median problem
Recently Published Documents


TOTAL DOCUMENTS

532
(FIVE YEARS 92)

H-INDEX

39
(FIVE YEARS 4)

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Chunsong Bai ◽  
Jianjie Zhou ◽  
Zuosong Liang

This study deals with the facility location problem of locating a set V p of p facilities on a graph such that the subgraph induced by V p is connected. We consider the connected p -median problem on a cactus graph G whose vertices and edges have nonnegative weights. The aim of a connected p -median problem is to minimize the sum of weighted distances from every vertex of a graph to the nearest vertex in V p . We provide an O n 2 p 2 time algorithm for the connected p -median problem, where n is the number of vertices.


Author(s):  
Kaike Zhang ◽  
Xueping Li ◽  
Mingzhou Jin

This study generalizes the r-interdiction median (RIM) problem with fortification to simultaneously consider two types of risks: probabilistic exogenous disruptions and endogenous disruptions caused by intentional attacks. We develop a bilevel programming model that includes a lower-level interdiction problem and a higher-level fortification problem to hedge against such risks. We then prove that the interdiction problem is supermodular and subsequently adopt the cuts associated with supermodularity to develop an efficient cutting-plane algorithm to achieve exact solutions. For the fortification problem, we adopt the logic-based Benders decomposition (LBBD) framework to take advantage of the two-level structure and the property that a facility should not be fortified if it is not attacked at the lower level. Numerical experiments show that the cutting-plane algorithm is more efficient than benchmark methods in the literature, especially when the problem size grows. Specifically, with regard to the solution quality, LBBD outperforms the greedy algorithm in the literature with an up-to 13.2% improvement in the total cost, and it is as good as or better than the tree-search implicit enumeration method. Summary of Contribution: This paper studies an r-interdiction median problem with fortification (RIMF) in a supply chain network that simultaneously considers two types of disruption risks: random disruptions that occur probabilistically and disruptions caused by intentional attacks. The problem is to determine the allocation of limited facility fortification resources to an existing network. It is modeled as a bilevel programming model combining a defender’s problem and an attacker’s problem, which generalizes the r-interdiction median problem with probabilistic fortification. This paper is suitable for IJOC in mainly two aspects: (1) The lower-level attacker’s interdiction problem is a challenging high-degree nonlinear model. In the literature, only a total enumeration method has been applied to solve a special case of this problem. By exploring the special structural property of the problem, namely, the supermodularity of the transportation cost function, we developed an exact cutting-plane method to solve the problem to its optimality. Extensive numerical studies were conducted. Hence, this paper fits in the intersection of operations research and computing. (2) We developed an efficient logic-based Benders decomposition algorithm to solve the higher-level defender’s fortification problem. Overall, this study generalizes several important problems in the literature, such as RIM, RIMF, and RIMF with probabilistic fortification (RIMF-p).


Author(s):  
Geng Lin ◽  
Zhengshan Dong ◽  
Jinyan Luo ◽  
Xiang Chen ◽  
Meiqin Xu

Author(s):  
Naveed Haghani ◽  
Claudio Contardo ◽  
Julian Yarkony

We address the problem of accelerating column generation (CG) for set-covering formulations via dual optimal inequalities (DOIs). We study two novel classes of DOIs, which are referred to as Flexible DOIs (F-DOIs) and Smooth-DOIs (S-DOIs), respectively (and jointly as SF-DOIs). F-DOIs provide rebates for covering items more than necessary. S-DOIs describe the payment of a penalty to permit the undercoverage of items in exchange for the overinclusion of other items. Unlike other classes of DOIs from the literature, the S-DOIs and F-DOIs rely on very little problem-specific knowledge and, as such, have the potential to be applied to a vast number of problem domains. In particular, we discuss the application of the new DOIs to three relevant problems: the single-source capacitated facility location problem, the capacitated p-median problem, and the capacitated vehicle-routing problem. We provide computational evidence of the strength of the new inequalities by embedding them within a column-generation solver for these problems. Substantial speedups can be observed as when compared with a nonstabilized variant of the same CG procedure to achieve the linear-relaxation lower bound on problems with dense columns and structured assignment costs.


2021 ◽  
pp. 107723
Author(s):  
Jack Brimberg ◽  
Raca Todosijević ◽  
Dragan Urošević ◽  
Nenad Mladenović

Sign in / Sign up

Export Citation Format

Share Document