首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper presents a unified framework for the general network design problem which encompasses several classical problems involving combined location and network design decisions. In some of these problems the service demand relates users and facilities, whereas in other cases the service demand relates pairs of users between them, and facilities are used to consolidate and re-route flows between users. Problems of this type arise in the design of transportation and telecommunication systems and include well-known problems such as location-network design problems, hub location problems, extensive facility location problems, tree-star location problems and cycle-star location problems, among others. Relevant modeling aspects, alternative formulations and possible algorithmic strategies are presented and analyzed.  相似文献   

2.
We consider the problem of restoring services provided by infrastructure systems after an extreme event disrupts them. This research proposes a novel integrated network design and scheduling problem that models these restoration efforts. In this problem, work groups must be allocated to build nodes and arcs into a network in order to maximize the cumulative weighted flow in the network over a horizon. We develop a novel heuristic dispatching rule that selects the next set of tasks to be processed by the work groups. We further propose families of valid inequalities for an integer programming formulation of the problem, one of which specifically links the network design and scheduling decisions. Our methods are tested on realistic data sets representing the infrastructure systems of New Hanover County, North Carolina in the United States and lower Manhattan in New York City. These results indicate that our methods can be used in both real-time restoration activities and long-term scenario planning activities. Our models are also applied to explore the effects on the restoration activities of aligning them with the goals of an emergency manager and to benchmark existing restoration procedures.  相似文献   

3.
For the products that provide not only intrinsic value from their functions but also stylish consumption experience, there often exist both Veblen and network effects. Some customers are more likely to purchase the product if fewer customers can afford it, while others might appreciate the existence of more peers. Focusing on these products, we study the market equilibrium under rational expectations. The optimal pricing and quantity decisions reveal interesting insights about the effects of such mixed consumption externalities.  相似文献   

4.
In this paper, we propose the first network performance measure that can be used to assess the efficiency of a network in the case of either fixed or elastic demands. Such a measure is needed for many different applications since only when the performance of a network can be quantifiably measured can the network be appropriately managed. Moreover, as we demonstrate, the proposed performance measure, which captures flow information and behavior, allows one to determine the criticality of various nodes (as well as links) through the identification of their importance and ranking. We present specific networks for which the performance/efficiency is computed along with the importance rankings of the nodes and links. The new measure can be applied to transportation networks, supply chains, financial networks, electric power generation and distribution networks as well as to the Internet and can be used to assess the vulnerability of a network to disruptions.  相似文献   

5.
A neural fuzzy control system with structure and parameter learning   总被引:8,自引:0,他引:8  
A general connectionist model, called neural fuzzy control network (NFCN), is proposed for the realization of a fuzzy logic control system. The proposed NFCN is a feedforward multilayered network which integrates the basic elements and functions of a traditional fuzzy logic controller into a connectionist structure which has distributed learning abilities. The NFCN can be constructed from supervised training examples by machine learning techniques, and the connectionist structure can be trained to develop fuzzy logic rules and find membership functions. Associated with the NFCN is a two-phase hybrid learning algorithm which utilizes unsupervised learning schemes for structure learning and the backpropagation learning scheme for parameter learning. By combining both unsupervised and supervised learning schemes, the learning speed converges much faster than the original backpropagation algorithm. The two-phase hybrid learning algorithm requires exact supervised training data for learning. In some real-time applications, exact training data may be expensive or even impossible to obtain. To solve this problem, a reinforcement neural fuzzy control network (RNFCN) is further proposed. The RNFCN is constructed by integrating two NFCNs, one functioning as a fuzzy predictor and the other as a fuzzy controller. By combining a proposed on-line supervised structure-parameter learning technique, the temporal difference prediction method, and the stochastic exploratory algorithm, a reinforcement learning algorithm is proposed, which can construct a RNFCN automatically and dynamically through a reward-penalty signal (i.e., “good” or “bad” signal). Two examples are presented to illustrate the performance and applicability of the proposed models and learning algorithms.  相似文献   

6.
One of the hardest challenges in building a realistic Bayesian Network (BN) model is to construct the node probability tables (NPTs). Even with a fixed predefined model structure and very large amounts of relevant data, machine learning methods do not consistently achieve great accuracy compared to the ground truth when learning the NPT entries (parameters). Hence, it is widely believed that incorporating expert judgments can improve the learning process. We present a multinomial parameter learning method, which can easily incorporate both expert judgments and data during the parameter learning process. This method uses an auxiliary BN model to learn the parameters of a given BN. The auxiliary BN contains continuous variables and the parameter estimation amounts to updating these variables using an iterative discretization technique. The expert judgments are provided in the form of constraints on parameters divided into two categories: linear inequality constraints and approximate equality constraints. The method is evaluated with experiments based on a number of well-known sample BN models (such as Asia, Alarm and Hailfinder) as well as a real-world software defects prediction BN model. Empirically, the new method achieves much greater learning accuracy (compared to both state-of-the-art machine learning techniques and directly competing methods) with much less data. For example, in the software defects BN for a sample size of 20 (which would be considered difficult to collect in practice) when a small number of real expert constraints are provided, our method achieves a level of accuracy in parameter estimation that can only be matched by other methods with much larger sample sizes (320 samples required for the standard machine learning method, and 105 for the directly competing method with constraints).  相似文献   

7.
A common business strategy to promote product adoption in software industry is to provide a free trial version with limited functionalities of the commercial product to increase the installed user base. The increase of user base will lead to higher value of the software because of positive network effects. However, offering a free trial version may cannibalize some demand of the commercial software. This paper examines the tradeoff between network effects and the cannibalization effect, and aims to uncover the conditions under which firms should introduce the free trial product. We find that when network intensity is strong, it is more profitable for a software monopoly to offer free trial than to segment the market with two versions of different qualities. In addition, this paper solves the joint decision problem of finding the optimal quality for the firm’s free trial software and the optimal price of its commercial product.  相似文献   

8.
Scheduling with deteriorating jobs and learning effects has been widely studied. However, multi-agent scheduling with simultaneous considerations of deteriorating jobs and learning effects has hardly been considered until now. In view of this, we consider a two-agent single-machine scheduling problem involving deteriorating jobs and learning effects simultaneously. In the proposed model, given a schedule, we assume that the actual processing time of a job of the first agent is a function of position-based learning while the actual processing time of a job of the second agent is a function of position-based deterioration. The objective is to minimize the total weighted completion time of the jobs of the first agent with the restriction that no tardy job is allowed for the second agent. We develop a branch-and-bound and several simulated annealing algorithms to solve the problem. Computational results show that the proposed algorithms are efficient in producing near-optimal solutions.  相似文献   

9.
While the agility of networked organizational structures is important for organizational performance, studies on how to evaluate it remain scant, probably because the difficulty in measuring network evolution. In this conceptual paper, we propose two measures - network entropy and mutual information - to characterize the agility of networked organizational structure. Rooted in graph theory and information theory, these two measures capture network evolution in a comprehensive and parsimonious way. They indicate the uncertainty (or disorder) at the network level as well as the degree distribution at the individual level. We also propose an algorithm for applying them in the scenario of adding links to a network while holding the number of nodes fixed. Both simulated and real networks are used for demonstration. Implications and areas for future research are discussed in the end.  相似文献   

10.
Educational research communities bear responsibility for establishing a substantial body of evidence to support claims that drive the field. For example, one commonly accepted claim is that there is a relationship between the cognitive demand of mathematical task enactments and students’ learning. One study that is often cited in association with this claim is Stein and Lane (1996), and in 44% of those citations, Stein and Lane (1996) is the sole reference. Citation analysis reveals that many of these claims go beyond the warrants provided by the Stein and Lane study, either by granting more confidence in the relationship than the study design allows or by phrasing the claim as a causal relationship between cognitive demand and student learning. A few other studies are occasionally cited in conjunction with Stein and Lane (1996) and are summarized in this article, but there remains a need for replication studies to provide better empirical support for claims about cognitive demand and student learning and to refine our shared understanding.  相似文献   

11.
It has recently become clear that many control problems are too difficult to admit analytic solutions. New results have also emerged to show that the computational complexity of some “solved” control problems is prohibitive. Many of these control problems can be reduced to decidability problems or to optimization questions. Even though such questions may be too difficult to answer analytically, or may not be answered exactly given a reasonable amount of computational resources, researchers have shown that we can “approximately” answer these questions “most of the time”, and have “high confidence” in the correctness of the answers.  相似文献   

12.
We study a single-commodity Robust Network Design problem (RND) in which an undirected graph with edge costs is given together with a discrete set of balance matrices, representing different supply/demand scenarios. In each scenario, a subset of the nodes is exchanging flow. The goal is to determine the minimum cost installation of capacities on the edges such that the flow exchange is feasible for every scenario. Previously conducted computational investigations on the problem motivated the study of the complexity of some special cases and we present complexity results on them, including hypercubes. In turn, these results lead to the definition of new instances (random graphs with {−1, 0, 1} balances) that are computationally hard for the natural flow formulation. These instances are then solved by means of a new heuristic algorithm for RND, which consists of three phases. In the first phase the graph representing the network is reduced by heuristically deleting a subset of the arcs, and a feasible solution is built. The second phase consists of a neighborhood search on the reduced graph based on a Mixed-Integer (Linear) Programming (MIP) flow model. Finally, the third phase applies a proximity search approach to further improve the solution, taking into account the original graph. The heuristic is tested on the new instances, and the comparison with the solutions obtained by Cplex on a natural flow formulation shows the effectiveness of the proposed method.  相似文献   

13.
The complex biological and environmental factors involved in the transmission of mosquito-borne diseases in humans have made their control elusive in many instances. Conceptual models contribute to gain insight and help to reduce the risk of taking poor managerial decisions. The focus of this paper is to compare, using a contact network model, the impact that perturbation of the number infectious contacts and of transmissibility have on the size of an outbreak. We illustrate the analysis on a contact network parametrized with data that associates humans and the mosquito Culex quinquefasciatus, a vector for lymphatic filariasis. The model suggests that, if the values corresponding to transmissibility and number of infectious contacts is relatively large, variations in the size of an outbreak are significantly in favor of control measures to reduce infectious contacts.  相似文献   

14.
Removing important nodes from complex networks is a great challenge in fighting against criminal organizations and preventing disease outbreaks. Six network performance metrics, including four new metrics, are applied to quantify networks’ diffusion speed, diffusion scale, homogeneity, and diameter. In order to efficiently identify nodes whose removal maximally destroys a network, i.e., minimizes network performance, ten structured heuristic node removal strategies are designed using different node centrality metrics including degree, betweenness, reciprocal closeness, complement-derived closeness, and eigenvector centrality. These strategies are applied to remove nodes from the September 11, 2001 hijackers’ network, and their performance are compared to that of a random strategy, which removes randomly selected nodes, and the locally optimal solution (LOS), which removes nodes to minimize network performance at each step. The computational complexity of the 11 strategies and LOS is also analyzed. Results show that the node removal strategies using degree and betweenness centralities are more efficient than other strategies.  相似文献   

15.
16.
By continuing a contrast with the DNR research program, begun in Harel and Koichu (2010), I discuss several important issues with respect to teaching and learning mathematics that have emerged from our research program which studies learning that occurs through students’ mathematical activity and indicate issues of complementarity between DNR and our research program. I make distinctions about what we mean by inquiring into the mechanisms of conceptual learning and how it differs from work that elucidates steps in the development of a mathematical concept. I argue that the construct of disequilibrium is neither necessary nor sufficient to explain mathematics conceptual learning. I describe an emerging approach to instruction aimed at particular mathematical understandings that fosters reinvention of mathematical concepts without depending on students’ success solving novel problems.  相似文献   

17.
In this work we provide a simple proof of the existence of optimal tolls for multiclass network equilibrium problems where the value-of-time parameter varies continuously throughout the population. The main argument, based on a finite-dimensional reformulation of the problem, also allows us to determine in a simple fashion revenue minimizing link toll vectors.  相似文献   

18.
Two examples of parametric cost programming problems—one in network programming and one in NP-hard 0-1 programming—are given; in each case, the number of breakpoints in the optimal cost curve is exponential in the square root of the number of variables in the problem. This research is partially supported by the Air Force Office of Scientic Research. Air Force Number AFOSR-78-3646  相似文献   

19.
The art of teaching freshmen students is undergoing a rapid paradigm change. Classical forms of teaching are not applicable any more and an unmanageable offer of new multimedia tools and concepts is glutting the market. Moreover, compared to previous courses, the class size triples. In view of these challenges, we implemented a new teaching concept best described as Kaizen learning. By Kaizen learning, we define a teaching philosophy that is based on a concise mix of short learning units (with feedback loops and tests) and of carefully chosen repetitions (also with feedback loops and tests) to calibrate a course for the students. Here, this intensive blended, student-centred learning paradigm is analysed together with its direct impact on the students’ performance. This case study leads to easy-to-implement key drivers for successfully teaching science in Oman, such as (1) human–human interaction, (2) clearly communicated expectations, (3) avoidance of a short-term learning attitude, (4) a no-calculator policy, (5) continuous Kaizen learning, and (6) balanced combination of traditional teaching and e-learning.  相似文献   

20.
Data envelopment analysis (DEA) is a method for measuring the efficiency of peer decision making units (DMUs). Recently network DEA models been developed to examine the efficiency of DMUs with internal structures. The internal network structures range from a simple two-stage process to a complex system where multiple divisions are linked together with intermediate measures. In general, there are two types of network DEA models. One is developed under the standard multiplier DEA models based upon the DEA ratio efficiency, and the other under the envelopment DEA models based upon production possibility sets. While the multiplier and envelopment DEA models are dual models and equivalent under the standard DEA, such is not necessarily true for the two types of network DEA models. Pitfalls in network DEA are discussed with respect to the determination of divisional efficiency, frontier type, and projections. We point out that the envelopment-based network DEA model should be used for determining the frontier projection for inefficient DMUs while the multiplier-based network DEA model should be used for determining the divisional efficiency. Finally, we demonstrate that under general network structures, the multiplier and envelopment network DEA models are two different approaches. The divisional efficiency obtained from the multiplier network DEA model can be infeasible in the envelopment network DEA model. This indicates that these two types of network DEA models use different concepts of efficiency. We further demonstrate that the envelopment model’s divisional efficiency may actually be the overall efficiency.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号