Next Article in Journal
Percentile Study of χ Distribution. Application to Response Time Data
Next Article in Special Issue
Hybridization of Multi-Objective Deterministic Particle Swarm with Derivative-Free Local Searches
Previous Article in Journal
Reduced Dilation-Erosion Perceptron for Binary Classification
Previous Article in Special Issue
An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Gene-Similarity Normalization in a Genetic Algorithm for the Maximum k-Coverage Problem

1
Department of Computer Engineering, College of Information Technology, Gachon University, 1342 Seongnamdaero, Sujeong-gu, Seongnam-si, Gyeonggi-do 13120, Korea
2
School of Software, Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, Korea
*
Author to whom correspondence should be addressed.
Mathematics 2020, 8(4), 513; https://doi.org/10.3390/math8040513
Submission received: 28 February 2020 / Revised: 27 March 2020 / Accepted: 30 March 2020 / Published: 2 April 2020
(This article belongs to the Special Issue Evolutionary Computation & Swarm Intelligence)

Abstract

:
The maximum k-coverage problem (MKCP) is a generalized covering problem which can be solved by genetic algorithms, but their operation is impeded by redundancy in the representation of solutions to MKCP. We introduce a normalization step for candidate solutions based on distance between genes which ensures that a standard crossover such as uniform and n-point crossovers produces a feasible solution and improves the solution quality. We present results from experiments in which this normalization was applied to a single crossover operation, and also results for example MKCPs.

1. Introduction

The maximum k-coverage problem (MKCP) is regarded as a generalization of several covering problems. The problem has a range of applications in combinatorial optimization such as scheduling, circuit layout design, packing, facility location, and covering graphs by subgraphs [1,2]. Recently, besides some theoretical approaches [3,4], it has been extended to many real-world applications such as blog-watch [5], seed selection in a Web crawler [6], map-reduce [7], influence maximization in social networks [8], recommendation in e-commerce [9], sensor deployment in wireless sensor networks [10], multi-depot train driver scheduling [11], cloud computing [12], and location problem [13].
Let A = ( a i j ) be an m × n 0-1 matrix, and let w i be a weight applied to each row of A. The objective of MKCP is to choose k columns so as to maximize the sum of the weights of the rows that contain ‘1’ and are also located in one of these k columns.
This problem can be represented formally as follows:
maximize i = 1 m w i · I j = 1 n a i j x j 1 subject to j = 1 n x j = k x j { 0 , 1 } , j = 1 , 2 , , n ,
where I ( · ) is an indicator function ( I ( f a l s e ) = 0 and I ( t r u e ) = 1 ).
We are concerned with the case that w i = 1 for all i, when we say that a row is covered by the selected k columns if it contains ‘1’ which is also located in one of these columns. In this case, MKCP is to find k columns that cover as many rows as possible.
MKCP has many real-world applications. For example, MKCP can be applied to the following practical applications about museum touring [14]: Suppose that a museum can operate only k guided tour programs of visiting a set of exhibits among n possible programs due to some constraints such as operating costs. If there are m visitors and it is possible to predict whether or not each visitor i is satisfied with the experience of each program j (meaning a i j ), the problem of choosing exactly k programs to satisfy as many visitors as possible is exactly formulated as MKCP. Among the visitors, if it is preferred to satisfy specific visitors who have more importance such as VIPs, the problem can be modeled more elaborately by giving different weight ( w i ) to each visitor i. Similarly, MKCP can be applied to other practical applications such as public safety networks and systems [15,16]. For example, we can consider a disaster management system in which n agencies are involved and m positions for Unmanned Aerial Vehicles (UAVs) are available to enable the communication between the agencies. In this situation, it can be easily investigated whether or not each agency i is covered when a UAV is placed in each position j (meaning a i j ). If only k UAVs are available for resource management, the problem of choosing exactly k positions of UAVs to cover as many agencies in the disaster area as possible can also be formulated as MKCP.
The NP-hardness of MKCP can easily be deduced from the NP-hardness of the minimum set covering problem (MSCP) [17]. Many meta-heuristics have been applied to the MSCP such as tabu search [18], genetic algorithms [19,20], particle swarm optimization [21], ant colony optimization [22], etc., but MKCP has been scarcely addressed. Some naïve greedy heuristics [1,7,23,24,25] and an improved local search [26], which do not scale well to large datasets, have been studied. To the best of our knowledge, there is only one meta-heuristic [27] that uses particle swarm optimization, applied to MKCP, and genetic algorithms have not been applied. The present authors previously conducted an initial investigation of MKCP [28], which we now extend. Because MKCP selects a fixed number of columns, the representation of solutions is simpler than it is in other covering problems, and this favors the adoption of a genetic algorithm (GA). When we apply a GA to the MKCP, it also has an interesting inherent property that each gene of a chromosome is not just a number but actually a column of a matrix, which we analyze and relate to the characteristic of its solution space. We go on to present a problem-specific normalization for use in a GA which takes account of the feasibility of solutions and improves the solution quality.
The remaining parts are organized as follows. We analyze the solution space of MKCP, and the representation of solutions in Section 2. Based on this analysis, in Section 3, we propose a normalization method for producing feasible and improved solutions. In Section 4, we present experimental results to assess the effectiveness of our method. Finally, we draw conclusions in Section 5.

2. Representation and Space of Solution to MKCP

When we solve a problem with GAs, the representation of chromosomes is an important issue. Representation depends on the problem and reflects the properties of the problem. One representation of a solution to MKCP is a vector of k integers representing column indices; another is a binary vector of length n, in which each element indicates whether or not the corresponding column is selected. Thus, when k = 2 and n = 4 , the integer representation ( 1 , 4 ) is equivalent to the binary vector representation ( 1 , 0 , 0 , 1 ) . We focus on the integer vector representation.
Using the integer vector representation, the encodings ( 1 , 4 ) and ( 4 , 1 ) both represent the same solution. The coverage, which is the value of the objective function, is also independent of this ordering. Since for the same solution there may be more than one different encoding, encoding space (genotypes) is different from solution space (phenotypes). We can consider permutations and combinations as genotypes and phenotypes, respectively. In the integer vector representation, it is natural to encode combinations using permutation encoding. However, in this case, many encodings correspond to the same combination. That is, this representation is redundant. Let G be the space of encodings in the integer vector representation, and let two encodings x and y in G be ( x 1 , x 2 , , x n ) and ( y 1 , y 2 , , y n ) , respectively. Now, the relation ∼ is defined on G:
Definition 1.
x y if and only if we have a permutation σ Σ k such that σ ( x 1 , x 2 , , x k ) = ( y 1 , y 2 , , y k ) , where Σ k is the set of permutations of size k, and σ ( x ) represents x permuted by σ.
Proposition 1.
The relation ∼ becomes an equivalence relation.
Proof. 
For each i k , Σ i , forms a symmetric group S i , where ∘ is the function composition operator [29]. Then, the direct product P : = Π i = 1 k S k is also a group [29], and therefore has an identity meaning that the relation ∼ is reflexive. When σ P , its inverse σ 1 P exists, i.e., the relation ∼ is symmetric. The group P is closed under the operator ∘: It means if σ 1 , σ 2 P , then σ 1 σ 2 P . That is, the relation ∼ is also transitive. Taken together, the relation ∼ becomes an equivalence relation. □
For example, the solutions ( 1 , 3 , 5 , 7 ) and ( 3 , 7 , 5 , 1 ) are equivalent. The number of vectors equivalent to a vector g G is k ! .
The equivalence relation of Definition 1 allows us to consider the real solution space (phenotype space) as the set of equivalence classes of elements in G, i.e., the quotient space G / .
We can measure the similarity of two vectors x and y in G, the space of MKCP solution encodings, using a distance metric D, which we obtain by summing values of a subsidiary metric d which measures the difference between two columns of the matrix A which expresses the MKCP, as follows:
D ( x , y ) : = i = 1 n d ( x i , y i ) .
Here, the genes of two chromosomes, x i and y i , represent chosen column indices. If we regard the indices as just labels, not column vectors, the discrete metric, which becomes one if the two indices are the same, and zero otherwise, can be used as a metric d. This satisfies all the conditions for a distance metric including the triangular inequality.
An alternative metric is Hamming distance, which is a measure of the dissimilarity of two binary vectors. If we consider each column of the matrix A as a binary vector (the column vector), not just an integer, we can find the Hamming distance between any two column vectors, and hence between the corresponding genes x i and y i in two chromosomes from G. These distances can then be summed as shown in Equation (1).
Figure 1 shows two distances in G calculated using discrete metric and Hamming distance. As shown in Figure 1c, the discrete metric simply compares the column indices of x i and y i , and ignores the contents of the corresponding columns of A. In Figure 1d, we see that the distance between x 1 and y 1 is the Hamming distance between the first and the second column vectors of A.
Now, we establish a metric in the quotient space G / by the following proposition:
Proposition 2.
Let x = ( x 1 , x 2 , , x n ) and y = ( y 1 , y 2 , , y n ) be in G, and let a metric D on G be defined by Equation (1). Then,
D ¯ ( x ¯ , y ¯ ) : = min σ Σ k i = 1 k d ( x i , σ i ( y ) )
becomes a metric on G / , where σ i ( y ) represents the ith element of permuted y by σ.
Proof. 
Let σ be in the group Π i = 1 k S k . The computation D ( x , y ) : = i = 1 n d ( x i , y i ) , is unaffected by summation order, and thus D ( x , y ) = D ( σ ( x ) , σ ( y ) ) . Hence, σ is an isometry on G, and thus Π i = 1 k S k is an isometry subgroup. The relation ∼ is an equivalent relation obtained from Π i = 1 k S k . Hence from [30,31] D ¯ ( x ¯ , y ¯ ) is a metric on G / . □

3. Normalization in MKCP

As shown above, redundancy in the integer representation of solutions to MKCP means that the encoding (genotype) space G is unnecessarily larger than the true solution (phenotype) space, which is the quotient space G / . Redundant representations can be expected to reduce the performance of genetic algorithms significantly, which, in particular, undermines the effectiveness of standard crossovers defined using masks [32]. The problem of redundant representations have been addressed by a number of methods such as adaptive crossover [33,34,35,36], and among which the normalization technique [37] is representative. Normalization changes a parent genotype into a different genotype with the same phenotype which is similar to the genotype of the other parent before a standard crossover is performed. It is based on adaptive crossovers [34,35] and many variants have appeared [31,38,39].

3.1. Preserving Feasibility

A representation is infeasible if it does not meet the requirements of a solution. Figure 2a shows an integer representation which is infeasible because it contains duplicate column indices, and Figure 2b shows a binary representation which is infeasible because it contains the wrong number of ‘1’s. Figure 2 also shows how these infeasible solutions are likely to be created by standard crossover operators such as uniform and n-point crossovers.
A repairing step can be performed to restore feasibility, but this has the effect of a mutation, and may garble gene sequences inherited from parents. Using integer encoding, the problem can be avoided by rearranging the parents so that any shared column indices are in the same position. Such rearrangement naturally makes offspring preserve feasibility and no special repairing step is required. This form of normalization is easily implemented, as shown in the pseudocode in Figure 3, and takes O ( k 2 ) time.
In Figure 4, this normalization to preserve feasibility for the example in Figure 2a is shown.

3.2. Normalization for Improving Solution Quality

A good solution to MKCP will consist of dissimilar columns. For example, in Figure 1, ( 1 , 3 ) is a better solution than ( 1 , 4 ) because the ‘1’s in Columns 1 and 3 all occur in different rows, while Columns 1 and 4 share a ‘1’ in Row 2.
In the context of a genetic algorithm, we would expect chromosomes with genes corresponding to dissimilar columns to be most effective. Looking again at Figure 1, suppose that we apply a standard one-point crossover to the parents ( 1 , 2 ) and ( 3 , 4 ) . If the cutting line lies between the first gene and the second one, then the offspring will be ( 1 , 4 ) , and this offspring covers the rows { 1 , 2 , 3 } of A. However, if the second parent is rearranged to ( 4 , 3 ) , the offspring becomes ( 1 , 3 ) , which covers { 1 , 2 , 4 , 5 } . This example is illustrated in Figure 5. In general, we want the offspring to have genes that correspond to columns that are as dissimilar as possible. Thus, it is helpful to rearrange chromosomes so that genes corresponding to similar columns are in the same positions. The goal of this rearrangement can be formulated in terms of distance in the phenotype space G / . Consider two parents x and y in the genotype space G. Rearranging genes so that those corresponding to the most similar columns are located in the same positions is equivalent to the search for a permutation σ * such that the distance between the equivalence class of x and that of y is equal to the distance between x and σ * ( y ) . This is also equivalent to finding the σ which minimizes the distance between x and the permuted y in Equation (2).
The optimal rearrangement is achieved by considering all of the permutations of genes in the second parent, and choosing the permutation that minimizes the distance sum between the column vectors corresponding to gene pairs in the same locations. If Hamming distance H is used to get the dissimilarity between the column vectors corresponding to two genes, we will choose the permutation σ * such that
σ * = argmin σ Σ k i = 1 k H ( x i , σ i ( y ) ) ,
where Σ k is the set of all the permutations of length k and σ i ( y ) denotes the ith element of permuted y by σ .
We give an example case in Figure 6, in which the chromosomes ( 1 , 2 ) and ( 3 , 4 ) are both parents, and now we normalize ( 3 , 4 ) . Because k is 2, the number of all the permutations is just 2. We compute i = 1 k H ( x i , σ i ( y ) ) for each permutation. If σ 1 = 1 2 1 2 , σ 1 ( y ) = ( 3 , 4 ) . Then, H ( x 1 , σ 1 1 ( y ) ) = 4 , H ( x 2 , σ 2 1 ( y ) ) = 2 , and their sum is 6. For the second permutation σ 2 = 1 2 2 1 , σ 2 ( y ) = ( 4 , 3 ) . Then, H ( x 1 , σ 1 2 ( y ) ) = 2 , H ( x 2 , σ 2 2 ( y ) ) = 2 , and their sum is 4. Since this is smaller than 6, σ 2 = 1 2 2 1 is the optimal permutation.
Enumerating all k ! permutations is intractable for a large k, and thus this procedure is intractable. However, the problem can be solved using the Hungarian method [40], which is a network-flow-based technique. It provides an optimal result, and runs in O ( k 3 ) time [41]. Alternatively, we can use a fast heuristic [42], which runs in O ( k 2 ) and produces results very close to the optimum. Either of these methods can be treated as a function that accepts a 2D array, in which the elements are the distances between two genes, and returns the permutation with the minimum total distance between chromosomes. This normalization is shown in the pseudocode of Figure 7.
After we rearrange the second parent according to the permutation σ * , a standard crossover is applied.
Now, we investigate the relation between this optimal rearrangement and the feasibility. There may be more than one optimal rearrangement satisfying Equation (3), but we can show that one of them is always feasible. Feasibility is preserved by an optimal permutation σ * which locates all common indices in the same positions by σ * , as we now prove:
Proposition 3.
If x = ( x 1 , x 2 , , x k ) and y = ( y 1 , y 2 , , y k ) are two chromosomes and x p = y q , then there exists σ * Σ k such that σ p * ( y ) = y q and i = 1 k d ( x i , σ i * ( y ) ) i = 1 k d ( x i , σ i ( y ) ) for all σ Σ k , where d is a distance metric.
Proof. 
Let σ be argmin σ Σ k i = 1 k d ( x i , σ i ( y ) ) . There is an index r satisfying σ r ( y ) = y q . Let σ be the same permutation as σ , except that σ ( y ) p and σ r ( y ) are exchanged:
σ i ( y ) = σ r ( y ) if i = p , σ p ( y ) if i = r , σ i ( y ) otherwise .
Then,
i = 1 k d ( x i , σ i ( y ) ) = d ( x p , σ p ( y ) ) + d ( x r , σ r ( y ) ) + i p , i r d ( x i , σ i ( y ) ) = d ( x p , σ r ( y ) ) + d ( x r , σ p ( y ) ) + i p , i r d ( x i , σ i ( y ) ) = d ( x p , y q ) + d ( x r , σ p ( y ) ) + i p , i r d ( x i , σ i ( y ) ) = d ( x r , σ p ( y ) ) + i p , i r d ( x i , σ i ( y ) ) ( d ( x p , y q ) = 0 by assumption ) d ( x r , x p ) + d ( x p , σ p ( y ) ) + i p , i r d ( x i , σ i ( y ) ) ( triangular inequality ) = d ( x r , y q ) + d ( x p , σ p ( y ) ) + i p , i r d ( x i , σ i ( y ) ) = d ( x r , σ r ( y ) ) + d ( x p , σ p ( y ) ) + i p , i r d ( x i , σ i ( y ) ) = i = 1 k d ( x i , σ i ( y ) ) i = 1 k d ( x i , σ i ( y ) ) for all σ Σ k .
Hence, i = 1 k d ( x i , σ i ( y ) ) i = 1 k d ( x i , σ i ( y ) ) for all σ Σ k and σ p ( y ) = y q . □
This proof relies on the triangular inequality, which is a key property of any valid distance. Thus, Proposition 3 holds for distances other than Hamming distance. We could use discrete metric, introduced in Section 2. This distance provides a very rough comparison of two solutions, but Proposition 3 still holds. Equation (3) can be rewritten using discrete metric ρ instead of Hamming distance H:
σ * = argmin σ Σ k i = 1 k ρ ( x i , σ i ( y ) ) .
In particular, in this case, feasibility is preserved by any optimal permutation σ * in Equation (4). Its proof is quite similar to the proof of Proposition 3.
Proposition 4.
If x = ( x 1 , x 2 , , x k ) and y = ( y 1 , y 2 , , y k ) are two chromosomes and x p = y q , then σ p * ( y ) = y q , where σ * is a permutation such that i = 1 k ρ ( x i , σ i * ( y ) ) i = 1 k ρ ( x i , σ i ( y ) ) for all σ Σ k .
Proof. 
We assume that σ p * ( y ) y q . There is an index r satisfying σ r * ( y ) = y q . Let σ be the same permutation as σ * , except that σ * ( y ) p and σ r * ( y ) are exchanged:
σ i ( y ) = σ r * ( y ) if i = p , σ p * ( y ) if i = r , σ i * ( y ) otherwise .
Then,
i = 1 k ρ ( x i , σ i ( y ) ) = ρ ( x p , σ p ( y ) ) + ρ ( x r , σ r ( y ) ) + i p , i r ρ ( x i , σ i ( y ) ) = ρ ( x p , σ r * ( y ) ) + ρ ( x r , σ p * ( y ) ) + i p , i r ρ ( x i , σ i * ( y ) ) = ρ ( x p , y q ) + ρ ( x r , σ p * ( y ) ) + i p , i r ρ ( x i , σ i * ( y ) ) = ρ ( x r , σ p * ( y ) ) + i p , i r d ( x i , σ i * ( y ) ) ( x p = y q by assumption ) < 1 + 1 + i p , i r d ( x i , σ i * ( y ) ) = ρ ( x p , σ p * ( y ) ) + ρ ( x r , x p ) + i p , i r ρ ( x i , σ i * ( y ) ) ( x p σ p * ( y ) and x r x p ) = ρ ( x p , σ p * ( y ) ) + ρ ( x r , y q ) + i p , i r ρ ( x i , σ i * ( y ) ) = ρ ( x p , σ p * ( y ) ) + ρ ( x r , σ r * ( y ) ) + i p , i r ρ ( x i , σ i * ( y ) ) = i = 1 k ρ ( x i , σ i * ( y ) ) .
This contradicts the assumption that i = 1 k ρ ( x i , σ i * ( y ) ) i = 1 k ρ ( x i , σ i ( y ) ) for all σ Σ k . □
Using discrete metric will only cause identical indices to be rearranged into the same positions. In fact, normalization by discrete metric is exactly the same as rearranging for preserving feasibility introduced in Section 3.1.

4. Experiments

4.1. Test Sets and Test Environments

Our experiments were conducted on 65 instances of 11 set cover problems with various size and densities, from the OR-library [43]. Although these benchmark data were designed as set cover problems, the data can also be considered as maximum k-coverage problems, as in [27]. Some details of these problems are presented in Table 1, where m and n are the numbers of rows and columns, respectively, and density is the percentage of ‘1’s in the MKCP matrix A. The present authors previously experimented with problems with fixed values of k of 10 and 20 [28]. However, in this study, we varied k with the tightness ratio α , which is the product of k and the density of a problem. The higher is the tightness ratio, the larger is the value of the object function, which is the coverage, that we are likely to achieve. If the tightness ratio is 1, the optimum coverage is likely to be very close to n. We used tightness ratios of 0.8 , 0.6 , and 0.4 .
We implemented all our tested algorithms in C language using gcc version 5.4.0, and ran them on Ubuntu 16.04.6.

4.2. Effect of Normalization on a Crossover

To see whether or not normalization is effective at crossover, we performed experiments with three methods of rearranging the second of two parents before a crossover:
  • REPAIR: The second parent is not rearranged before the crossover, but infeasible offspring are repaired to restore feasibility after the crossover.
  • FP: The second parent is rearranged to produce only feasible offspring using the normalization in Figure 3.
  • OPT: The second parent is rearranged by the normalization in Figure 7, to minimize the sum of the distances using the permutation σ * of Equation (3).
REPAIR produces feasible offspring by the method of replacing duplicate column indices with a randomly chosen one among the indices that are not contained in the offspring. OPT was implemented using the Hungarian method [40], which runs in O ( k 3 ) time.
To determine the most effective method, we performed the following steps:
(1)
N parent chromosomes were randomly generated. (N was set to 100.)
(2)
The chromosomes were randomly paired, making N / 2 couples.
(3)
The second parent in each pair was rearranged using the methods described above.
(4)
A uniform crossover was applied to each couple.
(5)
We computed the mean and the standard deviation for the coverage of each of the N / 2 offspring.
This procedure was applied to a single instance of each problem listed in Table 1 using REPAIR, FP, and OPT. Table 2 shows the results for each of these 11 instances. We see that OPT normalization outperforms the others, and can therefore be expected to improve the performance of a GA. Moreover, the results of the one-tailed t-test show that the objective values of offspring produced using OPT normalization were better than those of their parents. On the contrary, the values produced using REPAIR and FP were similar to those of their parents. This suggests that, compared to other methods, OPT normalization would strongly support the function of the crossover operator in searching the solution space in a promising direction, without replacement strategy.

4.3. Performance of GAs with Normalization Methods

Our underlying evolutionary model is similar to the model of CHC [44], which was applied to many problems [45,46,47,48,49,50]. We paired a population of N chromosomes randomly, and then we applied crossover to each pair, generating a total of N / 2 offspring. We ranked all parents and offspring and the fittest N individuals among them became the population in the next generation. We used 100 as the size of population in our experiments. We reinitialized the population, except for the best individual, if there were no changes over k r ( 1 r ) generations, where r is a divergence ratio that wes set to 0.25 . This GA stopped after 500 generations and returned the best it has found. The pseudocode of our GA is given in Figure 8.
In the following experiments, we changed the normalization method in a single GA. We compared the output of our GA with the best result that we found in this study, using the metric %-gap, which is 100 × | b e s t o u t p u t | / b e s t .
Thirty trials were performed for each method, and the averaged results are shown in Table 3. The results labeled RR-GA were produced without normalization: infeasible offspring produced were repaired randomly using the same method as REPAIR in Section 4.2. We also compared the results from the GA with a multi-start method using randomly generated solutions. In each run of this method, called Multi-Start, we sampled 10 6 random solutions and chose the best one. Even RR-GA performed significantly better than Multi-Start, suggesting that GAs are an appropriate mechanism for solving the MKCP.
The results labeled FP-GA in Table 3 were produced by rearranging the genes of the second parent to produce feasible offspring without the need for repair. FP-GA outperformed RR-GA for large values of k but not for small values. It seems that the effect of mutation by repair is rather effective when the solution space is small.
The results labeled OPT-GA in Table 3 were produced by the GA with the proposed normalization. Using the same GA as FP-GA, OPT-GA rearranges the genes of the second parent to minimize the sum of distances between genes (column vectors) before applying recombination. OPT-GA clearly outperforms Multi-Start and RR-GA; the results of one-tailed t-tests prove that OPT-GA also outperforms FP-GA significantly.
The results of the t-tests show that Multi-Start is clearly the worst technique, even though it is allowed 10 6 evaluations, while the GA-based methods produce relatively small 2.5 × 10 4 chromosomes. RR-GA and FP-GA have similar performance, and OPT-GA clearly does best.

5. Conclusions

We present the maximum k-coverage problem (MKCP) and analyze its representation and solution space. If we apply a GA to the MKCP, then we immediately encounter the issue of redundancy in the genotype space, which is larger than the phenotype space that we characterize as a quotient space. We introduce a method of normalizing chromosomes that ensures a crossover produces feasible offspring with genes that are column vectors of the MKCP matrix and are as dissimilar as possible. This normalization was implemented using the Hungarian method [40]. We performed experiments which showed the effectiveness of this approach.
In this study, we adopted two locus-based metrics of the discrete metric and its extended version derived from Hamming distance between genes (column vectors). However, other metrics such as some variants of Cayley metric on permutations [51,52] may also be applied to the proposed theoretical framework. In the case of such non-locus-based metric, we should design a new crossover tailored to the metric. This investigation will be a promising work, which we leave for future study.
As mentioned in the Introduction, the proposed theoretical framework can be applied to real-world applications such as the cyber-physical social systems and public safety networks. We leave this applied work for future study. We also expect that this approach can be applied to other problems which have the same representation for their solutions. By expanding this technique to solution representations of variable length as in [53,54], we believe it could also be applied to the set cover problem.

Author Contributions

Conceptualization, Y.Y. and Y.-H.K.; methodology, Y.-H.K.; software, Y.Y.; validation, Y.Y.; formal analysis, Y.Y.; investigation, Y.Y.; resources, Y.Y.; data curation, Y.Y.; writing—original draft preparation, Y.Y.; writing—review and editing, Y.-H.K.; visualization, Y.Y.; supervision, Y.-H.K.; project administration, Y.-H.K.; and funding acquisition, Y.-H.K. All authors have read and agreed to the published version of the manuscript.

Funding

The present research was conducted by the Research Grant of Kwangwoon University in 2020. This research was a part of the project titled ‘Marine Oil Spill Risk Assessment and Development of Response Support System through Big Data Analysis’ funded by the Korea Coast Guard. This work was also supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (Ministry of Science, ICT & Future Planning) (No. 2017R1C1B1010768).

Acknowledgments

The authors thank Byung-Ro Moon for his valuable suggestions, which improved this paper.

Conflicts of Interest

The authors declare that they have no conflict of interest.

Disclosure

A preliminary version of this paper appeared in the Proceedings of the Genetic and Evolutionary Computation Conference, pp. 593–598, 2008. In comparison with the conference paper, this paper was newly rewritten with the following new materials: (i) new work: complete literature survey (Section 1) and complete theoretical work of the proposed normalization (Section 2 and Section 3.2); and (ii) improved work: an improved genetic algorithm (through the improvement of normalization technique), and its largely-extended experiments together with their statistical verification (Section 4).

References

  1. Hochbaum, D.S.; Pathria, A. Analysis of the greedy approach in problems of maximum k-coverage. Nav. Res. Logist. 1998, 45, 615–627. [Google Scholar] [CrossRef]
  2. Caprara, A.; Fischetti, M.; Toth, P.; Vigo, D.; Guida, P.L. Algorithms for railway crew management. Math. Program. 1997, 79, 125–141. [Google Scholar] [CrossRef] [Green Version]
  3. Indyk, P.; Mahabadi, S.; Mahdian, M.; Mirrokni, V.S. Composable Core-sets for Diversity and Coverage Maximization. In Proceedings of the 33rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Snowbird, UT, USA, 22–27 June 2014; pp. 100–108. [Google Scholar]
  4. Indyk, P.; Vakilian, A. Tight Trade-offs for the Maximum k-Coverage Problem in the General Streaming Model. In Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, Amsterdam, The Netherlands, 30 June–5 July 2019; pp. 200–217. [Google Scholar]
  5. Saha, B.; Getoor, L. On Maximum Coverage in the Streaming Model & Application to Multi-topic Blog-Watch. In Proceedings of the the SIAM International Conference on Data Mining, Sparks, NV, USA, 30 April–2 May 2009; pp. 697–708. [Google Scholar]
  6. Zheng, S.; Dmitriev, P.; Giles, C.L. Graph Based Crawler Seed Selection. In Proceedings of the 18th International Conference on World Wide Web, WWW ’09, Madrid, Spain, 20–24 April 2009; pp. 1089–1090. [Google Scholar]
  7. Chierichetti, F.; Kumar, R.; Tomkins, A. Max-cover in Map-reduce. In Proceedings of the 19th International Conference on World Wide Web, Raleigh, NC, USA, 26–30 April 2010; pp. 231–240. [Google Scholar]
  8. Li, F.H.; Li, C.T.; Shan, M.K. Labeled Influence Maximization in Social Networks for Target Marketing. In Proceedings of the IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, Boston, MA, USA, 9–11 October 2011; pp. 560–563. [Google Scholar]
  9. Hammar, M.; Karlsson, R.; Nilsson, B.J. Using Maximum Coverage to Optimize Recommendation Systems in e-Commerce. In Proceedings of the 7th ACM Conference on Recommender Systems, Hong Kong, China, 12–16 October 2013; pp. 265–272. [Google Scholar]
  10. Yoon, Y.; Kim, Y.H. An Efficient Genetic Algorithm for Maximum Coverage Deployment in Wireless Sensor Networks. IEEE Trans. Cybern. 2013, 43, 1473–1483. [Google Scholar] [CrossRef] [PubMed]
  11. Yaghini, M.; Karimi, M.; Rahbar, M. A set covering approach for multi-depot train driver scheduling. J. Comb. Optim. 2015, 29, 636–654. [Google Scholar] [CrossRef]
  12. Liu, Q.; Cai, W.; Shen, J.; Fu, Z.; Liu, X.; Linge, N. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 2016, 9, 4002–4012. [Google Scholar] [CrossRef]
  13. Máximo, V.R.; Nascimento, M.C.V.; Carvalho, A.C.P.L.F. Intelligent-guided adaptive search for the maximum covering location problem. Comput. Oper. Res. 2017, 78, 129–137. [Google Scholar] [CrossRef]
  14. Tsiropoulou, E.E.; Thanou, A.; Papavassiliou, S. Quality of Experience-based museum touring: A human in the loop approach. Soc. Netw. Anal. Min. 2017, 7, 33. [Google Scholar] [CrossRef]
  15. Sikeridis, D.; Tsiropoulou, E.E.; Devetsikiotis, M.; Papavassiliou, S. Socio-spatial resource management in wireless powered public safety networks. In Proceedings of the IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 810–815. [Google Scholar]
  16. Fragkos, G.; Tsiropoulou, E.E.; Papavassiliou, S. Disaster Management and Information Transmission Decision-Making in Public Safety Systems. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  17. Garey, M.; Johnson, D.S. Computers and Intractability: A Guide to the Theory of NP-Completeness; Freeman: San Francisco, CA, USA, 1979. [Google Scholar]
  18. Caserta, M.; Doerner, K.F. Tabu search-based metaheuristic algorithm for the large-scale set covering problem. In Metaheuristics: Progress in Complex Systems Optimization; Springer: New York, NY, USA, 2007; pp. 43–63. [Google Scholar]
  19. Aickelin, U. An indirect genetic algorithm for set covering problems. J. Oper. Res. Soc. 2002, 53, 1118–1126. [Google Scholar] [CrossRef] [Green Version]
  20. Beasley, J.E.; Chu, P.C. A Genetic Algorithm for the Set Covering Problem. Eur. J. Oper. Res. 1996, 94, 392–404. [Google Scholar] [CrossRef]
  21. Balaji, S.; Revathi, N. A new approach for solving set covering problem using jumping particle swarm optimization method. Nat. Comput. 2016, 15, 503–517. [Google Scholar] [CrossRef]
  22. Al-Shihabi, S.; Arafeh, M.; Barghash, M. An improved hybrid algorithm for the set covering problem. Comput. Ind. Eng. 2015, 85, 328–334. [Google Scholar] [CrossRef]
  23. Ausiello, G.; Boria, N.; Giannakos, A.; Lucarelli, G.; Paschos, V. Online maximum k-coverage. Discret. Appl. Math. 2012, 160, 1901–1913. [Google Scholar] [CrossRef] [Green Version]
  24. Yu, H.; Yuan, D. Set coverage problems in a one-pass data stream. In Proceedings of the the SIAM International Conference on Data Mining, Austin, TX, USA, 2–4 May 2013; pp. 758–766. [Google Scholar]
  25. Chandu, D.P. Big Step Greedy Heuristic for Maximum Coverage Problem. Int. J. Comput. Appl. 2015, 125, 19–24. [Google Scholar]
  26. Wang, Y.; Ouyang, D.; Yin, M.; Zhang, L.; Zhang, Y. A restart local search algorithm for solving maximum set k-covering problem. Neural Comput. Appl. 2018, 29, 755–765. [Google Scholar] [CrossRef]
  27. Lin, G.; Guan, J. Solving maximum set k-covering problem by an adaptive binary particle swarm optimization method. Knowl.-Based Syst. 2018, 142, 95–107. [Google Scholar] [CrossRef]
  28. Yoon, Y.; Kim, Y.H.; Moon, B.R. Feasibility-Preserving Crossover for Maximum k-Coverage Problem. In Proceedings of the Genetic and Evolutionary Computation Conference, Atlanta, GA, USA, 12–16 July 2008; pp. 593–598. [Google Scholar]
  29. Fraleigh, J.B. A First Course in Abstract Algebra, 7th ed.; Addison Wesley: Boston, MA, USA, 2002. [Google Scholar]
  30. Burago, D.; Burago, Y.; Ivanov, S.; Burago, I.D. A Course in Metric Geometry; American Mathematical Society: Providence, RI, USA, 2001. [Google Scholar]
  31. Yoon, Y.; Kim, Y.H.; Moraglio, A.; Moon, B.R. Quotient geometric crossovers and redundant encodings. Theor. Comput. Sci. 2012, 425, 4–16. [Google Scholar] [CrossRef] [Green Version]
  32. Choi, S.S.; Moon, B.R. Normalization in Genetic Algorithms. In Proceedings of the Genetic and Evolutionary Computation Conference, Chicago, IL, USA, 12–16 July 2003; pp. 862–873. [Google Scholar]
  33. Dorne, R.; Hao, J.K. A New Genetic Local Search Algorithm for Graph Coloring. In Proceedings of the Fifth Conference on Parallel Problem Solving from Nature, Amsterdam, The Netherlands, 27–30 September 1998; pp. 745–754. [Google Scholar]
  34. Laszewski, G. Intelligent Structural Operators for the k-way Graph Partitioning Problem. In Proceedings of the Fourth International Conference on Genetic Algorithms, San Diego, CA, USA, 13–16 July 1991; pp. 45–52. [Google Scholar]
  35. Mühlenbein, H. Parallel genetic algorithms in combinatorial optimization. In Computer Science and Operations Research: New Developments in Their Interfaces; Pergamon: Oxford, MS, USA, 1992; pp. 441–456. [Google Scholar]
  36. Van Hoyweghen, C.; Naudts, B.; Goldberg, D.E. Spin-flip symmetry and synchronization. Evol. Comput. 2002, 10, 317–344. [Google Scholar] [CrossRef]
  37. Kang, S.J.; Moon, B.R. A Hybrid Genetic Algorithm for Multiway Graph Partitioning. In Proceedings of the Genetic and Evolutionary Computation Conference, Las Vegas, NV, USA, 8–12 July 2000; pp. 159–166. [Google Scholar]
  38. Moraglio, A.; Kim, Y.H.; Yoon, Y.; Moon, B.R. Geometric Crossovers for Multiway Graph Partitioning. Evol. Comput. 2007, 15, 445–474. [Google Scholar] [CrossRef]
  39. Choi, S.S.; Moon, B.R. Normalization for Genetic Algorithms with Nonsynonymously Redundant Encodings. IEEE Trans. Evol. Comput. 2008, 12, 604–616. [Google Scholar] [CrossRef]
  40. Kuhn, H.W. The Hungarian Method for the assignment problem. Nav. Res. Logist. Q. 1955, 2, 83–97. [Google Scholar] [CrossRef] [Green Version]
  41. Papadimitriou, C.H.; Steiglitz, K. Combinatorial Optimization: Algorithms and Complexity; Prentice-Hall: Englewood Cliffs, NJ, USA, 1955. [Google Scholar]
  42. Avis, D. A survey of heuristics for the weighted matching problem. Networks 1983, 13, 475–493. [Google Scholar] [CrossRef]
  43. Beasley, J.E. OR-Library: Distributing test problems by electronic mail. J. Oper. Res. Soc. 1990, 41, 1069–1072. [Google Scholar] [CrossRef]
  44. Eshelman, L.J. The CHC adaptive search algorithm: How to have safe search when engaging in nontraditional genetic recombination. In Foundations of Genetic Algorithms; Morgan Kaufmann: Burlington, MA, USA, 1991; pp. 265–283. [Google Scholar]
  45. Alba, E.; Luque, G.; Araujo, L. Natural language tagging with genetic algorithms. Inf. Process. Lett. 2006, 100, 173–182. [Google Scholar] [CrossRef]
  46. Cordón, O.; Damasb, S.; Santamaría, J. Feature-based image registration by means of the CHC evolutionary algorithm. Image Vis. Comput. 2006, 24, 525–533. [Google Scholar] [CrossRef]
  47. Guerra-Salcedo, C.; Whitley, D. Genetic Search for Feature Subset Selection: A Comparison Between CHC and GENESIS. In Proceedings of the Third Annual Conference on Genetic Programming; Morgan Kaufmann: Burlington, MA, USA, 1998; pp. 504–509. [Google Scholar]
  48. Nebro, A.J.; Alba, E.; Molina, G.; Chicano, F.; Luna, F.; Durillo, J.J. Optimal antenna placement using a new multi-objective CHC algorithm. In Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, London, UK, 7–11 July 2007; pp. 876–883. [Google Scholar]
  49. Tsutsui, S.; Goldberg, D.E. Search space boundary extension method in real-coded genetic algorithms. Inf. Sci. 2001, 133, 229–247. [Google Scholar] [CrossRef] [Green Version]
  50. Yoon, Y.; Kim, Y.H.; Moraglio, A.; Moon, B.R. A Theoretical and Empirical Study on Unbiased Boundary-extended Crossover for Real-valued Representation. Inf. Sci. 2012, 183, 48–65. [Google Scholar] [CrossRef] [Green Version]
  51. Pinch, R.G.E. The distance of a permutation from a subgroup of Sn. arXiv 2005, arXiv:math/0511501. [Google Scholar]
  52. Kim, Y.H.; Moraglio, A.; Kattan, A.; Yoon, Y. Geometric generalisation of surrogate model-based optimisation to combinatorial and program spaces. Math. Probl. Eng. 2014, 2014, 184540. [Google Scholar] [CrossRef]
  53. Nam, Y.W.; Kim, Y.H. Automatic jazz melody composition through a learning-based genetic algorithm. In Proceedings of the 8th International Conference on Computational Intelligence in Music, Sound, Art and Design (EvoMUSART), Leipzig, Germany, 24–26 April 2019; Lecture Notes in Computer Science. Springer: Berlin, Germany; Volume 11453, pp. 217–233. [Google Scholar]
  54. Lee, J.; Kim, Y.H. Epistasis-based basis estimation method for simplifying the problem space of an evolutionary search in binary representation. Complexity 2019, 2019, 2095167. [Google Scholar] [CrossRef]
Figure 1. Discrete metric vs. Hamming distance, for the chromosomes (1,3) and (2,3).
Figure 1. Discrete metric vs. Hamming distance, for the chromosomes (1,3) and (2,3).
Mathematics 08 00513 g001
Figure 2. How infeasible solutions can be created by crossover operations.
Figure 2. How infeasible solutions can be created by crossover operations.
Mathematics 08 00513 g002
Figure 3. Pseudocode of normalization to preserve feasibility.
Figure 3. Pseudocode of normalization to preserve feasibility.
Mathematics 08 00513 g003
Figure 4. Normalization to preserve feasibility in the example from Figure 2a.
Figure 4. Normalization to preserve feasibility in the example from Figure 2a.
Mathematics 08 00513 g004
Figure 5. Effect of rearranging genes to match similar columns in the example from Figure 1.
Figure 5. Effect of rearranging genes to match similar columns in the example from Figure 1.
Mathematics 08 00513 g005
Figure 6. Normalization with Hamming distance in the example from Figure 1.
Figure 6. Normalization with Hamming distance in the example from Figure 1.
Mathematics 08 00513 g006
Figure 7. Pseudocode of normalization by the optimal rearrangement.
Figure 7. Pseudocode of normalization by the optimal rearrangement.
Mathematics 08 00513 g007
Figure 8. Pseudocode of our genetic algorithm.
Figure 8. Pseudocode of our genetic algorithm.
Mathematics 08 00513 g008
Table 1. Problem set.
Table 1. Problem set.
ProblemmnDensity#Instances
Set Tested
I-420010002%10
I-520020002%10
I-620010005%5
I-A30030002%5
I-B30030005%5
I-C40040002%5
I-D40040005%5
I-E500500010%5
I-F500500020%5
I-G100010,0002%5
I-H100010,0005%5
Table 2. Effect of normalization on a single crossover, after the REPAIR, FP, and OPT procedures.
Table 2. Effect of normalization on a single crossover, after the REPAIR, FP, and OPT procedures.
Tightness ParentsREPAIRFPOPT
RatioInstancekAveSDAveSDAveSDAveSD
scp4140110.276.33110.305.89110.005.46113.806.12
scp5140110.726.62110.006.95111.826.90115.026.77
scp6116111.336.43111.246.64111.206.73114.206.24
scpa140167.697.76166.807.83167.688.47173.668.93
scpb116168.319.27170.809.79168.909.11171.369.25
0.8scpc140220.4010.53221.0410.83220.429.76225.849.91
scpd116223.749.22222.3410.15224.368.69228.569.48
scpnre18284.4310.23285.0810.93285.7611.08287.149.27
scpnrf14295.4410.76294.949.94294.449.50297.349.75
scpnrg140553.3014.49553.9614.56553.8216.10561.2812.16
scpnrh116560.9414.49562.1216.57563.1416.24567.4617.09
scp413090.406.4190.806.3489.984.8295.346.14
scp513090.776.7491.926.9291.446.5094.206.64
scp611290.966.5490.566.1790.945.8691.887.75
scpa130137.548.09136.748.95137.607.63143.748.01
scpb112138.058.31138.448.36139.689.08141.688.28
0.6scpc130181.5910.64178.5210.55180.2411.30186.0610.09
scpd112185.279.08184.809.06185.349.01188.307.72
scpnre16233.0211.34231.6012.83234.0412.41234.1211.04
scpnrf13244.4011.37245.0410.48244.2410.28245.689.57
scpnrg130452.9114.48452.7014.52452.5814.07461.3413.42
scpnrh112461.8713.66460.8016.68462.2216.58462.4015.61
scp412066.445.5266.845.5967.306.0968.065.19
scp512066.415.5467.446.6166.846.4468.986.71
scp61866.556.8067.686.0566.725.9167.745.71
scpa120100.828.4099.807.62100.007.63103.546.80
scpb18101.257.43101.748.91101.067.38104.068.43
0.4scpc120132.4710.42131.688.78133.149.07136.149.92
scpd18135.4810.49136.328.49134.729.46136.949.96
scpnre14171.4310.32172.0410.14172.9412.05173.1611.10
scpnrf12179.9510.83180.049.85179.9411.46182.9011.22
scpnrg120331.5113.57332.1013.64330.5214.89337.3014.60
scpnrh18338.5814.59336.8414.80337.3014.42343.4413.90
t-test p-value *- 4.25 × 10 1 1.09 × 10 1 7.52 × 10 12
Ave and SD are the average and the standard deviation of the fitness of 100 parents (in the column of “Parents”) or 50 offspring (in the remaining columns of REPAIR, FP, and OPT), respectively. REPAIR produces feasible offspring by random repair. FP rearranges the second parent to produce feasible offspring using the normalization in Figure 3. OPT is optimized normalization of the second parent. * The one-tailed t-test of the null hypothesis that the result of given method is equal to fitness of parents.
Table 3. Results of three GAs compared with random solutions to MKCP.
Table 3. Results of three GAs compared with random solutions to MKCP.
TightnessInstance Multi-StartRR-GAt-Test 1 FP-GAt-Test 2 OPT-GAt-Test 3
RatioSetk%-GapAve%-GapAvep-Value%-GapAvep-Value%-GapAvep-Value
I-44028.17141.357.08182.86 6.62 × 10 16 3.36190.19 3.45 × 10 11 1.96192.95 2.56 × 10 10
I-54028.67141.526.84184.82 2.92 × 10 19 3.95190.57 1.71 × 10 9 1.64195.14 5.16 × 10 10
I-61620.56143.774.22173.35 8.21 × 10 10 4.21173.37 4.67 × 10 1 2.53176.42 6.86 × 10 5
I-A4027.62207.576.16269.13 1.09 × 10 9 4.29274.49 4.85 × 10 6 1.81281.61 5.45 × 10 6
I-B1620.56208.934.52251.10 2.69 × 10 7 4.73250.54 8.86 × 10 2 2.68255.94 1.05 × 10 4
0.8I-C4026.81269.336.12345.48 2.89 × 10 8 4.85350.16 7.50 × 10 5 2.10360.28 2.11 × 10 5
I-D1618.78271.433.91321.14 8.71 × 10 8 4.15320.31 6.58 × 10 2 1.90327.84 2.65 × 10 6
I-E812.65336.813.63371.60 7.01 × 10 8 4.04369.99 9.37 × 10 3 2.65375.37 1.31 × 10 4
I-F46.23346.582.25361.27 2.18 × 10 6 2.42360.66 1.27 × 10 1 1.83362.82 1.78 × 10 3
I-G4021.61630.134.73765.78 3.64 × 10 10 3.82773.12 4.74 × 10 4 1.64790.58 1.47 × 10 5
I-H1614.79634.613.31720.14 1.81 × 10 8 3.75716.83 1.29 × 10 2 1.93730.41 5.89 × 10 5
I-43031.62121.576.72165.85 3.47 × 10 16 4.75169.35 8.86 × 10 9 2.69173.01 1.76 × 10 9
I-53032.71121.796.76168.76 1.25 × 10 17 5.69170.70 1.25 × 10 5 2.53176.42 1.53 × 10 12
I-61221.51124.004.35151.12 3.29 × 10 7 4.21151.35 1.62 × 10 1 2.56153.95 1.02 × 10 3
I-A3031.03178.496.12242.97 2.64 × 10 8 5.30245.09 6.19 × 10 3 2.36252.70 6.20 × 10 5
I-B1222.15179.344.83219.27 5.21 × 10 7 5.22218.36 1.65 × 10 2 3.00223.47 1.61 × 10 5
0.6I-C3029.54230.255.89307.54 1.41 × 10 9 5.19309.85 1.43 × 10 3 2.63318.20 3.56 × 10 7
I-D1220.18232.114.28278.34 5.40 × 10 8 4.73277.03 1.78 × 10 2 2.71282.91 8.94 × 10 6
I-E611.82287.653.12316.02 8.78 × 10 8 3.48314.85 2.63 × 10 2 2.25318.84 7.78 × 10 5
I-F34.29296.711.43305.56 5.35 × 10 7 1.91304.09 1.05 × 10 3 1.13306.50 1.72 × 10 4
I-G3024.17531.235.18664.26 2.06 × 10 9 5.00665.56 1.31 × 10 1 2.42683.65 2.75 × 10 5
I-H1215.06535.092.95611.43 2.77 × 10 8 3.34608.92 9.63 × 10 3 1.80618.66 2.49 × 10 4
I-42032.3095.985.56133.91 1.71 × 10 14 4.54135.36 2.39 × 10 7 2.40138.39 2.27 × 10 9
I-52034.3396.276.20137.51 5.07 × 10 16 6.12137.62 2.93 × 10 1 2.76142.55 8.79 × 10 10
I-6819.6398.213.14118.37 3.63 × 10 6 3.38118.08 1.62 × 10 1 2.08119.66 6.08 × 10 4
I-A2032.95140.655.88197.46 1.94 × 10 7 6.12196.95 1.14 × 10 1 2.92203.66 1.14 × 10 5
I-B821.41141.444.02172.76 5.61 × 10 7 4.84171.27 3.75 × 10 3 2.48175.53 1.48 × 10 4
0.4I-C2031.50179.735.50247.96 2.99 × 10 8 5.77247.24 1.12 × 10 1 2.66255.41 5.49 × 10 7
I-D819.61180.873.74216.59 1.92 × 10 6 4.48214.91 2.07 × 10 2 2.56219.23 2.34 × 10 6
I-E49.00222.762.14239.55 1.89 × 10 8 2.64238.34 1.59 × 10 2 1.64240.78 1.21 × 10 6
I-F21.87229.631.72229.97 1.22 × 10 1 1.97229.39 2.48 × 10 2 1.55230.37 8.79 × 10 3
I-G2025.35405.934.45519.61 5.35 × 10 9 4.65518.51 2.74 × 10 2 2.32531.16 2.91 × 10 5
I-H814.64408.883.15463.92 2.75 × 10 9 3.52462.16 2.56 × 10 2 1.87470.06 4.82 × 10 5
Averages from 30 runs. Multi-Start generates random solutions and chooses the best. RR-GA is a genetic algorithm with random repair. FP-GA is a genetic algorithm with FP normalization. OPT-GA is a genetic algorithm with OPT normalization. 1 The one-tailed t-test with the null hypothesis of RR-GA = Multi-Start. 2 The one-tailed t-test with the null hypothesis of FP-GA = RR-GA. 3 The one-tailed t-test with the null hypothesis of OPT-GA = FP-GA.

Share and Cite

MDPI and ACS Style

Yoon, Y.; Kim, Y.-H. Gene-Similarity Normalization in a Genetic Algorithm for the Maximum k-Coverage Problem. Mathematics 2020, 8, 513. https://doi.org/10.3390/math8040513

AMA Style

Yoon Y, Kim Y-H. Gene-Similarity Normalization in a Genetic Algorithm for the Maximum k-Coverage Problem. Mathematics. 2020; 8(4):513. https://doi.org/10.3390/math8040513

Chicago/Turabian Style

Yoon, Yourim, and Yong-Hyuk Kim. 2020. "Gene-Similarity Normalization in a Genetic Algorithm for the Maximum k-Coverage Problem" Mathematics 8, no. 4: 513. https://doi.org/10.3390/math8040513

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop