首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 734 毫秒
1.
We prove that if m is odd then a partial m-cycle system on n vertices can be embedded in an m-cycle system on at most m((m − 2)n(n − 1) + 2n + 1) vertices and that a partial weak Steiner m-cycle system on n vertices can be embedded in an m-cycle system on m(2n + 1) vertices.  相似文献   

2.
We describe in this paper two on-line algorithms for covering planar areas by a square-shaped tool attached to a mobile robot. Let D be the tool size. The algorithms, called Spanning Tree Covering (STC) algorithms, incrementally subdivide the planar area into a grid of D-size cells, while following a spanning tree of a grid graph whose nodes are 2D-size cells. The two STC algorithms cover general planar grids. The first, Spiral-STC, employs uniform weights on the grid-graph edges and generates spiral-like covering patterns. The second, Scan-STC, assigns lower weights to edges aligned with a particular direction and generates scan-like covering patterns along this direction. Both algorithms cover any planar grid using a path whose length is at most (n+m)D, where n is the total number of D-size cells and mn is the number of boundary cells, defined as cells that share at least one point with the grid boundary. We also demonstrate that any on-line coverage algorithm generates a covering path whose length is at least (2−)lopt in worst case, where lopt is the length of the optimal off-line covering path. Since (n+m)D2lopt, the bound is tight and the STC algorithms are worst-case optimal. Moreover, in practical environments mn, and the STC algorithms generate close-to-optimal covering paths in such environments.  相似文献   

3.
《Optimization》2012,61(3):211-267
The family of network optimization problems includes the following prototype models: assignment, critical path, max flow, shortest path, and transportation. Although it is long known that these problems can be modeled as linear programs (LP), this is generally not done. Due to the relative inefficiency and complexity of the simplex methods (primal, dual, and other variations) for network models, these problems are usually treated by one of over 100 specialized algorithms. This leads to several difficulties. The solution algorithms are not unified and each algorithm uses a different strategy to exploit the special structure of a specific problem. Furthermore, small variations in the problem, such as the introduction of side constraints, destroys the special structure and requires modifying andjor restarting the algorithm. Also, these algorithms obtain solution efficiency at the expense of managerial insight, as the final solutions from these algorithms do not have sufficient information to perform postoptimality analysis.

Another approach is to adapt the simplex to network optimization problems through network simplex. This provides unification of the various problems but maintains all the inefficiencies of simplex, as well as, most of the network inflexibility to handle changes such as side constraints. Even ordinary sensitivity analysis (OSA), long available in the tabular simplex, has been only recently transferred to network simplex.

This paper provides a single unified algorithm for all five network models. The proposed solution algorithm is a variant of the self-dual simplex with a warm start. This algorithm makes available the full power of LP perturbation analysis (PA) extended to handle optimal degeneracy. In contrast to OSA, the proposed PA provides ranges for which the current optimal strategy remains optimal, for simultaneous dependent or independent changes from the nominal values in costs, arc capacities, or suppliesJdemands. The proposed solution algorithm also facilitates incorporation of network structural changes and side constraints. It has the advantage of being computationally practical, easy for managers to understand and use, and provides useful PA information in all cases. Computer implementation issues are discussed and illustrative numerical examples are provided in the Appendix  相似文献   

4.
In exact arithmetic, the simplex method applied to a particular linear programming problem instance with real data either shows that it is infeasible, shows that its dual is infeasible, or generates optimal solutions to both problems. Most interior-point methods, on the other hand, do not provide such clear-cut information. If the primal and dual problems have bounded nonempty sets of optimal solutions, they usually generate a sequence of primal or primaldual iterates that approach feasibility and optimality. But if the primal or dual instance is infeasible, most methods give less precise diagnostics. There are methods with finite convergence to an exact solution even with real data. Unfortunately, bounds on the required number of iterations for such methods applied to instances with real data are very hard to calculate and often quite large. Our concern is with obtaining information from inexact solutions after a moderate number of iterations. We provide general tools (extensions of the Farkas lemma) for concluding that a problem or its dual is likely (in a certain well-defined sense) to be infeasible, and apply them to develop stopping rules for a homogeneous self-dual algorithm and for a generic infeasible-interior-point method for linear programming. These rules allow precise conclusions to be drawn about the linear programming problem and its dual: either near-optimal solutions are produced, or we obtain certificates that all optimal solutions, or all feasible solutions to the primal or dual, must have large norm. Our rules thus allow more definitive interpretation of the output of such an algorithm than previous termination criteria. We give bounds on the number of iterations required before these rules apply. Our tools may also be useful for other iterative methods for linear programming. © 1998 The Mathematical Programming Society, Inc. Published by Elsevier Science B.V.  相似文献   

5.
The simplex algorithm requires additional variables (artificial variables) for solving linear programs which lack feasibility at the origin point. Some students, however, particularly nonmathematics majors, have difficulty understanding the intuitive notion of artificial variables.A new general purpose solution algorithm obviates the use of artificial variables. The algorithm consists of two phases. Phase 1 searches for a feasible segment of the boundary hyper-plane (a face of feasible region or an intersection of several faces) by using rules similar to the ordinary simplex. Each successive iteration augments the basic variable set, BVS, by including another hyper-plane, until the BVS is full, which specifies a feasible vertex. In this phase, movements are on faces of the feasible region rather than from a vertex to a vertex. This phase terminates successfully (or indicates the infeasibility of the problem) with a finite number of iterations, which is at most equal to the number of constraints. The second phase uses exactly the ordinary simplex rules (if needed) to achieve optimality. This unification with the simplex method is achieved by augmenting the feasible BVS, which is always initially considered empty at the beginning of Phase 1. The algorithm working space is the space of the original (decision, slack and surplus) variables in the primal problem. It also provides a solution to the dual problem with useful information. Geometric interpretation of the strategic process with some illustrative numerical examples are also presented.  相似文献   

6.
The construction of most reliable networks is investigated. In particular, the study of restricted edge connectivity shows that general Harary graphs are max λ–min mi for all i=λ, λ+1,…,2λ−3. As a consequence, this implies that for each pair of positive integers n and e, there is a graph of n vertices and e edges that is max λ–min mi for all i=λ,λ+1,…,2λ−3. General Harary graphs that are max λ–min mi for all i=λ,λ+1,…,2λ−2 are also constructed.  相似文献   

7.
Let A be a square symmetric n × n matrix, φ be a vector from n, and f be a function defined on the spectral interval of A. The problem of computation of the vector u = f(A)φ arises very often in mathematical physics.

We propose the following method to compute u. First, perform m steps of the Lanczos method with A and φ. Define the spectral Lanczos decomposition method (SLDM) solution as um = φ Qf(H)e1, where Q is the n × m matrix of the m Lanczos vectors and H is the m × m tridiagonal symmetric matrix of the Lanczos method. We obtain estimates for uum that are stable in the presence of computer round-off errors when using the simple Lanczos method.

We concentrate on computation of exp(− tA)φ, when A is nonnegative definite. Error estimates for this special case show superconvergence of the SLDM solution. Sample computational results are given for the two-dimensional equation of heat conduction. These results show that computational costs are reduced by a factor between 3 and 90 compared to the most efficient explicit time-stepping schemes. Finally, we consider application of SLDM to hyperbolic and elliptic equations.  相似文献   


8.
Let be a fixed finite set of connected graphs. Results are given which, in principle, permit the Ramsey number r(G, H) to be evaluated exactly when G and H are sufficiently large disjoint unions of graphs taken from . Such evaluations are often possible in practice, as shown by several examples. For instance, when m and n are large, and mn,
r(mKk, nKl)=(k − 1)m+ln+r(Kk−1, Kl−1)−2.
  相似文献   

9.
Given a graph G and a positive integer d, an L(d,1)-labeling of G is a function f that assigns to each vertex of G a non-negative integer such that if two vertices u and v are adjacent, then |f(u)−f(v)|d; if u and v are not adjacent but there is a two-edge path between them, then |f(u)−f(v)|1. The L(d,1)-number of G, λd(G), is defined as the minimum m such that there is an L(d,1)-labeling f of G with f(V){0,1,2,…,m}. Motivated by the channel assignment problem introduced by Hale (Proc. IEEE 68 (1980) 1497–1514), the L(2,1)-labeling and the L(1,1)-labeling (as d=2 and 1, respectively) have been studied extensively in the past decade. This article extends the study to all positive integers d. We prove that λd(G2+(d−1)Δ for any graph G with maximum degree Δ. Different lower and upper bounds of λd(G) for some families of graphs including trees and chordal graphs are presented. In particular, we show that the lower and the upper bounds for trees are both attainable, and the upper bound for chordal graphs can be improved for several subclasses of chordal graphs.  相似文献   

10.
Asymptotic bounds for some bipartite graph: complete graph Ramsey numbers   总被引:6,自引:0,他引:6  
The Ramsey number r(H,Kn) is the smallest integer N so that each graph on N vertices that fails to contain H as a subgraph has independence number at least n. It is shown that r(K2,m,Kn)(m−1+o(1))(n/log n)2 and r(C2m,Kn)c(n/log n)m/(m−1) for m fixed and n→∞. Also r(K2,n,Kn)=Θ(n3/log2 n) and .  相似文献   

11.
Let CFn×n have minimum polynomial m(x). Suppose C is of zero trace and m(x) splits over F. Then, except when n = 2 and m(x) = (x - c)2 or when n = 3 and m(x) = x - c)2 with c ≠ 0, there exist nilpotents A, B ∈ Fn×n such that C = AB - BA.  相似文献   

12.
The purpose of this paper is to exhibit new infinite families of D-optimal (0, 1)-matrices. We show that Hadamard designs lead to D-optimal matrices of size (j, mj) and (j − 1, mj), for certain integers j ≡ 3 (mod 4) and all positive integers m. For j a power of a prime and j ≡ 1 (mod 4), supplementary difference sets lead to D-optimal matrices of size (j, 2mj) and (j − 1, 2mj), for all positive integers m. We also show that for a given j and d sufficiently large, about half of the entries in each column of a D-optimal matrix are ones. This leads to a new relationship between D-optimality for (0, 1)-matrices and for (±1)-matrices. Known results about D-optimal (±1)-matrices are then used to obtain new D-optimal (0, 1)-matrices.  相似文献   

13.
An approximation with spline functions of degree m and deficiency 3 is developed for solving second-order initial-value problems. The stability of the approximate solution is investigated and it is demonstrated that the method is divergent for m 7. Convergence is shown for m = 5 and m = 6. Moreover, the method is of order (m + 1) and error bounds are of the form: [boxV ]S(i)(x)yix[boxV ]∞=0hm+-i), i=01m A computational example is presented to illustrate the efficiency of the method.  相似文献   

14.
Let G be a simple graph. The size of any largest matching in G is called the matching number of G and is denoted by ν(G). Define the deficiency of G, def(G), by the equation def(G)=|V(G)|−2ν(G). A set of points X in G is called an extreme set if def(GX)=def(G)+|X|. Let c0(G) denote the number of the odd components of G. A set of points X in G is called a barrier if c0(GX)=def(G)+|X|. In this paper, we obtain the following:

(1) Let G be a simple graph containing an independent set of size i, where i2. If X is extreme in G for every independent set X of size i in G, then there exists a perfect matching in G.

(2) Let G be a connected simple graph containing an independent set of size i, where i2. Then X is extreme in G for every independent set X of size i in G if and only if G=(U,W) is a bipartite graph with |U|=|W|i, and |Γ(Y)||U|−i+m+1 for any Y U, |Y|=m (1mi−1).

(3) Let G be a connected simple graph containing an independent set of size i, where i2. Then X is a barrier in G for every independent set X of size i in G if and only if G=(U,W) is a bipartite graph with |U|=|W|=i, and |Γ(Y)|m+1 for any Y U, |Y|=m (1mi−1).  相似文献   


15.
A dominating set for a graph G = (V, E) is a subset of vertices VV such that for all v ε VV′ there exists some u ε V′ for which {v, u} ε E. The domination number of G is the size of its smallest dominating set(s). For a given graph G with minimum size dominating set D, let m1 (G, D) denote the number of edges that have neither endpoint in D, and let m2 (G, D) denote the number of edges that have at least one endpoint in D. We characterize the possible values that the pair (m1 (G, D), m2 (G, D)) can attain for connected graphs having a given domination number.  相似文献   

16.
We consider planar polynomial differential systems of degree m with a center at the origin and with an arbitrary linear part. We show that if the system has m(m + 1)/2 − [(m + 1)/2] algebraic solutions or exponential factors then it has a Darboux integrating factor. This result is an improvement of the classical Darboux integrability theorem and other recent results about integrability.  相似文献   

17.
We construct the polynomial pm,n* of degree m which interpolates a given real-valued function f L2[a, b] at pre-assigned n distinct nodes and is the best approximant to f in the L2-sense over all polynomials of degree m with the same interpolatory character. It is shown that the L2-error pm,n*f → 0 as m → ∞ if f C[a, b].  相似文献   

18.
This paper is devoted to the study of some formulas for polynomial decomposition of the exponential of a square matrix A. More precisely, we suppose that the minimal polynomial MA(X) of A is known and has degree m. Therefore, etA is given in terms of P0(A),…,Pm−1(A), where the Pj(A) are polynomials in A of degree less than m, and some explicit analytic functions. Examples and applications are given. In particular, the two cases m=5 and m=6 are considered.  相似文献   

19.
We provide two algorithms for finding dependence graphs both in a full transversal matroid and in its dual, a strict gammoid. The first algorithm is based on directed paths in the directed graph associated with a strict gammoid; its complexity is O(|L|(|V-L|+|E|)), where L is the link-set of the gammoid. The second algorithm is based on a special property of Gaussian elimination in a matrix of indeterminates representing a full transversal matroid; it complexity is o(m2n), where m is the rank of the matroid and n the cardinality of the underlying set. We provide an algorithm for listing all bases in, and calculating the Whitney and Tutte polynomials for, a full transversal matroid or a strict gammoid. The complexity of this algorithm is 0(N(n-m) (|E| + m2)), where N is the number of bases.  相似文献   

20.
In this paper, we provide a solution of the quadrature sum problem of R. Askey for a class of Freud weights. Let r> 0, b (− ∞, 2]. We establish a full quadrature sum estimate
1 p < ∞, for every polynomial P of degree at most n + rn1/3, where W2 is a Freud weight such as exp(−¦x¦), > 1, λjn are the Christoffel numbers, xjn are the zeros of the orthonormal polynomials for the weight W2, and C is independent of n and P. We also prove a generalisation, and that such an estimate is not possible for polynomials P of degree M = m(n) if m(n) = n + ξnn1/3, where ξn → ∞ as n → ∞. Previous estimates could sum only over those xjn with ¦xjn¦ σx1n, some fixed 0 < σ < 1.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号