GAA UNIT 5 - Part A
GAA UNIT 5 - Part A
GAA UNIT 5 - Part A
Applications
UNIT V
Presenter
Dr.Siron Anita Susan T
AP/SRMIST
Feature Selection
• Genetic algorithms (GAs) are known for their ability to efficiently search large,
unknown spaces.
• GAs are relatively insensitive to noise, making them robust for feature selection.
• Due to their noise insensitivity, GAs are an excellent choice for a robust feature
selection strategy.
• Using GAs for feature selection can enhance the performance of texture
classification systems.
• Genetic algorithms (GAs) are a form of inductive learning strategy.
• Adaptive Search Techniques: GAs are adaptive search techniques that show
significant improvement over random and local search methods.
• Exploitation of Information: GAs exploit accumulating information about an
initially unknown search space to bias searches towards promising subspaces.
Cont…
• GAs are domain-independent search techniques, suitable for applications where domain
knowledge and theory are hard to provide.
• Key Issues in Application: The main issues in applying GAs are selecting an appropriate
representation and an adequate evaluation function.
• Feature Selection Representation: In feature selection, the focus is on representing the
space of all possible subsets of a given feature set.
• Binary Representation: The simplest form of representation in feature selection is
binary, where each feature is a binary gene.
• Fixed-Length Binary String: Each individual in the population is a fixed-length binary
string, representing a subset of the given feature set.
• Binary Feature Vector: An individual of length l corresponds to an l-dimensional binary
feature vector X.
• Inclusion or Elimination: Each bit in the binary feature vector indicates whether a feature
is included (1) or eliminated (0).
Evaluation Function
Genetic Operators:
• The Internet enables easy and immediate acquisition of large numbers of digital color images, such as
daily growth of plants in remote fields.
• Detailed information concerning shape, growth rate, and leaf colors of plants can be obtained from
these images.
• Vast quantities of image data increase the time spent extracting detailed information due to the
need for human aid and empirical knowledge of image processing.
• The extraction procedure involves segmenting images of objects and deriving their outlines or areas,
often through routine and trial and error performed by hand.
• Expert systems and automated image processing systems have been studied in various engineering
areas.
• Genetic algorithms are suitable for selecting filtering algorithms and adjusting parameters for
segmenting target components in images due to their optimization and automation by trial and error.
• Researchers have applied GAs to obtain optimal image processing transformations, mapping the
original image into the target.
• Software based on GAs can be used for segmenting images of plants and acquiring knowledge on the
operations involved.
Image Segmentation Strategy
• Algorithm Steps:
• Compute Cluster Centers: Calculate the center (mean) of
each cluster.
• Reassign Objects: Assign each object to the cluster with the
nearest center using the Hamming distance.
• Repeat Cycle: This process is repeated for a specified number
of iterations or until the cluster assignments do not change
during an iteration.
Application:
Classical k-Means Algorithm: Implemented due to the reduced number of features.
Versatility: The approach can be applied to any large databases depending on the user's application.
Genetic Algorithm Based Fuzzy Data Mining to Intrusion Detection
• The widespread use of computer networks and the rise of e-commerce have made computer
network security a global priority.
• Intrusion Detection Categories:
• Misuse Detection: Recognizes attacks based on known patterns reported by experts. Vulnerable
to new or masked attack patterns.
• Anomaly Detection: Identifies intrusions by detecting deviations from normal behavior
patterns.
• AI Techniques in Intrusion Detection:
• Rule-Based Expert Systems: Use if-then rules based on expert knowledge of known attacks
(e.g., SRI’s IDES). The rule acquisition process is tedious and prone to errors.
• Machine Learning Techniques: Automate learning of attack patterns (e.g., TIM, neural network-
based systems).
• Data Mining in Intrusion Detection:
• Challenges: Rules derived directly from audit data may miss slight deviations or cause false
alarms due to minor changes in normal behavior.
• Fuzzy Logic Integration: Helps address these challenges by smoothing the separation between
normality and abnormality, providing a degree of normality or abnormality.
Cont…
Prototype Intelligent Intrusion Detection System (IIDS):
• Combines Two Approaches:
• Anomaly-based detection using fuzzy data mining.
• Misuse detection using traditional rule-based expert systems.
• Inputs: Uses both network traffic and system audit data.
Use of Genetic Algorithms:
Architecture of IIDS
Cont…
Machine Learning Component:
• Integrates fuzzy logic with association rules and frequency episodes to learn normal
patterns of system behavior.
• Stores normal behavior as sets of fuzzy association rules and fuzzy frequency episodes.
Adaptability:
• The machine learning component allows adaptation to new environments.
Cont…
Modular Structure:
• Detection methods implemented as a set of intrusion detection modules.
• Modules can address one or multiple types of intrusions.
• Modules can cooperate to detect intrusions in a loosely coupled manner.
• Different modules may use different methods (e.g., rule-based expert system, neural
network classifier).
• Modular structure eases future system expansion.
Decision-Making Module:
• Decides whether to activate an intrusion detection module (misuse or anomaly).
• Integrates evaluation results provided by the intrusion detection modules.
Communication Module:
• Acts as the bridge between the intrusion detection sentries and the decision-making
module.
• Pre-processes audit data and sends results to the communication module.
• Provides feedback to the sentries.
Very Large Scale Integration (VLSI)
Objective:
The objective of VLSI (Very Large Scale Integration) testing is to create a
collection of test vectors (sequences of input stimuli) that effectively detect
and diagnose manufacturing defects within integrated circuits (ICs).
•Stuck at fault modeling is the widely used fault modeling method in VLSI
Testing.
•Here nodes are assumed to be stuck at either “0” or “1”, for the purpose
fault modeling.
• Testing methodology for a digital circuit
Very Large Scale Integration (VLSI)
• Description of macrocells as rectangular blocks with terminals (pins) for signal transmission.
• Definition of nets connecting terminals for signal transmission, some routed to pads for chip I/O.
Problem Description
• Inputs of the placement problem are
• a set of blocks with fixed geometries and fixed pin positions
• a set of nets specifying the interconnections between pins of blocks
• a set of pads (external pins) with fixed positions
• a set of user constraints, e.g., block positions/orientations, critical nets, if any
VLSI Macro Cell Layout Using Hybrid GA
• The objective function, which measures the quality of the resulting placement, can be
expressed as follows,
• E =1/(C1ChipArea+C2WireLength)
where C1,C2 are the corresponding weights.
Genetic Layout Optimization
• The Hybrid Genetic Algorithm
• Design of a Hybrid Genetic Algorithm (HGA) incorporating heuristics to enhance
the quality of offspring produced by crossover.
□ If the offspring's layout has lower fitness than both parents, it is discarded.
The Hybrid Genetic Algorithm
• Mutation process:
□ Random number generation within the range of 0 to 1.
□ If the generated number is less than the specified probability for the mutation
operator, a layout is randomly selected and replaced with a randomized version in the
population.
The classical layout problem discussed in problem description; in which wirelength is also a factor in
fitness value is analyzed. But due to technological progress, technologies like Over-The-Cell routing are
now used so there is no need to determine wirelength and to add routing space (through which wires are
routed) to the layout.
Therefore in the fitness function introduced in problem description, C1 is assigned one, and C2 is
assigned zero.
The result of using hybrid GA is shown in Table 10.12.
Self Study:
• GA in network synthesis
• Fuzzy based speed control of business DC motor.
• Application in wireless network for topology planning
• GA application in ATM network