首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In some proportional electoral systems with more than one constituency the number of seats allotted to each constituency is pre-specified, as well as, the number of seats that each party has to receive at a national level. “Bidimensional allocation” of seats to parties within constituencies consists of converting the vote matrix V into an integer matrix of seats “as proportional as possible” to V, satisfying constituency and party totals and an additional “zero-vote zero-seat” condition. In the current Italian electoral law this Bidimensional Allocation Problem (or Biproportional Apportionment Problem—BAP) is ruled by an erroneous procedure that may produce an infeasible allocation, actually one that is not able to satisfy all the above conditions simultaneously. In this paper we focus on the feasibility aspect of BAP and, basing on the theory of (0,1)-matrices with given line sums, we formulate it for the first time as a “Matrix Feasibility Problem”. Starting from some previous results provided by Gale and Ryser in the 60’s, we consider the additional constraint that some cells of the output matrix must be equal to zero and extend the results by Gale and Ryser to this case. For specific configurations of zeros in the vote matrix we show that a modified version of the Ryser procedure works well, and we also state necessary and sufficient conditions for the existence of a feasible solution. Since our analysis concerns only special cases, its application to the electoral problem is still limited. In spite of this, in the paper we provide new results in the area of combinatorial matrix theory for (0,1)-matrices with fixed zeros which have also a practical application in some problems related to graphs.  相似文献   

2.
One of the most active research lines in the area of electoral systems to date deals with the Biproportional Apportionment Problem, which arises in those proportional systems where seats must be allocated to parties within territorial constituencies. A matrix of the vote counts of the parties within the constituencies is given, and one has to convert the vote matrix into an integer matrix of seats ??as proportional as possible?? to it, subject to the constraints that each constituency be granted its pre-specified number of seats, each party be allotted the total number of seats it is entitled to on the basis of its national vote count, and a zero-vote zero-seat condition be satisfied. The matrix of seats must simultaneously meet the integrality and the proportionality requirement, and this not infrequently gives rise to self-contradictory procedures in the electoral laws of some countries. Here we discuss a class of methods for Biproportional Apportionment characterized by an ??error minimization?? approach. If the integrality requirement is relaxed, fractional seat allocations (target shares) can be obtained so as to achieve proportionality at least in theory. In order to restore integrality, one then looks for integral apportionments that are as close as possible to the ideal ones in a suitable metric. This leads to the formulation of constrained optimization problems called ??best approximation problems?? which are solvable in polynomial time through the use of network flow techniques. These error minimization methods can be viewed as an alternative to the classical axiomatic approach introduced by Balinski and Demange (in Math Oper Res 14:700?C719, 1989a; Math Program 45:193?C210, 1989b). We provide an empirical comparison between these two approaches with a real example from the Italian Elections and a theoretical discussion about the axioms that are not necessarily satisfied by the error minimization methods.  相似文献   

3.
We give an algorithm which permits calculating the maximum and minimum vote shares that allow a party to obtain h seats, that is, the threshold of exclusion and the threshold of representation. These have already been studied for some methods (such as d'Hondt or Sainte-Laguë), and are here generalized to any divisor method, and to any number of seats. The thresholds depend on the size of the constituency, the number of parties running in the constituency, and the divisor method used. Finally, we give some consequences, including a characterization of the d'Hondt method.  相似文献   

4.
We describe an electoral system for distributing seats in a parliament. It gives proportionality for the political parties and close to proportionality for constituencies. The system suggested here is a version of the system used in Sweden and other Nordic countries with permanent seats in each constituency and adjustment seats to give proportionality on the national level. In the national election of 2010 the current Swedish system failed to give proportionality between parties. We examine here one possible cure for this unwanted behavior. The main difference compared to the current Swedish system is that the number of adjustment seats is not fixed, but rather dynamically determined to be as low as possible and still insure proportionality between parties.  相似文献   

5.
We present a model of multi-party, spatial competition under proportional rule with both electoral and coalitional risk. Each party consists of a set of delegates with heterogeneous policy preferences. These delegates choose one delegate as leader or agent. This agent announces the policy declaration (or manifesto) to the electorate prior to the election. The choice of the agent by each party elite is assumed to be a local Nash equilibrium to a game form . This game form encapsulates beliefs of the party elite about the nature of both electoral risk and the post-election coalition bargaining game. It is demonstrated, under the assumption that is smooth, that, for almost all parameter values, a locally isolated, local Nash equilibrium exists.In the final section of the paper some empirical work is reviewed in order to obtain some insights into why parties do not simply converge to an electoral center in order to maximize expected vote shares.  相似文献   

6.
The electoral system adopted for the allocation of seats in the Italian Senate utilizes a complex mechanism of awards at a regional level with the aim of strengthening, when necessary, the winning coalition and so improve overall government stability. The results presented here demonstrate that in a significant number of cases, the effect of the mechanism is opposite to that desired, to wit, weakening the resultant government by awarding more seats to the minority coalition. Indeed the award to the minority can even be such that the minority coalition becomes the majority and wins the election. The application of the award mechanism is strongly unpredictable as it depends crucially on the precise number of seats independently obtained in each region, and that each adjustment thereof can be positive, zero or negative; a characteristic that closely resembles the behaviour of a chaotic dynamical system whose trajectory, although purely deterministic, depends on infinitely precise details and is therefore unpredictable. To perform the systematic numerical analysis of the award effectiveness, we introduce characteristic polynomials, one for each electoral district, which carry information about all possible outcomes and award applications. Their product yields a polynomial containing the dependence of the result at national level on each of the regional awards.  相似文献   

7.
Conjoint measurement studies binary relations defined on product sets and investigates the existence and uniqueness of, usually additive, numerical representations of such relations. It has proved to be quite a powerful tool to analyze and compare MCDM techniques designed to build a preference relation between multiattributed alternatives and has been an inspiring guide to many assessment protocols. The aim of this paper is to show that additive representations can be obtained on the basis of much poorer information than a preference relation. We will suppose here that the decision maker only specifies for each object if he/she finds it “attractive” (better than the status quo), “unattractive” (worse than the status quo) or “neutral” (equivalent to the status quo). We show how to build an additive representation, with tight uniqueness properties, using such an ordered partition of the set of objects. On a theoretical level, this paper shows that classical results of additive conjoint measurement can be extended to cover the case of ordered partitions and wishes to be a contribution to the growing literature on the foundations of sorting techniques in MCDM. On a more practical level, our results suggest an assessment strategy of an additive model on the basis of an ordered partition.  相似文献   

8.
The Swedish electoral system exhibits significant levels of proportionality compared with the systems used in other countries. However, it has several deficiencies that could be corrected. Therefore, this paper (a) evaluates the current Swedish electoral system by identifying the imbalances in the representation of political parties and the sizes of the electoral constituencies that can occur and (b) presents two proposals for improvement that seek to correct the previously identified deficiencies. The first proposal consists of a slight modification of the current system that applies when parties get more seats than they proportionally deserve according to their global number of votes, as occurred in the 2010 election. In this case, the proposal includes a criterion so that the overrepresented parties return their excess seats. The second proposal relies on the implementation of biproportional allotments and on the replacement of the electoral thresholds of 4 % of the total votes nationwide and 12 % of the votes in a given constituency by a new threshold based on a reduction in the number of votes of the parties. The application of any of these proposals to the Swedish election held in 2010 reveals that the deficiencies in the representation of political parties are eliminated. Furthermore, the second proposal also corrects the deficiencies in the sizes of the electoral constituencies for Sweden.  相似文献   

9.
The British electoral system is unique in Europe in being of the first-past-the-post variety. The apparent emergence of a strong third party renders any prediction exercise a good deal more difficult, although some political commentators appear oblivious to that fact. It would appear that a transition matrix approach is capable of providing the deeper insights needed to explore the consequences of alternative voting-behaviour patterns. Unfortunately data of this form are not currently collected, but it is possible to postulate that transition matrices of a particular form could be of interest to the three parties. By associating such transition probabilities with the 1983 results for each of the 633 mainland constituencies, one can derive interesting relationships between the number of seats secured by each party.A range of computer analyses was performed, and this article sets out some of the more interesting results, some of which came as something of a surprise.  相似文献   

10.
Employing a formal analogy between ordered sets and topological spaces, over the past years we have investigated a notion of cocompleteness for topological, approach and other kind of spaces. In this new context, the down-set monad becomes the filter monad, cocomplete ordered set translates to continuous lattice, distributivity means disconnectedness, and so on. Curiously, the dual(?) notion of completeness does not behave as the mirror image of the one of cocompleteness; and in this paper we have a closer look at complete spaces. In particular, we construct the “up-set monad” on representable spaces (in the sense of L. Nachbin for topological spaces, respectively C. Hermida for multicategories); we show that this monad is of Kock–Zöberlein type; we introduce and study a notion of weighted limit similar to the classical notion for enriched categories; and we describe the Kleisli category of our “up-set monad”. We emphasise that these generic categorical notions and results can be indeed connected to more “classical” topology: for topological spaces, the “up-set monad” becomes the lower Vietoris monad, and the statement “X   is totally cocomplete if and only if XopXop is totally complete” specialises to O. Wyler's characterisation of the algebras of the Vietoris monad on compact Hausdorff spaces as precisely the continuous lattices.  相似文献   

11.
We perform the group classification of a bond-pricing partial differential equation of mathematical finance to discover the combinations of arbitrary parameters that allow the partial differential equation to admit a nontrivial symmetry Lie algebra. As a result of the group classification we propose “natural” values for the arbitrary parameters in the partial differential equation, some of which validate the choices of parameters in such classical models as that of Vasicek and Cox-Ingersoll-Ross. For each set of these natural parameter values we compute the admitted Lie point symmetries, identify the corresponding symmetry Lie algebra and solve the partial differential equation.  相似文献   

12.
It is a well-acknowledged fact that collaboration between different members of a supply chain yields a significant potential to increase overall supply chain performance. Sharing private information has been identified as prerequisite for collaboration and, at the same time, as one of its major obstacles. One potential avenue for overcoming this obstacle is Secure Multi-Party Computation (SMC). SMC is a cryptographic technique that enables the computation of any (well-defined) mathematical function by a number of parties without any party having to disclose its input to another party. In this paper, we show how SMC can be successfully employed to enable joint decision-making and benefit sharing in a simple supply chain setting. We develop secure protocols for implementing the well-known “Joint Economic Lot Size (JELS) Model” with benefit sharing in such a way that none of the parties involved has to disclose any private (cost and capacity) data. Thereupon, we show that although computation of the model’s outputs can be performed securely, the approach still faces practical limitations. These limitations are caused by the potential of “inverse optimization”, i.e., a party can infer another party’s private data from the output of a collaborative planning scheme even if the computation is performed in a secure fashion. We provide a detailed analysis of “inverse optimization” potentials and introduce the notion of “stochastic security”, a novel approach to assess the additional information a party may learn from joint computation and benefit sharing. Based on our definition of “stochastic security” we propose a stochastic benefit sharing rule, develop a secure protocol for this benefit sharing rule, and assess under which conditions stochastic benefit sharing can guarantee secure collaboration.  相似文献   

13.
Suppose we are given a family of choice functions on pairs from a given finite set (with at least three elements) closed under permutations of the given set. The set is considered the set of alternatives (say candidates for an office). The question is, what are the choice functions c on pairs of this set of the following form: for some (finite) family of “voters”, each having a preference, i.e. a choice from each pair from the given family, is chosen by the preference of the majority of voters. We give full characterization.  相似文献   

14.
Conventional data envelopment analysis (DEA) models assume real-valued inputs and outputs. In many occasions, some inputs and/or outputs can only take integer values. In some cases, rounding the DEA solution to the nearest whole number can lead to misleading efficiency assessments and performance targets. This paper develops the axiomatic foundation for DEA in the case of integer-valued data, introducing new axioms of “natural disposability” and “natural divisibility”. We derive a DEA production possibility set that satisfies the minimum extrapolation principle under our refined set of axioms. We also present a mixed integer linear programming formula for computing efficiency scores. An empirical application to Iranian university departments illustrates the approach.  相似文献   

15.
We consider a spatial interaction model for locating a set of new facilities that compete for customer demand with each other, as well as with some pre-existing facilities to capture the “market expansion” and the “market cannibalization” effects. Customer demand is assumed to be a concave non-decreasing function of the total utility derived by each customer from the service offered by the facilities. The problem is formulated as a non-linear Knapsack problem, for which we develop a novel solution approach based on constructing an efficient piecewise linear approximation scheme for the objective function. This allows us to develop exact and α-optimal solution approaches capable of dealing with relatively large-scale instances of the model. We also develop a fast Heuristic Algorithm for which a tight worst-case error bound is established.  相似文献   

16.
A simple permutation is one that never maps a nontrivial contiguous set of indices contiguously. Given a set of permutations that is closed under taking subpermutations and contains only finitely many simple permutations, we provide a framework for enumerating subsets that are restricted by properties belonging to a finite “query-complete set.” Such properties include being even, being an alternating permutation, and avoiding a given generalised (blocked or barred) pattern. We show that the generating functions for these subsets are always algebraic, thereby generalising recent results of Albert and Atkinson. We also apply these techniques to the enumeration of involutions and cyclic closures.  相似文献   

17.
In typical robust portfolio selection problems, one mainly finds portfolios with the worst-case return under a given uncertainty set, in which asset returns can be realized. A too large uncertainty set will lead to a too conservative robust portfolio. However, if the given uncertainty set is not large enough, the realized returns of resulting portfolios will be outside of the uncertainty set when an extreme event such as market crash or a large shock of asset returns occurs. The goal of this paper is to propose robust portfolio selection models under so-called “ marginal+joint” ellipsoidal uncertainty set and to test the performance of the proposed models. A robust portfolio selection model under a “marginal + joint” ellipsoidal uncertainty set is proposed at first. The model has the advantages of models under the separable uncertainty set and the joint ellipsoidal uncertainty set, and relaxes the requirements on the uncertainty set. Then, one more robust portfolio selection model with option protection is presented by combining options into the proposed robust portfolio selection model. Convex programming approximations with second-order cone and linear matrix inequalities constraints to both models are derived. The proposed robust portfolio selection model with options can hedge risks and generates robust portfolios with well wealth growth rate when an extreme event occurs. Tests on real data of the Chinese stock market and simulated options confirm the property of both the models. Test results show that (1) under the “ marginal+joint” uncertainty set, the wealth growth rate and diversification of robust portfolios generated from the first proposed robust portfolio model (without options) are better and greater than those generated from Goldfarb and Iyengar’s model, and (2) the robust portfolio selection model with options outperforms the robust portfolio selection model without options when some extreme event occurs.  相似文献   

18.
The stable allocation problem is the generalization of (0,1)-matching problems to the allocation of real numbers (hours or quantities) between two separate sets of agents. The same unique-optimal matching (for one set of agents) is characterized by each of three properties: “efficiency”, “monotonicity”, and “strategy-proofness”.  相似文献   

19.
Molodtsov’s soft set theory was originally proposed as a general mathematical tool for dealing with uncertainty. By combining the multi-fuzzy set and soft set models, the purpose of this paper is to introduce the concept of multi-fuzzy soft sets. Some operations on a multi-fuzzy soft set are defined, such as complement operation, “AND” and “OR” operations, Union and Intersection operations. Then, the DeMorgan’s laws are proved. Finally, by means of level soft set, an algorithm is presented, and a decision problem is analyzed using multi-fuzzy soft set.  相似文献   

20.
This paper examines location assignment for outbound containers in container terminals. It is an extension to the previous modeling work of Kim et al. (2000) and Zhang et al. (2010). The previous model was an “optimistic” handling way and gave a moderate punishment for placing a lighter container onto the top of a stack already loaded with heavier containers. Considering that the original model neglected the stack height and the state-changing magnitude information when interpreting the punishment parameter and hid too much information about the specific configurations for a given stack representation, we propose two new “conservative” allocation models in this paper. One considers the stack height and the state-changing magnitude information by reinterpreting the punishment parameter and the other further considers the specific configurations for a given stack representation. Solution qualities for the “optimistic” and the two “conservative” allocation models are compared on two performance indicators. The numerical experiments indicate that both the first and second “conservative” allocation models outperform the original model in terms of the two performance indicators. In addition, to overcome computational difficulties encountered by the dynamic programming algorithm for large-scale problems, an approximate dynamic programming algorithm is presented as well.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号