首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
Project networks – or PERT networks – can be characterized by random completion times of activities and positive or negative cash flows throughout the project. In these cases the decision maker’s problem consists of determining a feasible activities schedule, to maximize the project financial value, where the financial value is measured by the net present value (npv) of cash flows.The analysis of these networks is a difficult computational task for the following reason. First, suppose that a schedule is fixed using a heuristic rule. Then the expected npv is calculated. But, due to stochastic job completion times, this problem belongs to the ♯-P complete difficulty class, e.g. problems that involve finding all the Hamiltonian cycles in a network. The problem is such that evaluating one project alone is not sufficient, but the optimal one has to be selected. This involves a further increase in computational time.This paper proposes a stochastic optimization model to determine a heuristic scheduling rule, that provides an approximate solution to finding the optimal project npv. A feature of this approach is that the scheduling rule is completely deterministic and defined when the project begins. Therefore an upper bound of the expected npv, that is an optimistic estimate, can be calculated through linear programming and a lower bound, that is a pessimistic estimate, can be calculated using simulation before the project begins.  相似文献   

3.
4.
5.
6.
We consider a new class of Markov processes in the space of measures with constant mass. We present the construction of such processes in terms of probabilities that control the motion of individual particles. We study additive functionals of such processes and give examples related to stochastic flows with interaction.  相似文献   

7.
This paper discusses analytic algorithms and software for the enumeration of all integer flows inside a network. Concrete applications abound in graph theory, representation theory, and statistics. Our methods are based on the study of rational functions with poles on arrangements of hyperplanes; they surpass traditional exhaustive enumeration and can even yield formulas when the input data contains some parameters. We also discuss the calculation of chambers in detail because it is a necessary subroutine.  相似文献   

8.
The common definition of ‘criticality’ in stochastic networks is insufficiently general, and often counter-intuitive. An alternative metric, ‘cruciality’ has been proposed. The combination of the common criticality metric and cruciality is shown to provide information about the ‘uncertainty impact’ and ‘controllable benefit’ in the network.  相似文献   

9.
10.
This paper describes methods for calculating the most likely values of link flows in networks with incomplete data. The object is to present a thorough and rigorous treatment of maximum entropy flow estimation methods and to develop a methodological framework capable of handling different types of network problems. A multiple probability space conditional entropy approach is described for the general network problem. Results are presented and discussed for an example network intended for water supply.  相似文献   

11.
It was realized recently that the chordal, radial and dipolar Schramm–Löwner evolution (SLEs) are special cases of a general slit holomorphic stochastic flow. We characterize those slit holomorphic stochastic flows which generate level lines of the Gaussian free field. In particular, we describe the modifications of the Gaussian free field (GFF) corresponding to the chordal and dipolar SLE with drifts. Finally, we develop a version of conformal field theory based on the background charge and Dirichlet boundary condition modifications of GFF and present martingale-observables for these types of SLEs.  相似文献   

12.
充分利用图的字典积的结构证明了以下结论:如果图G_1的每连通分支都非平凡,图G_2的阶数大于3,那么它们的字典积G_1[G_2]具有非零3-流.  相似文献   

13.
14.
This paper deals with the detection and prediction of losses due to cyber attacks waged on vital networks. The accumulation of losses to a network during a series of attacks is modeled by a 2-dimensional monotone random walk process as observed by an independent delayed renewal process. The first component of the process is associated with the number of nodes (such as routers or operational sites) incapacitated by successive attacks. Each node has a weight associated with its incapacitation (such as loss of operational capacity or financial cost associated with repair), and the second component models the cumulative weight associated with the nodes lost. Each component has a fixed threshold, and crossing of a threshold by either component represents the network entering a critical condition. Results are given as joint functionals of the predicted time of the first observed threshold crossing along with the values of each component upon this time.  相似文献   

15.
16.
The recent developments in stochastic linear programming are reviewed here broadly in their applied aspects. They include non-parametric methods which are applicable in situations of incomplete knowledge and partial uncertainty. This framework is shown to be most suitable for developing robust optimal solutions. For instance, a class of non-parametric methods based on the minimax principle and the criteria of stochastic dominance is developed here to illustrate its wide scope of application. It is shown that this class of methods provides a measure of robustness through the adoption of a cautious policy. Some examples are discussed using the recent field of data envelopment analysis.  相似文献   

17.
Here we are dealing with minimum cost flow problem on dynamic network flows with zero transit times and a new arc capacity, horizon capacity, which denotes an upper bound on the total flow traversing through on an arc during a pre-specified time horizon T. We develop a simple approach based on mathematical modelling attributes to solve the min-cost dynamic network flow problem where arc capacities and costs are time varying, and horizon capacities are considered. The basis of the method is simple and relies on the appropriate defining of polyhedrons, and in contrast to the other usual algorithms that use the notion of time expanded network, this method runs directly on the original network.  相似文献   

18.
19.
20.
1.Introductiontrafficprocessesinqueueingnetworksareanimportantoperatingfacetofsuchmodels,aswellasvaluableinthestudyofvaliddecompositionsofnetworks.IfwefindsometrafficprocessesinanetworkPoisson,thenitoftenrendersthemathematicalanalysistractable.Generalized…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号