Mutation - canonical genetic algorithm, Computer Engineering

Mutation:

However it may appear that the above recombinations are a little arbitrary that especially as points defining whether crossover and inversion occur are chosen randomly. Further it is important to notice that large parts of the string are kept, whether the string contained a region that scored well doing with the evaluation function that these operators have a good chance of passing such that region on to the offspring and especially where the regions are fairly small and  as in most GA problems, the overall string length is quite high. 

Furthermore the recombination process , it produces a large range of possible solutions. Moreover it is still possible for it to guide the search with a local rather than the global maxima with respect to the evaluation function. Hence for this reason, GAs regularly perform random mutations. Thus in this process, the offspring are taken and each bit in their bit string is flipped from a one to a zero or vice versa regarding to a given probability. In fact this probability is generally taken to be very small which say less than 0.01, so that only one in a hundred letters is flipped on average.

Posted Date: 1/12/2013 6:15:51 AM | Location : United States







Related Discussions:- Mutation - canonical genetic algorithm, Assignment Help, Ask Question on Mutation - canonical genetic algorithm, Get Answer, Expert's Help, Mutation - canonical genetic algorithm Discussions

Write discussion on Mutation - canonical genetic algorithm
Your posts are moderated
Related Questions
How are applications of generic framework for e-commerce executed? To execute applications, this is essential to have Supporting Information and Organizational Infrastructure a

Explain the Race Around Condition? Consider the inputs of the JK flipflop j=1 and k=1 and Q=0 when a clock pulse of width tp is applied the output will change from 0 to 1 after

drawbacks of shadow paging

Direct or random access of elements is not possible in:- In Linked list direct or random access of elements is not possible

Explain about the network level in detail. Network Level Firewall/Packet Filters: At the Network level firewalls operate upon the mechanism of filtering individual IP pa

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

What are the authentication methods in .NET?   1. WINDOWS AUTHENTICATION 2. FORMS AUTHENTICATION 3. PASSPORT AUTHENTICATION The authentication option for the ASP.N

CIM and Holonic Manufacturing System The improvement of computer integrated manufacturing has demonstrated that the automation has the same potential such that of computers in

The CCITT standard bandwidth for speech is: (A) 20000 Hz                                  (B) 15000 Hz (C) 7000 Hz                                    (D) 3400 Hz Ans:

What is Basic Time Division Switching? Basic Time Division Switching: The functional blocks of a memory based time division switching switch is demonstrated in figure and i