首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Exploring Unknown Undirected Graphs   总被引:1,自引:0,他引:1  
A robot has to construct a complete map of an unknown environment modeled as an undirected connected graph. The task is to explore all nodes and edges of the graph using the minimum number of edge traversals. The penalty of an exploration algorithm running on a graph G = (V(G), E(G)) is the worst-case number of traversals in excess of the lower bound |E(G)| that it must perform in order to explore the entire graph. We give an exploration algorithm whose penalty is O(|V(G)|) for every graph. We also show that some natural exploration algorithms cannot achieve this efficiency.  相似文献   

2.
The undirected power graph G(S) of a semigroup S is an undirected graph whose vertex set is S and two vertices a,bS are adjacent if and only if ab and a m =b or b m =a for some positive integer m. In this paper we characterize the class of semigroups S for which G(S) is connected or complete. As a consequence we prove that G(G) is connected for any finite group G and G(G) is complete if and only if G is a cyclic group of order 1 or p m . Particular attention is given to the multiplicative semigroup ℤ n and its subgroup U n , where G(U n ) is a major component of G(ℤ n ). It is proved that G(U n ) is complete if and only if n=1,2,4,p or 2p, where p is a Fermat prime. In general, we compute the number of edges of G(G) for a finite group G and apply this result to determine the values of n for which G(U n ) is planar. Finally we show that for any cyclic group of order greater than or equal to 3, G(G) is Hamiltonian and list some values of n for which G(U n ) has no Hamiltonian cycle.  相似文献   

3.
Forest Harvest Scheduling problems incorporating area-based restrictions have been of great practical interest for several years, but only recently have advances been made that allow them to be efficiently solved. One significant development has made use of formulation strengthening using the Cluster Packing Problem. This improved formulation has allowed medium sized problems to be easily solved, but when restrictions on volume production over time are added, problem difficulty increases substantially. In this paper, we study the degrading effect of certain types of volume constraints and propose methods for reducing this effect. Developed methods include the use of constraint branching, the use of elastic constraints with dynamic penalty adjustment and a simple integer allocation heuristic. Application results are presented to illustrate the computational improvement afforded by the use of these methods.  相似文献   

4.
5.
无向双环网的特征分析   总被引:4,自引:1,他引:3  
本文给出了无向双环网直径的上界 ,并且找到了从任意节点到四个其它节点的四条内部不交的路 ,从而证明了无向双环网的连通度为 4  相似文献   

6.
This note refers to the article by G. Ghiani and G. Laporte ``A branch-and-cut algorithm for the Undirected Rural Postman Problem', Math. Program. 87 (2000). We show that some conditions for the facet-defining property of the basic non-trivial inequalities are not sufficient and that the Rural Postman Problem polytope is more complex even when focusing on canonical inequalities only.  相似文献   

7.
8.
王世英  林上为 《数学研究》2006,39(4):335-344
限制边连通度作为边连通度的推广,是计算机互连网络可靠性的一个重要度量.Superλ-′是比限制边连通度更精确的一个网络可靠性指标.一个图是Superλ-′的,如果它的任一最小限制边割都孤立一条有最小边度的边.本文考虑一类重要的网络模型-无向K autz图UK(d,n)的限制边连通度λ,′证明了当d 3,n 2时,λ(′UK(d,n))=4d-4,并进一步指出此时的UK(d,n)是Superλ-′的.  相似文献   

9.
The well-known Undirected Rural Postman Problem is considered and a binary linear problem using new dominance relations is presented. Polyhedral properties are investigated and a branch-and-cut algorithm is developed. Extensive computational results indicate that the algorithm is capable of solving much larger instances than previously reported. Received: December 1, 1997 / Accepted: October 13, 1999?Published online January 27, 2000  相似文献   

10.
We show that for positive integers n, m with n(n−1)/2≥mn−1, the graph Ln,m having n vertices and m edges that consists of an (nk)-clique and k−1 vertices of degree 1 has the fewest spanning trees among all connected graphs on n vertices and m edges. This proves Boesch’s conjecture [F.T. Boesch, A. Satyanarayana, C.L. Suffel, Least reliable networks and reliability domination, IEEE Trans. Commun. 38 (1990) 2004-2009].  相似文献   

11.
12.
13.
讨论了带根节点r的有向树、无向树理论的量词消去性质,找到决定理论量词消去的三类特殊公式,并给出了在语言■_0={E,r}(E为有向边或无向边)及添加二元距离关系D_(n,n)w所得膨胀语言下,可量词消去的这两类理论的完全分类.  相似文献   

14.
This paper proposes a new interpretation of intervals as classes of functions having the same domain. Interval operations are seen as operations on these classes. This approach allows to recover Markov's directed interval arithmetic by taking into account the monotonicity of the functions.  相似文献   

15.
Linear least squares problems with box constraints are commonly solved to find model parameters within bounds based on physical considerations. Common algorithms include Bounded Variable Least Squares (BVLS) and the Matlab function lsqlin. Here, the goal is to find solutions to ill-posed inverse problems that lie within box constraints. To do this, we formulate the box constraints as quadratic constraints, and solve the corresponding unconstrained regularized least squares problem. Using box constraints as quadratic constraints is an efficient approach because the optimization problem has a closed form solution. The effectiveness of the proposed algorithm is investigated through solving three benchmark problems and one from a hydrological application. Results are compared with solutions found by lsqlin, and the quadratically constrained formulation is solved using the L-curve, maximum a posteriori estimation (MAP), and the χ2 regularization method. The χ2 regularization method with quadratic constraints is the most effective method for solving least squares problems with box constraints.  相似文献   

16.
Calculating surrogate constraints   总被引:3,自引:0,他引:3  
Various theoretical properties of the surrogate dual of a mathematical programming problem are discussed, including some connections with the Lagrangean dual. Two algorithms for solving the surrogate dual, suggested by analogy with Lagrangean optimisation, are described and proofs of their convergence given. A simple example is solved using each method.  相似文献   

17.
Many combinatorial constraints over continuous variables such as SOS1 and SOS2 constraints can be interpreted as disjunctive constraints that restrict the variables to lie in the union of a finite number of specially structured polyhedra. Known mixed integer binary formulations for these constraints have a number of binary variables and extra constraints linear in the number of polyhedra. We give sufficient conditions for constructing formulations for these constraints with a number of binary variables and extra constraints logarithmic in the number of polyhedra. Using these conditions we introduce mixed integer binary formulations for SOS1 and SOS2 constraints that have a number of binary variables and extra constraints logarithmic in the number of continuous variables. We also introduce the first mixed integer binary formulations for piecewise linear functions of one and two variables that use a number of binary variables and extra constraints logarithmic in the number of linear pieces of the functions. We prove that the new formulations for piecewise linear functions have favorable tightness properties and present computational results showing that they can significantly outperform other mixed integer binary formulations.  相似文献   

18.
Uniform convergence of Lagrange interpolation at the zeros of Jacobi polynomials in the presence of constraints is investigated. We show that by a simple procedure it is always possible to transform the matrices of these zeros into matrices such that the corresponding Lagrange interpolating polynomial respecting the given constraints well approximates a given function and its derivatives.  相似文献   

19.
A set X of subsets of an n-element set S is called an anti-chain if no two elements of X are related by set-wise inclusion. Sperner showed [8] that max |X|=(n[n/2]), where |X| denotes the number of elements in X and the maximum is taken over all anti-chains of subsets of S.

Let non-negative integers io<n and mio≠0, mio+1,…mn be given. In this paper we give an algorithm for calculating max |X| where the maximum is taken only over anti-chains containing exactly mi i-element subsets of S for io i n.  相似文献   


20.
Best approximation with interpolatory constraints is considered. A sufficient condition for an approximating function to be a unique best approximation is presented. A necessary condition is deduced if uniqueness holds.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号