首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
When the processing times of jobs are controllable, selected processing times affect both the manufacturing cost and the scheduling performance. A well-known example for such a case that this paper specifically deals with is the turning operation on a CNC machine. Manufacturing cost of a turning operation is a nonlinear convex function of its processing time. We also know that scheduling decisions are quite sensitive to the processing times. Therefore, this paper considers minimizing total manufacturing cost (F1)(F1) and total completion time (F2)(F2) objectives simultaneously on identical parallel CNC turning machines. Since decreasing processing time of a job increases its manufacturing cost, we cannot minimize both objectives at the same time, so the problem is to generate non-dominated solutions. We consider the problem of minimizing F1F1 subject to a given F2F2 level and give an effective formulation for the problem. For this problem, we prove some optimality properties which facilitated designing an efficient heuristic algorithm to generate approximate non-dominated solutions. Computational results show that proposed algorithm performs almost equal with the GAMS/MINOS commercial solver although it spends much less computation time.  相似文献   

2.
In the paper two problems of a single machine bicriterion scheduling of a set of deteriorating jobs are considered. The jobs are independent, nonpreemptable and are ready for processing at time 00. The processing time pjpj of each job is a linear function of the starting time SjSj of the job, pj=1+αjSjpj=1+αjSj, where Sj?0Sj?0 and αj>0αj>0 for j=0,1,...,nj=0,1,...,n.  相似文献   

3.
In this paper we focus on the minimal deterministic finite automaton SkSk that recognizes the set of suffixes of a word ww up to kk errors. As first result we give a characterization of the Nerode’s right-invariant congruence that is associated with SkSk. This result generalizes the classical characterization described in [A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. Chen, J. Seiferas, The smallest automaton recognizing the subwords of a text, Theoretical Computer Science, 40, 1985, 31–55]. As second result we present an algorithm that makes use of SkSk to accept in an efficient way the language of all suffixes of ww up to kk errors in every window of size rr of a text, where rr is the repetition index of ww. Moreover, we give some experimental results on some well-known words, like prefixes of Fibonacci and Thue-Morse words. Finally, we state a conjecture and an open problem on the size and the construction of the suffix automaton with mismatches.  相似文献   

4.
Given a finite set of observed data {Xtk(ω0),Ytk(ω0)}{Xtk(ω0),Ytk(ω0)} of just one sample path at nn regularly spaced time of the processes XtXt and YtYt satisfying dXt=a0(t)dt+a1(t)dW1(t)+a2(t)dW2(t)+dJ1(t),dYt=b0(t)dt+b1(t)dW1(t)+b2(t)dW2(t)+dJ2(t),t∈[0,T]dXt=a0(t)dt+a1(t)dW1(t)+a2(t)dW2(t)+dJ1(t),dYt=b0(t)dt+b1(t)dW1(t)+b2(t)dW2(t)+dJ2(t),t[0,T], where J1,J2J1,J2 are jump process, we are to investigate a numerical scheme for the estimation of the value νX,Y(t)=a1(t)b1(t)+a2(t)b2(t)νX,Y(t)=a1(t)b1(t)+a2(t)b2(t) called cross volatility. Our framework also contains the volatility estimation problem as a special case. We will show that our scheme works under mild assumptions on the activity of the jump process JtJt.  相似文献   

5.
6.
7.
We study a new variant of the online bin-packing problem, in which each item aiai is associated with a size aiai and also a release time riri so that it must be placed at least riri above the bottom of a bin. Items arrive in turn and must be assigned without any knowledge of subsequent items. The goal is to pack all items into unit-size bins using the minimum number of bins. We study the problem with all items have equal size. First, we show that the ANY FIT algorithm cannot be approximated within any constant. Then we present a best possible online algorithm with asymptotic competitive ratio of two.  相似文献   

8.
We have investigated the performance of an alternative wetting boundary condition for complex geometries in a phase field Lattice Boltzmann scheme, which is an alternative to the commonly used formulation by Yeomans and coworkers. Though our boundary condition is much simpler in its implementation, all investigated schemes show proper droplet spreading behaviour following the Cox–Voinov law. Still, numerical artefacts like spurious velocities or chequer board effects in the pressure field can be significantly reduced by the use of a two-relaxation-time (TRT) scheme, likewise recent studies by the Yeomans group. The outstanding property of our implementation is the presence of an (artificial) thin wetting layer, which influences the relation between the saturation (SwSw) and capillary pressure pcappcap in channels with irregular polygonal cross section. The pcap(Sw)pcap(Sw) relation from our simulation follows the shifted-Young–Laplace (sYL) law, showing that the physics of this wetting layer is similar to precursor films due to Van der Waals forces. With the knowledge of the thickness of the wetting layer, simulation results can be translated back to realistic pore configurations with thinner wetting layers.  相似文献   

9.
Let G=(V,E)G=(V,E) be a simple undirected graph with a set VV of vertices and a set EE of edges. Each vertex v∈VvV has a demand d(v)∈Z+d(v)Z+ and a cost c(v)∈R+c(v)R+, where Z+Z+ and R+R+ denote the set of nonnegative integers and the set of nonnegative reals, respectively. The source location problem with vertex-connectivity requirements in a given graph GG requires finding a set SS of vertices minimizing vSc(v)vSc(v) such that there are at least d(v)d(v) pairwise vertex-disjoint paths from SS to vv for each vertex v∈V−SvVS. It is known that if there exists a vertex v∈VvV with d(v)≥4d(v)4, then the problem is NP-hard even in the case where every vertex has a uniform cost. In this paper, we show that the problem can be solved in O(|V|4log2|V|)O(|V|4log2|V|) time if d(v)≤3d(v)3 holds for each vertex v∈VvV.  相似文献   

10.
In this work, we describe a simple and efficient construction of a large subset S   of FpFp, where p   is a prime, such that the set A(S)A(S) for any non-identity affine map A   over FpFp has small intersection with S.  相似文献   

11.
12.
The problem of global state observation is fundamental to distributed systems and to the analysis of data streams. Many interactions in distributed systems can be analyzed in terms of the building block formed by the pairwise interactions of intervals at two processes. Considering causality-based pairwise interactions by which two processes may interact with each other, there are 40 orthogonal interaction types. For each pair of processes (Pi,Pj)(Pi,Pj), let interaction type ri,jri,j be of interest. This paper examines the problem: “If a global state of interest to an application is specified in terms of such pairwise interaction types, one per pair of processes, how can such a global state be detected?” A solution identifies a global state in which the interaction type specified for each process pair is satisfied. This paper formulates the specific conditions on the communication structures to determine which of the intervals being examined at any time may never satisfy the stipulated interaction type for that pair of processes, and therefore that interval(s) need no longer be considered as forming a part of any solution. Based on this theory, the paper proposes two on-line distributed algorithms to solve the problem.  相似文献   

13.
In this paper, two delayed SEIR epidemic models with continuous and impulsive vaccination and saturating incidence are investigated. The dynamical behaviors of the disease are analyzed. For continuous vaccination, we obtain a basic reproductive number R1R1 and prove that if R1≤1R11 then the disease-free equilibrium is globally attractive and if R1>1R1>1 then the disease is permanent by using the Lyapunov functional method. For impulsive vaccination, we obtain two thresholds RR and RR and prove that if R<1R<1 then the disease-free periodic solution is globally attractive and if R>1R>1 then the disease is permanent by using the comparison theorem of impulsive differential equation and the Lyapunov functional method. Lastly, we compared the effects of two vaccination strategies.  相似文献   

14.
15.
This study addresses the identical parallel machine scheduling problem in which the total earliness and tardiness about a common due date are minimized subject to minimum total flowtime, P∥(E+T)/∑CiP(E+T)/Ci. The problem is demonstrated to be transformed into a simplified version of the parallel machine problem with the objective of minimizing makespan subject to minimum total flowtime, P∥Cmax/∑CiPCmax/Ci. Several properties are considered to solve optimally the restricted version of the problem. A streamlined binary integer programming model is developed to solve the P∥Cmax/∑CiPCmax/Ci problem and the P∥(E+T)/∑CiP(E+T)/Ci problem. Computational experiments indicate that the binary integer programming model is superior to the existing optimization algorithm for the P∥Cmax/∑CiPCmax/Ci problem in the literature.  相似文献   

16.
A midbit function on ?? binary inputs x1,…,x?x1,,x? outputs the middle bit in the binary representation of x1+?+x?x1+?+x?. We consider the problem of Probably Approximately Correct (PAC) learning embedded   midbit functions, where the set S⊂{x1,…,xn}S{x1,,xn} of relevant variables on which the midbit depends is unknown to the learner.  相似文献   

17.
In this paper, we establish a new model for path planning with interval data which arises in a variety of applications. It is formulated as minimum risk-sum path problem  : given a source-destination pair in a network G=(V,E)G=(V,E), traveling on each link e in G   may take time xexe in a prespecified interval [le,ue][le,ue] and take risk (ue-xe)/(ue-le)(ue-xe)/(ue-le), the goal is to find a path in G from the source to the destination, together with an allocation of travel times along each link on the path, so that the total travel time of links on the path is no more than a given time bound and the risk-sum over the links on the path is minimized. Our study shows that this new model has two features that make it different from the existing models. First, the minimum risk-sum path problem is polynomial-time solvable, and second, it provides many solutions that vary with time bounds and risk sums and leaves the choice for decision makers. Therefore, the new model is more flexible and easier to use for the path planning with interval data.  相似文献   

18.
We aim at finding the best possible seed values when computing a1/pa1/p using the Newton–Raphson iteration in a given interval. A natural choice of the seed value would be the one that best approximates the expected result. It turns out that in most cases, the best seed value can be quite far from this natural choice. When we evaluate a monotone function f(a)f(a) in the interval [amin,amax][amin,amax], by building the sequence xnxn defined by the Newton–Raphson iteration, the natural choice consists in choosing x0x0 equal to the arithmetic mean of the endpoint values. This minimizes the maximum possible distance between x0x0 and f(a)f(a). And yet, if we perform nn iterations, what matters is to minimize the maximum possible distance between xnxn and f(a)f(a). In several examples, the value of the best starting point varies rather significantly with the number of iterations.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号