A heuristic for solving the frequency assignment problem
|
|
- Kathlyn Atkinson
- 5 years ago
- Views:
Transcription
1 A heuristic for solving the frequency assignment problem Mireille Palpant, Christian Artigues and Philippe Michelon Laboratoire d Informatique, Université d Avignon, France. mireille.palpant@lia.univ-avignon.fr, christian.artigues@lia.univ-avignon.fr, philippe.michelon@lia.univ-avignon.fr Abstract We present a large neighbourhood search method for solving the frequency assignment problem with multiple source interferences. Starting from an initial solution, subproblems of auto-adjustable size are iteratively generated and solved with either a greedy algorithm or an exact method. The approach has been successfully tested on realistic instances issued from military applications. Keywords: frequency assignment, heuristics, large neighbourhood search.
2 1. Introduction In combinatorial optimisation, some local search methods aim at exploring large neighbourhoods by implicit enumeration methods. For the quadratic assignment problem, the Mimausa method designed by Mautor and Michelon [3], build at each iteration a reduced problem and solves it by branch and bound. For the vehicle routing problem, Shaw [5] considers the removal of several customer visits and re-insert them by using Limited Discrepancy Search (LDS). Caseau et al [2] have also successfully applied the so-called Forget and Extend heuristic on the job-shop problem, freezing a set of tasks at each iteration and solving the remaining sub-problem by LDS associated with constraint propagation techniques. In the same spirit, Palpant et al [4] have proposed in a previous work an efficient large neighbourhood search technique for the resource-constrained project scheduling problem. In this paper, we propose a local search method based on [4] to solve the minimum interference frequency assignment problem (MI-FAP). We first check whether the problem is feasible, then try to minimize the span (i.e. the difference between the minimum and maximum used frequency). At each iteration a subproblem is derived from the current solution and solved with the help of constraint propagation techniques. The resolution can be performed by different methods depending on the resolution time and solution quality desired. Thus the use of a greedy algorithm provides medium quality solutions in a very short time while a truncated exact method obtains better solutions spending more time in the search. In the approach developed we have focused on the combination of these two methods in a local search scheme. We have also emphasized the sub-problem generation, leaving its resolution to a commercial constraint programming solver. 2. Problem description The considered approach proposes to solve the frequency assignment problem in hertzian networks. Such networks consist of a collection of sites where antennas related to emitters and receivers are located. A connection establishes a link between two distinct geographic sites and can be composed by several transmission channels. Each channel i = 1,, n possesses emission and reception characteristics given by a system σ(i). It must be assigned to a pair (f i, w i ), where f i represents a frequency of its domain D ϕ(i) and w i the wave polarisation. The present work only considers the case of a unique polarisation possibility. Consequently the assignment problem amounts to find a n-tuple F = {f 1,, f n } which satisfies (partially) the following constraints: - Simple Equality constraints: f i = f j, (i,j) SE; - Simple Inequality constraints : f i f j, (i,j) SI; - Duplex Equality constraints: f i f j = ε ij, (i,j) DE; - Duplex Inequality constraints f i f j ε ij, (i,j) DI; - Co-site constraint: f i f j δ ij, (i,j) C; - Global constraints: j i λ ij T σ(i) σ(j) fi f j Λ i, i G. The tabulated non-negative functions T σ(i) σ(j), defined for all possible pairs of systems, are calculated from selectivity and normalized spectre curves and decrease as the gap between frequencies i and j increases.
3 Simple and duplex constraints SE, SI, DE and DI are grouped together under the term of imperative equality and inequality constraints IE and II and can be all formulated as duplex constraints with a possibly null ε ij. They have strictly to be satisfied. Duplex constraints impose or forbid a frequency gap on a pair of channels belonging to the same connection. Co-site and global constraints C and G belong to electro-magnetic constraints. They are used to model interferences between channels. To avoid any interference between a perturbed and a disruptive channel, whose respective receiver and emitter are located on the same site, co-site constraints C impose a minimal gap on the two assigned frequencies. In the same way, global constraints G enable to take into account the case of several disruptive channels associated with emitters not collocated with the perturbed channel receiver. In classical approaches the disruptive right is evenly distributed among all disruptive channels and modelled by co-site type binary constraints. To provide a model closer to practical situations, we replace here each set of binary constraints by a single global constraint. This new global approach is also less restrictive. This may hopefully lead to some improvement in the solution quality for both interference and span criterions. The objective of the problem is double: on the one hand it consists in minimizing the level of interference given by the weighted sum α V + β W of respectively co-site and global violated constraints until a feasible solution is found; on the other hand, it tends to minimize the span if the previous objective has been reached. Being strongly NP-hard, the FAP has been widely studied over the last years. We refer to [6] for a recent survey on this problem. 3. Overview of the method 3.1. The main algorithm The main algorithm, which is directly adapted from the method presented in [4], runs as described below. The procedure stops when the total execution time reaches the requested execution time. The first phase (interference minimization) runs until the number of violated constraints becomes null. 1. pre-processing: 1.1. reduction of channels domains due to imperative equality constraints : for each IE such that f i f j = ε ij for each value v of D ϕ(i) (respectively D ϕ(j) ) if v ε ij and v + ε ij D ϕ(j) (respectively D ϕ(i) ) then remove v from D ϕ(i) (respectively D ϕ(j) ) 1.2. problem decomposition in k connex components: CC 1,, CC k of size n 1,, n k, respectively 2. generation of an initial solution S 0 : for i = 1 to k 2.1. apply the greedy_init heuristic to CC i
4 3. interference minimisation: 3.1. greedy phase repeat select the next connex component CC i such that at least one constraint is violated select p i n i channels in A s and generate the associated subproblem SPI s solve SPI s with the greedy_iter heuristic eventually adjust the subproblem size p i until tot_time = 3/4*req_time or nb_violated = exact phase repeat select the next connex component CC i such that at least one constraint is violated select p i n i channels in A s and generate the associated subproblem SPI s solve SPI s with the exact method in maximum exact_time time until tot_time = req_time or nb_violated = 0 4. span minimisation: repeat 4.1. select the next connex component CC i 4.2. select p i n i channels in A s and generate the associated subproblem SPS s 4.3. solve SPS s with the exact method in maximum exact_time time until tot_time = req_time In the next sections, we describe how each of the main steps of the algorithm is performed The greedy_init heuristic For the generation of an initial solution, we use a simple greedy method. At each iteration, greedy_init selects the most constrained channel of smallest domain and assigns it to the lowest frequency possible that minimizes the weighted sum of electromagnetic violated constraints (C+G). We perform two executions of this algorithm with a different definition of the channels constraint degree each time. During the first execution, the degree of a channel is given exactly by its number of occurrences in any constraint. During the second one, an occurrence in a global constraint of a channel as a disrupter increases the degree only by Selection of the subproblem Let p i denote the current number of channels to be included in the subproblem of connex component CC i at the current iteration s. We initialise p i to min(15, n i 1) where n i is the total number of channels in CC i. We compute the set A s as follows: a start channel x is selected randomly among the channels that belong to at least one violated constraint in the current solution. Then any channel i linked with x by any constraint is included in A s, in the order given by a randomly mixed index list L. We
5 repeat the process recursively from the next selected channel until p i channels are included in A s. The interest of the index list lies in bringing some diversification to the selection process. Indeed, starting from a given channel, it enables to obtain different subproblem selections. The example below shows an execution of the selection process for the connex component CC 0. At each iteration we compute a sub-graph G x which associates an edge (i, x) with a possible selection of the channel i from the channel x. In the adopted selection method, an edge (i, x) belongs to G x if the two channels i and j are linked together by any duplex, co-site or global constraint. n 0 = 18, p 0 = 15 L = {10, 5, 4, 8, 15, 11, 2, 0, 12, 3, 14, 7, 6, 16, 17, 1, 13, 9} x A s = {2, 10, 8, 11, 0, 3, 14, 16, 17} L = {10, 5, 4, 8, 15, 11, 2, 0, 12, 3, 14, 7, 6, 16, 17, 1, 13, 9} x A s = {2, 10, 8, 11, 0, 3, 14, 16, 17}
6 L = {10, 5, 4, 8, 15, 11, 2, 0, 12, 3, 14, 7, 6, 16, 17, 1, 13, 9} x A s = {2, 10, 8, 11, 0, 3, 14, 16, 17, 5, 4, 15, 12, 7, 6} We have also considered other selection methods whose efficiency has been tested. The table below displays the average results obtained over thirty instances (that we will present in more details in section 4) in term of solution quality (both average objective function value and span) and time requirement by the following methods : - total random selection (S rand ); - selection of channels linked by imperative (or co-site or global) constraints only (S ic_only or S cc_only or S gc_only ); - retained selection (S dc_cc_gc ). Table 1. Comparison of different selection methods S rand S ic_only S cc_only S gc_only S ic_cc_gc Objective Span CPU This table clearly shows the domination of S ic_only and S ic_cc_gc selections in term of objective function value over the other methods while all methods are quite comparable if we refer to the span criterion. If we detail the obtained results we can remark the good behaviour of S rand on small and easy instances on the contrary of S cc_only and especially S gc_only which give very bad quality solutions on almost all instances. Finally we have chosen the S ic_cc_gc method which is less efficient than S ic_only because of its inferior time requirement Generation of the subproblem Depending on the objective, we have two kinds of subproblems to tackle: SPI for interference minimization, SPS for span minimization. At the current iteration s SPI s or SPS s are obtained by constraining any channel i not belonging to A s to be assigned to its current value f i s : f i = f i s, i A s. Then, each channel i A s is associated with a reduced domain induced by imperative and co-site constraints that have to be satisfied computed as follows:
7 - redd i = D ϕ(i) : - {f k, f k f j s ε ij, f k f j s + ε ij, f i f j = ε ij, j A s } - { f j s ε ij, f j s + ε ij, f i f j = ε ij, j A s } - {f k, f k > f j s δ ij, f k < f j s + δ ij, f i f j δ ij, j A s } (SPS s only) The constraints of the global problem that belong also to the subproblem are then generated: - f i f j = ε ij, i, j A s (IE) - f i f j ε ij, i, j A s (II) - f i f j δ ij, i, j A s (type 1 C) - f i f j s + δ ij OR f i f j s δ ij, i A s, j A s (type 2 C: SPI s only) - j i, j A s λij T σ(i) σ(j) fi f j Λ i k i, k A s λik T σ(i) σ(k) fi f k s, i A s (type 1 G: first member possibly null) - j i, j A s λij T σ(i) σ(j) fi s f j Λ i k i, k A s λik T σ(i) σ(k) fi s f k s, i A s (type 2 G: first member imperatively not null) Finally the objective is defined in order to improve the current solution: - α V + β W < current_objective_value or - max(f) min(f) < current_span 3.5. Resolution of the subproblem For solving the subproblem, we use either a simple greedy method or a truncated exact method, both associated with constraint propagation techniques. The choice of the resolution method depends on the kind of subproblem to treat and the strategies considered. The principle of the greedy_iter algorithm is to select iteratively the channel of smallest domain and to assign it to the lowest frequency that minimizes the weighted sum of electro-magnetic violated constraints. This algorithm obviously has no guarantee to find a neighbour solution in which case the current solution remains unchanged. However it enables to quickly improve an average quality solution. Hence we use it first during the interference minimization phase to obtain a "sufficiently good" solution. The tree search exact method is also used to find the neighbour solution. The branching scheme consists in choosing the channel of smallest domain. The search stops as soon as a better solution is found (first-fit) or when the exact_time time limit is reached. This method is used to intensify the search procedure during the interference minimization phase by visiting several neighbour solutions. It is also used to solve SPS subproblems. In both methods every time a channel is assigned to a frequency, default propagation techniques (arc consistency AC5) are employed to reduce the domain of remaining channels.
8 3.6. Building the next current solution If a solution to the subproblem has been found, the solution S s+1 is derived from S s by setting all assignment of channels in A s to the value found for the subproblem, and by keeping the values in S s for the other channels. Note that by construction S s+1 is feasible Adjustment of the subproblem size In the greedy phase, if the best solution has not been improved for a given number max_no_imp of iterations, the subproblem size p i is increased in one if p i < n i 1 or set to its initial value otherwise. We have set empirically max_no_imp = Computational results The proposed method has been assessed on the FAPPG realistic instances provided by the CELAR in the context of military applications. We have coded the heuristics in C++ using ILOG tools (Concert and Solver) and the tests have been realized on a PC with 2 processors, 1.3 GHz and 1 GB RAM. We have performed the experiments with exact_time = 30s. The parameter req_time has been set to one hour. The results are displayed on table 2. For each instance, the number of channels, the span, the number of co-site (CC) and global (GC) violated constraints and the mean CPU time for obtaining the best solution are given. Table 2. Computational results on the CELAR instances Instance #Channels #Violated CC #Violated GC Span CPU (s) FAPPG /16 0/ FAPPG /25 0/ FAPPG /108 0/ FAPPG /94 0/ FAPPG /95 0/ FAPPG /284 0/ FAPPG /285 3/ FAPPG /1063 0/ FAPPG /2585 0/ FAPPG /608 0/ FAPPG /592 0/ FAPPG /3251 0/ FAPPG /1125 9/ FAPPG /486 0/ FAPPG / / FAPPG /136 30/ FAPPG /108 28/ FAPPG /130 0/ FAPPG / / FAPPG / / FAPPG /3259 0/ FAPPG /1898 0/
9 FAPPG /63 0/ FAPPG /102 0/ FAPPG /248 2/ FAPPG /316 0/ FAPPG /342 2/ FAPPG /111 0/ FAPPG /1444 0/ FAPPG /598 16/ The results appear to be good as well in term of interference minimization as span minimization: we have found nineteen instances feasible in a very short time (no more than five minutes) and for FAPPG1 and FAPPG23 we have obtained the optimal span. Similarly, on more difficult problems the number of violated constraints is relatively low, sometimes even optimal like for FAPPG25 and FAPPG27. The good behaviour of the method is particularly clear on the very big sized FAPPG15 for which we found eighteen violated constraints in about fifty minutes. However, in spite of these encouraging results, the method shows poor efficiency on FAPPG19. This could be explained by the evident difficulty of the problem (highest "number of constraints / n" ratio) or a bad choice of objective function weights. We have also tested our program on some FAPPI instances in which each global constraint of corresponding FAPPG instance is replaced by a set of co-site constraints, which is more constraining. Our goal is to weigh up the impact of global constraints on the quality of solutions. The results obtained are reported in the table below. Table 3. Computational results on the FAPPI CELAR instances Instance #Channels #Violated CC Span CPU (s) FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI / FAPPI /
10 We can clearly note that the number of feasible instances decreases (9 versus 12 for the 20 corresponding FAPPG problems). Furthermore when an instance is found feasible the span is always bigger than the one of the corresponding FAPPG problem. However, in that case, we can remark that the computational time is lower than on FAPPG, which underlines the difficulty to take global constraints into account. Nevertheless the results obtained on the two different types of problems tend to prove the validity of the new approach. 5. Concluding remarks and further work We have proposed a heuristic for solving a new approach of the frequency assignment problem inspired by realistic features of military applications. We have emphasized the usefulness of global constraints which enable to increase the solution quality for both interference and span criterions. The method is competitive in term of time requirement and obtains good results on a set of thirty instances. It would be interesting to know how much the CPU times and the quality could be improved by refining the subproblem resolution methods with more powerful and dedicated constraint propagation techniques, implementation of LDS, etc. Moreover other way of generating subproblems, particularly in the span minimization context, could also be promising. References [1] Adams, J., Balas, E., and Zawack, D. (1988). The Shifting bottleneck procedure for job shop scheduling, Management Science, 34, [2] Caseau, Y., Laburthe, F., Le Pape, C., and Rottembourg, B. (2001). Combining local and global search in a constraint programming environment, Knowledge Engineering Review, 16, [3] Mautor, T. and Michelon, P. (1997). Mimausa: a new hybrid method combining exact solution and local search. Second International Conference on Meta- Heuristics, MIC 2, Sophia Antipolis, France. [4] Palpant, M., Artigues, C. and Michelon, P. (2001). Solving the resourceconstrained scheduling problem with large neighbourhood search, LIA technical report, 255. [5] Shaw, P. (1998). Using Constraint Programming and Local Search Methods to Solve Vehicle Routing Problems, In proceedings Principles and Practice of Constraint Programming, CP-98, Pisa, Italy, Lecture Notes in Computer Science, 1520, [6] Aardal, K. I., Van Hoesel, S. P. M., Koster, A. M. C. A., Mannino, C., Sassano, A. (2001). Models and solution techniques for frequency assignment problems, ZIB- Report, 01-40
arxiv: v1 [cs.dm] 6 May 2009
Solving the 0 1 Multidimensional Knapsack Problem with Resolution Search Sylvain Boussier a, Michel Vasquez a, Yannick Vimont a, Saïd Hanafi b and Philippe Michelon c arxiv:0905.0848v1 [cs.dm] 6 May 2009
More informationTabu Search for Constraint Solving and Its Applications. Jin-Kao Hao LERIA University of Angers 2 Boulevard Lavoisier Angers Cedex 01 - France
Tabu Search for Constraint Solving and Its Applications Jin-Kao Hao LERIA University of Angers 2 Boulevard Lavoisier 49045 Angers Cedex 01 - France 1. Introduction The Constraint Satisfaction Problem (CSP)
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationThe Branch & Move algorithm: Improving Global Constraints Support by Local Search
Branch and Move 1 The Branch & Move algorithm: Improving Global Constraints Support by Local Search Thierry Benoist Bouygues e-lab, 1 av. Eugène Freyssinet, 78061 St Quentin en Yvelines Cedex, France tbenoist@bouygues.com
More informationBranch-and-bound: an example
Branch-and-bound: an example Giovanni Righini Università degli Studi di Milano Operations Research Complements The Linear Ordering Problem The Linear Ordering Problem (LOP) is an N P-hard combinatorial
More informationα Coverage to Extend Network Lifetime on Wireless Sensor Networks
Noname manuscript No. (will be inserted by the editor) α Coverage to Extend Network Lifetime on Wireless Sensor Networks Monica Gentili Andrea Raiconi Received: date / Accepted: date Abstract An important
More informationJob-shop scheduling with limited capacity buffers
Job-shop scheduling with limited capacity buffers Peter Brucker, Silvia Heitmann University of Osnabrück, Department of Mathematics/Informatics Albrechtstr. 28, D-49069 Osnabrück, Germany {peter,sheitman}@mathematik.uni-osnabrueck.de
More informationGraph Coloring via Constraint Programming-based Column Generation
Graph Coloring via Constraint Programming-based Column Generation Stefano Gualandi Federico Malucelli Dipartimento di Elettronica e Informatica, Politecnico di Milano Viale Ponzio 24/A, 20133, Milan, Italy
More informationPCP and Hardness of Approximation
PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting
More informationCP-based Local Branching
CP-based Local Branching Zeynep Kiziltan 1, Andrea Lodi 2, Michela Milano 2, and Fabio Parisini 2 1 Department of Computer Science, University of Bologna, Italy. zeynep@cs.unibo.it 2 D.E.I.S., University
More informationColumn Generation Method for an Agent Scheduling Problem
Column Generation Method for an Agent Scheduling Problem Balázs Dezső Alpár Jüttner Péter Kovács Dept. of Algorithms and Their Applications, and Dept. of Operations Research Eötvös Loránd University, Budapest,
More informationA simulated annealing algorithm for the vehicle routing problem with time windows and synchronization constraints
A simulated annealing algorithm for the vehicle routing problem with time windows and synchronization constraints Sohaib Afifi 1, Duc-Cuong Dang 1,2, and Aziz Moukrim 1 1 Université de Technologie de Compiègne
More informationMethods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem
Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem L. De Giovanni M. Di Summa The Traveling Salesman Problem (TSP) is an optimization problem on a directed
More informationParallel Computing in Combinatorial Optimization
Parallel Computing in Combinatorial Optimization Bernard Gendron Université de Montréal gendron@iro.umontreal.ca Course Outline Objective: provide an overview of the current research on the design of parallel
More informationDiscrete Optimization. Lecture Notes 2
Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More informationAdvanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras
Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 35 Quadratic Programming In this lecture, we continue our discussion on
More informationUsing Constraint Programming to Solve the Maximum Clique Problem
Using Constraint Programming to Solve the Maximum Clique Problem Jean-Charles Régin ILOG Sophia Antipolis Les Taissounières HB, 1681 route des Dolines, 06560 Valbonne, France regin@ilog.fr Abstract. This
More informationTwo models of the capacitated vehicle routing problem
Croatian Operational Research Review 463 CRORR 8(2017), 463 469 Two models of the capacitated vehicle routing problem Zuzana Borčinová 1, 1 Faculty of Management Science and Informatics, University of
More informationFast algorithms for max independent set
Fast algorithms for max independent set N. Bourgeois 1 B. Escoffier 1 V. Th. Paschos 1 J.M.M. van Rooij 2 1 LAMSADE, CNRS and Université Paris-Dauphine, France {bourgeois,escoffier,paschos}@lamsade.dauphine.fr
More informationBranch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks
Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More informationAlgorithms for Integer Programming
Algorithms for Integer Programming Laura Galli November 9, 2016 Unlike linear programming problems, integer programming problems are very difficult to solve. In fact, no efficient general algorithm is
More informationColumn Generation embedding Carousel Greedy for the Maximum Network Lifetime Problem with Interference Constraints
Column Generation embedding Carousel Greedy for the Maximum Network Lifetime Problem with Interference Constraints Francesco Carrabs, Carmine Cerrone, Ciriaco D Ambrosio and Andrea Raiconi Abstract We
More informationBranch-and-Cut and GRASP with Hybrid Local Search for the Multi-Level Capacitated Minimum Spanning Tree Problem
Branch-and-Cut and GRASP with Hybrid Local Search for the Multi-Level Capacitated Minimum Spanning Tree Problem Eduardo Uchoa Túlio A.M. Toffolo Mauricio C. de Souza Alexandre X. Martins + Departamento
More informationA Note on the Separation of Subtour Elimination Constraints in Asymmetric Routing Problems
Gutenberg School of Management and Economics Discussion Paper Series A Note on the Separation of Subtour Elimination Constraints in Asymmetric Routing Problems Michael Drexl March 202 Discussion paper
More informationSchedule generation schemes for the job-shop problem with sequencedependent setup times: dominance properties and computational analysis
Schedule generation schemes for the job-shop problem with sequencedependent setup times: dominance properties and computational analysis Christian Artigues 1, Pierre Lopez 2 and Pierre-Dimitri Ayache 1
More informationGreedy Algorithms CHAPTER 16
CHAPTER 16 Greedy Algorithms In dynamic programming, the optimal solution is described in a recursive manner, and then is computed ``bottom up''. Dynamic programming is a powerful technique, but it often
More informationComputational Complexity CSC Professor: Tom Altman. Capacitated Problem
Computational Complexity CSC 5802 Professor: Tom Altman Capacitated Problem Agenda: Definition Example Solution Techniques Implementation Capacitated VRP (CPRV) CVRP is a Vehicle Routing Problem (VRP)
More informationA two-level metaheuristic for the All Colors Shortest Path Problem
Noname manuscript No (will be inserted by the editor) A two-level metaheuristic for the All Colors Shortest Path Problem F Carrabs R Cerulli R Pentangelo A Raiconi Received: date / Accepted: date Abstract
More informationGeneral properties of staircase and convex dual feasible functions
General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia
More informationConstructive and destructive algorithms
Constructive and destructive algorithms Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Constructive algorithms In combinatorial optimization problems every
More informationIMPLEMENTATION OF A FIXING STRATEGY AND PARALLELIZATION IN A RECENT GLOBAL OPTIMIZATION METHOD
IMPLEMENTATION OF A FIXING STRATEGY AND PARALLELIZATION IN A RECENT GLOBAL OPTIMIZATION METHOD Figen Öztoprak, Ş.İlker Birbil Sabancı University Istanbul, Turkey figen@su.sabanciuniv.edu, sibirbil@sabanciuniv.edu
More informationConstraint-Based Scheduling: An Introduction for Newcomers
Constraint-Based Scheduling: An Introduction for Newcomers Roman Barták * Charles University in Prague, Faculty of Mathematics and Physics Malostranské námestí 2/25, 118 00, Praha 1, Czech Republic bartak@kti.mff.cuni.cz
More informationSolving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach
Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach Amir Salehipour School of Mathematical and Physical Sciences, The University of Newcastle, Australia
More information6. Tabu Search. 6.3 Minimum k-tree Problem. Fall 2010 Instructor: Dr. Masoud Yaghini
6. Tabu Search 6.3 Minimum k-tree Problem Fall 2010 Instructor: Dr. Masoud Yaghini Outline Definition Initial Solution Neighborhood Structure and Move Mechanism Tabu Structure Illustrative Tabu Structure
More informationTask Allocation for Minimizing Programs Completion Time in Multicomputer Systems
Task Allocation for Minimizing Programs Completion Time in Multicomputer Systems Gamal Attiya and Yskandar Hamam Groupe ESIEE Paris, Lab. A 2 SI Cité Descartes, BP 99, 93162 Noisy-Le-Grand, FRANCE {attiyag,hamamy}@esiee.fr
More informationComputing and maximizing the exact reliability of wireless backhaul networks
Computing and maximizing the exact reliability of wireless backhaul networks David Coudert, James Luedtke, Eduardo Moreno, Konstantinos Priftis To cite this version: David Coudert, James Luedtke, Eduardo
More informationCombining Forces to Solve the Car Sequencing Problem
Combining Forces to Solve the Car Sequencing Problem Laurent Perron and Paul Shaw ILOG SA 9 rue de Verdun, 94253 Gentilly cedex, France {lperron,pshaw}@ilog.fr Abstract. Car sequencing is a well-known
More informationMVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg
MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:
More informationA LOCAL SEARCH GENETIC ALGORITHM FOR THE JOB SHOP SCHEDULING PROBLEM
A LOCAL SEARCH GENETIC ALGORITHM FOR THE JOB SHOP SCHEDULING PROBLEM Kebabla Mebarek, Mouss Leila Hayat and Mouss Nadia Laboratoire d'automatique et productique, Université Hadj Lakhdar -Batna kebabla@yahoo.fr,
More informationA tabu search based memetic algorithm for the max-mean dispersion problem
A tabu search based memetic algorithm for the max-mean dispersion problem Xiangjing Lai a and Jin-Kao Hao a,b, a LERIA, Université d'angers, 2 Bd Lavoisier, 49045 Angers, France b Institut Universitaire
More informationA CSP Search Algorithm with Reduced Branching Factor
A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il
More informationInteger Programming ISE 418. Lecture 7. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint
More informationConstraint Satisfaction Problems
Constraint Satisfaction Problems CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2013 Soleymani Course material: Artificial Intelligence: A Modern Approach, 3 rd Edition,
More informationMulti-objective branch-and-bound. Application to the bi-objective spanning tree problem.
Multi-objective branch-and-bound. Application to the bi-objective spanning tree problem. Francis Sourd Olivier Spanjaard Patrice Perny LIP6, University of Paris 6 8, rue du Capitaine Scott F75015 Paris,
More informationLearning techniques for Automatic Algorithm Portfolio Selection
Learning techniques for Automatic Algorithm Portfolio Selection Alessio Guerri and Michela Milano 1 Abstract. The purpose of this paper is to show that a well known machine learning technique based on
More informationModule 1 Lecture Notes 2. Optimization Problem and Model Formulation
Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More informationFull CNF Encoding: The Counting Constraints Case
Full CNF Encoding: The Counting Constraints Case Olivier Bailleux 1 and Yacine Boufkhad 2 1 LERSIA, Université de Bourgogne Avenue Alain Savary, BP 47870 21078 Dijon Cedex olivier.bailleux@u-bourgogne.fr
More informationEfficient decomposition method for the stochastic optimization of public transport schedules
Efficient decomposition method for the stochastic optimization of public transport schedules Sofia Zaourar-Michel Xerox Research Centre Europe sofia.michel@xrce.xerox.com Abstract We propose a new method
More informationA Study of Shape Penalties in Vehicle Routing
A Study of Shape Penalties in Vehicle Routing Charles Gretton and Phil Kilby 10 June 2013 NICTA Funding and Supporting Members and Partners 1/37 Capacitated Vehicle Routing Problem with Time Windows Service
More informationFramework for Design of Dynamic Programming Algorithms
CSE 441T/541T Advanced Algorithms September 22, 2010 Framework for Design of Dynamic Programming Algorithms Dynamic programming algorithms for combinatorial optimization generalize the strategy we studied
More informationReload Cost Trees and Network Design
Reload Cost Trees and Network Design Ioannis Gamvros, ILOG, Inc., 1080 Linda Vista Avenue, Mountain View, CA 94043, USA Luis Gouveia, Faculdade de Ciencias da Universidade de Lisboa, Portugal S. Raghavan,
More informationTrees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.
Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationCS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem
CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,
More information12.1 Formulation of General Perfect Matching
CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,
More informationA Case Study on Earliness/Tardiness Scheduling by Constraint Programming
A Case Study on Earliness/Tardiness Scheduling by Constraint Programming Jan Kelbel, Zdeněk Hanzálek Department of Control Engineering, Faculty of Electrical Engineering Czech Technical University in Prague
More informationA Re-examination of Limited Discrepancy Search
A Re-examination of Limited Discrepancy Search W. Ken Jackson, Morten Irgens, and William S. Havens Intelligent Systems Lab, Centre for Systems Science Simon Fraser University Burnaby, B.C., CANADA V5A
More informationMinimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes
Minimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes J.-F. Couturier 1 P. Heggernes 2 D. Kratsch 1 P. van t Hof 2 1 LITA Université de Lorraine F-57045 Metz France 2 University
More informationA Fast Arc Consistency Algorithm for n-ary Constraints
A Fast Arc Consistency Algorithm for n-ary Constraints Olivier Lhomme 1 and Jean-Charles Régin 2 1 ILOG, 1681, route des Dolines, 06560 Valbonne, FRANCE 2 Computing and Information Science, Cornell University,
More informationTabu search and genetic algorithms: a comparative study between pure and hybrid agents in an A-teams approach
Tabu search and genetic algorithms: a comparative study between pure and hybrid agents in an A-teams approach Carlos A. S. Passos (CenPRA) carlos.passos@cenpra.gov.br Daniel M. Aquino (UNICAMP, PIBIC/CNPq)
More informationMathematical Programming and Research Methods (Part II)
Mathematical Programming and Research Methods (Part II) 4. Convexity and Optimization Massimiliano Pontil (based on previous lecture by Andreas Argyriou) 1 Today s Plan Convex sets and functions Types
More informationMathematical Programming Formulations, Constraint Programming
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING Lecture 3 Mathematical Programming Formulations, Constraint Programming 1. Special Purpose Algorithms 2. Constraint Programming Marco Chiarandini DM87 Scheduling,
More informationLocal search. Heuristic algorithms. Giovanni Righini. University of Milan Department of Computer Science (Crema)
Local search Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Exchange algorithms In Combinatorial Optimization every solution x is a subset of E An exchange
More informationSelected Topics in Column Generation
Selected Topics in Column Generation February 1, 2007 Choosing a solver for the Master Solve in the dual space(kelly s method) by applying a cutting plane algorithm In the bundle method(lemarechal), a
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationNP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.
CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT
More informationJob Shop Scheduling Problem (JSSP) Genetic Algorithms Critical Block and DG distance Neighbourhood Search
A JOB-SHOP SCHEDULING PROBLEM (JSSP) USING GENETIC ALGORITHM (GA) Mahanim Omar, Adam Baharum, Yahya Abu Hasan School of Mathematical Sciences, Universiti Sains Malaysia 11800 Penang, Malaysia Tel: (+)
More informationCS321 Introduction To Numerical Methods
CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types
More informationOn the separation of partition inequalities
On the separation of partition inequalities ohamed Didi Biha mohameddidi-biha@univ-avignonfr Ali Ridha ahjoub Ridhaahjoub@mathuniv-bpclermontfr Lise Slama liseslama@isimafr Laboratoire d Analyse non linéaire
More informationInfinite locally random graphs
Infinite locally random graphs Pierre Charbit and Alex D. Scott Abstract Motivated by copying models of the web graph, Bonato and Janssen [3] introduced the following simple construction: given a graph
More informationAn Evolutionary Algorithm for the Multi-objective Shortest Path Problem
An Evolutionary Algorithm for the Multi-objective Shortest Path Problem Fangguo He Huan Qi Qiong Fan Institute of Systems Engineering, Huazhong University of Science & Technology, Wuhan 430074, P. R. China
More informationFlexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract
Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,
More informationA Fast Taboo Search Algorithm for the Job Shop Scheduling Problem
A Fast Taboo Search Algorithm for the Job Shop Scheduling Problem Uffe Gram Christensen (uffe@diku.dk) Anders Bjerg Pedersen (andersbp@diku.dk) Kim Vejlin (vejlin@diku.dk) October 21, 2008 Abstract: In
More informationRevisiting the Upper Bounding Process in a Safe Branch and Bound Algorithm
Revisiting the Upper Bounding Process in a Safe Branch and Bound Algorithm Alexandre Goldsztejn 1, Yahia Lebbah 2,3, Claude Michel 3, and Michel Rueher 3 1 CNRS / Université de Nantes 2, rue de la Houssinière,
More informationNotes for Lecture 24
U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined
More informationLOCAL SEARCH FOR THE MINIMUM FUNDAMENTAL CYCLE BASIS PROBLEM
LOCAL SEARCH FOR THE MINIMUM FUNDAMENTAL CYCLE BASIS PROBLEM Abstract E.Amaldi, L.Liberti, N.Maculan, F.Maffioli DEI, Politecnico di Milano, I-20133 Milano amaldi,liberti,maculan,maffioli @elet.polimi.it
More informationA Course on Meta-Heuristic Search Methods for Combinatorial Optimization Problems
A Course on Meta-Heuristic Search Methods for Combinatorial Optimization Problems AutOrI LAB, DIA, Roma Tre Email: mandal@dia.uniroma3.it January 16, 2014 Outline 1 An example Assignment-I Tips Variants
More informationApproximability Results for the p-center Problem
Approximability Results for the p-center Problem Stefan Buettcher Course Project Algorithm Design and Analysis Prof. Timothy Chan University of Waterloo, Spring 2004 The p-center
More informationFacets of the minimum-adjacency vertex coloring polytope
Facets of the minimum-adjacency vertex coloring polytope Diego Delle Donne Javier Marenco email: {ddelle, jmarenco}@dc.uba.ar Computer Science Dept., FCEN, University of Buenos Aires Pabellón I, Ciudad
More informationModeling and Solving Location Routing and Scheduling Problems
Modeling and Solving Location Routing and Scheduling Problems Z. Akca R.T. Berger T.K Ralphs October 13, 2008 Abstract This paper studies location routing and scheduling problems, a class of problems in
More informationCONSTRAINT-BASED SCHEDULING: AN INTRODUCTION FOR NEWCOMERS. Roman Barták
In Proceedings of 7th IFAC Workshop on Intelligent Manufacturing Systems (IMS 2003), Elsevier Science, 2003 (to appear). CONSTRAINT-BASED SCHEDULING: AN INTRODUCTION FOR NEWCOMERS Roman Barták Charles
More informationINTERACTIVE MULTI-OBJECTIVE GENETIC ALGORITHMS FOR THE BUS DRIVER SCHEDULING PROBLEM
Advanced OR and AI Methods in Transportation INTERACTIVE MULTI-OBJECTIVE GENETIC ALGORITHMS FOR THE BUS DRIVER SCHEDULING PROBLEM Jorge PINHO DE SOUSA 1, Teresa GALVÃO DIAS 1, João FALCÃO E CUNHA 1 Abstract.
More informationImproving the Held and Karp Approach with Constraint Programming
Improving the Held and Karp Approach with Constraint Programming Pascal Benchimol 1, Jean-Charles Régin 2, Louis-Martin Rousseau 1, Michel Rueher 2, Willem-Jan van Hoeve 3 1 CIRRELT,École Polytechnique
More informationLarge Neighborhood Search For Dial-a-Ride Problems
Large Neighborhood Search For Dial-a-Ride Problems Siddhartha Jain and Pascal Van Hentenryck Brown University, Department of Computer Science Box 1910, Providence, RI 02912, U.S.A. {sj10,pvh}@cs.brown.edu
More informationSolving the Euclidean Steiner Tree Problem in n-space
Solving the Euclidean Steiner Tree Problem in n-space Marcia Fampa (UFRJ), Jon Lee (U. Michigan), and Wendel Melo (UFRJ) January 2015 Marcia Fampa, Jon Lee, Wendel Melo Solving the Euclidean Steiner Tree
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationDepartment of Economics and Management University of Brescia Italy. C. Archetti, N. Bianchessi, A. Hertz A. Colombet, F. Gagnon
+ Working Papers Department of Economics and Management University of Brescia Italy C. Archetti, N. Bianchessi, A. Hertz A. Colombet, F. Gagnon Directed Weighted Improper Coloring for Cellular Channel
More informationIn this lecture, we ll look at applications of duality to three problems:
Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,
More informationLagrangean relaxation - exercises
Lagrangean relaxation - exercises Giovanni Righini Set covering We start from the following Set Covering Problem instance: min z = x + 2x 2 + x + 2x 4 + x 5 x + x 2 + x 4 x 2 + x x 2 + x 4 + x 5 x + x
More informationParallel Algorithm Design. Parallel Algorithm Design p. 1
Parallel Algorithm Design Parallel Algorithm Design p. 1 Overview Chapter 3 from Michael J. Quinn, Parallel Programming in C with MPI and OpenMP Another resource: http://www.mcs.anl.gov/ itf/dbpp/text/node14.html
More informationConflict Graphs for Combinatorial Optimization Problems
Conflict Graphs for Combinatorial Optimization Problems Ulrich Pferschy joint work with Andreas Darmann and Joachim Schauer University of Graz, Austria Introduction Combinatorial Optimization Problem CO
More informationColumn Generation Based Primal Heuristics
Column Generation Based Primal Heuristics C. Joncour, S. Michel, R. Sadykov, D. Sverdlov, F. Vanderbeck University Bordeaux 1 & INRIA team RealOpt Outline 1 Context Generic Primal Heuristics The Branch-and-Price
More informationRecursive column generation for the Tactical Berth Allocation Problem
Recursive column generation for the Tactical Berth Allocation Problem Ilaria Vacca 1 Matteo Salani 2 Michel Bierlaire 1 1 Transport and Mobility Laboratory, EPFL, Lausanne, Switzerland 2 IDSIA, Lugano,
More informationSurrogate Gradient Algorithm for Lagrangian Relaxation 1,2
Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2 X. Zhao 3, P. B. Luh 4, and J. Wang 5 Communicated by W.B. Gong and D. D. Yao 1 This paper is dedicated to Professor Yu-Chi Ho for his 65th birthday.
More informationConsistency and Set Intersection
Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study
More informationPolynomial time approximation algorithms
Polynomial time approximation algorithms Doctoral course Optimization on graphs - Lecture 5.2 Giovanni Righini January 18 th, 2013 Approximation algorithms There are several reasons for using approximation
More information