首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Let be a simple graph with nodes and links, a subset of “terminals,” a vector , and a positive integer d, called “diameter.” We assume that nodes are perfect but links fail stochastically and independently, with probabilities . The “diameter‐constrained reliability” (DCR) is the probability that the terminals of the resulting subgraph remain connected by paths composed of d links, or less. This number is denoted by . The general DCR computation belongs to the class of ‐hard problems, since it subsumes the problem of computing the probability that a random graph is connected. The contributions of this paper are twofold. First, a full analysis of the computational complexity of DCR subproblems is presented in terms of the number of terminal nodes and the diameter d. Second, we extend the class of graphs that accept efficient DCR computation. In this class, we include graphs with bounded co‐rank, graphs with bounded genus, planar graphs, and, in particular, Monma graphs, which are relevant to robust network design.  相似文献   

2.
This article considers a communication network modeled by a graph and a distinguished set of terminal nodes . We assume that the nodes never fail, but the edges fail randomly and independently with known probabilities. The classical K ‐reliability problem computes the probability that the subnetwork is composed only by the surviving edges in such a way that all terminals communicate with each other. The d ‐diameter ‐constrained K ‐reliability generalization also imposes the constraint that each pair of terminals must be the extremes of a surviving path of approximately d length. It allows modeling communication network situations in which limits exist on the acceptable delay times or on the amount of hops that packets can undergo. Both problems have been shown to be NP ‐hard, yet the complexity of certain subproblems remains undetermined. In particular, when , it was an open question whether the instances with were solvable in polynomial time. In this paper, we prove that when and is a fixed parameter (i.e. not an input) the problem turns out to be polynomial in the number of nodes of the network (in fact linear). We also introduce an algorithm to compute these cases in such time and also provide two numerical examples.  相似文献   

3.
A divisible load is an amount W of computational work that can be arbitrarily divided into independent chunks of load. In many divisible load applications, the load can be parallelized in a master–worker fashion, where the master distributes the load among a set P of worker processors to be processed in parallel. The master can only send load to one worker at a time, and the transmission can be done in a single round or in multiple rounds. The multi‐round divisible load scheduling problem consists in (a) selecting the subset of workers that will process the load, (b) defining the order in which load will be transmitted to each of them, (c) defining the number m of transmission rounds that will be used, and (d) deciding the amount of load that will be transmitted to each worker at each round , so as to minimize the makespan. We propose a heuristic approach that determines the transmission order, the set of the active processors and the number of rounds by a biased random‐key genetic algorithm. The amount of load transmitted to each worker is computed in polynomial time by closed‐form formulas. Computational results showed that the proposed genetic algorithm outperformed a closed‐form state‐of‐the‐art heuristic, obtaining makespans that are 11.68% smaller on average for a set of benchmark problems.  相似文献   

4.
This paper deals with the presentation of polynomial time (approximation) algorithms for a variant of open‐shop scheduling, where the processing times are only machine‐dependent. This variant of scheduling is called proportionate scheduling and its applications are used in many real‐world environments. This paper develops three polynomial time algorithms for the problem. First, we present a polynomial time algorithm that solves the problem optimally if , where n and m denote the numbers of jobs and machines, respectively. If, on the other hand, , we develop a polynomial time approximation algorithm with a worst‐case performance ratio of that improves the bound existing for general open‐shops. Next, in the case of , we take into account the problem under consideration as a master problem and convert it into a simpler secondary approximation problem. Furthermore, we formulate both the master and secondary problems, and compare their complexity sizes. We finally present another polynomial time algorithm that provides optimal solution for a special case of the problem where .  相似文献   

5.
Let be a finite, simple, and connected graph. The closed interval of a set is the set of all vertices lying on a shortest path between any pair of vertices of S. The set S is geodetic if . The eccentricity of a vertex v is the number of edges in the greatest shortest path between v and any vertex w of G. A vertex v is a contour vertex if no neighbor of v has eccentricity greater than v. The contour of G is the set formed by the contour vertices of G. We consider two problems: the problem of determining whether the contour of a graph class is geodetic; the problem of determining if there exists a graph such that is not geodetic. We obtain a sufficient condition that is useful for both problems; we prove a realization theorem related to problem and show two infinite families such that is not geodetic. Using computational tools, we establish the minimum graphs for which is not geodetic; and show that all graphs with , and all bipartite graphs with , are such that is geodetic.  相似文献   

6.
We consider a ground set E and a submodular function acting on it. We first propose a “set multicovering” problem in which the value (price) of any is . We show that the linear program (LP) of this problem can be directly solved by applying a submodular function minimization (SFM) algorithm on the dual LP. However, the main results of this study concern prize‐collecting multicovering with submodular pricing, that is, a more general and more difficult “multicovering” problem in which elements can be left uncovered by paying a penalty. We formulate it as a large‐scale LP (with variables representing all subsets of E) that could be tackled by column generation (CG; for a CG algorithm for “set‐covering” problems with submodular pricing). However, we do not solve this large‐scale LP by CG, but we solve it in polynomial time by exploiting its integrality properties. More exactly, after appropriate restructuring, the dual LP can be transformed into an LP that has been thoroughly studied (as a primal) in the SFM theory. Solving this LP reduces to optimizing a strong map of submodular functions. For this, we use the Fleischer–Iwata framework that optimizes all these functions within the same asymptotic running time as solving a single SFM, that is, in , where and γ is the complexity of one submodular evaluation. Besides solving the problem, the proposed approach can be useful to (a) simultaneously find the best solution of up to functions under strong map relations in time, (b) perform sensitivity analysis in very short time (even at no extra cost), and (c) reveal combinatorial insight into the primal–dual optimal solutions. We present several potential applications throughout the paper, from production planning to combinatorial auctions.  相似文献   

7.
This paper addresses a new combinatorial problem, the Min‐Degree Constrained Minimum Spanning Tree (md‐MST), that can be stated as: given a weighted undirected graph with positive costs on the edges and a node‐degrees function , the md‐MST is to find a minimum cost spanning tree T of G, where each node i of T either has at least a degree of or is a leaf node. This problem is closely related to the well‐known Degree Constrained Minimum Spanning Tree (d‐MST) problem, where the degree constraint is an upper bound instead. The general NP‐hardness for the md‐MST is established and some properties related to the feasibility of the solutions for this problem are presented, in particular we prove some bounds on the number of internal and leaf nodes. Flow‐based formulations are proposed and computational experiments involving the associated Linear Programming (LP) relaxations are presented.  相似文献   

8.
On‐line parameter adaptation schemes are widely used in metaheuristics. They are sometimes preferred to off‐line tuning techniques for two main reasons. First, they promise to achieve good performance even on new instance families that have not been considered during the design or the tuning phase of the algorithm. Second, it is assumed that an on‐line scheme could adapt the algorithm's behaviour to local characteristics of the search space. This paper challenges the second hypothesis by analysing the contribution of the parameter adaptation to the performance of a state‐of‐the‐art reactive tabu search () algorithm for the maximum clique problem. Our experimental analysis shows that this on‐line parameter adaptation scheme converges to good instance‐specific settings for the parameters, and that there is no evidence that it adapts to the local characteristics of the search space. The insights gained from the analysis are confirmed by further experiments with an algorithm for the quadratic assignment problem. Together, the results of the two algorithms shed some new light on the reasons behind the effectiveness of .  相似文献   

9.
In this paper, we study the k‐labeled spanning forest (kLSF) problem in which an undirected graph whose edges are labeled and an integer‐positive value are given; the aim is to find a spanning forest of the input graph with the minimum number of connected components and the upper bound on the number of labels. The problem is related to the minimum labeling spanning tree problem and has several applications in the real world. In this paper, we compare several metaheuristics to solve this NP‐hard problem. In particular, the proposed intelligent variable neighborhood search (VNS) shows excellent performance, obtaining high‐quality solutions in short computational running time. This approach integrates VNS with other complementary approaches from machine learning, statistics, and experimental algorithmics, in order to produce high‐quality performance and completely automate the resulting optimization strategy.  相似文献   

10.
In this work, we study the mixed control for Markov jump linear systems with hidden Markov parameters. The hidden Markov process is denoted by , where the nonobservable component θ(k) represents the mode of operation of the system, whereas represents the observable component provided by a detector. The goal is to obtain design techniques for mixed control problems, with the controllers depending only on the estimate , for problems formulated in 3 different forms: (i) minimizing an upper bound on the norm subject to a given restriction on the norm; (ii) minimizing an upper bound on the norm, while limiting the norm; and (iii) minimizing a weighted combination of upper bounds of both the and norms. We propose also new conditions for synthesizing robust controllers under parametric uncertainty in the detector probabilities and in the transition probabilities. The so‐called cluster case for the mixed control problem is also analyzed under the detector approach. The results are illustrated by means of 2 numerical examples.  相似文献   

11.
We present anefficient algorithm for determining an aesthetically pleasing shape boundary connecting all the points in a given unorganized set of 2D points, with no other information than point coordinates. By posing shape construction as a minimisation problem which follows the Gestalt laws, our desired shape is non‐intersecting, interpolates all points and minimizes a criterion related to these laws. The basis for our algorithm is an initial graph, an extension of the Euclidean minimum spanning tree but with no leaf nodes, called as the minimum boundary complex . and can be expressed similarly by parametrizing a topological constraint. A close approximation of , termed can be computed fast using a greedy algorithm. is then transformed into a closed interpolating boundary in two steps to satisfy ’s topological and minimization requirements. Computing exactly is an NP (Non‐Polynomial)‐hard problem, whereas is computed in linearithmic time. We present many examples showing considerable improvement over previous techniques, especially for shapes with sharp corners. Source code is available online.  相似文献   

12.
An expression of the thin‐slot formalism is presented to alleviate the gridding of the split‐field finite‐difference time‐domain (FDTD) solution for periodic structure. The varying auxiliary‐field ( , ) and split‐field ( , ) distributions near the slots are analytically derived from the varying field ( , ). The update equations for the split‐field FDTD are obtained by incorporating those varying field distributions into the split‐field equations in integral form. A frequency selective surface (FSS) structure is applied to verify the proposed method. The results indicate that the computational efficiency is improved.  相似文献   

13.
The determinization of a nondeterministic finite automaton (FA) is the process of generating a deterministic FA (DFA) equivalent to (sharing the same regular language of) . The minimization of is the process of generating the minimal DFA equivalent to . Classical algorithms for determinization and minimization are available in the literature for several decades. However, they operate monolithically, assuming that the FA to be either determinized or minimized is given once and for all. By contrast, we consider determinization and minimization in a dynamic context, where augments over time: after each augmentation, determinization and minimization of into is required. Using classical monolithic algorithms to solve this problem is bound to poor performance. An algorithm for incremental determinization and minimization of acyclic finite automata, called IDMA, is proposed. Despite being conceived within the narrow domain of model‐based diagnosis and monitoring of active systems, the algorithm is general‐purpose in nature. Experimental evidence indicates that IDMA is far more efficient than classical algorithms in solving incremental determinization and minimization problems. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

14.
This paper focuses on the graphical tuning method of fractional order proportional integral derivative (FOPID) controllers for fractional order uncertain system achieving robust ‐stability. Firstly, general result is presented to check the robust ‐stability of the linear fractional order interval polynomial. Then some alternative algorithms and results are proposed to reduce the computational effort of the general result. Secondly, a general graphical tuning method together with some computational efficient algorithms are proposed to determine the complete set of FOPID controllers that provides ‐stability for interval fractional order plant. These methods will combine the results for fractional order parametric robust control with the method of FOPID ‐stabilization for a fixed plant. At last, two important extensions will be given to the proposed graphical tuning methods: determine the ‐stabilizing region for fractional order systems with two kinds of more general and complex uncertainty structures: multi‐linear interval uncertainty and mixed‐type uncertainties. Numerical examples are followed to illustrate the effectiveness of the method. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

15.
A single layer single probe‐fed wideband microstrip antenna is presented and investigated. By cutting a U‐slot in the rectangular patch, and by incorporating two identical U‐shaped parasitic patches around both the radiating edges and the nonradiating edges of the rectangular patch, three resonant frequencies are excited to form the wideband performance. Details of the antenna design is presented. The measured and simulated results are in good agreement, the measured impedance bandwidth is GHz ( GHz), or centered at GHz, which covers WLAN GHz ( GHz), WLAN GHz ( GHz), and WIMAX GHz ( GHz) bands. The measured peak gains at the three resonant frequencies are dB, dB, and dB, respectively. An equivalent circuit model which is based on the transmission line theory, the asymmetric coupled microstrip lines theory, and the π‐network theory is established. This equivalent circuit model is used to give an insight into the wideband mechanism of the proposed antenna, and is also used to explain why the three resonant frequencies shift at the variations of different parameters from a physical point of view. The error analysis is given to demonstrate the validity of the equivalent circuit model.  相似文献   

16.
Choosing balls that best approximate a 3D object is a non‐trivial problem. To answer it, we first address the inner approximation problem, which consists of approximating an object defined by a union of n balls with balls defining a region . This solution is further used to construct an outer approximation enclosing the initial shape, and an interpolated approximation sandwiched between the inner and outer approximations. The inner approximation problem is reduced to a geometric generalization of weighted max k‐cover, solved with the greedy strategy which achieves the classical lower bound. The outer approximation is reduced to exploiting the partition of the boundary of by the Apollonius Voronoi diagram of the balls defining the inner approximation. Implementation‐wise, we present robust software incorporating the calculation of the exact Delaunay triangulation of points with degree two algebraic coordinates, of the exact medial axis of a union of balls, and of a certified estimate of the volume of a union of balls. Application‐wise, we exhibit accurate coarse‐grain molecular models using a number of balls 20 times smaller than the number of atoms, a key requirement to simulate crowded cellular environments.  相似文献   

17.
In this study, a pair of multiobjective variational mixed symmetric dual programs involving cone constraints is presented and usual duality results are established using the notion of generalized ‐convexity. Self‐duality is discussed under additional condition of skew symmetry, and a time‐independence (static) version of the problems is also incorporated.  相似文献   

18.
The paper derives a robust networked controller design method for systems with saturation where the delay is large and uncertain, as in one‐directional data flow‐control. A classical linear H criterion is first formulated in terms of the sensitivity and complementary sensitivity functions. A new asymptotic constraint is then derived, which specifies the minimum amount of low frequency gain that is needed in the sensitivity function to conclude on non‐linear closed loop ‐stability using the Popov criterion. This result guides the selection of the design criterion, thereby adjusting the linear controller design for better handling of delay and saturation. The controller design method then uses gridding to pre‐compute a subset of the stability region. Based on the pre‐computed region, a robust ‐stable controller can be selected. Alternatively, an adaptive controller could recompute ‐stable controllers on‐line using the pre‐computed region. Simulations show that the controller meets the specified stability and performance requirements.  相似文献   

19.
In this article, a variational control problem is considered. We introduce the concept of higher order ‐convex function for a continuous case. Further, we formulate higher order mixed‐type dual for the considered problem and obtain appropriate duality results using aforesaid assumptions.  相似文献   

20.
In predicting time series, if a trend includes a structural break, then a state space model can be applied to revise the predictive method. Some scholars suggest that restricted damped trend models yield excellent prediction results by automatically revising unforeseen structural break factors in the prediction process. Restricted damped trend models add a smoothed error statistic to a local‐level model and use the exponentially weighted moving average (EWMA) method to make corrections. This paper applies the generally weighted moving average (GWMA) concept and method to a restricted damped trend model that changes the smoothed error statistic from the EWMA form to the GWMA form and adds the correction parameter λ, which distinguishes three situations , , and . The original restricted damped trend model applies only to , enabling the model to capture situations in which and increases its generality. This paper also compares the effect of various parameter values on the predictive model and finds the range of parameter settings that optimize the model.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号