Heat exchanger network synthesis (HENS) has been one of the most extensively studied synthesis problem in chemical engineering. The methodologies commonly used to solve a heat exchanger network (HEN) problem are based...
详细信息
Heat exchanger network synthesis (HENS) has been one of the most extensively studied synthesis problem in chemical engineering. The methodologies commonly used to solve a heat exchanger network (HEN) problem are based on heuristic methods instead of deterministic methods which, theoretically, only with feasible initial HEN configuration enumeration, can find global optima. But enumeration always leads to unacceptable computational time. This paper presents a principle of process stream arrangement and the related deterministic algorithm for synthesizing HEN. The implementation of the principle based on the uniformity factor which proposed to describe the degree of the energy distribution of HEN configuration under different process stream arrangement is aimed to decrease the space of configuration enumeration. Thus, through the part of smaller uniformity factor network structure are optimized, deterministic methods are effectively suitable for medium-size problem with global optima in a reasonable brief computational time. Notably, using examples of 8SP1, 10SP, 10SP1, 14SP1, we demonstrate that our approach finds superior networks compared to those known in the literature. (C) 2013 Published by Elsevier Ltd.
We study the cooperative data exchange problem for fully connected networks. In this problem, nodes make broadcast transmissions to recover a file consisting of K independent packets. Each node initially only possesse...
详细信息
We study the cooperative data exchange problem for fully connected networks. In this problem, nodes make broadcast transmissions to recover a file consisting of K independent packets. Each node initially only possesses a subset of the packets. We propose (d, K)-Basis Searching, a deterministic polynomial-time minimization approach, to calculate the minimum rate for this problem. (d, K)-Basis Searching has strictly reduced complexity compared with the state-of-the-art algorithms, which are based on submodular function minimization. We extend our algorithm to a generalized problem: the so-called successive local omniscience problem.
This paper proposes a deterministic heuristic algorithm (DHA) for two-dimensional strip packing problem where 90 rotations of pieces are allowed and there is no guillotine packing constraint. The objective is to place...
详细信息
This paper proposes a deterministic heuristic algorithm (DHA) for two-dimensional strip packing problem where 90 rotations of pieces are allowed and there is no guillotine packing constraint. The objective is to place all pieces without overlapping into a strip of given width so as to minimize the total height of the pieces. Based on the definition of action space, a new sorting rule for candidate placements is proposed such that the position for the current piece is as low as possible, the distance between the current piece and other inside pieces is as close as possible, and the adverse impact for further placements is as little as possible. Experiments on four groups of benchmarks showed the proposed DHA achieved highly competitive results in comparison with the state-of-the-art algorithms in the literature. Also, as a deterministic algorithm, the DHA could achieve high quality solutions by only one independent run on both small-scale and large-scale problem instances and the results are repeatable. (C) 2013 Elsevier Ltd. All rights reserved.
The two-sided assembly line becomes very popular in recent years. In this paper, a priority rules-based algorithmic design is developed for optimizing two-sided assembly line. Five elementary rules and 90 composite ru...
详细信息
The two-sided assembly line becomes very popular in recent years. In this paper, a priority rules-based algorithmic design is developed for optimizing two-sided assembly line. Five elementary rules and 90 composite rules are tested on the benchmark data sets and their performance are provided. Two enumerative principles, which are specific to two-sided assembly lines are proposed to enhance the performance of the rules. Further, priority rules are embedded into a bounded dynamic programming framework to form a deterministic algorithm where the use of a bound can reduce the solution space as the algorithm is advanced stage-by-stage. These approaches offer distinct advantages over the methods proposed in the literature, such as less fine-tuning effort and more stable results. Computational results show that the novel algorithm can generate good solutions efficiently, especially in large sized problems.
Tensor wheel (TW) decomposition combines the popular tensor ring and fully connected tensor network decompositions and has achieved excellent performance in tensor completion problem. A standard method to compute this...
详细信息
Tensor wheel (TW) decomposition combines the popular tensor ring and fully connected tensor network decompositions and has achieved excellent performance in tensor completion problem. A standard method to compute this decomposition is the alternating least squares (ALS). However, it usually suffers from slow convergence and numerical instability. In this work, the fast and robust SVD-based algorithms are investigated. Based on a result on TW-ranks, we first propose a deterministic algorithm that can estimate the TW decomposition of the target tensor under a controllable accuracy. Then, the randomized versions of this algorithm are presented, which can be divided into two categories and allow various types of sketching. Numerical results on synthetic and real data show that our algorithms have much better performance than the ALS-based method and are also quite robust. In addition, with one SVD-based algorithm, we also numerically explore the variability of TW decomposition with respect to TW-ranks and the comparisons between TW decomposition and other famous formats in terms of the performance on approximation and compression.
Mobile Heterogeneous Wireless Sensor Networks (Heterogeneous WSNs) are mainly characterized by their internal diversity. In such networks, the variety of properties in each component provides profitable outcomes relat...
详细信息
Mobile Heterogeneous Wireless Sensor Networks (Heterogeneous WSNs) are mainly characterized by their internal diversity. In such networks, the variety of properties in each component provides profitable outcomes related to many metrics such as network lifetime and hardware cost. Although it offers remarkable advantages, random mobility causes major difficulties in the management of Heterogeneous WSNs. The purpose of this paper is to introduce a controlled mobility approach for Heterogeneous WSNs using Unmanned Aerial Vehicles (UAVs). According to experiments, the proposed deterministic and genetic methods can efficiently deal with the complexity of Mobile Heterogeneous WSNs compared to the previously applied random strategies. The obtained results prove that our suggested techniques can achieve a greater delivery ratio, a faster coverage time, and a faster latency. (C) 2020 The Authors. Published by Elsevier B.V. on behalf of King Saud University.
Let G = (V, E) be a multigraph which has a designated vertex s is an element of V with an even degree. For two edges e(1) = (s, u(1)) and e(2) = (s, u(2)), we say that a multigraph G' is obtained from G by splitti...
详细信息
Let G = (V, E) be a multigraph which has a designated vertex s is an element of V with an even degree. For two edges e(1) = (s, u(1)) and e(2) = (s, u(2)), we say that a multigraph G' is obtained from G by splitting e(1) and e(2) at s if two edges e(1) and e(2) are replaced with a single edge (u(1), u(2)). It is known that all edges incident to s can be split without losing the edge-connectivity of G in V - s. This complete splitting plays an important role in solving many graph connectivity problems. The currently fastest algorithm for a complete splitting [14] runs in O(n(m + n log n) log n) time, where n = \V\ and m is the number of pairs of vertices between which G has an edge. Their algorithm is first designed for Eulerian multigraphs, and then extended for general multigraphs. Although the part for Eulerian multigraphs is simple, the rest for general multigraphs is considerably complicated. This paper proposes a much simpler O (n (m + n log n) log n) time algorithm for finding a complete splitting. A new edge-splitting theorem derived from our algorithm is also presented.
The paper is devoted to searching algorithms which will allow to generate images of attractors of generalized iterated function systems (GIFS in short), which are certain generalization of classical iterated function ...
详细信息
The paper is devoted to searching algorithms which will allow to generate images of attractors of generalized iterated function systems (GIFS in short), which are certain generalization of classical iterated function systems, defined by Mihail and Miculescu in 2008, and then intensively investigated in the last years (the idea is that instead of selfmaps of a metric space X, we consider mappings form the Cartesian product Xx...xX to X). Two presented algorithms are counterparts of classical deterministic algorithm and so-called chaos game. The third and fourth one is fitted to special kind of GIFSs - to affine GIFS, which are, in turn, also investigated.
We present a (full) derandomization of HSSW algorithm for 3-SAT, proposed by Hofmeister, Schoning, Schuler, and Watanabe (in STACS 2002, pp. 192-202, 2002). Thereby, we obtain an O(1.3303 (n) )-time deterministic algo...
详细信息
We present a (full) derandomization of HSSW algorithm for 3-SAT, proposed by Hofmeister, Schoning, Schuler, and Watanabe (in STACS 2002, pp. 192-202, 2002). Thereby, we obtain an O(1.3303 (n) )-time deterministic algorithm for 3-SAT, which is currently fastest.
A team consisting of an unknown number of mobile agents starting from different nodes of an unknown network, possibly at different times, have to explore the network: Every node must be visited by at least one agent, ...
详细信息
A team consisting of an unknown number of mobile agents starting from different nodes of an unknown network, possibly at different times, have to explore the network: Every node must be visited by at least one agent, and all agents must eventually stop. Agents are anonymous (identical), execute the same deterministic algorithm, and move in synchronous rounds along links of the network. They are silent: They cannot send any messages to other agents or mark visited nodes in any way. In the absence of any additional information, exploration with termination of an arbitrary network in this model, devoid of any means of communication between agents, is impossible. Our aim is to solve the exploration problem by giving to agents very restricted local traffic reports. Specifically, an agent that is at a node nu in a given round is provided with three bits of information answering the following questions: Am I alone at nu? Did any agent enter nu in this round? Did any agent exit v in this round? We show that this small amount of information permits us to solve the exploration problem in arbitrary networks. More precisely, we give a deterministic terminating exploration algorithm working in arbitrary networks for all initial configurations that are not perfectly symmetric;that is, in which there are agents with different views of the network. The algorithm works in polynomial time in the (unknown) size of the network. A deterministic terminating exploration algorithm working for all initial configurations in arbitrary networks does not exist.
暂无评论