首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 390 毫秒
1.
In this paper, we study scheduling games under mixed coordination mechanisms on hierarchical machines. The two scheduling policies involved are ‐ and ‐, where ‐ (resp., ‐) policy sequences jobs in nondecreasing order of their hierarchies, and jobs of the same hierarchy in nonincreasing (resp., nondecreasing) order of their processing times. We first show the existence of a Nash equilibrium. Then we present the price of anarchy and the price of stability for the games with social costs of minimizing the makespan and maximizing the minimum machine load. All the bounds given in this paper are tight.  相似文献   

2.
The constrained shortest path tour problem (CSPTP) is an NP‐hard combinatorial optimization problem defined on a connected directed graph , where V is the set of nodes and A is the set of nonnegative weighted arcs. Given two distinct nodes , an integer value , and node disjoint subsets , , the CSPTP aims at finding the shortest trail from s to t while visiting at least one node in every subset , in this order. In this paper, we perform a comparative analysis between two integer programming (IP) models for the problem. We also propose valid inequalities and a Lagrangian‐based heuristic framework. Branch‐and‐bound algorithms from the literature, as well as a metaheuristic approach, are used for comparison. Extensive computational experiments carried out on benchmark data sets show the effective use of valid inequalities and the quality of bounds obtained by the Lagrangian framework. Because benchmark instances do not require a great computational effort of IP models in the sense that their optimality is reached at the root node of the CPLEX branch‐and‐cut search tree, we introduce new challenging CSPTP instances for which our solution approaches outperform existing ones for the problem.  相似文献   

3.
Since many -complete graph problems are polynomial-time solvable when restricted to claw-free graphs, we study the problem of determining the distance of a given graph to a claw-free graph, considering vertex elimination a measure. Claw-free Vertex Deletion (CFVD) consists of determining the minimum number of vertices to be removed from a graph such that the resulting graph is claw-free. Although CFVD is -hard in general and recognizing claw-free graphs is still a challenge, where the current best deterministic algorithm for a graph G consists of performing executions of the best algorithm for matrix multiplication, we present linear-time algorithms for CFVD on weighted block graphs and weighted graphs with bounded treewidth. Furthermore, we show that this problem on forests can be solved in linear time by a simpler algorithm, and we determine the exact values for full k-ary trees. On the other hand, we show that CFVD is -hard even when the input graph is a split graph. We also show that the problem is hard to be approximated within any constant factor better than 2, assuming the unique games conjecture.  相似文献   

4.
The ‐centroid problem or leader–follower problem is generalized considering different customer choice rules where a customer may use facilities belonging to different firms, if the difference in travel distance (or time) is small enough. Assuming essential goods, some particular customer choice rules are analyzed. Linear programming formulations for the generalized ‐medianoid and ‐centroid problems are presented and an exact solution approach is applied. Some computational examples are included.  相似文献   

5.
We introduce two spanning tree problems with dependency constraints, where an edge can be chosen only if at least one or all edges in its dependency set are also chosen, respectively. The dependencies on the input graph G are described by a digraph D whose vertices are the edges of G, and the in‐neighbors of a vertex are its dependency set. We show that both problems are NP‐hard even if G is an outerplanar chordal graph with diameter 2 or maximum degree 3, and D is a disjoint union of arborescences of height 2. We also prove that the problems are inapproximable to a factor, unless , and that they are W[2]‐hard. As an attempt to narrow the hardness gap, we present two polynomial cases. We test integer linear programming formulations based on directed cut (DCUT) and Miller–Tucker–Zemlin (MTZ) constraints. Computational experiments are reported.  相似文献   

6.
7.
The work proposes the pre--gain analysis framework based on the newly raised nonweighted pre--gain performance index and predictive Lyapunov function, which is devoted to nonweighted -gain analysis and relevant control of discrete-time switched systems under mode-dependent average dwell time. This also provides new ideas for other disturbance-related studies. To begin with, the predictive Lyapunov function is established for switched nonlinear systems in the sense of better reflecting future system dynamics and future external disturbances. Hence, it is achievable to develop less conservative stability and nonweighted pre--gain criteria for switched linear systems. Further, a new disturbance-output expression is devised to match with the nonweighted pre--gain, whose function is to estimate and optimize the traditional nonweighted -gain of the underlying system through discussions. Then, a solvable condition is formulated to seek the piecewise time-dependent gains of switching controller in a convex structure, ensuring the global uniform exponential stability with nonweighted pre--gain and thereby attaining much smaller non-weighted -gain. Finally, the simulation comprised of a circuit system and a numerical example manifests the impressive potential of the obtained results for the purpose of preferable disturbance attenuation performances.  相似文献   

8.
We propose a fast and effective method, fast target detection (FTD), to detect the moving cooperative target for the unmanned aerial vehicle landing, and the target is composed of double circles and a cross. The purpose of our strategy is to land on the target. The FTD method needs to detect the target at the high and low heights. At the high height, the target appears completely and stably in the camera field. The FTD method can detect the circle and cross to rapidly reach the target center, named cross and circle–FTD (). To detect the cross, we propose a slope distance equation to obtain the distance between two slopes. The proposed slopes cluster method, based on the distance equation and K‐means, is used to determine the cross center. At the low height, the target appears incompletely and unstably. Therefore, FTD methods detect only the cross, named cross–FTD (). We extract the cross features ( CFs) based on line segments. Then, four CFs are combined based on graph theory. Experiments on our four datasets show that FTD has rapid speed and good performance. (Our method is implemented in C++ and is available at https://github.com/Li-Zhaoxi/UAV-Vision-Servo .) On the Mohamed Bin Zayed International Robotics Challenge datasets made we constructed, detects the target from a image approximately per pipeline with F‐measure and tracks target approximately per pipeline with F‐measure. detects centers from a image at approximately per image with F‐measure.  相似文献   

9.
How to efficiently handle uncertain information is still an open issue. In this paper, a new method to deal with uncertain information, named as two-dimensional belief function (TDBF), is presented. A TDBF has two components, T = (), both and are classical belief functions, while is a measure of reliable of . The definition of TDBF and the discounting algorithm are proposed. Compared with the classical discounting model, the proposed TDBF is more flexible and reasonable. Numerical examples are used to show the efficiency and application of the proposed method.  相似文献   

10.
Vulnerability metrics play a key role in the understanding of cascading failures and target/random attacks to a network. The graph fragmentation problem (GFP) is the result of a worst‐case analysis of a random attack. We can choose a fixed number of individuals for protection, and a nonprotected target node immediately destroys all reachable nodes. The goal is to minimize the expected number of destroyed nodes in the network. In this paper, we address the GFP by several approaches: metaheuristics, approximation algorithms, polytime methods for specific instances, and exact methods for small instances. The computational complexity of the GFP is included in our analysis, where we formally prove that the corresponding decision version of the problem is ‐complete. Furthermore, a strong inapproximability result holds: there is no polynomial approximation algorithm with factor lower than 5/3, unless . This promotes the study of specific instances of the problem for tractability and/or exact methods in exponential time. As a synthesis, we propose new vulnerability/connectivity metrics and an interplay with game theory using a closely related combinatorial problem called component order connectivity.  相似文献   

11.
Given an nth order, -control input, p-measured output generalized plant, this article proposes a simple, direct approach to design an output feedback H controller with order satisfying for , or for . For this purpose, the output feedback H control problem is transformed into an H state feedback problem for an augmented generalized system. A class of plants for which this transformation always exists and the ensuing controller has order as above, is identified. As a result, for such plants, the reduced order H controller gains are found just by solving a simple linear matrix inequality problem used in state feedback based H control. The efficacy of the proposed approach is studied on some benchmark examples.  相似文献   

12.
The task of unsupervised image‐to‐image translation has seen substantial advancements in recent years through the use of deep neural networks. Typically, the proposed solutions learn the characterizing distribution of two large, unpaired collections of images, and are able to alter the appearance of a given image, while keeping its geometry intact. In this paper, we explore the capabilities of neural networks to understand image structure given only a single pair of images, and . We seek to generate images that are structurally aligned: that is, to generate an image that keeps the appearance and style of , but has a structural arrangement that corresponds to . The key idea is to map between image patches at different scales. This enables controlling the granularity at which analogies are produced, which determines the conceptual distinction between style and content. In addition to structural alignment, our method can be used to generate high quality imagery in other conditional generation tasks utilizing images and only: guided image synthesis, style and texture transfer, text translation as well as video translation. Our code and additional results are available in https://github.com/rmokady/structural-analogy/  相似文献   

13.
The eigenvalues of tensors become more and more important in the numerical multilinear algebra. In this paper, based on the nonmonotone technique, an accelerated Levenberg–Marquardt (LM) algorithm is presented for computing the -eigenvalues of symmetric tensors, in which an LM step and an accelerated LM step are computed at each iteration. We establish the global convergence of the proposed algorithm using properties of symmetric tensors and norms. Under the local error-bound condition, the cubic convergence of the nonmonotone accelerated LM algorithm is derived. Numerical results show that this method is efficient.  相似文献   

14.
Let be a finite, simple, and connected graph. The closed interval of a set is the set of all vertices lying on a shortest path between any pair of vertices of S. The set S is geodetic if . The eccentricity of a vertex v is the number of edges in the greatest shortest path between v and any vertex w of G. A vertex v is a contour vertex if no neighbor of v has eccentricity greater than v. The contour of G is the set formed by the contour vertices of G. We consider two problems: the problem of determining whether the contour of a graph class is geodetic; the problem of determining if there exists a graph such that is not geodetic. We obtain a sufficient condition that is useful for both problems; we prove a realization theorem related to problem and show two infinite families such that is not geodetic. Using computational tools, we establish the minimum graphs for which is not geodetic; and show that all graphs with , and all bipartite graphs with , are such that is geodetic.  相似文献   

15.
Generalized orthopair fuzzy sets are extensions of ordinary fuzzy sets by relaxing restrictions on the degrees of support for and support against. Correlation analysis is to measure the statistical relationships between two samples or variables. In this paper, we propose a function measuring the interrelation of two -rung orthopair fuzzy sets, whose range is the unit interval . First, the correlation and correlation coefficient of -rung orthopair membership grades are presented, and their basic properties are investigated. Second, these concepts are extended to -rung orthopair fuzzy sets on discrete universes. Then, we discuss their applications in cluster analysis under generalized orthopair fuzzy environments. And, a real-world problem involving the evaluation of companies is used to illustrate the detailed processes of the clustering algorithm. Finally, we introduce the correlation and correlation coefficient of -rung orthopair fuzzy sets on both bounded and unbounded continuous universes and provide some numerical examples to substantiate such arguments.  相似文献   

16.
The paper investigates the sampled‐data state feedback control (SDSFC) for set stabilization of Boolean control networks (BCNs). Set stabilization means that a system converges to a subset of the state space under certain controllers. Assume that the given subset is , where and sampling period is τ. We consider two conditions qτ;q > τ and for any given subset , calculate the corresponding largest control invariant subset (LCIS). Moreover, a design procedure to calculate all possible SDSFCs for set stabilization of BCNs is obtained. Ultimately, we provide an example to demonstrate the efficiency of the results.  相似文献   

17.
As a classic NP-hard problem in machine learning and computational geometry, the k-means problem aims to partition the given points into k sets to minimize the within-cluster sum of squares. The k-means problem with penalties (k-MPWP), as a generalizing problem of the k-means problem, allows a point that can be either clustered or penalized with some positive cost. In this paper, we mainly apply the parallel seeding algorithm to the k-MPWP, and show sufficient analysis to bound the expected solution quality in the case where both the number of iterations and the number of points sampled in each iteration can be given arbitrarily. The approximate guarantee can be obtained as , where is a polynomial function involving the maximal ratio M between the penalties. On one hand, this result can be viewed as a further improvement on the parallel algorithm for k-MPWP given by Li et al., where the number of iterations depends on other factors. On the other hand, our result also generalizes the one solving the k-means problem presented by Bachem et al., because k-MPWP is a variant of the k-means problem. Moreover, we present a numerical experiment to show the effectiveness of the parallel algorithm for k-means with penalties.  相似文献   

18.
This paper presents techniques to linearly combine the sensor measurements and/or actuator inputs of a linear time‐invariant system to obtain a new system that is interior conic with prescribed bounds. In the optimal sensor combination problem, a desired system output is defined, and in the optimal actuator combination problem, a desired system input is defined, along with a frequency bandwidth in which the desired system input or output should be matched. The simultaneous optimal sensor and actuator combination problem includes desired system outputs and inputs. In all cases, the weighted or norm of the difference between the system with linearly combined sensors or actuators and the desired system is minimized while rendering the new system interior conic with prescribed bounds. The weighting transfer matrix used in the ‐ or ‐optimization problem is determined by the frequency bandwidth of interest. The individual sensor and actuator combination methods involve linear matrix inequality constraints and are posed as convex optimization problems, whereas the combined sensor and actuator method is an iterative procedure composed of convex optimization steps. Numerical examples illustrate superior tracking performance with the proposed sensor and actuator combination techniques over comparable techniques in the literature when implemented with a simple feedback controller. Robust asymptotic stability of the closed‐loop system to plant uncertainty is demonstrated in the numerical examples.  相似文献   

19.
Let be a simple graph with nodes and links, a subset of “terminals,” a vector , and a positive integer d, called “diameter.” We assume that nodes are perfect but links fail stochastically and independently, with probabilities . The “diameter‐constrained reliability” (DCR) is the probability that the terminals of the resulting subgraph remain connected by paths composed of d links, or less. This number is denoted by . The general DCR computation belongs to the class of ‐hard problems, since it subsumes the problem of computing the probability that a random graph is connected. The contributions of this paper are twofold. First, a full analysis of the computational complexity of DCR subproblems is presented in terms of the number of terminal nodes and the diameter d. Second, we extend the class of graphs that accept efficient DCR computation. In this class, we include graphs with bounded co‐rank, graphs with bounded genus, planar graphs, and, in particular, Monma graphs, which are relevant to robust network design.  相似文献   

20.
In this paper we study the approximate controllability of semilinear systems on time scale. In order to do so, we first give a complete characterization for the controllability of linear systems on time scale in terms of surjective linear operators in Hilbert spaces. Then we will prove that, under certain conditions on the nonlinear term, if the corresponding linear system is exactly controllable on , for any , then semilinear system on time scale is approximately controllable on .  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号