首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Some of the most popular routing protocols for wireless sensor networks require a virtual backbone for efficient communication between the sensors. Connected dominating sets (CDS) have been studied as a method of choosing nodes to be in the backbone. The traditional approach is to assume that the transmission range of each node is given and to minimize the number of nodes in the CDS representing the backbone. A recently introduced alternative strategy is based on the concept of k-bottleneck connected dominating set (k-BCDS), which, given a positive integer k, minimizes the transmission range of the nodes that ensures a CDS of size k exists in the network. This paper provides a 6-approximate distributed algorithm for the k-BCDS problem. The results of empirical evaluation of the proposed algorithm are also included.  相似文献   

2.
We present a quasi-Monte-Carlo particle simulation of some multidimensional linear parabolic equations with constant coefficients. We approximate the elliptic operator in space by a finite-difference operator. We discretize time into intervals of length Δt. The discrete representation of the solution at time tn = nΔt is a sum of Dirac delta measures. Using the explicit Euler scheme, the resulting approximation at time tn+1 is recovered by a quasi-Monte-Carlo integration. We make use of a technique involving renumbering the simulated particles in every time step. We state and prove a convergence theorem for the method. Experimental results are presented for some model problems. The results suggest that the quasi-Monte-Carlo simulation tends to give more accurate solutions than a Monte-Carlo simulation, when the correct renumbering technique is used. Other choices can result in significant loss of efficiency.  相似文献   

3.
A new adaptive algorithm is proposed for constructing grids in the hp-version of the finite element method with piecewise polynomial basis functions. This algorithm allows us to find a solution (with local singularities) to the boundary value problem for a one-dimensional reaction-diffusion equation and smooth the grid solution via the adaptive elimination and addition of grid nodes. This algorithm is compared to one proposed earlier that adaptively refines the grid and deletes nodes with the help of an estimate for the local effect of trial addition of new basis functions and the removal of old ones. Results are presented from numerical experiments aimed at assessing the performance of the proposed algorithm on a singularly perturbed model problem with a smooth solution.  相似文献   

4.
In this paper a problem of scheduling a single machine under linear deterioration which aims at minimizing the number of tardy jobs is considered. According to our assumption, processing time of each job is dependent on its starting time based on a linear function where all the jobs have the same deterioration rate. It is proved that the problem is NP-hard; hence a branch and bound procedure and a heuristic algorithm with O(n 2) is proposed where the heuristic one is utilized for obtaining the upper bound of the B&B procedure. Computational results for 1,800 sample problems demonstrate that the B&B method can solve problems with 28 jobs quickly and in some other groups larger problems are also solved. Generally, B&B method can optimally solve 85% of the samples which shows high performance of the proposed method. Also it is shown that the average value of the ratio of optimal solution to the heuristic algorithm result with the objective ??(1 ? Ui) is at most 1.11 which is more efficient in comparison to other proposed algorithms in related studies in the literature.  相似文献   

5.
An algorithm is proposed for the numerical integration of an arbitrary function represent-able as a sum of an absolutely converging multiple trigonometric Fourier series. The resulting quadrature formulas have identical weights, and the nodes form a Korobov grid that is completely defined by two positive integers, of which one is the number of nodes. In the case of classes of functions with dominant mixed smoothness, it is shown that the algorithm is almost optimal in the sense that the construction of a grid of N nodes requires far fewer elementary arithmetic operations than NlnlnN. Solutions of related problems are also given.  相似文献   

6.
A simple augmented ?-constraint (SAUGMECON) method is put forward to generate all non-dominated solutions of multi-objective integer programming (MOIP) problems. The SAUGMECON method is a variant of the augmented ?-constraint (AUGMECON) method proposed in 2009 and improved in 2013 by Mavrotas et al. However, with the SAUGMECON method, all non-dominated solutions can be found much more efficiently thanks to our innovations to algorithm acceleration. These innovative acceleration mechanisms include: (1) an extension to the acceleration algorithm with early exit and (2) an addition of an acceleration algorithm with bouncing steps. The same numerical example in Lokman and Köksalan (2012) is used to illustrate workings of the method. Then comparisons of computational performance among the method proposed by  and , the method developed by Lokman and Köksalan (2012) and the SAUGMECON method are made by solving randomly generated general MOIP problem instances as well as special MOIP problem instances such as the MOKP and MOSP problem instances presented in Table 4 in Lokman and Köksalan (2012). The experimental results show that the SAUGMECON method performs the best among these methods. More importantly, the advantage of the SAUGMECON method over the method proposed by Lokman and Köksalan (2012) turns out to be increasingly more prominent as the number of objectives increases.  相似文献   

7.
In this paper, a new adaptive nodes technique based on equi-distribution principles and dimension reduction is presented for irregular regions in three dimensional cases. The mesh generation is performed by first producing some adaptive nodes in a cube based on equi-distribution along the coordinate axes and then transforming the generated nodes to the physical domain followed by a refinement process. The mesh points produced are appropriate for meshless-type methods which need only some scattered points rather than a mesh with some smoothness properties. The effectiveness of the generated mesh points is examined by a collocation meshless method using a well known radial basis function, namely ?(r)?=?r 5 which is sufficiently smooth for our purpose. Some experimental results will be presented to illustrate the effectiveness of the proposed method.  相似文献   

8.
1.IntroductionLetSbeanonemptyclosedconvexsubsetofR"andletF:R"-R"beacontinuousmapping.ThevariatiollalillequalityproblemFindx*6Ssuchthat(F(x*),x--x*)20forallxeS(VIP)iswidelyusedtostudyvariousequilibriummodelsarisingilleconomic,operatiollsresearch,transportatiollandregionalsciellces[2'3I?where(.,.)dellotestheinnerproductinR".Manyiterativemethodsfor(VIP)havebeendeveloped,forexample,projectionmethods[7ts],thenonlinearJacobimethod[5],thesuccessiveoverrelaxation.ethod[9]andgeneralizedgradient.…  相似文献   

9.
In this paper, we consider the network improvement problem for multicut by upgrading nodes in a directed tree T = (VE) with multiple sources and multiple terminals. In a node based upgrading model, a node v can be upgraded at the expense of c(v) and such an upgrade reduces weights on all edges incident to v. The objective is to upgrade a minimum cost subset S ⊆ V of nodes such that the resulting network has a multicut in which no edge has weight larger than a given value D. We first obtain a minimum cardinality node multicut Vc for tree T, then find the minimum cost upgrading set based on the upgrading sets for the subtrees rooted at the nodes in Vc. We show that our algorithm is polynomial when the number of source–terminal pairs is upper bounded by a given value.  相似文献   

10.
The problem of finding an x∈Rn such that Axb and x⩾0 arises in numerous contexts. We propose a new optimization method for solving this feasibility problem. After converting Axb into a system of equations by introducing a slack variable for each of the linear inequalities, the method imposes an entropy function over both the original and the slack variables as the objective function. The resulting entropy optimization problem is convex and has an unconstrained convex dual. If the system is consistent and has an interior solution, then a closed-form formula converts the dual optimal solution to the primal optimal solution, which is a feasible solution for the original system of linear inequalities. An algorithm based on the Newton method is proposed for solving the unconstrained dual problem. The proposed algorithm enjoys the global convergence property with a quadratic rate of local convergence. However, if the system is inconsistent, the unconstrained dual is shown to be unbounded. Moreover, the same algorithm can detect possible inconsistency of the system. Our numerical examples reveal the insensitivity of the number of iterations to both the size of the problem and the distance between the initial solution and the feasible region. The performance of the proposed algorithm is compared to that of the surrogate constraint algorithm recently developed by Yang and Murty. Our comparison indicates that the proposed method is particularly suitable when the number of constraints is larger than that of the variables and the initial solution is not close to the feasible region.  相似文献   

11.
We study the positive stationary solutions of a standard finite-difference discretization of the semilinear heat equation with nonlinear Neumann boundary conditions. We prove that there exists a unique solution of such a discretization, which approximates the unique positive stationary solution of the “continuous” equation. Furthermore, we exhibit an algorithm computing an ε-approximation of such a solution by means of a homotopy continuation method. The cost of our algorithm is linear in the number of nodes involved in the discretization and the logarithm of the number of digits of approximation required.  相似文献   

12.
An algorithm is presented for the approximate solution of the problem of packing regular convex polygons in a given closed bounded domain G so as to maximize the total area of the packed figures. On G a grid is constructed whose nodes generate a finite set W on G, and the centers of the figures to be packed can be placed only at some points of W. The problem of packing these figures with centers in W is reduced to a 0-1 linear programming problem. A two-stage algorithm for solving the resulting problems is proposed. The algorithm finds packings of the indicated figures in an arbitrary closed bounded domain on the plane. Numerical results are presented that demonstrate the effectiveness of the method.  相似文献   

13.
This paper describes a new algorithm for solving constrained optimization problems, based on a method proposed by Chattopadhyay. The proposed algorithm replaces the original problem withm constraints,m>1, by a sequence of optimization problems, with one constraint. Here, we modify the algorithm given by Chattopadhyay in order to make it applicable for a larger class of optimization problems and to improve its convergence characteristics.  相似文献   

14.
We consider a two-stage defender-attacker game that takes place on a network, in which the attacker seeks to take control over (or “influence”) as many nodes as possible. The defender acts first in this game by protecting a subset of nodes that cannot be influenced by the attacker. With full knowledge of the defender’s action, the attacker can then influence an initial subset of unprotected nodes. The influence then spreads over a finite number of time stages, where an uninfluenced node becomes influenced at time t if a threshold number of its neighbors are influenced at time t?1. The attacker’s objective is to maximize the weighted number of nodes that are influenced over the time horizon, where the weights depend both on the node and on the time at which that is influenced. This defender-attacker game is especially difficult to optimize, because the attacker’s problem itself is NP-hard, which precludes a standard inner-dualization approach that is common in many interdiction studies. We provide three models for solving the attacker’s problem, and develop a tailored cutting-plane algorithm for solving the defender’s problem. We then demonstrate the computational efficacy of our proposed algorithms on a set of randomly generated instances.  相似文献   

15.
A very simple and efficient local variational iteration method (LVIM), or variational iteration method with local property, for solving problems of nonlinear science is proposed in this paper. The analytical iteration formula of this method is derived first using a general form of first order nonlinear differential equations, followed by straightforward discretization using Chebyshev polynomials and collocation method. The resulting numerical algorithm is very concise and easy to use, only involving highly sparse matrix operations of addition and multiplication, and no inversion of the Jacobian in nonlinear problems. Apart from the simple yet efficient iteration formula, another extraordinary feature of LVIM is that in each local domain, all the collocation nodes participate in the calculation simultaneously, thus each local domain can be regarded as one “node” in calculation through GPU acceleration and parallel processing. For illustration, the proposed algorithm of LVIM is applied to various nonlinear problems including Blasius equations in fluid mechanics, buckled bar equations in solid mechanics, the Chandrasekhar equation in astrophysics, the low-Earth-orbit equation in orbital mechanics, etc. Using the built-in highly optimized ode45 function of MATLAB as a comparison, it is found that the LVIM is not only very accurate, but also much faster by an order of magnitude than ode45 in all the numerical examples, especially when the nonlinear terms are very complicated and difficult to evaluate.  相似文献   

16.
We provide an O(log?log?opt)-approximation algorithm for the problem of guarding a simple polygon with guards on the perimeter. We first design a polynomial-time algorithm for building ε-nets of size \(O(\frac{1}{\varepsilon}\log\log\frac{1}{\varepsilon})\) for the instances of Hitting Set associated with our guarding problem. We then apply the technique of Brönnimann and Goodrich to build an approximation algorithm from this ε-net finder. Along with a simple polygon P, our algorithm takes as input a finite set of potential guard locations that must include the polygon’s vertices. If a finite set of potential guard locations is not specified, e.g., when guards may be placed anywhere on the perimeter, we use a known discretization technique at the cost of making the algorithm’s running time potentially linear in the ratio between the longest and shortest distances between vertices. Our algorithm is the first to improve upon O(log?opt)-approximation algorithms that use generic net finders for set systems of finite VC-dimension.  相似文献   

17.
Various vehicle routing problems (VRP) appear in the literature due to their important applications in the area of transportation and distribution.A VRP is characterized by the constraints that the involved factors must satisfy and by an optimality goal.In this paper, we develop a heuristic algorithm that
  • (i)partitions suitably a distribution network into subnetworks. A single depot complies with every subnetwork, where a fleet of identical vehicles will start their itinerary. The nodes of the corresponding subnetwork are demand nodes that require a onetime visit by one only vehicle.
  • (ii)Determine the routes of k vehicles, k=2,3,…, for every subnetwork so to minimize the visiting time of the corresponding demand nodes. Consequently the method computes the necessary vehicle number for each subnetwork so as to complete promptly the visiting requirement of all the demand nodes of the whole network. The main strategy of the algorithm for designing the vehicle routes consists of balancing the time utilization of the used vehicles. The paper is integrated by an application of the presented algorithm to the center of the city of Thessaloniki.
  相似文献   

18.
The biggest challenge in MANETs is to find most efficient routing due to the changing topology and energy constrained battery operated computing devices. It has been found that Ant Colony Optimization (ACO) is a special kind of optimization technique having characterization of Swarm Intelligence (SI) which is highly suitable for finding the adaptive routing for such a type of volatile network. The proposed ACO routing algorithm uses position information and energy parameters as a routing metric to improve the performance and lifetime of network. Typical routing protocols have fixed transmission power irrespective of the distance between the nodes. Considering limiting factors, like small size, limited computational power and energy source, the proposed solution excludes use of GPS for identifying the distance between nodes for indoor MANETs. The distance between nodes can be determined by using Received Signal Strength Indicator (RSSI) measurements. Thus, an intelligent ACO routing algorithm with location information and energy metric is developed to adaptively adjust the transmission power and distribute the load to avoid critical nodes. Proposed Autonomous Localization based Eligible Energetic Path_with_Ant Colony Optimization (ALEEP_with_ACO) algorithm ensures that nodes in the network are not drained out of the energy beyond their threshold, as the load is shared with other nodes, when the energy of a node in the shortest path has reached its threshold. Hence, the total energy expenditure is reduced, thus prolonging the lifetime of network devices and the network. We simulated our proposal and compared it with the classical approach of AODV and other biological routing approaches. The results achieved show that ALEEP_with_ACO presents the best Packet Delivery Ratio (PDR), throughput and less packet drop specially under high mobility scenarios.  相似文献   

19.
This paper deals with the one-machine dynamic total completion time scheduling problem. This problem is known to be NP-hard in the strong sense. A polynomial time heuristic algorithm is proposed which applies the recently introduced Recovering Beam Search (RBS) approach. The algorithm is based on a beam search procedure with unitary beam width and includes a recovering subroutine that allows to overcome wrong decisions taken at higher levels of the beam search tree. It is shown that the total number of considered nodes is bounded by n where n is the jobsize. The proposed algorithm is able to solve in very short CPU time problems with up to 500 jobs outperforming the best state of the art heuristics.  相似文献   

20.
A local algorithm with local horizon r is a distributed algorithm that runs in r synchronous communication rounds; here r is a constant that does not depend on the size of the network. As a consequence, the output of a node in a local algorithm only depends on the input within r hops from the node.We give tight bounds on the local horizon for a class of local algorithms for combinatorial problems on unit-disk graphs (UDGs). Most of our bounds are due to a refined analysis of existing approaches, while others are obtained by suggesting new algorithms. The algorithms we consider are based on network decompositions guided by a rectangular tiling of the plane. The algorithms are applied to matching, independent set, graph colouring, vertex cover, and dominating set.We also study local algorithms on quasi-UDGs, which are a popular generalisation of UDGs, aimed at more realistic modelling of communication between the network nodes. Analysing the local algorithms on quasi-UDGs allows one to assume that the nodes know their coordinates only approximately, up to an additive error. Despite the localisation error, the quality of the solution to problems on quasi-UDGs remains the same as for the case of UDGs with perfect location awareness. We analyse the increase in the local horizon that comes along with moving from UDGs to quasi-UDGs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号