This contribution is aimed at advanced rescue system designing. Since the modelled decisions are strategic and often have a long-term impact on accessibility and effectiveness of service providing, several aspects sho...
详细信息
ISBN:
(纸本)9781728107011
This contribution is aimed at advanced rescue system designing. Since the modelled decisions are strategic and often have a long-term impact on accessibility and effectiveness of service providing, several aspects should be taken into account when a integer-programming model of the problem is created. One of them consists in system robustness that means its resistance to randomly occurring failures in the associated transportation network, which is used by ambulance vehicles when delivering rescue service to system users. To incorporate system robustness into the particular integer-programming model, a finite set of failure scenarios is usually formed. Then, the optimal robust rescue system design can be obtained by minimization of the highest detrimental impact of the individual scenarios. A simple rescue system design can be modelled as a weighted p-median problem. While a weighted p-median problem is easily solvable, the robust system design often causes computational difficulties due to the model size and its complicated structure. Therefore, the main goal of this contribution is to develop a fast algorithm for robust rescue system design, which enables to obtain a good approximate solution of the original problem in a short time. The theoretical explanation is here accompanied by a computational study.
In this paper, an approximate algorithm is proposed to solve facility layout problem (FLP) which is formulated as quadratic assignment problem (QAP). In the proposed approach, linear assignment problem (LAP) is formul...
详细信息
ISBN:
(纸本)9781424429271
In this paper, an approximate algorithm is proposed to solve facility layout problem (FLP) which is formulated as quadratic assignment problem (QAP). In the proposed approach, linear assignment problem (LAP) is formulated which is solvable in polynomial time. The proposed heuristic is applied to solve FLP from the set of LAP solution. To evaluate the performance of the heuristic a comparison between optimal and heuristic solution is also provided. The approach is tested on numerous benchmark problems available in literature. An encouraging comparative performance of this procedure is thus reported.
We have designed a novel polynomial-time approximate algorithm for the graph vertex colouring problem. Contrary to the common top-down strategy for solving the colouring graph problem, we propose a bottom-up algorithm...
详细信息
Phase field models have been employed extensively in the study of microstructure evolution in materials. Elasticity plays an important role in solid-state phase transformation processes, and it is usually introduced i...
详细信息
Phase field models have been employed extensively in the study of microstructure evolution in materials. Elasticity plays an important role in solid-state phase transformation processes, and it is usually introduced into phase field models in terms of the elastic strain energy by applying Khachaturyan-Shatalov microelasticity theory. Conventionally, this energy is derived in the reciprocal space and results in full-space Fourier transformation in practice, which becomes bottle-neck in large-scale and massively-parallel applications. In this article, we propose an error-controlled approximation algorithm for scalable and efficient calculation of the elastic strain energy in phase field models. We first derive a real-space convolutional representation of the elastic strain energy by representing the equilibrium displacements in the Khachaturyan-Shatalov microelasticity theory using Green's function. Then we propose an error-controlled truncation criterion to approximate the corresponding terms in the phase field model. Finally, a carefully designed parallel algorithm is presented to carry out large-scale simulations. The accuracy and efficiency of the proposed algorithm are demonstrated by real-world large-scale phase field simulations.
In this paper, a 2-approximate algorithm is described to answer the previously open problem "What is the complexity of the TPP for disjoint non-convex simple polygons" which is known to NP-hard. We provide a...
详细信息
In this paper, a 2-approximate algorithm is described to answer the previously open problem "What is the complexity of the TPP for disjoint non-convex simple polygons" which is known to NP-hard. We provide a O(kn) approximate algorithm, where k is polygon counts, and n is the number of vertexes of the polygons, to efficiently find a path which is 2 times at most than the shortest path. To solve this problem, we transform all of simple polygons into corresponding convex polygons, then process the shortest path of convex polygons according to the parity of polygons sequence and finally obtain the approximate path of simple polygons.
We develop a simple and fast (1 + is an element of)-approximate algorithm for computing the Minimum Enclosing Ball (MEB) of a points set in high dimensional Euclidean space without requirement of any numerical solver....
详细信息
ISBN:
(纸本)9781424417339
We develop a simple and fast (1 + is an element of)-approximate algorithm for computing the Minimum Enclosing Ball (MEB) of a points set in high dimensional Euclidean space without requirement of any numerical solver. We prove theoretically that the proposed Simpler Minimum Enclosing Ball (SMEB) algorithm converges to the optimum within any precision in O(1/is an element of) iterations. Compared to the MEB algorithms adopted in the Core Vector Machines (CVM) and Simpler Core Vector Machines (SCVM) recently arisen, it has the competitive performances in both training time and accuracy. Besides, the proposed algorithm does not need any extra requirement of kernels, it can be linked with extensive kernel methods, consequently. We also present the potential application areas for the algorithm theoretically, such as Unbalanced SVM and Ranking SVM. Experiments demonstrate the validity of the algorithm we proposed.
The scatter halfspace depth (sHD) is an extension of the location halfspace (also called Tukey) depth that is applicable in the nonparametric analysis of scatter. Using sHD, it is possible to define minimax optimal ro...
详细信息
The scatter halfspace depth (sHD) is an extension of the location halfspace (also called Tukey) depth that is applicable in the nonparametric analysis of scatter. Using sHD, it is possible to define minimax optimal robust scatter estimators for multivariate data. The problem of exact computation of sHD for data of dimension d >= 2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$d \ge 2$$\end{document} has, however, not been addressed in the literature. We develop an exact algorithm for the computation of sHD in any dimension d and implement it efficiently for any dimension d >= 1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$d \ge 1$$\end{document}. Since the exact computation of sHD is slow especially for higher dimensions, we also propose two fast approximate algorithms. All our programs are freely available in the R package scatterdepth.
We study approximate algorithms for placing a set of documents into M distributed Web servers in this paper. We define the load of a server to be the summation of loads induced by all documents stored. The size of a s...
详细信息
We study approximate algorithms for placing a set of documents into M distributed Web servers in this paper. We define the load of a server to be the summation of loads induced by all documents stored. The size of a server is defined in a similar manner. We propose five algorithms. algorithm 1 balances the loads and sizes of the servers by limiting the loads to k(l) and the sizes to k(s) times their optimal values, where 1/k(l)-1 + 1/k(s)-1 <= 1. This result improves the bounds on load and size of servers in [ 10]. algorithm 2 further reduces the load bound on each server by using partial document replication, and algorithm 3 by sorting. algorithm 4 employs both partial replication and sorting. Last, without using sorting and replication, we give algorithm 5 for the dynamic placement at the cost of a factor O(log M) in the time-complexity.
Frequent cyber-attacks compel service providers to employ security-aware service functions (S-SFs) while delivering network services. Typically, one S-SF can be implemented by diverse configurations, each requiring di...
详细信息
Frequent cyber-attacks compel service providers to employ security-aware service functions (S-SFs) while delivering network services. Typically, one S-SF can be implemented by diverse configurations, each requiring different implementation costs and providing various security levels. These multi-configured S-SFs could compose various security-aware service function chains (S-SFCs) to satisfy the security requirement of incoming network request. How to properly compose an S-SFC and effectively deploy it remains an open challenging problem. In this work, we discover the "reDundancy security A ccumulatio N "(DAN) phenomenon caused by the direct-summation-fashion when calculating the security level (SeL) of an S-SFC and propose novel methodology to estimate the SeL of one S-SFC for avoiding DAN. To begin, we introduce the concept security level indicator (SeLI) and our novel methodology. Next, we formulate the problem of security-aware SF selection, chaining, and deployment (Sec-SFCD) with the objective function of cost optimization and prove its NP-hardness. To solve this problem, we propose the security-cost-balance (SCB) factor technique, which measures the average cost of satisfying one unit of security requirement. Based on this technique, we further develop an efficient algorithm called SCB-based S-SFC deployment (SCB-SD) and improves it by proposing overflowing security level elimination (OSE) technique. Through our thorough analysis, we show the logarithm approximation of SCB-SD and SCB-SD with OSE technique (SSD-OSE). The extensive simulation results validate SSD-OSE' s logarithm-approximation and demonstrate that it significantly outperforms the benchmarks directly extended from the state-of-the-art by an average of 17.98 % and 67.47 %.
The density peak clustering (DPC) algorithm identifies patterns in high-dimensional data and obtains robust outcomes across diverse data types with minimal hyperparameters. However, DPC may produce inaccurate pattern ...
详细信息
The density peak clustering (DPC) algorithm identifies patterns in high-dimensional data and obtains robust outcomes across diverse data types with minimal hyperparameters. However, DPC may produce inaccurate pattern sizes in multi-dimensional datasets and exhibit poor performance in recognizing similar patterns. To solve these issues, we propose the rediscover and subdivide density peak clustering algorithm (RSDPC), which follows three key strategies. The first strategy, rediscover, iteratively uncovers prominent patterns within the existing data. The second strategy, subdivide, partitions patterns into several similar subclasses. The third strategy, re-sort, rectifies errors from the preceding steps by incorporating critical distance and nearest distance considerations. The experimental results show that RSDPC is feasible and effective in synthetic and practical datasets compared with state-of-the-art works.
暂无评论