respective advantages and disadvantages. Both of these algorithms aim to find the smallest weights. The use of Genetic algorithms aims to explore the entire node without returning to previously browsed nodes. Prim aims to connect the entire node based on existing connections. Both of these algorithms can work together to optimize the routes used and applied into the real world. These algorithms have a perfect role for technological advancement. References [1] S. Aryza, M. Irwanto, Z. Lubis, A. P. U. Siahaan, R. Rahim and M. Furqan, “A Novelty Design of Minimization of Electrical Losses in A Vector Controlled Induction Machine Drive”, IOP Conference Series: Materials Science and Engineering, vol. 300, (2018), no. 1. [2] M. Iqbal, A. P. U. Siahaan, N. E. Purba and D. Purwanto, “Prim’s Algorithm for Optimizing Fiber Optic Trajectory Planning”, Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, (2017), pp. 504-509. [3] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers”. [4] V. Tasril, M. B. Ginting, Mardiana and A. P. U. Siahaan, “Threats of Computer System and its Prevention”, Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, (2017), pp. 448-451. [5] R. D. Sari, Supiyandi, A. P. U. Siahaan, M. Muttaqin and R. B. Ginting, “A Review of IP and MAC Address Filtering in Wireless Network Security”, Int. J. Sci. Res. Sci. Technol., vol. 3, no. 6, pp. 470-473, (2017). [6] D. Kurnia, H. Dafitri, M. Sugianto and A. P. U. Siahaan, “RSA 32-bit Implementation Technique”, Int. J. Recent Trends Eng. Res., vol. 3, no. 7, (2017) July, pp. 279-284. [7] A. P. U. Siahaan, “Rail Fence Cryptography in Securing Information”. [8] R. Rahim, “Searching Process with Raita Algorithm and its Application”, J. Phys. Conf. Ser., vol. 1007, no. 1, (2018), pp. 1-7. [9] A. P. U. Siahaan and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm”, Int. J. Secur. Its Appl., vol. 10, no. 8, (2016) August, pp. 173-180. [10] R. Rahim, “Combination Base64 Algorithm and EOF Technique for Steganography”, J. Phys. Conf. Ser., vol. 1007, no. 1, pp. 1-5, (2018). [11] R. F. Wijaya, Y. M. Tondang and A. P. U. Siahaan, “Take Off and Landing Prediction using Fuzzy Logic”, Int. J. Recent Trends Eng. Res., vol. 2, no. 12, (2016), pp. 127-134. [12] S. Supiyandi, M. I. Perangin-angin, A. H. Lubis, A. Ikhwan, Mesran and A. P. U. Siahaan, “Association Rules Analysis on FP-Growth Method in Predicting Sales”, Int. J. Recent Trends Eng. Res., vol. 3, no. 10, (2017), pp. 58-65. [13] M. Iswan Perangin-angin, Khairul and A. P. U. Siahaan, “Fuzzy Logic Concept in Technology, Society, and Economy Areas in Predicting Smart City”, Int. J. Recent Trends Eng. Res., vol. 2, no. 12, (2016), pp. 176-181. [14] S. Hartanto, M. Furqan, A. P. U. Siahaan and W. Fitriani, “Haversine Method in Looking for the Nearest Masjid”, Int. J. Recent Trends Eng. Res., vol. 3, no. 8, (2017) August, pp. 187-195. [15] A. P. U. Siahaan, “Genetic Algorithm in Hill Cipher Encryption”, Am. Int. J. Res. Sci. Technol. Eng. Math., vol. 15, no. 1, (2016), pp. 84-89. [16] A. P. U. Siahaan, “Adjustable Knapsack in Travelling Salesman Problem Using Genetic Process”. Int. J. Sci. Technoledge, vol. 4, no. 9, (2016), pp. 46-55. [17] A. P. U. Siahaan, “Scheduling Courses using Genetic Algorithms”, Int. J. Comput. Appl., vol. 153, no. 3, (2016), pp. 20-25. [18] I. Sumartono, D. Arisandi, A. P. U. Siahaan and Mesran, “Expert System of Catfish Disease Determinants Using Certainty Factor Method”, Int. J. Recent Trends Eng. Res., vol. 3, no. 8, (2017) August, pp. 202- 209. [19] A. P. U. Siahaan and W. Fitriani, “A Simple Comparison Between WEKA and Salford System in Data Mining Software”. [20] Z. Ramadhan, “Perbandingan Algoritma Prim dan Algoritma Floyd-Warshall dalam Menentukan Lintasan Terpendek (Shortest Path Problem)”, Universitas Sumatera Utara, (2016). [21] R. Meiyanti, A. Subandi, N. Fuqara, M. A. Budiman and A. P. U. Siahaan, “The Recognition of Female Voice Based on Voice Registers in Singing Techniques in Real-Time using Hankel Transform Method and Macdonald Function”, J. Phys. Conf. Ser., vol. 978, no. 1, (2018), pp. 1-6. [22] A. Bloomfield, “Program and Data Representation”, 2018. [Online]. Available: https://aaronbloomfield.github.io/pdr/slides/11-graphs.html?print-pdf#/cover. [Accessed: 21-May-2018]. [23] M. Iqbal, M. A. S. Pane and A. P. U. Siahaan, “SMS Encryption Using One-Time Pad Cipher”, IOSR J. Comput. Eng., vol. 18, no. 6, (2016), pp. 54-58. [24] A. P. U. Siahaan, “High Complexity Bit-Plane Security Enchancement in BPCS Steganography”, Int. J. Comput. Appl., vol. 148, no. 3, (2016), pp. 17-22.
  • 14. International Journal of Control and Automation Vol. 11, No. 6 (2018) 122 Copyright © 2018 SERSC Australia [25] A. P. U. Siahaan, “Securing Short Message ServiceUsing Vernam Cipher in Android Operating System”, IOSR, (2016) April. [26] W. Fitriani, R. Rahim, B. Oktaviana and A. P. U. Siahaan, “Vernam Encypted Text in End of File Hiding Steganography Technique”, Int. J. Recent Trends Eng. Res., vol. 3, no. 7, (2017) July, pp. 214-219. [27] A. Q. Ansari, Ibraheem and S. Katiyar, “Comparison and analysis of solving travelling salesman problem using GA, ACO and hybrid of ACO with GA and CS”, 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions (WCI), (2015), pp. 1-5. [28] Z. Sitorus and A. P. U. Siahaan, “Heuristic Programming in Scheduling Problem Using A* Algorithm”, IOSR J. Comput. Eng., vol. 18, no. 5, (2016), pp. 71-79. [29] A. P. U. Siahaan, “Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem”, IOSR J. Comput. Eng., vol. 18, no. 05, (2016) May, pp. 39-48. [30] A. P. U. Siahaan, “Determination of Thesis Preceptor and Examiner Based on Specification of Teaching Using Fuzzy Logic”. [31] Z. Tharo and A. P. U. Siahaan, “Profile Matching in Solving Rank Problem”, IOSR J. Electron. Commun. Eng., vol. 11, no. 05, (2016) May, pp. 73-76. [32] H. A. Hasibuan, R. B. Purba and A. P. U. Siahaan, “Productivity Assessment (Performance, Motivation, and Job Training) using Profile Matching”, Int. J. Econ. Manag. Stud., vol. 3, no. 6, (2016), pp. 73-77.