AE1: An extension matrix approximate method for the general covering problem

1985 ◽  
Vol 14 (6) ◽  
pp. 421-437 ◽  
Author(s):  
Jiarong Hong
1986 ◽  
Author(s):  
Jiarong Hong ◽  
Ryszard Michalski ◽  
Carl Uhrik

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Broderick Crawford ◽  
Ricardo Soto ◽  
Miguel Olivares-Suárez ◽  
Fernando Paredes

1983 ◽  
Vol 48 (10) ◽  
pp. 2751-2766
Author(s):  
Ondřej Wein ◽  
N. D. Kovalevskaya

Using a new approximate method, transient course of the local and mean diffusion fluxes following a step concentration change on the wall has been obtained for a broad class of steady flow problems.


Author(s):  
Egor Shiryaev ◽  
Elena Golimblevskaia ◽  
Mikhail Babenko ◽  
Andrei Tchernykh ◽  
Bernardo Pulido-Gaytan

Mathematics ◽  
2021 ◽  
Vol 9 (16) ◽  
pp. 1839
Author(s):  
Broderick Crawford ◽  
Ricardo Soto ◽  
José Lemus-Romani ◽  
Marcelo Becerra-Rozas ◽  
José M. Lanza-Gutiérrez ◽  
...  

One of the central issues that must be resolved for a metaheuristic optimization process to work well is the dilemma of the balance between exploration and exploitation. The metaheuristics (MH) that achieved this balance can be called balanced MH, where a Q-Learning (QL) integration framework was proposed for the selection of metaheuristic operators conducive to this balance, particularly the selection of binarization schemes when a continuous metaheuristic solves binary combinatorial problems. In this work the use of this framework is extended to other recent metaheuristics, demonstrating that the integration of QL in the selection of operators improves the exploration-exploitation balance. Specifically, the Whale Optimization Algorithm and the Sine-Cosine Algorithm are tested by solving the Set Covering Problem, showing statistical improvements in this balance and in the quality of the solutions.


Mathematics ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 225
Author(s):  
José García ◽  
Gino Astorga ◽  
Víctor Yepes

The optimization methods and, in particular, metaheuristics must be constantly improved to reduce execution times, improve the results, and thus be able to address broader instances. In particular, addressing combinatorial optimization problems is critical in the areas of operational research and engineering. In this work, a perturbation operator is proposed which uses the k-nearest neighbors technique, and this is studied with the aim of improving the diversification and intensification properties of metaheuristic algorithms in their binary version. Random operators are designed to study the contribution of the perturbation operator. To verify the proposal, large instances of the well-known set covering problem are studied. Box plots, convergence charts, and the Wilcoxon statistical test are used to determine the operator contribution. Furthermore, a comparison is made using metaheuristic techniques that use general binarization mechanisms such as transfer functions or db-scan as binarization methods. The results obtained indicate that the KNN perturbation operator improves significantly the results.


Author(s):  
Vera Traub ◽  
Thorben Tröbst

AbstractWe consider the capacitated cycle covering problem: given an undirected, complete graph G with metric edge lengths and demands on the vertices, we want to cover the vertices with vertex-disjoint cycles, each serving a demand of at most one. The objective is to minimize a linear combination of the total length and the number of cycles. This problem is closely related to the capacitated vehicle routing problem (CVRP) and other cycle cover problems such as min-max cycle cover and bounded cycle cover. We show that a greedy algorithm followed by a post-processing step yields a $$(2 + \frac{2}{7})$$ ( 2 + 2 7 ) -approximation for this problem by comparing the solution to a polymatroid relaxation. We also show that the analysis of our algorithm is tight and provide a $$2 + \epsilon $$ 2 + ϵ lower bound for the relaxation.


Sign in / Sign up

Export Citation Format

Share Document