scholarly journals Using Excel to reduce a Square Matrix

Author(s):  
Josef Holoubek ◽  
Petr Zach

When solving operations research problems, one can use either specialised computer programs such as Lingo, Lindo, Storm or more universal programs such Excel, Matlab, and R. To obtain the input data, one can use either a program’s own editor or other programs commonly available such as Excel. While the problem-solving methods, being part of various programs, are the subjects of numerous publications (such as Gros, 2003; Jablonský, 2002; Plevný – Žižka, 2007; Stevenson – Ozgur, 2009), the way the input data are obtained, recorded, and processed receives far less attention although this part of problem-solving requires considerable effort and, if the method for data recording is inadequate, may cause subsequent difficulties in their further processing. A problem known as “the travelling salesman problem” (TSP) may serve as an example. Here, the input data form a “square matrix of distances”. This paper is concerned with some Excel tools that can be used to obtain and subsequently modify such a square matrix. Given a square m × m matrix, an ordinary user might want to reduce it to an i × i square matrix (where i < m) without having to copy data from the matrix, skip some of its rows and/or columns or write a program to implement such a reduction.In her degree project, Kourková, 2009 was looking for an efficient method of reducing an Excel matrix. She had found no relevant papers on this subject concluding that the authors of the commercial program had not considered this. Therefore, she offered her own solution unconventionally using the contingency table menu option. Although this had resulted in the desired submatrix, some of its parts were superfluous and even baffling for the user.For this reason, the authors analyse the method of representing an m × m matrix and the way of its reduction. Finally, a better option is offered to achieve the desired objective as well as other methods of obtaining the required submatrix that even users without sufficient programming skills can use.

2020 ◽  
Author(s):  
Linda deswita

the way we manage finances. This article researchers used the literature study method by collecting literature (materials) taken from book sources, journals, and other sources related to the science of Educational Administration. The method of literature relating to topics of interest can help make it easier to formulate research problems.


2003 ◽  
Vol 15 (3) ◽  
pp. 161-166 ◽  
Author(s):  
Anne P. Crick

Tourism is the mainstay of the Caribbean and the attitude of the people in the region may have a significant impact on the success of the industry. This paper analyzes the way in which tourism authorities of three Caribbean destinations have internally marketed tourism to their host populations in order to encourage the desired attitudinal expressions. A matrix of five possible responses to tourism was developed and each of the three countries was found to occupy different positions in the matrix. An analysis of the internal marketing strategies determined that the countries adopted different approaches based on their particular challenges but none of the approaches had achieved lasting success. The study concludes with recommendations for future research.


1977 ◽  
Vol 16 (3) ◽  
pp. 361-369
Author(s):  
M. Deza ◽  
Peter Eades

Necessary and sufficient conditions are given for a square matrix to te the matrix of distances of a circulant code. These conditions are used to obtain some inequalities for cyclic difference sets, and a necessary condition for the existence of circulant weighing matrices.


2020 ◽  
Author(s):  
Sriram Srinivasan ◽  
Shashank A ◽  
vinayakumar R ◽  
Soman KP

In the present era, cyberspace is growing tremendously and the intrusion detection system (IDS) plays a key role in it to ensure information security. The IDS, which works in network and host level, should be capable of identifying various malicious attacks. The job of network-based IDS is to differentiate between normal and malicious traffic data and raise an alert in case of an attack. Apart from the traditional signature and anomaly-based approaches, many researchers have employed various deep learning (DL) techniques for detecting intrusion as DL models are capable of extracting salient features automatically from the input data. The application of deep convolutional neural network (DCNN), which is utilized quite often for solving research problems in image processing and vision fields, is not explored much for IDS. In this paper, a DCNN architecture for IDS which is trained on KDDCUP 99 data set is proposed. This work also shows that the DCNN-IDS model performs superior when compared with other existing works.


Author(s):  
Mehmet Anil Sahin ◽  
Gulfem Tuzkaya

Maintenance routing is one of the most complicated problems of operations research applications for airline industry. In this study, airline industry operations' main applications and subjects are basically mentioned and literature is briefly reviewed. This study is conducted under the headings of; Fleet Assignment, Aircraft Routing, Maintenance Routing and Crew Scheduling. Additionally, network models are explained basically on an example flight program. This study's purpose is to be a guide for the new researchers of this area through operations research applications for airline industry and to introduce maintenance routing problem literature.


Author(s):  
Ariana-Stanca Vacaretu

Mathematics is or it should be about problem solving and math thinking. However, what mathematics students learn in schools is more about procedures for solving different types of math exercises and problems. In many cases, students learn by heart algorithms and words (math concepts) and use them for solving different math tasks. School math is very far from what mathematicians do and, in many cases, doesn’t motivate students for learning math. This paper presents the way we organized the assessment of the students’ skills developed through math research workshops and some of the assessment results. Even though we didn’t assess all the competences the students develop through the math research workshop, the findings show that the students certainly develop their problem-solving skills.


Author(s):  
Katharine Clemmer

Loyola Marymount University (LMU) has developed a new approach to problem solving, Collaborative Solution Discovery (CSD), to help practitioners in a school system leverage their individual passions in a way that grows students’ positive math identity through mathematical thinking, problem solving, and self-regulation. By focusing on how students and teachers interact with each other in real-time in an ideal classroom, practitioners take ownership of a process to guide their students in growing their positive math identity and thus taking ownership of their own math learning. Practitioners measure progress along the way through metrics that are created, defined, used, and continually refined by themselves to attain their ideal math learning environment. The entire CSD process results in a system that owns ist improvement efforts—improvement efforts that are flexible, adaptable, and sustainable.


Author(s):  
Jesus Gonzalez-Feliu ◽  
Antoine Parent

This chapter proposes to apply combinatorial optimization to past military conflicts with the aim of producing quantitative data that help explaining history. To do this, we can go beyond the classical “problem solving” vision of operations research that focuses on algorithmic development and computation analysis to privilege solution analysis and the needs of matching the obtained solution to the reality we aim to represent, study and analyze. In particular, we propose an iterative logic search method that aims to identify and analyze military strategic logic in terms of logistics. Then, to illustrate it, an application to the French troop assignment plan (Plan XVII of Joffre, 1932) is made to analyze which could be the subjacent logic behind the defense plan of French troops and state on the consequences of the optimization choices in terms of regional distribution of troops. A discussion of the proposed framework and the directions to generalize it will be presented as a conclusion.


Sign in / Sign up

Export Citation Format

Share Document