首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We consider the k-level facility location problem with soft capacities (k-LFLPSC). In the k-LFLPSC, each facility i has a soft capacity u i along with an initial opening cost f i ≥ 0, i.e., the capacity of facility i is an integer multiple of u i incurring a cost equals to the corresponding multiple of f i . We firstly propose a new bifactor (ln(1/β)/(1 ?β),1+2/(1 ?β))-approximation algorithm for the k-level facility location problem (k-LFLP), where β ∈ (0, 1) is a fixed constant. Then, we give a reduction from the k-LFLPSC to the k-LFLP. The reduction together with the above bifactor approximation algorithm for the k-LFLP imply a 5.5053-approximation algorithm for the k-LFLPSC which improves the previous 6-approximation.  相似文献   

2.
Let x 0, x 1,? , x n , be a set of n + 1 distinct real numbers (i.e., x i x j , for ij) and y i, k , for i = 0,1,? , n, and k = 0 ,1 ,? , n i , with n i ≥ 1, be given of real numbers, we know that there exists a unique polynomial p N ? 1(x) of degree N ? 1 where \(N={\sum }_{i=0}^{n}(n_{i}+1)\), such that \(p_{N-1}^{(k)}(x_{i})=y_{i,k}\), for i = 0,1,? , n and k = 0,1,? , n i . P N?1(x) is the Hermite interpolation polynomial for the set {(x i , y i, k ), i = 0,1,? , n, k = 0,1,? , n i }. The polynomial p N?1(x) can be computed by using the Lagrange polynomials. This paper presents a new method for computing Hermite interpolation polynomials, for a particular case n i = 1. We will reformulate the Hermite interpolation polynomial problem and give a new algorithm for giving the solution of this problem, the Matrix Recursive Polynomial Interpolation Algorithm (MRPIA). Some properties of this algorithm will be studied and some examples will also be given.  相似文献   

3.
The circular packing problem (CPP) consists of packing n circles C i of known radii r i , iN={1,?…,?n}, into the smallest containing circle ?. The objective is to determine the coordinates (x i ,?y i ) of the centre of C i , iN, as well as the radius r and centre (x,?y) of ?. CPP, which is a variant of the two-dimensional open-dimension problem, is NP hard. This paper presents an adaptive algorithm that incorporates nested partitioning within a tabu search and applies some diversification strategies to obtain a (near) global optimum. The tabu search is to identify the n circles’ ordering, whereas the nested partitioning is to determine the n circles’ positions that yield the smallest r. The computational results show the efficiency of the proposed algorithm.  相似文献   

4.
For every algebraically closed field k of characteristic different from 2, we prove the following: (1) Finite-dimensional (not necessarily associative) k-algebras of general type of a fixed dimension, considered up to isomorphism, are parametrized by the values of a tuple of algebraically independent (over k) rational functions of the structure constants. (2) There exists an “algebraic normal form” to which the set of structure constants of every such algebra can be uniquely transformed by means of passing to its new basis—namely, there are two finite systems of nonconstant polynomials on the space of structure constants, {fi}i∈I and {bj}j∈J, such that the ideal generated by the set {fi}i∈I is prime and, for every tuple c of structure constants satisfying the property bj(c) ≠ 0 for all jJ, there exists a unique new basis of this algebra in which the tuple c′ of its structure constants satisfies the property fi(c′) = 0 for all iI.  相似文献   

5.
A frame in an n-dimensional Hilbert space H n is a possibly redundant collection of vectors {f i } iI that span the space. A tight frame is a generalization of an orthonormal basis. A frame {f i } iI is said to be scalable if there exist nonnegative scalars {c i } iI such that {c i f i } iI is a tight frame. In this paper we study the combinatorial structure of frames and their decomposition into tight or scalable subsets by using partially-ordered sets (posets). We define the factor poset of a frame {f i } iI to be a collection of subsets of I ordered by inclusion so that nonempty J?I is in the factor poset iff {f j } jJ is a tight frame for H n . We study various properties of factor posets and address the inverse factor poset problem, which inquires when there exists a frame whose factor poset is some given poset P. We then turn our attention to scalable frames and present partial results regarding when a frame can be scaled to have a given factor poset; in doing so we present a bridge between erasure resilience (as studied via prime tight frames) and scalability.  相似文献   

6.
A non-empty subset A of X=X 1×???×X d is a (proper) box if A=A 1×???×A d and A i ?X i for each i. Suppose that for each pair of boxes A, B and each i, one can only know which of the three states takes place: A i =B i , A i =X i ?B i , A i ?{B i ,X i ?B i }. Let F and G be two systems of disjoint boxes. Can one decide whether ∪F=∪G? In general, the answer is ‘no’, but as is shown in the paper, it is ‘yes’ if both systems consist of pairwise dichotomous boxes. (Boxes A, B are dichotomous if there is i such that A i =X i ?B i .) Several criteria that enable to compare such systems are collected. The paper includes also rigidity results, which say what assumptions have to be imposed on F to ensure that ∪F=∪G implies F=G. As an application, the rigidity conjecture for 2-extremal cube tilings of Lagarias and Shor is verified.  相似文献   

7.
The paper considers a simple Errors-in-Variables (EiV) model Yi = a + bXi + εξi; Zi= Xi + σζi, where ξi, ζi are i.i.d. standard Gaussian random variables, Xi ∈ ? are unknown non-random regressors, and ε, σ are known noise levels. The goal is to estimates unknown parameters a, b ∈ ? based on the observations {Yi, Zi, i = 1, …, n}. It is well known [3] that the maximum likelihood estimates of these parameters have unbounded moments. In order to construct estimates with good statistical properties, we study EiV model in the large noise regime assuming that n → ∞, but \({\epsilon ^2} = \sqrt n \epsilon _ \circ ^2,{\sigma ^2} = \sqrt n \sigma _ \circ ^2\) with some \(\epsilon_\circ^2, \sigma_\circ^2>0\). Under these assumptions, a minimax approach to estimating a, b is developed. It is shown that minimax estimates are solutions to a convex optimization problem and a fast algorithm for solving it is proposed.  相似文献   

8.
For a PERT network, a new method is developed for estimating the criticality index of activity i (ACI i ) as a function of the expected duration of activity i (μ i ) and for the sensitivity analysis of the expected project completion time (μ T ) with respect to μ i . The proposed method evaluates the frequency of activity i being on the critical path, and thereby its ACI i using Monte Carlo simulation or a Taguchi orthogonal array experiment at several values of μ i , fits a logistic regression model for estimating ACI i as a function of μ i , and then, using the estimated ACI i function, evaluates the amount of change in μ T when μ i is changed by a given amount. Unlike the previous works, the proposed method models ACI i as a nonlinear (ie, logistic) function of μ i , which can be used to estimate the amount of change in μ T for a variety of changes in μ i . Computational results indicate that the performance of the proposed method is comparable to that of direct Monte Carlo simulation.  相似文献   

9.
We consider a scheduling problem where a set of n jobs has to be processed on a set of m machines and arbitrary precedence constraints between operations are given. Moreover, for any two operations i and j values a ij >0 and a ji >0 may be given where a ij is the minimal difference between the starting times of operations i and j when operation i is processed first. Often, the objective is to minimize the makespan but we consider also arbitrary regular criteria. Even the special cases of the classical job shop problem J//Cmax belong to the set of NP-hard problems. Therefore, approximation or heuristic algorithms are necessary to handle large-dimension problems. Based on the mixed graph model we give a heuristic decomposition algorithm for such a problem, i.e. the initial problem is partitioned into subproblems that can be solved exactly or approximately with a small error bound. These subproblems are obtained by a relaxation of a subset of the set of undirected edges of the mixed graph. The subproblems are successively solved and a proportion of the results obtained for one subproblem is kept for further subproblem definitions. Numerical results of the algorithm presented here are given.  相似文献   

10.
We describe a new approach to isolate the roots (either real or complex) of a square-free polynomial F with real coefficients. It is assumed that each coefficient of F can be approximated to any specified error bound and refer to such coefficients as bitstream coefficients. The presented method is exact, complete and deterministic. Compared to previous approaches (Eigenwillig in Real root isolation for exact and approximate polynomials using Descartes’ rule of signs, PhD thesis, Universität des Saarlandes, 2008; Eigenwillig et al. in CASC, LNCS, 2005; Mehlhorn and Sagraloff in J. Symb. Comput. 46(1):70–90, 2011) we improve in two aspects. Firstly, our approach can be combined with any existing subdivision method for isolating the roots of a polynomial with rational coefficients. Secondly, the approximation demand on the coefficients and the bit complexity of our approach is considerably smaller. In particular, we can replace the worst-case quantity σ(F) by the average-case quantity \({\prod_{i=1}^n\sqrt[n] {\sigma_i}}\) , where σ i denotes the minimal distance of the i -th root ξ i of F to any other root of F, σ(F) := min i σ i , and n = deg F. For polynomials with integer coefficients, our method matches the best bounds known for existing practical algorithms that perform exact operations on the input coefficients.  相似文献   

11.
In this paper, we consider the robust facility leasing problem (RFLE), which is a variant of the well-known facility leasing problem. In this problem, we are given a facility location set, a client location set of cardinality n, time periods \(\{1, 2, \ldots , T\}\) and a nonnegative integer \(q < n\). At each time period t, a subset of clients \(D_{t}\) arrives. There are K lease types for all facilities. Leasing a facility i of a type k at any time period s incurs a leasing cost \(f_i^{k}\) such that facility i is opened at time period s with a lease length \(l_k\). Each client in \(D_t\) can only be assigned to a facility whose open interval contains t. Assigning a client j to a facility i incurs a serving cost \(c_{ij}\). We want to lease some facilities to serve at least \(n-q\) clients such that the total cost including leasing and serving cost is minimized. Using the standard primal–dual technique, we present a 6-approximation algorithm for the RFLE. We further offer a refined 3-approximation algorithm by modifying the phase of constructing an integer primal feasible solution with a careful recognition on the leasing facilities.  相似文献   

12.
Consider the resource allocation problem:minimize ∑ni=1 fi(xi) subject to ∑ni=1 xi = N and xi's being nonnegative integers, where each fi is a convex function. The well-known algorithm based on the incremental method requires O(N log n + n) time to solve this problem. We propose here a new algorithm based on the Lagrange multiplier method, requiring O[n2(log N)2] time. The latter is faster if N is much larger than n. Such a situation occurs, for example, when the optimal sample size problem related to monitoring the urban air pollution is treated.  相似文献   

13.
A subalgebra H of a finite dimensional Lie algebra L is said to be a SCAP-subalgebra if there is a chief series 0 = L0 ? L1 ?... ? Lt = L of L such that for every i = 1, 2,..., t, we have H + Li = H + Li-1 or HLi = HLi-1. This is analogous to the concept of SCAP-subgroup, which has been studied by a number of authors. In this article, we investigate the connection between the structure of a Lie algebra and its SCAP-subalgebras and give some sufficient conditions for a Lie algebra to be solvable or supersolvable.  相似文献   

14.
We prove that the isotopes of the alternative monster and the Skosyrsky algebra satisfy the identity Пi=14 [xi, yi] = 0. Hence, the algebras themselves satisfy the identity Пi=14 (c, xi, yi) = 0. We also show that none of the identities Пi=1n(c, xi, yi) = 0 holds in all commutative alternative nil-algebras of index 3. Thus, we refute the Grishkov–Shestakov hypothesis about the structure of the free finitely generated commutative alternative nil-algebras of index 3.  相似文献   

15.
For an embedding i : X ? M of smooth manifolds and a Fourier integral operator Φ on M defined as the quantization of a canonical transformation g: T*M \ {0} → T*M \ {0}, we consider the operator ii* on the submanifold X, where i* and i* are the boundary and coboundary operators corresponding to the embedding i. We present conditions on the transformation g under which such an operator has the form of a Fourier integral operator associated with the fiber of the cotangent bundle over a point. We obtain an explicit formula for calculating the amplitude of this operator in local coordinates.  相似文献   

16.
Let {X i = (X 1,i ,...,X m,i )?, i ≥ 1} be a sequence of independent and identically distributed nonnegative m-dimensional random vectors. The univariate marginal distributions of these vectors have consistently varying tails and finite means. Here, the components of X 1 are allowed to be generally dependent. Moreover, let N(·) be a nonnegative integer-valued process, independent of the sequence {X i , i ≥ 1}. Under several mild assumptions, precise large deviations for S n = Σ i=1 n X i and S N(t) = Σ i=1 N(t) X i are investigated. Meanwhile, some simulation examples are also given to illustrate the results.  相似文献   

17.
A poset P = (X, ?) is a unit OC interval order if there exists a representation that assigns an open or closed real interval I(x) of unit length to each xP so that x ? y in P precisely when each point of I (x) is less than each point in I (y). In this paper we give a forbidden poset characterization of the class of unit OC interval orders and an efficient algorithm for recognizing the class. The algorithm takes a poset P as input and either produces a representation or returns a forbidden poset induced in P.  相似文献   

18.
We consider a discrete-time risk model with insurance and financial risks. Within period i ≥ 1, the real-valued net insurance loss caused by claims is the insurance risk, denoted by X i , and the positive stochastic discount factor over the same time period is the financial risk, denoted by Y i . Assume that {(X, Y), (X i , Y i ), i ≥ 1} form a sequence of independent identically distributed random vectors. In this paper, we investigate a discrete-time risk model allowing a dependence structure between the two risks. When (X, Y ) follows a bivariate Sarmanov distribution and the distribution of the insurance risk belongs to the class ?(γ) for some γ > 0, we derive the asymptotics for the finite-time ruin probability of this discrete-time risk model.  相似文献   

19.
Let c,s,t be positive integers. The (c,s,t)-Ramsey game is played by Builder and Painter. Play begins with an s-uniform hypergraph G 0=(V,E 0), where E 0=Ø and V is determined by Builder. On the ith round Builder constructs a new edge e i (distinct from previous edges) and sets G i =(V,E i ), where E i =E i?1∪{e i }. Painter responds by coloring e i with one of c colors. Builder wins if Painter eventually creates a monochromatic copy of K s t , the complete s-uniform hypergraph on t vertices; otherwise Painter wins when she has colored all possible edges.We extend the definition of coloring number to hypergraphs so that χ(G)≤col(G) for any hypergraph G and then show that Builder can win (c,s,t)-Ramsey game while building a hypergraph with coloring number at most col(K s t ). An important step in the proof is the analysis of an auxiliary survival game played by Presenter and Chooser. The (p,s,t)-survival game begins with an s-uniform hypergraph H 0 = (V,Ø) with an arbitrary finite number of vertices and no edges. Let H i?1=(V i?1,E i?1) be the hypergraph constructed in the first i ? 1 rounds. On the i-th round Presenter plays by presenting a p-subset P i ?V i?1 and Chooser responds by choosing an s-subset X i ?P i . The vertices in P i ? X i are discarded and the edge X i added to E i?1 to form E i . Presenter wins the survival game if H i contains a copy of K s t for some i. We show that for positive integers p,s,t with sp, Presenter has a winning strategy.  相似文献   

20.
The paper is devoted to investigation of differential-geometric structure associated with Lagrangian t depending on n functions of one variable L and their derivatives by means of Cartan–Laptev method. We construct a fundamental object of a structure associated with Lagrangian. We also construct a covector E i (i = 1,..., n) embraced by prolonged fundamental object so that the system of equalities E i = 0 is an invariant representation of the Euler equations for the variational functional. Due to this, there is no necessity to connect Euler equations with the variational problem. Moreover,we distinguish in an invariant way the class of special Lagrangians generating connection in the bundle of centroaffine structure over the base M. In the case when Lagrangian L is special, there exists a relative invariant Π defined on M which generates a covector field on M and fibered metric in the bundle of centroaffine structure over the base M.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号