SSP, MST, MSF
SSP, MST, MSF
Recent advances in evolutionary computation have made it possible to solve such practical network optimization problems:
Ali, M. & F. Kamoun Neural Networks for Shortest Path Computation and Routing in Computer Networks, IEEE Trans. on Neural Networks, vol.4, pp.941-954, 1993. Perfetti, R. : Optimization Neural Network for Solving Flow Problems, IEEE Trans. on Neural Network, Vol.6, No.5, pp.1287-1291, 1995. Gen, M. & K. Ida: Neural Networks and Optimization with Mathematica, Kyoritsu Shuppan, 1998 in Japanese. Ahn, C. W., R. Ramakrishna, C. Kang & I. Choi: Shortest Path Routing Algorithm using Hopfield Neural Network, Electronic Letter, Vol.37, No.19, pp.1176-1178, 2001.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 2
4 WASEDA UNIVERSITY ,very high speed Backbone Network Services vBNS: IPS
2. 3. 4. 5.
Maximum Flow (MXF) Problem Minimum Cost Flow (MCF) Problem Bicriteria Network Design Problem (BNP) Multi-criteria Network Design Problem
WASEDA UNIVERSITY , IPS 7
cij
2 36 s
18 16 13 5
4 11
32 20 7 12
8 24 t 15 13 10
1 27 3
12 23 6
cij
38
s.t.
x x
j =1 ij k =1
ki
10
Salesperson Routing
Investment Planning
11
OSPF is designed for exchanging routing information within a large or very large internetwork. The biggest advantage of OSPF is that it is efficient.
OSPF requires very little network overhead even in very large internetworks. OSPF requires proper planning and is more difficult to configure and administer.
WASEDA UNIVERSITY , IPS 12
Bellman-Ford Algorithm
Bellman-Ford algorithm computes single-source shortest paths in a weighted graph (where some of the edge weights may be negative). Bellman-Ford is usually used only when there are negative edge weights.
Floyd-Warshall Algorithm
Floyd-Warshall algorithm is an algorithm to solve the all pairs shortest path problem in a weighted, directed graph by multiplying an adjacency-matrix representation of the graph multiple times.
14
Path 1 124810 Objective function value z=110 Path 2 1247810 Objective function value z=109 Path 3 13547810 Objective function value z=110
Soft Computing Lab.
15
They adopted an indirect approach: The path is generated by sequential node appending procedure with beginning from the specified node 1 and terminating at the specified node n. At each step, there are usually several nodes available for consideration. They gave each node a priority with a random mechanism and add the one with the highest priority into path.
As we know, a gene in a chromosome is characterized by two factors: locus, i.e., the position of gene located within the structure of chromosome, allele, i.e., the value which the gene takes.
In the priority-based encoding method, the position of a gene is used to represent node ID and its value is used to represent the priority of the node for constructing a path among candidates. A path can be uniquely determined from this encoding.
17
2 1 s 1 3 4
5 t 1 7 6
priority :2
path :
Advantage:
Any permutation of the encoding corresponds to a path (legality). Most existing genetic operators can be easily applied to the encoding. Any path has a corresponding encoding (completeness); any point in solution space is accessible for genetic search.
Disadvantage:
At some case, n-to-1 mapping may occur for the encoding.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 18
The proposed encoding method consists of sequences of positive integers that represent the IDs of nodes through which a path passes.
Each locus of the chromosome represents an order of a node (indicated by the gene of the locus) in a path. The length of the chromosome is variable, but is should not exceed the maximum length n, where n is the total number of nodes in the network, since it never needs more than n number of nodes to form a path. The gene of the first locus encodes the source node, and the gene of second locus is randomly or heuristically selected from the nodes connected with the source node. Soft Computing Lab. WASEDA UNIVERSITY , IPS 19
2 1 s 1 3 4
5 t 1 7 6
node ID :1
path :
Advantage: The mapping from any chromosome to solution (decoding) belongs to 1to-1 mapping (uniqueness). Theoretically, convergence performance is better than the priority-based encoding method. Disadvantage: In general, the genetic operators may generate infeasible chromosomes (illegality) that violate the constraints, generating loops in the paths. Repairing techniques are usually adopted to convert an illegal chromosome to a legal one.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 20
The proposed method are sequences of integers and each gene represents the node ID through which it passes.
To encode a route from node 1 to node n, put i in the jth locus of the chromosome. This process is reiterated from the specified node 1 and terminating at the specified node n. If the route does not pass through a node x, select one node randomly from the set of nodes which are connected with node x, and put it in the xth locus.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 21
2 1 s 1 3 4
5 t 1 7 6 node ID :3 1 4 7 2 4 6
path :
Advantage: Any path has a corresponding encoding (completeness). Any point in solution space is accessible for genetic search. Any permutation of the encoding corresponds to a path (legality) using the special genetic operators. Disadvantage: At some case, n-to-1 mapping may occur for the encoding. Furthermore the probability of occurrence of n-to-1 mapping is higher than the priority-based encoding method. In the special genetic operator phase, some offspring may generate new chromosomes that resemble the initial chromosomes in fitness, thereby retarding the process of evolution.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 22
23
for i=1 to n / 2 repeat jrandom[1, n]; lrandom[1, n]; until lj swap (vk(j), vk(l)); output the chromosome vk; end
Soft Computing Lab.
// step 2
24
Chromosome:
node ID: j
10
priority: v(j)
8 10 1
Path:
1367810
In this study, the nature of the priority-based encoding is a kind of permutation representation.
Generally, this representation will yield illegal offspring by one-point crossover or other simple crossover operators.
During the past decade, several crossover operators have been proposed for permutation representation, such as:
Partial-mapped crossover (PMX) Goldberg, D. & R. Lingle, Alleles: loci and the traveling salesman problem, Proc. of the 1st Inter. Conf. on GA, pp.154-159, 1985. Order crossover (OX):
Davis, L. : Applying adaptive algorithms to domains, Proc. of the Inter. Joint Conf. on Artificial Intelligence, pp.1162-164, 1985.
Position-based crossover (PX)
Davis, L. : Applying adaptive algorithms to domains, Proc. of the Inter. Joint Conf. on Artificial Intelligence, pp.1162-164, 1985.
Cycle crossover (CX) Oliver, I. & J. Holland: A study of permutation crossover operators on the traveling salesman problem, Euro. J. of OR, vol.26, pp.187-210, 1986. Heuristic crossover, and so on. Soft Computing Lab. WASEDA UNIVERSITY , IPS
27
PMX can be viewed as an extension of two-point crossover for binary string to permutation representation. It uses a special repairing procedure to resolve the illegitimacy caused by the simple two-point crossover. step 3 : determine mapping relationship step 1 : select the substring at random
substring selected
parent 1: parent 2: 1 4 7 6 2 3 3 5 4 7 6 1 5 8 8 2 3 5 7 2 3 4
235 47
substring selected
parent 2:
29
It is essentially a kind of uniform crossover for permutation representation together with a repairing procedure. It also can be viewed as a kind of variation of OX in which the nodes are selected inconsecutively.
parent 1: offspring: 1 3 7 7 2 5 3 1 4 4 6 6 5 2 8 8
parent 2:
for i = 1 to l for j = 1 to l if v1'[ p + i ] = s2 [ j ] then v1'[ p + i ] s1[ j ]; for j = 1 to l if v2'[ p + i ] = s1[ j ] then v2'[ p + i ] s2 [ j ]; output v1' , v2' ; end
32
parent 1 : 1 parent 2 : 1
3 2
4 4
7 5 7
offspring 1 : 1 offspring 2 : 1
3 1 5 5
3 2
4 4
5 7
33
Insertion Mutation
Selects a gene at random and inserts it in a random position as follows:
select a gene at random parent : 2 1 7 4 5 3 6 parent : 1 3 4 7
If a GA is biased towards exploration: Large numbers of schemata are sampled which tends to inhibit premature convergence. Unfortunately, excessive exploration results in a large number of function evaluations, and defaults to random search in the worst case.
35
Immigration operator
step 1: The algorithm is modified to include immigration, with each generation generated. step 2: Evaluate random members (, called the immigration rate). step 3: Replace the worst members of the population with the random members.
This study experimentally examines the immigration operator, and present the effectiveness of this approach for solving network design problems in next section.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 36
Ordinal-based selection: upon their rank within the population. The chromosomes are ranked according to their fitness values.
Tournament selection ( , ) selection Truncation selection Linear ranking selection
In this study, the roulette wheel selection, a type of Proportionate selection, is adopted.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 37
38
Each solution is compared with Dijkstras algorithm that provides a reference point (optimal solution). Each algorithm was applied to each test problem 20 times (i.e., 20 runs) using different initial populations. All the simulations were performed with Java on Pentium 4 processor (1.5-GHz clock).
Soft Computing Lab. WASEDA UNIVERSITY , IPS 39
1 1
40
2.0
1.5
1.0
0.5 0 2 4 6 Generations 8 10
41
260
Fig. 6.4 Convergence property of Ahn et al.s algorithm and proposed algorithm.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 42
240
1000
800
600
400
200
43
20/49 142.00 148.35 148.53 147.70 80/120 389.00 423.53 425.33 418.82 80/632 291.00 320.06 311.04 320.15 160/2544 284.00 429.55 454.98 480.19 320/1845 394.00 754.94 786.08 906.18 320/10208 288.00 794.26 732.72 819.85 Alg. 1: FMX+Swap; Alg. 2: OX+Swap; Alg. 3: PX+Swap; Alg. 4: WMX+Swap; Alg. 5: WMX+Swap+Immigration(3); Alg. 6: WMX+Insertion+Immigration(3).
The quality of solution with different genetic operators is investigated in Table 1. The path optimality is defined in all test problems, by Alg.6 (WMX+Insertion+ Immigration) that the GA finds the global optimum (i.e., the shortest path). The path optimality is defined in #1, #2 test problems, by Alg.5 (WMX+Swap+ Immigration), The near optimal result is defined in other test problems. By Alg.1 ~ Alg.4, the path optimality is not defined. Since the number of possible alternatives become to very large in test problems, the population be prematurely converged to a local optimum of the function.
WASEDA UNIVERSITY , IPS 44
Best solutions
20/49
80/120
80/630
160/2544
320/1845
320/10208
45
20 / 0.3 : 0.1
20 / 0.7 : 0.5
46
47
48
1. 2. 3.
Minimum Cost Flow (MCF) Problem Bicriteria Network Design Problem (BNP) Multi-criteria Network Design Problem
WASEDA UNIVERSITY , IPS 49
uij
50
uij
51
max z = f
f (i = 1) s. t. xij xki = 0 (i = 2,3, , n 1) j =1 k =1 f (i = n) 0 xij uij , (i, j ) A
n n
f 0
52
54
The maximum flow problem appears to be more challenging in applying GAs than many other common graph problems (e.g., shortest path, minimum spanning tree) Its unique characteristic:
A flow at each edge can be anywhere between zero and its flow capacity, i.e., it has more "freedom" to choose. In many other problems, selecting an edge may mean to simply add a fixed distance. The flow at each edge must be between zero and its flow capacity. At each vertex, the incoming flow and outgoing flow must balance.
55
for i=1 to n / 2 repeat jrandom[1, n]; lrandom[1, n]; until lj swap (vk(j), vk(l)); end
Soft Computing Lab.
Pk = {x1l , xl ,l , xl
,l
58
S i {a}, i
~ step 5: perform the flow min{u uiji, j each arc update. Make a new flow capacity ij as follows: u u capacity ( of ) P k }
ij ij ij l
step 6: if the flow capacity ij =0, perform the set of nodes Si update which the node j adjacent to node i.
~ si si { jpaths iL, j ) l Pl k & u ijf = 0 path, iL step 7: output number of } , ( -1, the flow of each
k i k
. 59
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
11
10
60
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
k 1 i 0 1 2 3 4 5 0 1 2 3 4 Si
4
l 3 6 5 8 11 3 6 8 11
11 9
Pk
10 5
3
S1
7
fk
2, 3, 4 4, 6, 7 5, 8, 9, 10 8 9, 11 2, 3, 4 4, 6, 7 8, 9, 10 9, 11
1 1, 3 1, 3, 6 1, 3, 6, 5 1, 3, 6, 5, 8 1, 3, 6, 5, 8, 11 1 1, 3 1, 3, 6 1, 3, 6, 8 1, 3, 6, 8, 11
k : number of paths i : start node Si : the set of nodes l : sink node Pk : the kth path S1 : the set of nodes with all nodes adjacent to node 1 fk : maximum possible flow
2, 3, 4 20
60
2, 3, 4 50
3
61
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
k 3 i 0 1 2 3 4 5 0 1 2 3 4 5 Si
4
l
11 9
Pk
10 5
3
S1
7
fk
2, 3, 4 4, 7 6, 10 9, 10 10, 11 2, 4 7 6, 10 9, 10 10, 11
3 7 6 9 11 4 7 6 9 11
1 1, 3 1, 3, 7 1, 3, 7, 6 1, 3, 7, 6, 9 1, 3, 7, 6, 9, 11 1 1, 4 1, 4, 7 1, 4, 7, 6 1, 4, 7, 6, 9 1, 4, 7, 6, 9, 11
l : sink node Pk : the kth path S1 : the set of nodes with all nodes adjacent to node 1 fk : maximum possible flow
60
2,4
70
3
62
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
11 9
10 5
k 5
i 0 1 2 3 4 0 1 2 3 4
Si 2, 4 7 10 11 2 3, 5, 6 8 9, 11
l 4 7 10 11 2 5 8 11
Pk 1 1, 4 1, 4, 7 1, 4, 7, 10 1, 4, 7, 10, 11 1 1, 2 1, 2, 5 1, 2, 5, 8 1, 2, 5, 8, 11
S1
fk
k : number of paths i : start node Si : the set of nodes l : sink node Pk : the kth path S1 : the set of nodes with all nodes adjacent to node 1 fk : maximum possible flow
100
60
110
3
63
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
k 7 i 0 1 2 3 4 5 0 1 2 3 4 5
1
Si
11 9
l 2 5 8 9 11 2 6 9 10 11 Pk
10 5
3
S1
7
fk
2 3, 5, 6 8 9 10, 11 2 3, 6 9, 10 10 11
1 1, 2 1, 2, 5 1, 2, 5, 8 1, 2, 5, 8, 9 1, 2, 5, 8, 9, 11 1 1, 2 1, 2, 6 1, 2, 6, 9 1, 2, 6, 9, 10 1, 2, 6, 9, 10, 11
l : sink node Pk : the kth path S1 : the set of nodes with all nodes adjacent to node 1 fk : maximum possible flow
60
160
3
64
50/50
7
6
10
9 10 11
Chromosome:3 node ID :1 2
priority :2 1 6
11
10
xij / uij
235 47
parent: offspring:
1 1
7 7
2 6
3 3
4 4
6 2
5 5
8 8
Selection: The roulette wheel approach, a type of fitnessproportional selection, was adopted.
67
All the simulations were performed with Java on Pentium 4 processor (1.5-GHz clock).
Soft Computing Lab. WASEDA UNIVERSITY , IPS 69
15 15
12
20 20
17
8 25 25 20 10 25 10 25 25
15 15
13
20 20
18
8
22
30
20 20
15 15
14
20 20
19
8
23
30 30
25
10
15 15
15
20 20
20
24
i
uij
6
Soft Computing Lab.
11
16
20
21
70
14/15
12
9/20
17
5/25 4/8
5/5 4 /4 2/5
15/15 15/15
13
20/20 20/20
18
4/8
25/25 15/20
22
30/30
90
20/20 19/20
8/8 10/10
7/15 15/15
14
10/20 2/20
19
5/10 5/25
23 30/30
30/30
25
90
10/10 20/20
6/8 10/10
10
9/15
15
20/20 9/20
20 25/25
24
15/15
11
16
21
xij / uij
Objective function value: z=90 (optimal solution) Generation Num. of Obtained best result: 34 Best Chromosome:
node ID : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
priority:
25
12 15 20
16 21 14
18 23
13
17
11
24 19 10 22
71
flow
72
11
2 18 7 5
11 8
20
9
7
6 8 6
16
10 7
12
12 8
8 10
21
20 15 8
15
8
9 8 7
17
10
20
4
7
13
20 6 9
10
22
8
30 20
25
20
9
10 7 12 5
18
6 5 6
5
20
14
22 6 8
23
15 9
10
15
19
10
uij
73
11 7
18/18 4/5
20
16
6/10
9/9
6/6 4/8
12
9/12
4/8
21
5/7 20/20 8/15 8/8
15/15
8
7/9
17
6/10 1/10
91
20/20
8/8 7/7
13 9
15/20
22
22/30 20/20
25 91
20/20
18
6/6 4/5
8/8 6/6
5
13/20
14
7/22 3/6
23
14/15
10
6/15
19
9/10
5/9
uij
15
24
Objective function value: z=91 (optimal solution) Generation Num. of Obtained best result: 67 Best Chromosome:
node ID : 1 2 3 4 5 6 7 8 9 10 11 12
13
14
15
16
17
18
19
20
21
22
23
24
25
priority: 20 10
22 25 23 11
18
16 12
14 15 19
13 17
21 24
74
flow
75
76
4. 5.
19, 60
8
18, 60 19, 50
s 1
19, 60
16, 50 17, 30
t 11
6
15, 20
17, 60
15, 30
14, 30 17, 50
19, 40
10 i
cij , uij
78
19, 60
8
18, 60 19, 50
s 1
19, 60
16, 50 17, 30
t 11
6
15, 20
17, 60
15, 30
14, 30 17, 50
19, 40
10
cij , uij
79
Primal-dual Algorithm
Out-of-Kilter Algorithm
82
for i=1 to n / 2 repeat jrandom[1, n]; lrandom[1, n]; until lj swap (vk(j), vk(l)); end
Soft Computing Lab.
l1 ,l2
85
86
c c
k l
k l 1
step 5: perform the flow capacity uij of each arc update. Make a new flow capacity ij as follows:
~ u ij u ij min{u ij (i, j ) Pl k }
step 6: if the flow capacity ij =0, perform the set of nodes Si update which the node j adjacent to node i. ~ k
si si { j} , (i, j ) Pl & u ij = 0
step 7: output number of paths Lk l -1, the flow fik and the cost cik of
Soft Computing Lab.
87
19, 60
8
18, 60 19, 50
s 1
19, 60
16, 50 17, 30
t 11
6
15, 20
17, 60
15, 30
14, 30 17, 50
19, 40
10
cij , uij
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
11
10
88
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
11 9
10 5
= 60
k 1 i 0 1 2 3 4 5 0 1 2 3 4 2, 3, 4 4, 6, 7 5, 8, 9, 10 8 9, 11 2, 3, 4 4, 6, 7 8, 9, 10 9, 11 3 6 5 8 11 3 6 8 11 Si l Pk 1 1, 3 1, 3, 6 1, 3, 6, 5 1, 3, 6, 5, 8 1, 3, 6, 5, 8, 11 1 1, 3 1, 3, 6 1, 3, 6, 8 1, 3, 6, 8, 11 S1 flk
clk
2, 3, 4 20
87
k : number of paths i : start node Si : the set of nodes l : sink node Pk : the kth path S1 : the set of nodes with all nodes adjacent to node 1 flk : the total flow clk : minimum possible cost
89
2, 3, 4 30
69
Chromosome:
node ID :1 2 3 4 5 6 7 8 9 10 11
priority :2
11 9
10 5
= 60
k 3 i 0 1 2 3 4 5 2, 3, 4 4, 7 6, 10 9, 10 10, 11 3 7 6 9 11 Si l Pk 1 1, 3 1, 3, 7 1, 3, 7, 6 1, 3, 7, 6, 9 1, 3, 7, 6, 9, 11 S1 flk
clk
2, 4
10
85
k : number of paths i : start node Si : the set of nodes l : sink node Pk : the kth path S1 : the set of nodes with all nodes adjacent to node 1 flk : the total flow clk : minimum possible cost
90
i 8
60
15, 10/40
t 11
60
15, 10/20
7
4 5 6 7 8 9
10
10 11
Chromosome:3 node ID :1 2
priority :2 1 6
11
10
235 47
parent: offspring:
1 1
7 7
2 6
3 3
4 4
6 2
5 5
8 8
Selection: The roulette wheel approach, a type of fitnessproportional selection, was adopted.
93
All the simulations were performed with Java on Pentium 4 processor (1.5-GHz clock).
Soft Computing Lab. WASEDA UNIVERSITY , IPS 95
10, 15 4, 15
12
8, 20 6, 20
17
11, 8 11, 25
3
13, 20
9, 15
13
7, 20 7, 20
18
5, 8
22
10, 30
11, 15
32, 20
9 12, 15
9, 15
14
7, 20 5, 20
19
23 2, 30
3, 30
25
135, 20 631, 20
3, 10 13, 4 33, 10 7, 10 7, 10
3, 8 3, 10
10
14, 15
15
14, 20 4, 20
20 14, 25
12, 25
24
5, 15
6
Soft Computing Lab.
11
16
14, 20
21
cij , uij
j 96
10, 15/15
12
6, 10/20
17
11, 10/25
8 9, 15/15
13
7, 20/20
18 8, 20/25 22
10, 30/30
13, 14/20 11, 15/15 4, 2/5 q=70 32, 20/20 15, 8/8 1 4 9 12, 7/15 35, 10/10 135, 14/20 3, 10/10 9, 3/15 13, 4/4 5 10 631, 4/20 14, 15/15 7, 4/10
14
7, 18/20
19
10, 10/10
q=70 23 2, 20/30 25
15
11
16
21
Total flow value q = 70 Objective function value: z= 6969 Generation Num. of Obtained best result:863 Best Chromosome:
node ID : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
priority:
16 11
15 10
12 13 21
22 14 18 20 24 17 25 23
19
97
cost
98
11
29, 11 13, 2 6, 8
20
16
26, 9
3
10, 20
12
30, 10 6, 8 9, 10 12, 7
21
10, 20 31, 15 8, 4
2,15
17
33, 20
13
34, 10 15, 10 2, 9
22
6, 30
25
126, 20
18
7, 20 30, 8 11, 6
5
634, 20
14
35, 6 14, 5 7, 8
23
9, 15
10
11, 22 6, 6
19
35, 9
12, 15
15
8, 10
24
cij , uij
j 99
11
7, 8/18
29, 10/11
20
26, 8/9
7
2, 18/20
16
30, 6/10
12
6, 6/12
21
12, 6/7 10, 20/20 31, 3/15 8,4/ 4
2,10/15
10, 14/20
17
34,9/10
q=72
33, 20/20
13 9
8, 15/20
22
6, 16/30
25
q=72
126, 20/20
2, 3/9 3, 5/5
18
14
23
9, 6/15
10 6
19
8, 6/10
15
24
Total flow value q = 72 Objective function value: z=5986 Generation Num. of Obtained best result:132 Best Chromosome:
node ID : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
priority: 10 25 15 24 11
12
13 14
16 17 18
20 22 19 23 21
100
cost
6500 6400 6300 6200 6100 6000 5900 0 50 100 150 200 250
102
104
In a manufacturing system, the two criteria under consideration are minimizing cost and maximizing manufacturing.
Raghavan, S., M. O. Ball, and V. S. Trichur: Bicriteria product design optimization, Institute for Systems Research, Tech. Rep. TR 2001-8, 2001. [Online]. Available: http://techreports.isr.umd.edu/ARCHIVE/
In a logistic system, the main drive to improve logistics productivity is the enhancement of customer services and asset utilization through a significant reduction in order cycle time (lead time) and logistics costs.
Zhou, G. , H. Min, and M. Gen: A genetic algorithm approach to the bi-criteria allocation of customers to warehouses, Int. J. Production Economics, vol. 86, pp. 35-45, Oct. 2003. WASEDA UNIVERSITY , IPS 105
For solving the BNP, the set of efficient paths may be very large and possibly exponential in size.
Thus the computational effort required to solve it can increase exponentially with the problem size in the worst case.
While the tractability of the problem is of importance when solving large scale problems, the issue concerning with the size of the efficient set is important to a decision maker. Having to evaluate a large efficient set in order to select the best one poses a considerable cognitive burden on decision makers. Therefore, in such cases, obtaining the entire Pareto optimal set is of little interest to decision makers.
WASEDA UNIVERSITY , IPS 106
107
Hassin (1992) provided a strongly polynomial FPAS for the problem which improved the running time of Warburton.
Hassin, R.: Approximation schemes for the restricted shortest path problem, Math. Of Operations Research, vol. 17, no. 1, pp. 36-42, Feb. 1992.
108
Ganley et al. (1995) consider a more general problem with more than two objective functions.
Ganley, J. L., M. J. Golin, and J. S. Salowe: The multi-weighted spanning tree problem, Proc. 1st COCOON, pp. 141-150, Springer-Verlag, LNCS, 1995.
Marathe et al. (1998) consider three different criteria of network and presented the first polynomial-time approximation algorithms for a large class of BNP.
Marathe, M. V., R. Ravi, R. Sundaram, S. S. Ravi, D. J. Rosenkrantz, and H. B. Hunt: Bicriteria network design problems, J. Algorithms, vol. 28, no. 1, pp. 142-171, 1998.
109
Considering the characteristic of priority-based encoding method, we proposed a new crossover operator called as Weight Mapping Crossover (WMX) Insertion mutation operator and Immigration operator (Michael et al., 1991) was adopted.
Michael, C.M., C.V. Stewart and R. B. Kelly: Reducing the search time of a steady state genetic algorithm using the immigration operator, Proc. IEEE Int. Conf. Tools for AI, San Jose, CA, pp.500-501, 1991.
These methods provide a search capability that results in improved quality of solution and enhanced rate of convergence. For ensure the population diversity in MOGA, Adaptive Weight Approach (AWA) which is one of weighted-sum approach, was adopted.
Gen, M. and R. Cheng: Genetic Algorithms and Engineering Optimization, John Wiley & Sons, New York, 2000. Their elements represent that weights are adjusted adaptively based on the current generation to obtain search pressure toward the positive ideal point.
WASEDA UNIVERSITY , IPS 110
In a network with flow capacities and costs on the arcs, BNP is to determine both the maximum possible flow z1 and minimum cost z2 in the same time, from a source to a sink.
s. t.
for i=1 to n / 2 repeat jrandom[1, n]; lrandom[1, n]; until lj swap (vk(j), vk(l)); end
Soft Computing Lab.
114
115
c c
k l
k l 1
step 5: perform the flow capacity uij of each arc update. Make a new flow capacity ij as follows:
~ u ij u ij min{u ij (i, j ) Pl k }
step 6: if the flow capacity ij =0, perform the set of nodes Si update which the node j adjacent to node i. ~ k
si si { j} , (i, j ) Pl & u ij = 0
step 7: output number of paths Lk l -1, the flow fik and the cost cik of
Soft Computing Lab.
116
k 1
i 0 1 2 3 4 5 0 1 2 3 4
Si 2, 3, 4 4, 6, 7 5, 8, 9, 10 8 9, 11 2, 3, 4 4, 6, 7 8, 9, 10 9, 11
l 3 6 5 8 11 3 6 8 11
Pk 1 1, 3 1, 3, 6 1, 3, 6, 5 1, 3, 6, 5, 8 1, 3, 6, 5, 8, 11 1 1, 3 1, 3, 6 1, 3, 6, 8 1, 3, 6, 8, 11
S1
z1k
z2k
18, 60
117
k 3
i 0 1 2 3 4 5 0 1 2 3 4 5
Si 2, 3, 4 4, 7 6, 10 9, 10 10, 11 2, 4 7 6, 10 9, 10 10, 11
l 3 7 6 9 11 4 7 6 9 11
Pk
S1
z1k
z2k
1 1, 3 1, 3, 7 1, 3, 7, 6 1, 3, 7, 6, 9 1, 3, 7, 6, 9, 11 2, 4 1 1, 4 1, 4, 7 1, 4, 7, 6 1, 4, 7, 6, 9 1, 4, 7, 6, 9, 11 2,4
l : sink node Pk : the kth path S1 : the set of nodes with all nodes
18, 60
118
k 5
i 0 1 2 3 4 0 1 2 3 4
Si 2, 4 7 10 11 2 3, 5, 6 8 9, 11
l 4 7 10 11 2 5 8 11
Pk 1 1, 4 1, 4, 7
S1
z1k
z2k
1, 4, 7, 10 1, 4, 7, 10, 11 2 1 1, 2 1, 2, 5 1, 2, 5, 8 1, 2, 5, 8, 11 2
100
9410
110
10120
18, 60
119
k 7
i 0 1 2 3 4 5 0 1 2 3 4 5
Si 2 3, 5, 6 8 9 10, 11 2 3, 6 9, 10 10 11
l 2 5 8 9 11 2 6 9 10 11
Pk 1 1, 2 1, 2, 5 1, 2, 5, 8 1, 2, 5, 8, 9 1, 2, 5, 8, 9, 11 1 1, 2 1, 2, 6 1, 2, 6, 9 1, 2, 6, 9, 10 1, 2, 6, 9, 10, 11
S1
z1k
z2k
l : sink node Pk : the kth path S1 : the set of nodes with all nodes
18, 60
120
-14000 -16000
0 20 40 60 80 100 120 140 160, 14350 160 180
flow
a where z1mx , z max , z1min and z2min are the maximal value and minimal value for
objective 1 and objective 2 in the current population. They are defined as follows:
122
1 min z2
k min
eval (vk ) =
( w ( f z ) w (c + z ) )
Lk k min i =1 1 i 1 2 i 2
Lk
, k popSize
123
parent 1 : 1 parent 2 : 1
3 2
4 4
7 5 7
offspring 1 : 1 offspring 2 : 1
3 2
4 4
5 7
124
parent : 1
offspring : 1
Selection:
the roulette wheel selection, a type of Proportionate selection, is adopted.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 125
126
127
All the simulations were performed with Java on Pentium 4 processor (1.5-GHz clock).
128
10, 15 4, 15
12
8, 20 6, 20
17
11, 8 11, 25
3
13, 20
9, 15
13
7, 20 7, 20
18
5, 8
22
10, 30
11, 15
32, 20
9 12, 15
9, 15
14
7, 20 5, 20
19
23 2, 30
3, 30
25
135, 20 631, 20
3, 10 13, 4 33, 10 7, 10 7, 10
3, 8 3, 10
10
14, 15
15
14, 20 4, 20
20 14, 25
12, 25
24
5, 15
6
Soft Computing Lab.
11
16
14, 20
21
cij , uij
j 129
z2
300 345 600 696 993 1001 1226 1568 1629 1833 2178
z1
30 33 38 40 43 47 52 56 59 66 69
z2
2470 2786 2926 3046 3274 3674 4074 4830 5406 6575 7145
z1
72 73 75 78 80 82 85 87 88 89 90
z2
7703 8382 9762 11799 13147 14531 17115 17941 19254 19333 20007
Gen, M., L. Lin & R. Cheng: Bicriteria Network Optimization Problem using Prioritybased Genetic Algorithm, IEEJ Trans. on Elect., Info. & Sys., Oct. 2004.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 130
-5000 -
z1=66, z2=6575
-10000 cost -15000 -
-20000 -
- 25000 -
20
40
60
80
100
flow
Soft Computing Lab.
131
11
29, 11 13, 2 6, 8
20
16
26, 9
3
10, 20
12
30, 10 6, 8 9, 10 12, 7
21
10, 20 31, 15 8, 4
2,15
17
33, 20
13
34, 10 15, 10 2, 9
22
6, 30
25
126, 20
18
7, 20 30, 8 11, 6
5
634, 20
14
35, 6 14, 5 7, 8
23
9, 15
10
11, 22 6, 6
19
35, 9
12, 15
15
8, 10
24
cij , uij
j 132
z2
52 248 340 495 692 1012 1111 1220 1292 1406 1457 1475
z1
32 34 36 38 40 41 43 47 49 51 52
z2
1633 1909 1937 2077 2485 2581 2731 3080 3302 3551 3739
z1
54 55 58 61 63 65 66 67 68 71 72
z2
3872 3990 4146 4671 5153 5463 5704 6323 6422 6537 6748
z1
73 74 75 76 78 80 82 83 85 86 91
z2
6944 7192 7402 7532 7847 9228 10395 12508 12610 13151 16752
Gen, M., L. Lin & R. Cheng: Bicriteria Network Optimization Problem using Prioritybased Genetic Algorithm, IEEJ Trans. on Elect., Info. & Sys., Oct. 2004.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 133
ideal point:
z1=91, z2=52
z1=61, z2=4671
20
40
60
80
100
flow
Soft Computing Lab.
134
135
136
INFOCOM, pp.1274-1283, 1991. Frank, A., L. Wittie, and A. Bernstein: Multicast communication in network computers, IEEE Software, Vol. 2, No. 3, pp. 49-61,1985. Kadaba, B. and J. Jaffe: Routing to multiple destinations in computer networks, IEEE Transactions on Communications, Vol. COM-31, pp. 343351,1983. Kompella, V.P., J.C. Pasquale and G.C. Polyzos: Multicasting for multimedia applications, Proceedings of IEEE INFOCOM, 1992. Kompella, V.P., J.C. Pasquale and G.C. Polyzos: Multicast routing for multimedia communication, IEEE/ACM Transactions on Networking, pp. 286-292, 1993.
WASEDA UNIVERSITY , IPS 137
138
Bookstein, A. & S.T. Klein: Construction of Optimal Graphs for Bit-Vector Compression, Proc. 13th ACM-SIGIR, vol. 16, pp. 387-400, 1990. Zhu, Q., M. Parsa & W.W.M. Dai: An iterative approach for delay-bounded minimum Steiner tree construction, Technical Report UCSC-CRL-94-39, UC Santa Cruz, 1994.
With the advent of deep micron VLSI designs, the feature size has shrunk to sizes of 0.5 microns and less. As a result, the interconnect resistance, being proportional to the square of the scaling factor, has increased significantly. An increase in interconnect resistance has led to an increase in interconnect delays thus making them a dominant factor in the timing analysis of VLSI circuits. Therefore VLSI circuit designers aim at finding minimum cost (spanning or Steiner) trees given delay bound constraints on sourcesink connections.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 139
The applications set the stage for the formal definition of multicriteria network design problems. Marathe et al. explain this concept by giving a formal definition of a bicriteria network design problem.
Marathe, M. V., R. Ravi, R. Sundaram, S. S. Ravi, D. J. Rosenkrantz, and H. B. Hunt: Bicriteria network design problems, J. Algorithms, vol. 28, no. 1, pp. 142-171, 1998. Marathe et al. study the complexity and approximability of a number of bicriteria network design problems. The three objectives considered:
total cost diameter degree of the network.
WASEDA UNIVERSITY , IPS 140
For the examined solutions at each generation, they define two extreme points (maximum: z+, minimum: z-)
max max z + = [ z1max z2 z q ] min min z = [ z1min z2 z q ]
where zkmax and zkmin are the maximal and minimal values for the kth objective as defined by the following equations:
k = 1, 2, , q
k = 1, 2, , q
P: set of solution candidates.
142
z( x) =
w (z
k =1 k
min k
k =1
wk =
1 , max min zk zk
k = 1, 2, , q
The equation driven above is a hyperplane defined by the following extreme points in current solutions:
min min z 2 z kmin z q ] max min z 2 z kmin z q ] min min z 2 z kmax z q ] min max z 2 z kmin z q ]
143
z2
z
max 2
(z
min 1
,z
max 2
z+
maximum
extreme point
min z2
minimum
min ( z1max , z 2 )
adaptive
moving line
subspace
current solutions
z1min
Soft Computing Lab.
z1max
WASEDA UNIVERSITY , IPS
z1
144
Fixed-weight approach gives the GAs a tendency to sample the area toward a fixed point in the criterion space. Random-weight approach gives the GAs a tendency to demonstrate a variable search direction, therefore, the ability to sample the area uniformly over the entire frontier. f1 f1
z = wk f k ( x )
k =1
wk =
rk
q
j =1 j
k = 1, 2, , q
where rj are non-negative random number between [0, 1]. Before selecting a pair of parents for crossover operation, a new set of random weights is specified. The selection probability pi for individual i is then defined by the following linear scaling function:
pi =
zi z min
popSize j =1
(z
z min )
It is characterized by:
Storing nondominated solutions externally in a second, continuously updated population. Evaluating an individuals fitness dependent on the number of external nondominated points that dominate it. Preserving population diversity using the Pareto dominance relationship. Incorporating a clustering procedure in order to reduce the nondominated set without destroying its characteristics.
147
n si = N +1
where si is proportional to the number of population members jP for which i j. n is the number of individuals in P that are covered by i and N is the size of P. f1
3/8 5/8
3/8
f2 Fig. 6.9 Two scenarios for a maximization problem with two objectives.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 148
f j = 1+
i, i j
s ,
i
where f j [1, N )
where the fitness of an individual jP is calculated by summing the strengths of all external nondominated solutions iP that cover j. f1
11/8 16/8 13/8 3/8 5/8 13/8
3/8 11/8
19/8 16/8
f2 Fig. 6.10 Two scenarios for a maximization problem with two objectives.
Soft Computing Lab. WASEDA UNIVERSITY , IPS 149
151
Each algorithm was applied to each test problem 20 times (i.e., 20 runs) using different initial populations. All the simulations were performed with Java on Pentium 4 processor (1.5-GHz clock).
Soft Computing Lab. WASEDA UNIVERSITY , IPS 152
10, 15 4, 15
12
8, 20 6, 20
17
11, 8 11, 25
3
13, 20
9, 15
13
7, 20 7, 20
18
5, 8
22
10, 30
11, 15
32, 20
9 12, 15
9, 15
14
7, 20 5, 20
19
23 2, 30
3, 30
25
135, 20 631, 20
3, 10 13, 4 33, 10 7, 10 7, 10
3, 8 3, 10
10
14, 15
15
14, 20 4, 20
20 14, 25
12, 25
24
5, 15
6
Soft Computing Lab.
11
16
14, 20
21
cij , uij
j 153
11
29, 11 13, 2 6, 8
20
16
26, 9
3
10, 20
12
30, 10 6, 8 9, 10 12, 7
21
10, 20 31, 15 8, 4
2,15
17
33, 20
13
34, 10 15, 10 2, 9
22
6, 30
25
126, 20
18
7, 20 30, 8 11, 6
5
634, 20
14
35, 6 14, 5 7, 8
23
9, 15
10
11, 22 6, 6
19
35, 9
6
Soft Computing Lab.
12, 15
15
8, 10
24
cij , uij
154
155
5000
cost
10000
15000
20000 0 20 40 60 80 100
flow
z2
260 318 376 510 590 644 744 808 918 1030 1206 1320 1496 1650 1796 1875 1955 2058 2162 2262
z1
39 40 41 42 43 45 46 47 48 49 50 51 52 53 54 55 56 57 58 60
z2
2380 2447 2531 2648 2696 2866 3042 3049 3151 3322 3393 3527 3530 3932 4066 4072 4364 4479 4747 5010
z1
62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
z2
z1
82 83 84 85 86 87 88 89 90
z2
14088 14841 15561 16198 16842 17528 18332 18988 19597
5339 5743 5936 5962 6162 6382 6714 6846 6952 7182 7364 8043 8707 9375 10057 10750 11438 12123 12735 13523
157
5000
cost
10000
15000
20000 0 20 40
flow
60
80
100
z2
52 115 167 248 275 306 388 495 608 653 784 872 953 965 1035 1168 1217 1275 1332
z1
31 32 33 34 35 36 37 38 40 42 43 44 45 47 48 49 50
z2
1408 1488 1595 1640 1753 1818 1892 1942 2171 2319 2405 2587 2653 2701 2897 2974 3077
z1
55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 73
z2
3525 3610 3669 3732 3987 4189 4458 4551 4751 4867 5069 5341 5517 5583 5809 5941 6128
z1
75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
z2
6815 7081 7227 7308 8002 8697 9319 9997 10667 11341 11949 12623 13455 14116 14735 15551 16100
28 29
159
D1R =
1 S*
rS *
min{d
rx
x S j}
where S* is a reference solution set for evaluation the solution set Sj. dxr is the distance between a solution x and2 a reference solution r. 2 d rx = f1 ( r ) f1 ( x) + f 2 (r ) f 2 ( x)
) (
[Ref.] Ishibuchi, H., T. Yoshida & T. Murata: Balance Between Genetic Search and Local Search in Memetic Algorithms for Multiobjective Permutation Flowshop Scheduling. IEEE Trans. On Evol. Comp., Vol. 7, No. 2, pp. 204-223, 2003. Soft Computing Lab. 160 WASEDA UNIVERSITY , IPS
Table 6.9 Comparison with the four approaches using the RNDS (Sj) measure.
Test Problems (# of nodes/ # of arcs) 25/49 25/56 RWA 0.57 0.41 RNDS (Sj) SPEA NSGA- 0.54 0.34 0.39 0.36 AWA 0.61 0.53 RWA CPU Times SPEA NSGA- 15693 15981 AWA 14170 14961
Table 6.10 Comparison with the four approaches using the D1R measure.
Test Problems (# of nodes/ # of arcs) 25/49 25/56 RWA 191.21 203.96 D1R measure SPEA NSGA- 315.61 224.40 228.65 185.89 AWA 143.58 141.43 RWA CPU Times SPEA NSGA- 15693 15981 AWA 14170 14961
161
Table 6.12 Comparison with the four approaches using the RNDS (Sj) measure.
Test Problems (# of nodes/ # of arcs) 25/49 25/56 AWA 0.57 0.51 RNDS (Sj) RWA SPEA 0.44 0.32 0.56 0.60 NSGA- 0.48 0.41
Table 6.13 Comparison with the four approaches using the D1R measure.
Test Problems (# of nodes/ # of arcs) 25/49 25/56 AWA 191.17 147.07 D1R measure RWA SPEA 203.72 219.59 222.28 279.60 NSGA- 239.99 433.43
162
Table 6.12 Comparison with the four approaches using the RNDS (Sj) measure.
Test Problems (# of nodes/ # of arcs) 25/49 25/56 RWA 0.44 0.32 RNDS (Sj) SPEA NSGA- 0.56 0.60 0.48 0.41 AWA 0.57 0.51
Table 6.13 Comparison with the four approaches using the D1R measure.
Test Problems (# of nodes/ # of arcs) 25/49 25/56 RWA 203.72 219.59 D1R measure SPEA NSGA- 222.28 279.60 239.99 433.43 AWA 191.17 147.07
163
Sj
R NDS ( S j )
Sj
R NDS ( S j )
D1R: distance RNDS (Sj): ratio of nondominated solutions |Sj|: No. of obtained solutions Soft Computing Lab. WASEDA UNIVERSITY , IPS 164
Conclusion
In this study, we presented a GA approach used a priority-based chromosome for solving the network design problems. It is easy to verify that any permutation of the encoding corresponds to the paths. So that most existing genetic operators can easily be applied to the encoding. Also, any path has a corresponding encoding. Therefore, any point in solution space is accessible for genetic search. For solving the MXF/MCF, and Multi-criteria Network Design Problem, we also combines an adaptive evaluation function based on the AWA. The fitness values of all individuals are calculated according to this adaptive evaluation function. In each generation, the set of Pareto solutions is updated by deleting all dominated solutions and adding all newly generated Pareto solutions. Computer simulations show the several numerical experiments by using several network optimization problems, and show the effectiveness of the proposed method.
WASEDA UNIVERSITY , IPS 165