MANAGEMENT OPTIMIZATION PROBLEMS ON FUZZY GRAPHS
|
|
|
- Brendan Alexander
- 10 years ago
- Views:
Transcription
1 Investigaciones Europeas de Dirección y Economía de la Empresa Vol. 1, W 3,1995, pp MANAGEMENT OPTIMIZATION PROBLEMS ON FUZZY GRAPHS Krasnoproshin, V. Obraztsov, V. Belarus State University ABSTRACT In applied economics on different levels of management (of a technologieal proeess, an enterprise, region, ete.) very often there arise optimization problems that are naturaily interpreted in graph terminology. Due to various reasons mainly assoeiated with the neeessity to take into account insufficient definiteness sueh graphs may be treated as fuzzy ones. For example, aiong with different metric eharaeteristics (distanee, eapaeity, ete.) it is possible to set up a eorrespondenee between edges ancljor vertices and such ill-measurable characteristics as reliability, stability and other values subjective by their nature. Metric characteristics can also be interpreted in terms of fuzzy mathematics (e.g. a correspondenee can be set up between lower/upper capaeity and the interval thus leading to the so-eaued interval arithmeties). Keywords: Fuzzy graphs, Optimization problems. INTRODUCTION Voluminous literature is dedicated to different optimization problems on graphs in partially or even really indistinct definition. For example, a number of problems dealing with the arrangement of service centres with weights on vertices, construction of cycles in graphs with double weights of edges are considered in [1]. In [2] for the first time the notion of a fuzzy graph is introduced, some optimization problems close to similar problems for usual graphs are formulated and solved. Certain problems regarding dynamic programming with step-wise optimization of management for graphs where a correspondence is set up between edges and confidence intervals, threes are considered and transitive closures of fuzzy graphs are studied in [3]. Nevertheless, the current state of the art in the range of problems under consideration may be thought of as not quite satisfactory. The point is that in optimization problem statements the practical interpretation is of paramount importance. The formal aspect of a problem is also important but it is very bad if a problem loses meaning when passing from fuzzy to usual (Kantor's) sets. As an example we refer to the notion of the strongest [2] or the most stable [3] path in a graph. The notion is merely absurd for usual graphs because no algorithms for calculating the corresponding characteristics are needed. Generally speaking, the problem deals with the methodological aspect of relation between non-fuzzy and fuzzy mathematics, but so far there is not a unified point of view regarding this methodology. The way out is usually found 63
2 Krasnoproshin, V; Obrazstov; V either in well made subject interpretation or in the formalization that is based on classical problem statements for usual graphs and that contains solutions of the graphs as special cases. The faet that such formalization is possible and eonstruetive is shown below. In this case we deliberately narrow the generality of construction because it is beyond the scope of our paper. First, we introduce some definitions and notation borrowed from [1,2]. By G = (X, V), as it usually is, we denote a graph (X - vertices, V - edges). For simplicity of further presentation we assume that G is an undirected, connected, finite and weighted graph. And to avoid consideration of cycles of a negative surnmarized value we restrict ourselves to graphs with nonnegative matrices of weights D = [di) i.e. di) > O for all vertices x,x j EX. Graph G can be transformed into a fuzzy one by various means. In principie it can be achieved by one of the following three ways or by any perrnissible combination of them: 1. A set of vertices X may be assoeiated belonging Ilx:X ~ [0,1]. We obtain a X = {(x/,ilx(x /)),..,(x n,llx(x n ))}; with fuzzy the set funetion of of vertices 2. A set of edges V (as relation of adjacency on X x X ) may be also associated with the function of belonging Ilv:X x X ~ [0,1]. Let us denote a fuzzy set of edges by V = {(Vij, LV(Vij»I i,j E {l,...,lxih; 3. Each number of weight matrix D can be made a fuzzy one by the use of the function of belonging Il D:D ~ [0,1]. Let us denote the corresponding weight matrix by ñ There are various interesting interpretations of fuzzy graphs G, obtained by each of the above-listed ways and their combinations [2,3]. But we restrict ourselves to the study of a fuzzy graph G = ex,v) with a usual weight matrix D. The point is that graphs G with matrices D are considered in some detail in [3]. There the authors point out a pathological heuristic features of the corresponding algorithms due to partíal definiteness of comparison operations on a set of fuzzy arithmetic numbers. That is why such graphs are not of much interes from the point of view of problem statement. Besides, too much effort should be made for calculating the function of belonging that corresponds to the result and it is difficult to justify that fact taking into aecount the above-mentioned heuristie features of comparison operation. We do not also consider graphs G with fuzzy sets of vertices X but due to other reasons. First, they have been studied in [1] in quite a different context. Second, as it will become clear from the presentation that follows, function Ilx can be easily taken into account in statements that we propose. In an algorithrnic sense its use do es not most likely change anything. Notice that precisely for graphs G = (X, V) (but for unweighted ones) concepts are introduced in [2,3] that we will use for further considerations. So, assume that there is a fuzzy graph G = (X, V), XI= n, To define function Lx we will use a matrix le = [Ilv(vij)] of size nxn similar to adjacency matrix. Due to undirected 64 Investigaciones Europeas, Vol. 1, N 3, 1995, pp
3 Management optimization problems on fuzzy graphs nature of graph G it would appear reasonable that matrix le is a syrnmetric one, i.e. flv(vij)=flv(vj ) for all i,je{l,.. n}. Along with G we will consider subgraphs G' = (X', V') where X' k:; X while V' k:; V and V' do not contain edges adjacent to vertices from X \ X'. Each subgraph G' can be associated with several numerical characteristics: - weight of the subgraph co(g')= LA (where di) - weight of edge vij ); VijEV' - value of the subgraph 1 (G') = 1"'1; - stability r3] ofthe subgraph.t(g') = min {flv(vij)} VijE~' Let us now fix the vertex X E X and consider a random path Pk (x,x j) = (x ;1,,x i s ) where X~ =Xi, xt =Xj' k passesthroughaset N(X;,Xj)EN characterizingthenumber of paths from X to >S. It is evident that a definite connected subgraph G' corresponds to each path and that is why the numeric characteristics introduced above can also be calculated for the path Pk(x;,Xj). Let us denote them by co(pk(x;,xj», I(Pk(xi,x) and.t(pk (x,x j» respectively. There can be more than one path (if G is nota treej in accordance with the assumptions with respect to for vertices x.,x EX. And it is natural to single out peculiar paths from the whole set -rk (x i v x j )Ik E N(x,x j )}. For example, in [3] the authors introduce the notion of the most stable path Pko (x,x j) : k k A procedure for finding such paths is also proposed there. The procedure is based on construction of transitive closure of the graph, i.e. exponentiation of matrix I ;. Evidently, the complexity of the corresponding algorithm O(nn-l) is overstated. Besides, as mentioned above the notion of the most stable path is a non-algorithmic for usual graphs G. Below we will show how to overcome these drawbacks. Let us consider subgraph G'(x ) that can be obtained by collecting vertices and edges that are in the most stable paths from x to all other vertices x j It is evident that Investigaciones Europeas, Vol. 1, N" 3,1995, pp
4 Krasnoproshin, V; Obrazstov; V Assertion 1. G'(x;) is a spanning tree. The proof of this assertion can be based on the rule of contraríes. It is also easy to prove Assertion 2..t(G'(x)) =.t(g'(x)) for all i,je{l,...,n}. To prove this let us assume that the assertion is not satisfied. Then there can be two possible cases. 1. There is such x i E X that.t (G'(x i)) >.t (G'(x )) for a fixed vertex x E X. But this means that in G'(x) the path from xi to other vertices (including x - Pk (x J,x ) ) has the following feature:.t(pk (x J,x ) >.t(pk (x,x) where P k (x,x J) is the most stable path from x to x J. But it is not possible for an undirected graph. 2. The case.t (G'(x i)) <.t (G'(x )) is considered in a similar manner. And, finally, the following assertion holds true. Assertion 3. Let (;' = (X', V') and X' e X. If v - is an edge connecting vertices XsEX' and XtEX\X' forwhich Ilv(vst) = max {Il(vj7 ) I(x,XI!) EX' x X \X'} thenforall X EX' the edge V S1 is certain lo belong lo G'(x;). Let us apply the rule of contraríes and assume that for vertex X EX' the spanning tree G'(x) contains an edge vj7 ( x E X' and xi! E X\ X' ) but not Vst. Let us add the edge VS1 to G'(x) and exclude Vj71 This operation is reasonable because edges Vst and vjh are certain to enter one cycle. As a result we obtain a new spanning tree G"(x ) for which by the construction we have: It should be noted that all the above-mentioned assertions are close by ideology to similar assertions for problems dealing with the construction of a minirnal spanning tree (MST). Moreover, assertion 3 shows that for the construction of the most stable paths from Xi to all other vertices x J it is possible to use an algorithm for constructing MST. Such a unified algorithmic basis is a foundation for ideological combination of these problems with the help of the following functional 66 Investigaciones Europeas, Vol. 1, N" 3, 1995, pp
5 Management optimization problems on fuzry graphs (1).t(G'(x )) W(G'(X.» ---- max It is apparent that problem (1) includes problems of constructing the most stable paths and MST. Really, to solve the first one it is sufficient to put weights of a11edges equal to one positive number taken at random. For the solution of the second problem the similar operation should be made with values.lv(vij)' In so doing the structure of the subgraph G'(x;) does not depend on the choice of numbers. In the general case we obtain a tree with maximal stability of paths. Let us describe now an algorithm for the solution of problems dealing with the construction of a tree of the most stable paths and MST on the basis of the functional (1). Algorithm. Step O. in a11 Step 1. Choose such a vertex X EX\ y that x,ey and a(v st ) = max{vf7,ix f EY,XhEX\ Y}. Step 2. Y = YU X t, Z = Z U vs Step 3. If IYJ = n then the algorithm ends its work and G'(x ) = (Y,Z) is the graph to be found. Otherwise we go back to step 1. Unfortunately, the algorithm does not construct trees with maximal stability of paths on the basis of functional (1). The development of such an algorithm is beyond the scope of the present paper. Example. Let us assume that the fuzzy graph G = (X,V) is defined by the fo11owing matrices: O.8 O.6.5 O 5 O O.5 O O 5 O 3 O O le O.5 O.8.6 D= O 3 O O.8 O.4 2 O 2 O 4.5 O.6.4 O 3 O 3 4 O Using the above-mentioned algorithm we construct in the graph a tree of the most stable paths G'(x ) and a mini mal spanning tree. Investigaciones Europeas, Vol. 1, N 3, 1995, pp
6 Krasnoproshin, v.; Obrazstov, V. The results are graphically shown as: Fig.l A tree of the most stable paths. Fig.2 A mini mal spanning tree. J..l(G'(Xl)= 0.6 CO(G'(Xl)) = 10 It is not difficult to see that the algorithm has the complexity O(n2) Tt is hardly possible to lower the assessment even in case of constructing a tree of the most stable paths because in any step-wise procedure at each n steps it will be necessary to compare no less than n- 1 numeric characteristics for the whole graph. It is interesting to note that the solution of the problem dealing with the construction of a tree of the most stable paths can be obtained in terms of paths using the following functional (2) Unlike the case with functional (1) weights of all edges in V should be put equal to 1. But, it remains unclear whether it is possible in problem (2) to use the same algorithm or to apply methods similar to those for constructing the shortest paths in a usual graph. And, finally, a particular case of functional (2) is also of interest (3) L Il(P k (x ix j )) XjEX x j'~xi ro(p k (xi,x)) ---7 max 68 Investigaciones Europeas, Vol. 1, N 3,1995, pp
7 Management optimization problems on fuzry graphs Evidently, if we put all values.,tv(v ) equal to any positive number taken at random then problem (3) amounts to construction of the shortest paths from vertex x to all other x j E X. On the other hand, at no values dij problem (3) is connected with a problem of con s- tructing a tree of the most stable paths. That is why methods that forro the foundation of algorithms for constructing the shortest paths should be used precisely in (3). The present paper is not aimed at considering all possible functionals (1) - (3). We have only made an attempt to combine standard problems for usual and fuzzy graphs. And one of the functional has been considered in greater detail. Of course, there is still a problem of interpreting all functionals in terms of practical tasks because the last-named are, for all that, primary ones in optimization. REFERENCES [1]. CHRISTOTIDES, N. Graph Theory. - Acad. Press, London, [21. KAUFMANN, A. Introduction to the Theory of Fuzzy Subsets. - Acad. Press, N.Y., [3]. KAUFMANN, A., Gil Aluja J. Nuevas Tecnicas para la Direccion Estrategia. - Barcelona, Investigaciones Europeas, Vol. 1, N 3,1995, pp
8
Warshall s Algorithm: Transitive Closure
CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Random graphs with a given degree sequence
Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.
On the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
Types of Degrees in Bipolar Fuzzy Graphs
pplied Mathematical Sciences, Vol. 7, 2013, no. 98, 4857-4866 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.37389 Types of Degrees in Bipolar Fuzzy Graphs Basheer hamed Mohideen Department
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices
MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
Degree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
Large induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
Clique coloring B 1 -EPG graphs
Clique coloring B 1 -EPG graphs Flavia Bonomo a,c, María Pía Mazzoleni b,c, and Maya Stein d a Departamento de Computación, FCEN-UBA, Buenos Aires, Argentina. b Departamento de Matemática, FCE-UNLP, La
Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
On the Relationship between Classes P and NP
Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
A 2-factor in which each cycle has long length in claw-free graphs
A -factor in which each cycle has long length in claw-free graphs Roman Čada Shuya Chiba Kiyoshi Yoshimoto 3 Department of Mathematics University of West Bohemia and Institute of Theoretical Computer Science
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Cycles and clique-minors in expanders
Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor
Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there
- 1 - THREE TREE-PATHS Avram Zehavi Alon Itai Computer Science Department Technion - IIT, Haifa, Israel Abstract Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there
FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS. Mateusz Nikodem
Opuscula Mathematica Vol. 32 No. 4 2012 http://dx.doi.org/10.7494/opmath.2012.32.4.751 FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS Mateusz Nikodem Abstract. We develop the problem of fault-tolerant
Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling
Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Praveen K. Muthusamy, Koushik Kar, Sambit Sahu, Prashant Pradhan and Saswati Sarkar Rensselaer Polytechnic Institute
Determinants in the Kronecker product of matrices: The incidence matrix of a complete graph
FPSAC 2009 DMTCS proc (subm), by the authors, 1 10 Determinants in the Kronecker product of matrices: The incidence matrix of a complete graph Christopher R H Hanusa 1 and Thomas Zaslavsky 2 1 Department
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various
Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, [email protected] Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter
Cycle transversals in bounded degree graphs
Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design
Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
i/io as compared to 4/10 for players 2 and 3. A "correct" way to play Certainly many interesting games are not solvable by this definition.
496 MATHEMATICS: D. GALE PROC. N. A. S. A THEORY OF N-PERSON GAMES WITH PERFECT INFORMA TION* By DAVID GALE BROWN UNIVBRSITY Communicated by J. von Neumann, April 17, 1953 1. Introduction.-The theory of
All trees contain a large induced subgraph having all degrees 1 (mod k)
All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
Social Media Mining. Network Measures
Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Odd induced subgraphs in graphs of maximum degree three
Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov
Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices
A Review And Evaluations Of Shortest Path Algorithms
A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
BOUNDARY EDGE DOMINATION IN GRAPHS
BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN (p) 0-4874, ISSN (o) 0-4955 www.imvibl.org /JOURNALS / BULLETIN Vol. 5(015), 197-04 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA
How To Find Local Affinity Patterns In Big Data
Detection of local affinity patterns in big data Andrea Marinoni, Paolo Gamba Department of Electronics, University of Pavia, Italy Abstract Mining information in Big Data requires to design a new class
Cycles in a Graph Whose Lengths Differ by One or Two
Cycles in a Graph Whose Lengths Differ by One or Two J. A. Bondy 1 and A. Vince 2 1 LABORATOIRE DE MATHÉMATIQUES DISCRÉTES UNIVERSITÉ CLAUDE-BERNARD LYON 1 69622 VILLEURBANNE, FRANCE 2 DEPARTMENT OF MATHEMATICS
A FUZZY LOGIC APPROACH FOR SALES FORECASTING
A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005
V. Adamchik 1 Graph Theory Victor Adamchik Fall of 2005 Plan 1. Basic Vocabulary 2. Regular graph 3. Connectivity 4. Representing Graphs Introduction A.Aho and J.Ulman acknowledge that Fundamentally, computer
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms
CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard [email protected] CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes
Equilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
Solutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University [email protected] 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
Linear Programming I
Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
A Brief Study of the Nurse Scheduling Problem (NSP)
A Brief Study of the Nurse Scheduling Problem (NSP) Lizzy Augustine, Morgan Faer, Andreas Kavountzis, Reema Patel Submitted Tuesday December 15, 2009 0. Introduction and Background Our interest in the
Graphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
Math 4310 Handout - Quotient Vector Spaces
Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable
SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE
SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE 2012 SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH (M.Sc., SFU, Russia) A THESIS
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
Total colorings of planar graphs with small maximum degree
Total colorings of planar graphs with small maximum degree Bing Wang 1,, Jian-Liang Wu, Si-Feng Tian 1 Department of Mathematics, Zaozhuang University, Shandong, 77160, China School of Mathematics, Shandong
Mean Ramsey-Turán numbers
Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average
Distributed Computing over Communication Networks: Maximal Independent Set
Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.
On Integer Additive Set-Indexers of Graphs
On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines
The problem: load balancing with bounded look-ahead Input: integer m 2: number of machines integer k 0: the look-ahead numbers t 1,..., t n : the job sizes Problem: assign jobs to machines machine to which
3. The Junction Tree Algorithms
A Short Course on Graphical Models 3. The Junction Tree Algorithms Mark Paskin [email protected] 1 Review: conditional independence Two random variables X and Y are independent (written X Y ) iff p X ( )
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014
Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, [email protected] Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction
Mining Social-Network Graphs
342 Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network is
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with
Discuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
A Partition-Based Efficient Algorithm for Large Scale. Multiple-Strings Matching
A Partition-Based Efficient Algorithm for Large Scale Multiple-Strings Matching Ping Liu Jianlong Tan, Yanbing Liu Software Division, Institute of Computing Technology, Chinese Academy of Sciences, Beijing,
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
Labeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with
Visualization of textual data: unfolding the Kohonen maps.
Visualization of textual data: unfolding the Kohonen maps. CNRS - GET - ENST 46 rue Barrault, 75013, Paris, France (e-mail: [email protected]) Ludovic Lebart Abstract. The Kohonen self organizing
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
