Explore BrainMass

# Genetic Approximation

Genetic algorithms (GAs) are just one of the many examples of human invention mimicking nature. In this case, it is the process of natural evolution which is translated into a GA search heuristic in order to solve or optimize search problems. Mutation, inheritance, selection and crossover processes of nature are also frequently adopted as algorithms in fields like bioinformatics, phylogenetics, computational science, engineering, economics, chemistry, manufacturing, mathematics, physics and pharmacometrics1. It is truly amazing how wide a range of applications there are for this method of generating optimal solutions.

On the technical side of things, a GA implements its own tailored version of natural selection by trying to 'evolve' a pool of candidate solutions for the given problem into better, more optimal solutions. In this way, the solution's attributes are 'mutated' until they reach an acceptably accurate state. Typically, GAs require a description of the solution domain as well as a fitness function in order to appropriately evaluate that domain and ensure the solution is optimal .

Standard representation for the parts of a GA include:

• binary strings of 1s and 0s for solutions (not exclusively, but traditionally)
• each candidate solution expressed in an array of bits (or another type of array)
• genetic representation of the solution domain where the fixed size means their parts align naturally for ease of crossover operations
• variable length representation, or for more complex solutions, crossover implementation for the operations themselves.

Reference:

1. Silicon Institute of Technology (2014). Multi Objective Optimization with Genetic Algorithm. [ONLINE] Available at: http://www.silicon.ac.in/s2014/4-.php. [Last Accessed 22/5/2014].

### UCSC Genome Browser Exercises (tutorial with screenshots)

The Solution includes a selection of solved exercises with captions step by step to illustrate several applications of the UCSC Genome Browser and depending tools, such as BLAT, including a study case over human NR4A2 gene: 1.Locate the gene in the human genome 2. Hide all tracks and display the RefSeq gene (compact)in the g

### Ticketing System Requirements

The following is a description of a ticket issuing system for rail travel: The ticket issuing system is intended to automate the sale of rail tickets. Users will be able to select their destination and input a credit card and a personal identification number. The rail ticket is then issued, and the user's credit card account is

### Webhosting Comparisons

I am looking for some assistance with interpreting the attached file, which is about different web hosting plans. I also would like guidance on how to formulate a 1-2 page business memo to a client that compares and contrasts the different web hosting plans. See the attached file.

### Query processing strategy

Why is it not desirable to force users to make an explicit choice of a query processing strategy? Are there cases where it is desirable for users to be aware of the costs of competing query-processing strategies? Please explain.

### Easy Credit evaluates the credit limit of people based on their income and past credit limits.

Easy Credit evaluates the credit limit of people based on their income and past credit limits. Based on these inputs, calculations are performed to ascertain the credit worthiness of the customer. The following is a pseudocode that will help them automate the system of checking the credit worthiness and then printing out the res

### Health Information Technology

In what ways has health information technology changed medicine in the past 50 years?

### Learning Organizations

It is likely that your organization uses various decision-support programs, such as programs that automate production, programs for resource optimization, and so on. Briefly describe the situation inside your company, in terms of the use of such systems, and discuss whether it can be characterized as a learning organization.

### C++ programming and conceptual questions

12. Write a program that reads in an integer from the keyboard and displays its value doubled, using two functions that you write. The reading function should be int and the displaying function should be void. 13. How does the use of inline speed up the execution of a program? What is the disadvantage of using inline? 14.

### Transaction Log, Distributed Database, Query Optimization algorithms, Data Fragmentation and Data Replication strategies

1. Suppose that you are a manufacturer of product ABC, which is composed of parts A, B, and C. Each time a new product is created, it must be added to the product inventory, using the PROD_QOH in a table named PRODUCT. And each time the product ABC is created, the parts inventory, using PART_QOH in a table named PART, must be re

### Life cycle of a project

Detail all the written documentation, reports and communications methods used during the life cycle of a project. What are some elements of a successful project kickoff meeting? What are some elements of a successful project communications plan? Detail how a wide variety of project management documents are created and emp

### Graphics, sound, and actions in Web site design

1) The use of sound and action in Web pages can produce mixed results, positive and negative. Provide a URL for a site you feel uses sound and/or action effectively and positively. State your viewpoint, and describe why the function added to the appeal of the site. 2) What are the differences between the various graphic forma

### Identify the benefits of performing a site survey

You play the role of a network administrator. Your boss has just come to you and said that she wants a wireless network installed in the office, but the time line she gives you for setting up the network is very short and would make it difficult to conduct a site survey. You know that the site survey is a critical piece of setti

### Find an article or Web site on security attack prevention

Please use MS Word for this assignment. Prepare a 2-3 page paper evaluating the article and information provided.

### Yahoo web hosting

Hello OTA: I found some information on Yahoo Web Hosting, and for our project I need why we choose Yahoo web hosting for our hosting of our web site. Yahoo! Small Business is a one-stop success center where you can enhance every aspect of your online operations. Yahoo.com is the No. 1 Internet brand globally and attracts the

### Startup and maintenance costs of wiki, podcast, blog

What are the startup and maintenance costs of wiki, podcast, blog?

### Normalization and Optimization

Do explain the process of Normalization? Explain the context in which Normalization is used? What is its purpose? What are the steps to be taken? What do we actually do when we normalize? Would you describe Normalization as Science or Art? Dedicate your last paragraph to Optimization (de-normalization)

### When might it be appropriate to write software using machine code?

When might it be appropriate to write software using machine code?

### Outlook 2003 and Excel 2003

Describe at least two different software packages used by your company or commonly used. Include communication, word processing, finance and/or personnel software, as necessary. Describe the software packages in detail and discuss how the software enhances collaboration between workers and/or departments. analysis of t

### What types of data files do your know? What are advantages and disadvantages of each type?

Can you please help with the following study question? What types of data files do your know? What are advantages and disadvantages of each type? In which cases (when writing a programming code ) would you use each of the types? Give examples.

### Data Warehousing

What is data warehousing? How are databases and data warehousing related? Do you believe data warehousing is a fad or a "real" technology which will benefit organizations? What are XML databases? Are these of any value to organizations?

### Capability Maturity Model (CMM)

Using the Library, Internet, and other resources, discuss the following concerning the Capability Maturity Model (CMM): What are the benefits of using this model? What are the stages of the CCM? What happens at each stage? Research and relate how the CMM improved the software development processes of a particular company.

### Programming Languages Multiple Choice Questions

1. What does the term aliasing mean? a. Having two names for the same memory cell b. Having two referencing methods for the same memory cell c. Both a and b. d. Neither a nor b. 2. The most rigorous means of describing the meaning of a program is called _________ semantics. a. dynamic b. denotational c. static d. axi

### Relation Between Data Mining and Data Warehousing

How are data warehousing and data mining related?

### Airlines booking analysis model and design model

I require assistance in producing an analysis model & design model for the system through use case diagrams and document template as attached. See attached file for full problem description. The AIMS is envisioned to provide a single, integrated environment for dealing with all aspects of Albatross Airline's operation. Th

Describe at least three trade secrets that might exist in a website. You won't develop a website, but speculate every aspect of your trade secrets.

### System Development Life Cycle

(a) What should be management's role in the system development life cycle (SDLC)? (b) Why does project planning usually come before analysis and design? (c) What are some of the methodologies commonly used for requirements elicitation? (d) How can a prototype be used? (e) What are some metrics that c

### Differences are noted.

How is Visual Basic .NET different from any other programming language?

### performance of a communication protocol design

Considiring the performance of a communincation protocol design, how might the number of messages have potentially the largerst impact as compared to the total amount of data? How can one improve such protocol when using reliable communincation?