A Competitive Many-period Postman Problem With Varying Parameters

Size: px
Start display at page:

Download "A Competitive Many-period Postman Problem With Varying Parameters"

Transcription

1 Applied Mathematical Sciences, vol. 8, 2014, no. 146, HIKARI Ltd, A Competitive Many-period Postman Problem With Varying Parameters Xeniya Grigorieva St.Petersburg State University Faculty of Applied Mathematics and Control Processes University pr. 35, St.Petersburg, , Russia Oleg Malafeev St. Petersburg State University Faculty of Applied Mathematics and Control Processes University pr. 35, St.Petersburg, , Russia Copyright c 2014 Xeniya Grigorieva and Oleg Malafeev. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Let defined multistep game Γ G on a graph tree Γ. The postman s problem on a complete graph with finite number of agents which responsible for the postman s route and with varying weights given to the graph edges is a stage game G in each vertex on graph tree Γ. The problem G will be called a competitive one-period postman problem with varying parameters. In this parer competitive many-period postman problem with with varying papametres is examined. A multistep game with the postman problem realized on each step having a finite number of agents and varying matrix of weights given to the graph edges depending on the step (period), will be called a competitive many-period postman problem with varying parameters. The payoffs of the postman problem participants (players) including the postman himself in the simultaneous games G are their profits minus costs for providing postman s movement on the routes. The routes are the players strategies. An algorithm for finding a compromise situation for solving simultaneous games is proposed. The theory is illustrated by the example of three-step game of three players.

2 7250 Xeniya Grigorieva and Oleg Malafeev Mathematics Subject Classification: 91 Axx Keywords: postman problem, multistep game, compromise solution 1 Introduction Remind that the postman s problem is to pass all streets on his way (edges of graph) and come back to the initial point by minimizing the total length of the way. It is clear that not only postman has such a task but also different couriers [1], [2]. The following generalization of this postman problem is examined in this paper. It is assumed that there is a finite number of agents (offices) that are responsible for the postman s route, and each of them wants to minimize its costs for providing postman s movement on his route, or equivalently maximize the money remained, that is its profit. This model have apply in working process office selling goods prolonged consumption. The movement of seller along route is provided different agents. Each agent wants to minimize its costs for providing postman s movement on his route, or equivalently maximize the money remained, that is its profit. Thus, a noncoalitional game of N individuals which provide a postman s movement on the given routes will be called a competitive one-period postman problem with a finite number of agents N. In reality postman s work takes a long time and model s parameters can change according to different conditions. This would be followed by a change in weights on some edges of the graph corresponding to the chosen route, that is why a new postman problem considering changes in the graph should be solved (in particular, can be change a graph itself: some edges may be disappear and some may be appear). A multistep game with the postman problem realized on each step having a finite number of agents and varying matrix of weights given to the graph edges depending on the step (period), will be called a competitive many-period postman problem with varying parameters. The payoffs of the postman problem participants (players) including the postman himself in the simultaneous games G are their profits minus costs for providing postman s movement on the routes. The routes are the players strategies. An algorithm for finding a compromise situation for solving simultaneous games is proposed. The theory is illustrated by the example of three-step game of three players.

3 A competitive many-period postman problem with varying parameters The postman problem Let G = (X, P ) - be a complete connected undirected graph, where X and P are the sets of vertices and edges of the graph G correspondingly, and A = {a(i, j)} (i,j) P is a matrix of weights a(i, j) given to the graph edges. Then the postman problem G(A) is the problem of finding the shortest route, which includes each edge at least one time and which ends in the vertex of starting the movement. Construct a cycle on the graph G, in which each edge (i, j) of the graph G is passed f(i, j) + 1 times, where f(i, j) is the number of additional postman s passings of the edge (i, j). But the total length of repeatedly passed edges must be minimal: L = (i,j) P a(i, j)f(i, j)) min (i,j). An algorithm for calculating Floyd s matrix would be used for making this cycle. Each matrix element (i, j) defines the length of the shortest way from vertex i to the vertex j. Intermediate route nodes from the node i to the node j are defined according to the matrix of nodes sequence [3]. Since any graph G has even number of vertices with an odd degree, then matches [3] or sets of non-adjacent edges can be made from the remained unpassed vertices with an odd degree. The constructed solution may not be unique. 3 One-period postman problem with finite number of agents. 3.1 The state of the postman problem with finite number of agents. Consider noncoalitional game with n players G = I = {1,..., n}, {R j } j=1, m, {H j i } i=1, n, j=1, m, {A j i } i=1, n, j=1, m, where I is a set of agents, {R j } is a set of ways in the route when each of them includes each edge at least once and ends in the vertex of starting the motion, H j i is a real function of costs of agent i on j-th way, A j i is a sum of agent i for providing postamn s movement on j-th way. Each agent has a problem of maximizing the functional F j i = A j i H j i max, j = 1, m, j

4 7252 Xeniya Grigorieva and Oleg Malafeev that is in fact a payoff function of i-th agent when postman goes on j-th way. Construct matrix F of agent s profits, in which rows correspond to the chosen ways, columns correspond to the agents: F = F F 1 n F m 1... F m n R R m By solving a problem of maximization we find ways that are suitable for each agent in seperate. But it is needed to find a way (one or more), that is suitable for all of them. For this purpose we use an algorithm for finding a compromise situation (thus, compromise solution is taken as optimal principle). 3.2 Algorithm for finding a compromise situation. Algorithm for finding a compromise solution for noncoalitional game G is described as follows [1]. Step 1. Construct ideal vector M = (M 1,..., M n ) where M i := F j i i = max F j i is a maximal profit value of agent i: j F Fn F1 m... Fn m... F j F j n n Step 2. For each way j find deviation from the maximum M i of the rest of the profit values, i. e. j i := M i F j i, i = 1, n: = M 1 F M n Fn M 1 F1 m... M n Fn m Step 3. From found deviations j i for each way j choose a maximal deviation from all agent i j i = max j i : j i M 1 F M n F 1 n = M 1 F1 m... M n Fn m n m 1... m n 1 i m i m Step 4. Choose minimal from all maximal deviations j i = min j j j i = j = min max j i. The way R j on which the minimum is reached is a compromise j i game solution for all agents.

5 A competitive many-period postman problem with varying parameters A competitive many-period postman problem with varying parameters. Divide time segment [0, T ], during which a postman is going to move over the routes by periods [0, t 1 ], [t 1, t 2 ],..., [t k, T ], with 0 < t 1 < t 2 <... < T. Model parameters change under different conditions after each moment t k. It is assumed that there is a finite number of agents (offices) that provide postman movement on the route. They are interested in having minimal costs spent on the route during [0, T ]. Total costs are formed by adding costs on each time segment the segment [0, T ] is divided to. This many-period process can be illustrated in terms of graph tree Γ = (Z, L), where Z is the set of graph vertices, L is point-to-set mapping, defined on the set Z: L(z) Z, z Z. Finite graph tree with the initial vertex z 0 will be denoted by Γ(z 0 ). The root of Γ tree is the initial postman problem, vertices correspond to postman problems considering changes after each time-period, and branches are the chosen routes for corresponding problems, figure 1. Definition 4.1 A multistep game Γ(z 0 ) = I = {1,..., n}, Γ(z 0 ), {G(z, A z )} z Z, in which postman problem G(z, A z ) is realized on each step, with a finite number of agents and varying matrix A z of weights given to the graph edges depending on step or period, will be called a competitive many-period postman problem with varying parameters. Definition 4.2 Solving a competitive many-period postman problem with varying parameters means gaining such a sequence of ways for many-period process, that when summing up costs for each way forming this sequence we get minimal costs, that is equilibrium or compromise. Remark 4.1. There can be several ways for postman and it is not obligatory to choose an optimal one on each stage. The main thing is to have minimal final costs. An algorithm for finding a compromise situation would be used for solving this problem as well. Example 4.1. There is a complete graph G 0 with 4 vertices, figure 2. Matrix of weights assigned to the graph edges G 0 and matrix of ways with the shortest length between all pairs of vertices of the graph G F 0, calculated with the help of Floyd s algorithm, look as follows:

6 7254 Xeniya Grigorieva and Oleg Malafeev Figure 1: Figure 2:

7 A competitive many-period postman problem with varying parameters 7255 G 0 : G F 0 : It is necessary to choose edges that would be passed more than once because some graph vertices have odd degrees. For this purpose possible matches should be found. These are (1, 4), (2, 3), or (1, 2), (3, 4), or (2, 4), (1, 3) in this example. Therefore, possible graph passings are the following ways: R 1 = (1, 2), (2, 3), (3, 2), (2, 4), (4, 3), (3, 1), (1, 4), (4, 1); R 2 = (1, 2), (2, 3), (3, 4), (4, 2), (2, 4), (4, 1), (1, 3), (3, 1); R 3 = (1, 2), (2, 4), (4, 3), (3, 1), (1, 2), (2, 3), (3, 4), (4, 1). Other cycles passing graph edges in a different order are also possible. But these cycles would pass on same sets of two edges, which represent all possible matches on this graph, more than once. Thus, there are three different possible ways on this graph. Their lengths are as follows: L(R 1 ) = 24, L(R 2 ) = 25, L(R 3 ) = 26. After time t 1 graph changes. But when selecting different ways different changes arise. By selecting way R 1 graph G 0 has changed to graph G 1. Matrix of weights given to the graph edges G 1 and matrix of ways with the shortest length between all pairs of vertices of graph G F 1, calculated with the help of Floyd s algorithm, are as follows: R 1 G 1 : G F 1 : For passing graph G 1 there are the following ways: R 6 = R 1 = (1, 2), (2, 3), (3, 2), (2, 4), (4, 3), (3, 1), (1, 4), (4, 1); R 5 = R 2 = (1, 2), (2, 3), (3, 4), (4, 2), (2, 4), (4, 1), (1, 3), (3, 1); R 4 = R 3 = (1, 2), (2, 4), (4, 3), (3, 1), (1, 2), (2, 3), (3, 4), (4, 1). Their lengths: L(R 6 ) = 18, L(R 5 ) = 15, L(R 4 ) = 19.

8 7256 Xeniya Grigorieva and Oleg Malafeev By selecting way R 2 graph G 0 has changed to graph G 2. Matrix of weights given to the graph edges G 2 and matrix of ways with the shortest length between all pairs of vertices of graph G F 2, calculated with the help of Floyd s algorithm, are as follows: R 2 G 2 : G F 2 : For passing graph G 2 there are the following ways: R 7 = R 1 = (1, 2), (2, 3), (3, 2), (2, 4), (4, 3), (3, 1), (1, 4), (4, 1); R 8 = R 2 = (1, 2), (2, 3), (3, 4), (4, 2), (2, 4), (4, 1), (1, 3), (3, 1); R 9 = R 3 = (1, 2), (2, 4), (4, 3), (3, 1), (1, 2), (2, 3), (3, 4), (4, 1). Their lengths: L(R 7 ) = 14, L(R 8 ) = 13, L(R 9 ) = 12. By selecting way R 3 graph G 0 has changed to graph G 3. Matrix of weights given to the graph edges G 3 and matrix of ways with the shortest length between all pairs of vertices of graph G F 3, calculated with the help of Floyd s algorithm, are as follows: R 3 G 3 : G F 3 : For passing G 3 there are the following ways: R 10 = R 1 = (1, 2), (2, 3), (3, 2), (2, 4), (4, 3), (3, 1), (1, 4), (4, 1); R 11 = R 2 = (1, 2), (2, 3), (3, 4), (4, 2), (2, 4), (4, 1), (1, 3), (3, 1); R 12 = R 3 = (1, 2), (2, 4), (4, 3), (3, 1), (1, 2), (2, 3), (3, 4), (4, 1). Their lengths: L(R 10 ) = 20, L(R 11 ) = 21, L(R 12 ) = 19. Ways with total minimal length are the solution for many-period postman problem without firms that are competitors in terms of providing the movement. These are way R 2 on the time segment [0, t 1 ] and way R 9 on the time segment [t 1, T ]. Thus, by selecting these two ways for the route, we minimize the final costs. Costs will be equal to 37 units for moment T. Example 4.2. There is a postman that must move over its route during time T, parameters of the problem change after moment t 1. Thus, we get

9 A competitive many-period postman problem with varying parameters 7257 partition of the segment [0, T ] to segments [0, t 1 ], [t 1, T ]. Let there be three agents 1, 2 and 3, which provide the postman movement within his route. There are 3 possible ways of passing the route R 1, R 2, R 3 on time segment [0, t 1 ] and 9 possible ways R 4, R 5, R 6, R 7, R 8, R 9, R 10, R 11, R 12 on time segment [t 1, T ]. We need to find a compromise solution for time moment T, i. e. among set of ways R 1 +R 4, R 1 +R 5, R 1 +R 6, R 2 +R 7, R 2 +R 8, R 2 +R 9, R 3 +R 10, R 3 + R 11, R 3 + R 12 we need to find the minimal one. Costs functions: H R 1 1 H R 2 1 H R 3 1 H R 4 1 H R 5 1 H R 6 1 H R 7 1 H R 8 1 H R 9 1 H R 10 1 H R 11 1 H R 12 1 H R 1 2 H R 2 2 H R 3 2 H R 4 2 H R 5 2 H R 6 2 H R 7 2 H R 8 2 H R 9 2 H R 10 2 H R 11 2 H R 12 2 H R 1 3 H R 2 3 H R 3 3 H R 4 3 H R 5 3 H R 6 3 H R 7 3 H R 8 3 H R 9 3 H R 10 3 H R 11 3 H R 12 3 = Let the plan sum A j i be same for all agents for all possible ways and be equal to 30. Then matrix of profits of each way looks like follows: If recalculating for the sets of ways r 1 = R 1 + R 4, r 2 = R 1 + R 5, r 3 = R 1 + R 6, r 4 = R 2 + R 7, r 5 = R 2 + R 8, r 6 = R 2 + R 9, r 7 = R 3 + R 10, r 8 = R 3 + R 11, r 9 = R 3 + R 12, then matrix of profits for time T is: ) Ideal vector M = (24, 20, 19). 2) For each way j find deviation of the remained profit values from maximum M i from all agents i: ( ) =

10 7258 Xeniya Grigorieva and Oleg Malafeev max i 3) Among found deviations choose the maximal one for each agent (M i F j i ) = ( ). 4) Choose minimal from these maximal deviations min j max (M i F j i ) = 8. i Hence, we have compromise solution for game Γ G for all agents: way R 3 at the first stage [0, t 1 ] and way R 10 at the second stage [t 1, T ]. 5 Conclusion A competitive many-period postman problem with varying parameters and example of its numerical solution are examined in this paper. References [1] O.A. Malafeev, Managed conflict system, SPbSU, SPb., [2] T. Basar and G. Olsder, Dynamic Noncooperative Game Theory, 2-nd ed. Classics in Applied Mathematics, 23 New York, Academic Press, [3] Hamdy A. Taha, Operations Research: an introduction, Williams, Moscow, SPb, Kiev, Received: August 3, 2014

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

Types of Degrees in Bipolar Fuzzy Graphs

Types of Degrees in Bipolar Fuzzy Graphs pplied Mathematical Sciences, Vol. 7, 2013, no. 98, 4857-4866 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.37389 Types of Degrees in Bipolar Fuzzy Graphs Basheer hamed Mohideen Department

More information

Warshall s Algorithm: Transitive Closure

Warshall s Algorithm: Transitive Closure CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths

More information

Observation on Sums of Powers of Integers Divisible by Four

Observation on Sums of Powers of Integers Divisible by Four Applied Mathematical Sciences, Vol. 8, 2014, no. 45, 2219-2226 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.4140 Observation on Sums of Powers of Integers Divisible by Four Djoko Suprijanto

More information

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9

. 0 1 10 2 100 11 1000 3 20 1 2 3 4 5 6 7 8 9 Introduction The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive integer We say d is a

More information

The Max-Distance Network Creation Game on General Host Graphs

The Max-Distance Network Creation Game on General Host Graphs The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.

More information

Compact Representations and Approximations for Compuation in Games

Compact Representations and Approximations for Compuation in Games Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various

More information

LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS. 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method

LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS. 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method LECTURE 5: DUALITY AND SENSITIVITY ANALYSIS 1. Dual linear program 2. Duality theory 3. Sensitivity analysis 4. Dual simplex method Introduction to dual linear program Given a constraint matrix A, right

More information

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

More information

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Load balancing in a heterogeneous computer system by self-organizing Kohonen network Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.

More information

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Write the number of the left-hand item next to the item on the right that corresponds to it. 1. Stanford prison experiment 2. Friendster 3. neuron 4. router 5. tipping 6. small worlds 7. job-hunting

More information

A Review And Evaluations Of Shortest Path Algorithms

A Review And Evaluations Of Shortest Path Algorithms A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Part 2: Community Detection

Part 2: Community Detection Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -

More information

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8] Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

More information

Intersection of a Line and a Convex. Hull of Points Cloud

Intersection of a Line and a Convex. Hull of Points Cloud Applied Mathematical Sciences, Vol. 7, 213, no. 13, 5139-5149 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/ams.213.37372 Intersection of a Line and a Convex Hull of Points Cloud R. P. Koptelov

More information

Individual security and network design

Individual security and network design Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be

More information

Optimization in ICT and Physical Systems

Optimization in ICT and Physical Systems 27. OKTOBER 2010 in ICT and Physical Systems @ Aarhus University, Course outline, formal stuff Prerequisite Lectures Homework Textbook, Homepage and CampusNet, http://kurser.iha.dk/ee-ict-master/tiopti/

More information

Midterm Practice Problems

Midterm Practice Problems 6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. An Improved Approximation Algorithm for the Traveling Tournament Problem

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. An Improved Approximation Algorithm for the Traveling Tournament Problem MATHEMATICAL ENGINEERING TECHNICAL REPORTS An Improved Approximation Algorithm for the Traveling Tournament Problem Daisuke YAMAGUCHI, Shinji IMAHORI, Ryuhei MIYASHIRO, Tomomi MATSUI METR 2009 42 September

More information

TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines

TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines The problem: load balancing with bounded look-ahead Input: integer m 2: number of machines integer k 0: the look-ahead numbers t 1,..., t n : the job sizes Problem: assign jobs to machines machine to which

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

Methodology Framework for Analysis and Design of Business Intelligence Systems

Methodology Framework for Analysis and Design of Business Intelligence Systems Applied Mathematical Sciences, Vol. 7, 2013, no. 31, 1523-1528 HIKARI Ltd, www.m-hikari.com Methodology Framework for Analysis and Design of Business Intelligence Systems Martin Závodný Department of Information

More information

Analysis of Algorithms, I

Analysis of Algorithms, I Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

More information

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras

Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 36 Location Problems In this lecture, we continue the discussion

More information

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation 6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma

More information

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu ABSTRACT This

More information

P. Jeyanthi and N. Angel Benseera

P. Jeyanthi and N. Angel Benseera Opuscula Math. 34, no. 1 (014), 115 1 http://dx.doi.org/10.7494/opmath.014.34.1.115 Opuscula Mathematica A TOTALLY MAGIC CORDIAL LABELING OF ONE-POINT UNION OF n COPIES OF A GRAPH P. Jeyanthi and N. Angel

More information

Linear Programming. March 14, 2014

Linear Programming. March 14, 2014 Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7

(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7 (67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92. Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

More information

Equilibrium computation: Part 1

Equilibrium computation: Part 1 Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium

More information

Linear Programming I

Linear Programming I Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins

More information

A Graph-Theoretic Network Security Game

A Graph-Theoretic Network Security Game A Graph-Theoretic Network Security Game Marios Mavronicolas 1, Vicky Papadopoulou 1, Anna Philippou 1, and Paul Spirakis 2 1 Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus.

More information

Just the Factors, Ma am

Just the Factors, Ma am 1 Introduction Just the Factors, Ma am The purpose of this note is to find and study a method for determining and counting all the positive integer divisors of a positive integer Let N be a given positive

More information

A permutation can also be represented by describing its cycles. What do you suppose is meant by this?

A permutation can also be represented by describing its cycles. What do you suppose is meant by this? Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg martin.lauer@kit.edu

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Graphical degree sequences and realizations

Graphical degree sequences and realizations swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös

More information

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses

More information

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games 6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses

More information

Cpt S 223. School of EECS, WSU

Cpt S 223. School of EECS, WSU The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring

More information

Class One: Degree Sequences

Class One: Degree Sequences Class One: Degree Sequences For our purposes a graph is a just a bunch of points, called vertices, together with lines or curves, called edges, joining certain pairs of vertices. Three small examples of

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Analysis of the Data Using a Semantic Network as a Tool for Management Non-Conformities in Quality Management System

Analysis of the Data Using a Semantic Network as a Tool for Management Non-Conformities in Quality Management System Modern Applied Science; Vol. 10, No. 1; 2016 ISSN 1913-1844 E-ISSN 1913-1852 Published by Canadian Center of Science and Education Analysis of the Data Using a Semantic Network as a Tool for Management

More information

Product irregularity strength of certain graphs

Product irregularity strength of certain graphs Also available at http://amc.imfm.si ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 7 (014) 3 9 Product irregularity strength of certain graphs Marcin Anholcer

More information

On Integer Additive Set-Indexers of Graphs

On Integer Additive Set-Indexers of Graphs On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that

More information

Optimization Modeling for Mining Engineers

Optimization Modeling for Mining Engineers Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network. Ronit Nossenson Jerusalem College of Technology

Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network. Ronit Nossenson Jerusalem College of Technology Priority Based Enhancement of Online Power-Aware Routing in Wireless Sensor Network Ronit Nossenson Jerusalem College of Technology COMCAS 2011 1 What are sensor networks? Infrastructure-less networks

More information

Large induced subgraphs with all degrees odd

Large induced subgraphs with all degrees odd Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order

More information

Simple Graphs Degrees, Isomorphism, Paths

Simple Graphs Degrees, Isomorphism, Paths Mathematics for Computer Science MIT 6.042J/18.062J Simple Graphs Degrees, Isomorphism, Types of Graphs Simple Graph this week Multi-Graph Directed Graph next week Albert R Meyer, March 10, 2010 lec 6W.1

More information

From the probabilities that the company uses to move drivers from state to state the next year, we get the following transition matrix:

From the probabilities that the company uses to move drivers from state to state the next year, we get the following transition matrix: MAT 121 Solutions to Take-Home Exam 2 Problem 1 Car Insurance a) The 3 states in this Markov Chain correspond to the 3 groups used by the insurance company to classify their drivers: G 0, G 1, and G 2

More information

Oligopoly and Strategic Pricing

Oligopoly and Strategic Pricing R.E.Marks 1998 Oligopoly 1 R.E.Marks 1998 Oligopoly Oligopoly and Strategic Pricing In this section we consider how firms compete when there are few sellers an oligopolistic market (from the Greek). Small

More information

Math 55: Discrete Mathematics

Math 55: Discrete Mathematics Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What

More information

Analysis of an Artificial Hormone System (Extended abstract)

Analysis of an Artificial Hormone System (Extended abstract) c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating

More information

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

1 Portfolio Selection

1 Portfolio Selection COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # Scribe: Nadia Heninger April 8, 008 Portfolio Selection Last time we discussed our model of the stock market N stocks start on day with

More information

A MEASURE OF GLOBAL EFFICIENCY IN NETWORKS. Aysun Aytac 1, Betul Atay 2. Faculty of Science Ege University 35100, Bornova, Izmir, TURKEY

A MEASURE OF GLOBAL EFFICIENCY IN NETWORKS. Aysun Aytac 1, Betul Atay 2. Faculty of Science Ege University 35100, Bornova, Izmir, TURKEY International Journal of Pure and Applied Mathematics Volume 03 No. 05, 6-70 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/0.73/ijpam.v03i.5

More information

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013. Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing

More information

Math 120 Final Exam Practice Problems, Form: A

Math 120 Final Exam Practice Problems, Form: A Math 120 Final Exam Practice Problems, Form: A Name: While every attempt was made to be complete in the types of problems given below, we make no guarantees about the completeness of the problems. Specifically,

More information

n 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n + 3 2 lim m 2 1

n 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n + 3 2 lim m 2 1 . Calculate the sum of the series Answer: 3 4. n 2 + 4n + 3. The answer in decimal form (for the Blitz):, 75. Solution. n 2 + 4n + 3 = (n + )(n + 3) = (n + 3) (n + ) = 2 (n + )(n + 3) ( 2 n + ) = m ( n

More information

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices

More information

1 Representation of Games. Kerschbamer: Commitment and Information in Games

1 Representation of Games. Kerschbamer: Commitment and Information in Games 1 epresentation of Games Kerschbamer: Commitment and Information in Games Game-Theoretic Description of Interactive Decision Situations This lecture deals with the process of translating an informal description

More information

Time Value of Money, Part 4 Future Value aueof An Annuity. Learning Outcomes. Future Value

Time Value of Money, Part 4 Future Value aueof An Annuity. Learning Outcomes. Future Value Time Value of Money, Part 4 Future Value aueof An Annuity Intermediate Accounting I Dr. Chula King 1 Learning Outcomes The concept of future value Future value of an annuity Ordinary annuity versus annuity

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014

Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li. Advised by: Dave Mount. May 22, 2014 Euclidean Minimum Spanning Trees Based on Well Separated Pair Decompositions Chaojun Li Advised by: Dave Mount May 22, 2014 1 INTRODUCTION In this report we consider the implementation of an efficient

More information

How to Solve Strategic Games? Dominant Strategies

How to Solve Strategic Games? Dominant Strategies How to Solve Strategic Games? There are three main concepts to solve strategic games: 1. Dominant Strategies & Dominant Strategy Equilibrium 2. Dominated Strategies & Iterative Elimination of Dominated

More information

Review of Basic Options Concepts and Terminology

Review of Basic Options Concepts and Terminology Review of Basic Options Concepts and Terminology March 24, 2005 1 Introduction The purchase of an options contract gives the buyer the right to buy call options contract or sell put options contract some

More information

On the Relationship between Classes P and NP

On the Relationship between Classes P and NP Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

Online Adwords Allocation

Online Adwords Allocation Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Joschka Bödecker AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg jboedeck@informatik.uni-freiburg.de

More information

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

One Period Binomial Model

One Period Binomial Model FIN-40008 FINANCIAL INSTRUMENTS SPRING 2008 One Period Binomial Model These notes consider the one period binomial model to exactly price an option. We will consider three different methods of pricing

More information

Mathematical finance and linear programming (optimization)

Mathematical finance and linear programming (optimization) Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may

More information

Application of Game Theory in Inventory Management

Application of Game Theory in Inventory Management Application of Game Theory in Inventory Management Rodrigo Tranamil-Vidal Universidad de Chile, Santiago de Chile, Chile Rodrigo.tranamil@ug.udechile.cl Abstract. Game theory has been successfully applied

More information

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005 V. Adamchik 1 Graph Theory Victor Adamchik Fall of 2005 Plan 1. Basic Vocabulary 2. Regular graph 3. Connectivity 4. Representing Graphs Introduction A.Aho and J.Ulman acknowledge that Fundamentally, computer

More information

Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.

Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that

More information

Hacking-proofness and Stability in a Model of Information Security Networks

Hacking-proofness and Stability in a Model of Information Security Networks Hacking-proofness and Stability in a Model of Information Security Networks Sunghoon Hong Preliminary draft, not for citation. March 1, 2008 Abstract We introduce a model of information security networks.

More information

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES

NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES Silvija Vlah Kristina Soric Visnja Vojvodic Rosenzweig Department of Mathematics

More information

Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes

Decision Mathematics D1 Advanced/Advanced Subsidiary. Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes Paper Reference(s) 6689/01 Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Tuesday 5 June 2007 Afternoon Time: 1 hour 30 minutes Materials required for examination Nil Items included with

More information

4.6 Linear Programming duality

4.6 Linear Programming duality 4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

More information

6.3 Conditional Probability and Independence

6.3 Conditional Probability and Independence 222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted

More information

Paper 1. Calculator not allowed. Mathematics test. First name. Last name. School. Remember KEY STAGE 3 TIER 5 7

Paper 1. Calculator not allowed. Mathematics test. First name. Last name. School. Remember KEY STAGE 3 TIER 5 7 Ma KEY STAGE 3 Mathematics test TIER 5 7 Paper 1 Calculator not allowed First name Last name School 2009 Remember The test is 1 hour long. You must not use a calculator for any question in this test. You

More information

The Assignment Problem and the Hungarian Method

The Assignment Problem and the Hungarian Method The Assignment Problem and the Hungarian Method 1 Example 1: You work as a sales manager for a toy manufacturer, and you currently have three salespeople on the road meeting buyers. Your salespeople are

More information