The deep penetration of renewable energy sources (RES) in power systems is increasingly influencing electricity markets and the physical operations of transmission networks. Besides the environmental and climate benef...
详细信息
Supporting such an all-to-all traffic matrix is challenging as it can easily lead to congestion. Scheduling patterns are designed to avoid such congestion by spreading the communications over time. The time is divided...
详细信息
ISBN:
(纸本)9798350300741;9798350300734
Supporting such an all-to-all traffic matrix is challenging as it can easily lead to congestion. Scheduling patterns are designed to avoid such congestion by spreading the communications over time. The time is divided in phases and communications are spread across the phases. However, current scheduling algorithms are not fault-tolerant. In this paper we propose a fault-adaptive congestion-free scheduling to support an all-to-all exchange in fat tree topology. Our approach consist in the computation of the minimum number of communication phases required to support the all-to-all exchange with the available links, and of the scheduling of the communications on these phases. It enables to recover from failures and makes optimal use of the remaining bandwidth. We show that our scheduling approach provides better performance than the most common approach which is the linear-shift scheduling. The throughput is improved by roughly 80% with our approach, for as little as one link failure.
Due to continuously shrunk feature sizes and increased design complexity, the difficulty in pin access becomes one of the most critical challenges in large-scale full-chip routing. State-of-the-art pin access-aware de...
详细信息
ISBN:
(纸本)9781450399784
Due to continuously shrunk feature sizes and increased design complexity, the difficulty in pin access becomes one of the most critical challenges in large-scale full-chip routing. State-of-the-art pin access-aware detailed routing techniques suffer from either the ordering problem of the sequential routing scheme or the inflexibility of pre-determining an access point for each pin. Some other routing-related studies create pin extensions with Metal-2 metal segments to optimize pin accessibility;however, this strategy may not be practical without considering the contemporary routing flow. This paper presents a pin access-oriented concurrent detailed routing approach conducted after the track assignment stage. The core detailed routing engine is based on an integer linear programming (ILP) formulation, which has lower complexity and can flexibly tackle multi-pin nets compared to an existing formulation. Besides, to maximize the free routing resource and to keep the problem size tractable, a pre-processing flow trimming redundant metals and inserting assistant metals is developed. The experimental results show that compared to a state-of-the-art academic router, the proposed concurrent scheme can effectively derive good results with fewer design rule violations and less runtime.
Purpose The purpose of this paper is to describe an integer linear programming model to schedule the maintenance crew and the maintenance tasks in a bus operating company. Design/methodology/approach The proposed meth...
详细信息
Purpose The purpose of this paper is to describe an integer linear programming model to schedule the maintenance crew and the maintenance tasks in a bus operating company. Design/methodology/approach The proposed methodology relies on an integer linear programming model that finds feasible maintenance schedules. It minimizes the costs associated with maintenance crew and the costs associated with unavailability. The model is applied in a real-world case study of a Portuguese bus operating company. A constructive heuristic approach is put forward, based on solving the maintenance scheduling problem for each bus separately. Findings The heuristic finds better solutions than the exact methods (based on branch-and-bound techniques) in a much lower computational time. Practical implications The results suggest the relevance of such heuristic approaches for maintenance scheduling in practice. Originality/value This proposed model is an effective decision-making support method that provides feasible maintenance schedules for the maintenance technicians and for the maintenance tasks in a fleet of buses. It also complies with several operational, technical and labour constraints.
This work presents guillotine constraints for two- and three-dimensional cutting problems. These problems look for a subset of rectangular items of maximum value that can be cut from a single rectangular container. Gu...
详细信息
This work presents guillotine constraints for two- and three-dimensional cutting problems. These problems look for a subset of rectangular items of maximum value that can be cut from a single rectangular container. Guillotine constraints seek to ensure that items are arranged in such a way that cuts from one edge of the container to the opposite edge completely separate them. In particular, we consider the possibility of 2, 3, and 4 cutting stages in a predefined sequence. These constraints are considered within a two-level iterative approach that combines the resolution of integer linear programming and constraint programming models. Experiments with instances of the literature are carried out, and the results show that the proposed approach can solve in less than 500 s approximately 60% and 50% of the instances for the two- and three-dimensional cases, respectively. For the two-dimensional case, in comparison with the recent literature, it was possible to improve the upper bound for 16% of the instances.
In confronting the "Memory Wall", the design of embedded vision systems exhibits many challenges regarding design cost, energy consumption, and performance. This paper considers a variant of the Job Shop Sch...
详细信息
In confronting the "Memory Wall", the design of embedded vision systems exhibits many challenges regarding design cost, energy consumption, and performance. This paper considers a variant of the Job Shop Scheduling Problem with tooling constraints, arising in this context, in which the completion time (makespan) is to be minimized. This objective corresponds to the performance of the produced circuit. We discuss different formulations using integer linear programming and point out their characteristics, namely the size and the quality of the linearprogramming relaxation bound. To solve this scheduling problem with large size, we compare various approaches, including a Constraint programming model, two constructive greedy heuristics, two models of LocalSolver, a Simulated Annealing algorithm, and a Beam Search algorithm. Numerical experiments are conducted on 16 benchmark instances from the literature and 12 real-life non-linear image processing kernels for validating their efficiency.
This paper makes a plan to introduce school families. School families refer to a hierarchical system where the junior high school district encompasses the elementary school district. School families have the advantage...
详细信息
ISBN:
(纸本)9780998133164
This paper makes a plan to introduce school families. School families refer to a hierarchical system where the junior high school district encompasses the elementary school district. School families have the advantage of promoting efficient cooperation between elementary and junior high schools. Therefore, we formulated a new school district planning problem to introduce school families and created an optimal plan under changing population situations. Our formulation achieves school families by exploiting the continuity constraints of the school district. We also compare two different methods of reorganizing school districts in the simulation experiments: changing school districts by transferring current students in a given year (school-year method) and switching new students' schools over a multi-year period (birth-year method). We examined the cost and computation time of plans obtained with both methods and showed that the method combining the two provides the most significant cost savings.
Attack trees (ATs) are a widely deployed modelling technique to categorize potential attacks on a system. An attacker of such a system aims at doing as much damage as possible, but might be limited by a cost budget. T...
详细信息
ISBN:
(纸本)9798350347937
Attack trees (ATs) are a widely deployed modelling technique to categorize potential attacks on a system. An attacker of such a system aims at doing as much damage as possible, but might be limited by a cost budget. The maximum possible damage for a given cost budget is an important security metric of a system. In this paper, we find the maximum damage given a cost budget by modelling this problem with ATs, both in deterministic and probabilistic settings. We show that the general problem is NP-complete, and provide heuristics to solve it. For general ATs these are based on integer linear programming. However when the AT is tree-structured, then one can instead use a faster bottom-up approach. We also extend these methods to other problems related to the cost-damage tradeoff, such as the cost-damage Pareto front.
The growth in demand for air transport has generated new challenges for capacity and safety. In response, manufacturers develop new types of aircraft while airlines open new routes and adapt their fleet. This excessiv...
详细信息
The growth in demand for air transport has generated new challenges for capacity and safety. In response, manufacturers develop new types of aircraft while airlines open new routes and adapt their fleet. This excessive demand for air transport also leads to the need for further investments in airport expansion and ATM modernization. The current work was focused on the ATM problem with respect to new procedures, such as free flight, for addressing the air capacity issues in an environmental approach. The study was triggered by and aligned with the following performance objectives set by EUROCONTROL and the European Commission: (1) to improve ATM safety whilst accommodating air traffic growth;(2) to increase the ATM network efficiency;(3) to strengthen ATM's contribution to aviation security and to environmental objectives;(4) to match capacity and air transport growth. The proposed mathematical model covers the aforementioned objectives by focusing on energy losses and costs of flights under the scenario of a controlled free flight and a unified airspace. The factors enhanced in the model were chosen based on their impact on the ATM energy efficiency, such as the airborne delays and flight duration, the delays due to ground holding, the flight cancellation, the flight speed deviations and the flight level alterations. Therefore, the presented mathematical model minimizes the energy costs due to the above terms under certain assumptions and constraints. Finally, simulation case studies, used as proof tests, have been conducted under different ATM scenarios to examine the complexity and the efficiency of the developed model.
Mining the epistatic gene loci for complex diseases is an important research topic in recent years. The existing epistasis detection methods have the shortcomings of high complexity, low efficiency, high false positiv...
详细信息
暂无评论