Open Access   Article Go Back

RED DROP: Optimisation of Blood Donor Using Genetic Algorithm

K.S.Wagh 1 , Shubhangi Mangrulkar2 , Tejaswini Nagawade3 , Aishwarya Ingewar4 , Rohit Pende5

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 418-426, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.418426

Online published on Apr 30, 2019

Copyright © K.S.Wagh, Shubhangi Mangrulkar, Tejaswini Nagawade, Aishwarya Ingewar, Rohit Pende . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.S.Wagh, Shubhangi Mangrulkar, Tejaswini Nagawade, Aishwarya Ingewar, Rohit Pende , “RED DROP: Optimisation of Blood Donor Using Genetic Algorithm,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.418-426, 2019.

MLA Style Citation: K.S.Wagh, Shubhangi Mangrulkar, Tejaswini Nagawade, Aishwarya Ingewar, Rohit Pende "RED DROP: Optimisation of Blood Donor Using Genetic Algorithm." International Journal of Computer Sciences and Engineering 7.4 (2019): 418-426.

APA Style Citation: K.S.Wagh, Shubhangi Mangrulkar, Tejaswini Nagawade, Aishwarya Ingewar, Rohit Pende , (2019). RED DROP: Optimisation of Blood Donor Using Genetic Algorithm. International Journal of Computer Sciences and Engineering, 7(4), 418-426.

BibTex Style Citation:
@article{Mangrulkar_2019,
author = {K.S.Wagh, Shubhangi Mangrulkar, Tejaswini Nagawade, Aishwarya Ingewar, Rohit Pende },
title = {RED DROP: Optimisation of Blood Donor Using Genetic Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {418-426},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4052},
doi = {https://doi.org/10.26438/ijcse/v7i4.418426}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.418426}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4052
TI - RED DROP: Optimisation of Blood Donor Using Genetic Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - K.S.Wagh, Shubhangi Mangrulkar, Tejaswini Nagawade, Aishwarya Ingewar, Rohit Pende
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 418-426
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
483 374 downloads 151 downloads
  
  
           

Abstract

The number of online blood banks are available but none of them offer direct contact between donor and recipient. algorithm. The optimization of donor is also on the basis of most nearest location of requested person i.e. recipient. Based on the constraint satisfaction and most nearest location of donor the fittest donor is found out. Contact information of fittest donor is made available to recipient at any time even in urgent need of blood.

Key-Words / Index Term

Genetic Algorithm; Constraints, Fitness Function, Donor, Blood Bank, Crossover, Mutation, Genetic Operators

References

[1] Li Minqiang, Kou Jason, Lin Dan, etc. Genetic Algorithm: Basic Theory and Application [M]. Beijing.
[2] K. Deb and D. E. Goldberg, “An investigation of niche and species formation in genetic function optimization,” in Proceedings of the Third International Conference on Genetic Algorithms, J. D. Schaffer, Ed. San Mateo, CA: Morgan Kauffman, 1989, pp. 42–50.
[3] Soo-Jung Kim, Sun K. Yoo, Hyun-Ok Kim, HaSuk Bae, Jung-Jin Park, Kuk-Jin Seo and ByungChul Chang, "Smart Blood Bag Management System in a Hospittal Environment"InternationalFederation
[4] Bing-Nan Li, Taipa Ming-Chui Dong, Vai, M.1. "From Coda bar to ISBT 128: Implementing Barcode Technology in Blood Bank Automation System", 27th Annual International Conference of the Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005.
[5] W. Zhang, W. Chen and Y. Wang, The Adaptive Genetic Algorithms for Portfolio Selection Problem, International Journal of Computer Science and Network Security, VOL. 6 No.1, January 2006.
[6] Michael Chau, Eddie Cheng and Chi Wai Chan. Data Analysis for Healthcare: A Case Study in Blood Donation Center Analysis. Proceedings of Sixteenth Americas Conference on Information Systems (AMICS), 2010.
[7] A. Isaacs, T. Ray, and W. Smith, “Blessings of maintaining infeasible solutions for constrained multi-objective optimization problems,” in Proceedings of IEEE Congress on Evolutionary Computation (CEC), 2008, pp. 2780–2787.
[8] Ming Jiang, Ping Fu, Hexin Chen, Mianshu Chen, Bo Xing, et al. A Dynamic Blood Information Management System Based on RFID. Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China, September 1-4, 2005.
[9] Wiltbank TB, Giordano GF, Kamel H, Tomasulo P, Custer B. 2008. “Faint and pre-faint reactions in whole blood donors: An analysis of predonation measurements and their predictive value”, Transfusion. 2008 Sep; 48(9):1799-808. Epub 2008 May 14.
[10] Bravo, M., Kamel, H., Custer, B., Tomasulo, P.“Factors associated with fainting – before, during and After whole blood donation,” Vox Sanguinis (2011)101, 303–312.
[11] Michael Chau, Eddie Cheng and Chi Wai Chan. Data Analysis for Healthcare: A Case Study in Blood Donation Centre Analysis. Proceedings of Sixteenth Americas Conference on Information Systems (AMICS), 2010.
[12] Shyam Sundaram and T. Santhanam. Classification of Blood Donors using Data Mining. Proceedings of the Semantic Business and Enterprise Computing, pp. 145-147, 2009.
[13] Wang Meng, Jin Hanjun, Wang Xiaorong, Research on set at random algorithm in intelligent generating test paper [J], Computer Engineering and Design, VoI.27(2006), No.19, 3583-3585 (In Chinese).
[14] The Optimization of Blood Donor Information and Management System by Technopedia P. Priya1, V. Saranya2, S. Shabana3, Kavitha Subramani4 Department of Computer Science and Engineering, Panimalar Engineering College, Chennai, India.
[15] Centre for Biologics Evaluation and Research (CBER). Draft guidelines for the validation of blood establishment computer systems, 2005.
[16] Glynn, S. A., Klein man, S. H., Schreiber, G. B., Zuck, T., McCombs, S., Bethel, J., et al. Motivations to Donate blood: Demographic comparisons. Transfusion, 42(2), 216–225, 2002.
[17] Li, B. N., & Dong, M. C. Banking on blood. Computing and Control Engineering (August–September), 22–25, 2006.
[18] Roh, T. H., Ahn, C. K., & Han, I. The priority factor Model for customer relationship management system Success. Expert Systems with Applications, 28(4), 641–654, 2005.
[19] Behrouz A. Forouzan, “Cryptography & Network Security”, Special Indian Edition, Tata McGraw-Hill, ch. 1, ch. 14.
[20] C. A. Coello, “Theoretical and numerical constraint- handling techniques used with evolutionary algorithms: A survey of the state of the art,” Computer Methods in Applied Mechanics and Engineering, vol. 191, no. 11-12, pp. 1245–1287, 2002.
[21] Z. Michalewicz, “A Survey of Constraint Handling Techniques in Evolutionary Computation Methods,” in Proceedings of the 4th Annual Conference on Evolutionary Programming, J. R. McDonnell, R. G. Reynolds, and D. B. Fogel, Eds. Cambridge, Massachusetts: The MIT Press, 1995, pp. 135–155.
[22] E. Mezura-Montes, Ed., Constraint-Handling in Evolutionary Optimization, ser. Studies in Computational Intelligence. Springer-Verlag Berlin Heidelberg, 2009, vol. 198.
[23] A. Kuri-Morales and C. V. Quezada, “A Universal Eclectic Genetic Algorithm for Constrained Optimization,”in Proceedings 6th European Congress On Intelligent Techniques & Soft Computing, EUFIT’98. Aachen, Germany: Verlag Mainz, September 1998, pp. 518–522.
[24] A. Homaifar, S. H. Y. Lai, and X. Qi, “Constrained Optimization via Genetic Algorithms,” Simulation, vol. 62, no. 4, pp. 242–254, 1994.
[25] J. Joines and C. Houck, “On the use of non-stationary Penalty functions to solve nonlinear constrained Optimization problems with GAs,” in Proceedings of The first IEEE Conference on Evolutionary Computation, D. Fogel, Ed., Orlando, Florida, 1994, pp 579–584.
[26] G. Panchal, D. Panchal, “Solving NP hard problem Using Genetic Algorithm,” in National Women Conference, CITC, Changa.
[27] A. Ganatra, Classification and Optimization to Evaluate The Fitness of an Algorithm. Lap Academic Publisher, Germany, 2012.
[28] F. Hoffmeister and Sprave, “Problem-independent Handling of constraints by use of metric penalty Functions,” in Proceedings of the Fifth Annual Conference on Evolutionary Programming (EP’96), L. J. Fogel, P. J. Angeline, and T. B ̈ask, Eds. San Diego, California: The MIT Press, February 1996, pp. 289–294.
[29] T. Ray, K. Tai, and K. Seow, “Multiobjective design Optimization by an evolutionary algorithm,” Engineering Optimization, vol. 33, no. 4, pp. 399–424, 2001.
[30] Wieling, Wouter; France, Christopher R.; Dijk, Nynke Van; Kamel, Hany; Thijs, Roland D.; and Tomasulo, Peter. “Physiologic strategies to prevent fainting Responses during or after whole blood donation,” TRANSFUSON, April 2011.
[31] P., Ramachandran, Dr., N., Girija, Dr., T., Bhubaneswari, "Classifying Blood Donors Using Data Mining Techniques," IJCSET | Feb 2011 | Vol 1, Issue 1, 10-13.
[32] T., Hilda, Jenipha, R., Backiyalakshmi, "Android Blood Donor Life Saving Application in Cloud Computing,"Volume-03, Issue-02, pp-105- 108.
[33] Wiltbank TB, Giordano GF, Kamel H, Tomasulo P, Custer B. 2008. “Faint and pre-faint reactions in whole Blood donors: An analysis of predonation measurements and their predictive value”, Transfusion. 2008 Sep; 48(9):1799-808. Epub 2008 May 14.
[34] H. Kautz, B. Selman, and Y. Jiang, “A general Stochastic approach to solving problems with hard and Soft constraints,” The Satisfiability Problem: Theory And Applications, vol. 17, pp. 573–586, 1997.
[35] P. D. Surry and N. J. Radcliffe, “The COMOGA Method: Constrained optimisation by multi-objective Genetic algorithms,” Control and Cybernetics, vol. 26, No. 3, 1997.
[36] I. Berrada, J. A. Ferland, and P. Michelon, “A multi- Objective approach to nurse scheduling with both hard And soft constraints,” SocioEconomic Planning Sciences, vol. 30, no. 3, pp. 183–193, 1996.
[37] Sandip Mal and Kumar Rajnish, Sanjeev Kumar, “Package Level Cohesion Metric for Object-Oriented Design”, International Journal of Engineering and Technology (Engineering Journal publishers), Scopus, Vol-5, No.3, PP: 2523-2528, 2013.
[38] Sandip Mal and Kumar Rajnish, “Validation of new cohesion metric against Braind properties”, Advances in Intelligent Systems and Computing Vol: 243, PP: 591- 597, Springer, 2014, DOI: 10.1007/978-81-322-1665- 0_58.
[39] G. Prabakaran, R. Bhavani, P.S. Rajeswari, “Multi secure and robustness for medical image based steganography scheme, “Circuits, Power and Computing Technologies (ICCPCT), 2013 International Conference, pp. 1188-1193, 20-21 March 2013.
[40] N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality of LSB based image Steganography, “Computational Intelligence and Communication Networks(CICN), 2013 5th International Conference, pp. 385-390, 27-29 Sept. 2013.