首页 > 最新文献

Networks最新文献

英文 中文
More reliable graphs are not always stronger 更可靠的图并不总是更强
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-31 DOI: 10.1002/net.22141
Christina M. Graves
A graph G$$ G $$ is stronger than a graph H$$ H $$ if G$$ G $$ has at least as many connected spanning subgraphs of size k$$ k $$ as H$$ H $$ for any positive integer k$$ k $$ . Counting the number of connected spanning subgraphs of fixed size allows us to compute the reliability of a graph. Formally, the reliability polynomial of a graph is the probability that the graph is connected when each edge is deleted independently with the same fixed probability. A graph G$$ G $$ is uniformly more reliable than H$$ H $$ if its reliability polynomial is greater than or equal to the reliability polynomial of H$$ H $$ for all probabilities. As a direct consequence of the definition, a sufficient condition for G$$ G $$ to be uniformly more reliable than H$$ H $$ is for G$$ G $$ to be stronger than H$$ H $$ . In this paper, we show that the sufficient condition is not necessary by providing an example of two infinite families of graphs, Gk$$ {G}_k $$ and Hk$$ {H}_k $$ , such that Gk$$ {G}_k $$ is uniformly more reliable than Hk$$ {H}_k $$ but is not stronger than Hk$$ {H}_k $$ .
对于任意正整数k $$ k $$,如果G $$ G $$具有至少与H $$ H $$相同数量的大小为k $$ k $$的连通生成子图,则图G $$ G $$比图H $$ H $$强。计算固定大小的连接生成子图的数量使我们能够计算图的可靠性。图的可靠性多项式的形式是图的每条边以相同的固定概率被独立删除时,图连通的概率。对于所有概率,如果图G $$ G $$的可靠度多项式大于等于H $$ H $$的可靠度多项式,则图G 一致地比H $$ H $$更可靠。作为定义的直接结果,G $$ G $$比H $$ H $$一致更可靠的一个充分条件是G $$ G $$比H $$ H $$更强。本文通过给出两个无限族图Gk $$ {G}_k $$和Hk $$ {H}_k $$的例子,证明了Gk $$ {G}_k $$比Hk $$ {H}_k $$一致更可靠,但不强于Hk $$ {H}_k $$的充分条件是不必要的。
{"title":"More reliable graphs are not always stronger","authors":"Christina M. Graves","doi":"10.1002/net.22141","DOIUrl":"https://doi.org/10.1002/net.22141","url":null,"abstract":"A graph G$$ G $$ is stronger than a graph H$$ H $$ if G$$ G $$ has at least as many connected spanning subgraphs of size k$$ k $$ as H$$ H $$ for any positive integer k$$ k $$ . Counting the number of connected spanning subgraphs of fixed size allows us to compute the reliability of a graph. Formally, the reliability polynomial of a graph is the probability that the graph is connected when each edge is deleted independently with the same fixed probability. A graph G$$ G $$ is uniformly more reliable than H$$ H $$ if its reliability polynomial is greater than or equal to the reliability polynomial of H$$ H $$ for all probabilities. As a direct consequence of the definition, a sufficient condition for G$$ G $$ to be uniformly more reliable than H$$ H $$ is for G$$ G $$ to be stronger than H$$ H $$ . In this paper, we show that the sufficient condition is not necessary by providing an example of two infinite families of graphs, Gk$$ {G}_k $$ and Hk$$ {H}_k $$ , such that Gk$$ {G}_k $$ is uniformly more reliable than Hk$$ {H}_k $$ but is not stronger than Hk$$ {H}_k $$ .","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"490 - 498"},"PeriodicalIF":2.1,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45671449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A combinatorial branch and bound for the safe set problem 安全集问题的一个组合分支和界
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-23 DOI: 10.1002/net.22140
Alberto Boggio Tomasaz, R. Cordone, P. Hosteins
The Weighted Safe Set Problem requires to partition an undirected graph into two families of connected components, respectively denoted as safe and unsafe, in such a way that each safe component dominates the unsafe adjacent components with respect to a weight function. We introduce a combinatorial branch and bound approach, whose main strength is a refined relaxation that combines graph manipulations and the solution of an auxiliary problem. We also propose fixing procedures to reduce the number of branching nodes. The algorithm solves all weighted instances available in the literature and most unweighted ones, up to 50 vertices, with computational times orders of magnitude smaller than the competing algorithms. In order to investigate the limits of the approach, we introduce a benchmark of graphs with 60 vertices, solving to optimality the denser instances.
加权安全集问题要求将无向图划分为两个连通分量族,分别表示为安全分量和不安全分量,使得每个安全分量相对于权重函数支配不安全的相邻分量。我们介绍了一种组合分枝定界方法,其主要优点是将图操作和辅助问题的求解相结合的精细松弛。我们还提出了修复程序以减少分支节点的数量。该算法解决了文献中可用的所有加权实例和大多数未加权实例,最多50个顶点,计算时间比竞争算法小几个数量级。为了研究该方法的局限性,我们引入了一个具有60个顶点的图的基准,求解密度较大的实例的最优性。
{"title":"A combinatorial branch and bound for the safe set problem","authors":"Alberto Boggio Tomasaz, R. Cordone, P. Hosteins","doi":"10.1002/net.22140","DOIUrl":"https://doi.org/10.1002/net.22140","url":null,"abstract":"The Weighted Safe Set Problem requires to partition an undirected graph into two families of connected components, respectively denoted as safe and unsafe, in such a way that each safe component dominates the unsafe adjacent components with respect to a weight function. We introduce a combinatorial branch and bound approach, whose main strength is a refined relaxation that combines graph manipulations and the solution of an auxiliary problem. We also propose fixing procedures to reduce the number of branching nodes. The algorithm solves all weighted instances available in the literature and most unweighted ones, up to 50 vertices, with computational times orders of magnitude smaller than the competing algorithms. In order to investigate the limits of the approach, we introduce a benchmark of graphs with 60 vertices, solving to optimality the denser instances.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"445 - 464"},"PeriodicalIF":2.1,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42701267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maximum weight perfect matching problem with additional disjunctive conflict constraints 附加析取冲突约束的最大权完全匹配问题
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-23 DOI: 10.1002/net.22139
M. Akyüz, I. K. Altinel, T. Öncan
We focus on an extension of the maximum weight perfect matching problem with additional disjunctive conflict constraints in conjunction with the degree and binary restrictions. Given a simple graph with a nonnegative weight associated with each edge and a set of conflicting edges, the perfect matching problem with conflict constraints consists of finding a maximum weight perfect matching without any conflicting edge pair. Unlike the well‐known ordinary maximum weight perfect matching problem this one is strongly 𝒩𝒫 ‐hard. We propose two branch‐and‐bound algorithms for the exact solution of the problem. The first one is based on an equivalent maximum weight stable set formulation with an additional cardinality restriction obtained on the graph representing conflict relations and uses the information coming from its maximal stable sets. The second one is essentially a recursive depth first search scheme that benefits from simple upper bounds incorporated with a fast infeasibility detection procedure to prune the branch‐and‐bound tree. According to the extensive computational tests it is possible to say that they are both very efficient.
重点研究了带附加析取冲突约束的最大权值完美匹配问题的扩展,并结合了度约束和二元约束。给定一个具有非负权值的简单图和一组冲突边,冲突约束下的完美匹配问题包括寻找不存在冲突边对的最大权值完美匹配。不同于众所周知的普通的最大权值完美匹配问题,这个问题是强的硬的。我们提出了两个分支和定界算法来精确求解这个问题。第一种方法是基于在表示冲突关系的图上获得的等效最大权稳定集公式和附加的基数限制,并使用来自其最大稳定集的信息。第二种方法本质上是一种递归深度优先搜索方案,它得益于简单的上界和快速的不可行性检测过程来修剪分支和界树。根据大量的计算测试,可以说它们都是非常有效的。
{"title":"Maximum weight perfect matching problem with additional disjunctive conflict constraints","authors":"M. Akyüz, I. K. Altinel, T. Öncan","doi":"10.1002/net.22139","DOIUrl":"https://doi.org/10.1002/net.22139","url":null,"abstract":"We focus on an extension of the maximum weight perfect matching problem with additional disjunctive conflict constraints in conjunction with the degree and binary restrictions. Given a simple graph with a nonnegative weight associated with each edge and a set of conflicting edges, the perfect matching problem with conflict constraints consists of finding a maximum weight perfect matching without any conflicting edge pair. Unlike the well‐known ordinary maximum weight perfect matching problem this one is strongly 𝒩𝒫 ‐hard. We propose two branch‐and‐bound algorithms for the exact solution of the problem. The first one is based on an equivalent maximum weight stable set formulation with an additional cardinality restriction obtained on the graph representing conflict relations and uses the information coming from its maximal stable sets. The second one is essentially a recursive depth first search scheme that benefits from simple upper bounds incorporated with a fast infeasibility detection procedure to prune the branch‐and‐bound tree. According to the extensive computational tests it is possible to say that they are both very efficient.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"465 - 489"},"PeriodicalIF":2.1,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44448137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network augmentation for disaster‐resilience against geographically correlated failure 针对地理相关故障的灾难恢复能力的网络增强
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-08 DOI: 10.1002/net.22138
Nicolau Andrés-Thió, M. Brazil, C. Ras, Doreen A. Thomas
We introduce a formal framework for the study of augmenting networks in the plane for disaster‐resilience, where a disaster is modeled by a straight‐line segment. We generalize various graph structures from classical 2‐edge‐connectivity, including minimal cuts and blocks. The key concept that we introduce is that of an l$$ l $$ ‐leaf, which builds on the fundamental “leaf‐block” concept from classical augmentation. We present a number of algorithms for constructing the above‐mentioned graph structures, including a sweep‐line algorithm that finds all edge‐cuts that can be destroyed by a single disaster. We also present an algorithm which optimally adds a single edge between a pair of l$$ l $$ ‐leaves or blocks while avoiding certain disaster regions. Finally, we present a number of heuristic schemes for solving the disaster‐resilient network augmentation problem and perform extensive experiments to demonstrate the power of the l$$ l $$ ‐leaf concept within heuristic design.
我们引入了一个正式的框架来研究灾难恢复平面上的扩展网络,其中灾难是由直线段建模的。我们从经典的2边连通性中推广了各种图结构,包括最小切割和块。我们引入的关键概念是l $$ l $$‐叶,它建立在经典增广的基本“叶块”概念之上。我们提出了许多用于构建上述图结构的算法,包括一种扫描线算法,该算法可以找到所有可能被一次灾难破坏的边缘切割。我们还提出了一种算法,该算法在一对l $$ l $$‐叶或块之间最佳地添加一条边,同时避免某些灾难区域。最后,我们提出了一些启发式方案来解决灾难弹性网络增强问题,并进行了广泛的实验来证明l $$ l $$‐leaf概念在启发式设计中的力量。
{"title":"Network augmentation for disaster‐resilience against geographically correlated failure","authors":"Nicolau Andrés-Thió, M. Brazil, C. Ras, Doreen A. Thomas","doi":"10.1002/net.22138","DOIUrl":"https://doi.org/10.1002/net.22138","url":null,"abstract":"We introduce a formal framework for the study of augmenting networks in the plane for disaster‐resilience, where a disaster is modeled by a straight‐line segment. We generalize various graph structures from classical 2‐edge‐connectivity, including minimal cuts and blocks. The key concept that we introduce is that of an l$$ l $$ ‐leaf, which builds on the fundamental “leaf‐block” concept from classical augmentation. We present a number of algorithms for constructing the above‐mentioned graph structures, including a sweep‐line algorithm that finds all edge‐cuts that can be destroyed by a single disaster. We also present an algorithm which optimally adds a single edge between a pair of l$$ l $$ ‐leaves or blocks while avoiding certain disaster regions. Finally, we present a number of heuristic schemes for solving the disaster‐resilient network augmentation problem and perform extensive experiments to demonstrate the power of the l$$ l $$ ‐leaf concept within heuristic design.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"419 - 444"},"PeriodicalIF":2.1,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46241509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mean‐standard deviation model for minimum cost flow problem 最小成本流问题的均值-标准差模型
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-07 DOI: 10.1002/net.22135
C. Gokalp, S. Boyles, A. Unnikrishnan
We study the mean‐standard deviation minimum cost flow (MSDMCF) problem, where the objective is minimizing a linear combination of the mean and standard deviation of flow costs. Due to the nonlinearity and nonseparability of the objective, the problem is not amenable to the standard algorithms developed for network flow problems. We prove that the solution for the MSDMCF problem coincides with the solution for a particular mean‐variance minimum cost flow (MVMCF) problem. Leveraging this result, we propose bisection (BSC), Newton–Raphson (NR), and a hybrid (NR‐BSC)—method seeking to find the specific MVMCF problem whose optimal solution coincides with the optimal solution for the given MSDMCF problem. We further show that this approach can be extended to solve more generalized nonseparable parametric minimum cost flow problems under certain conditions. Computational experiments show that the NR algorithm is about twice as fast as the CPLEX solver on benchmark networks generated with NETGEN.
我们研究了平均-标准偏差最小成本流(MSDMCF)问题,其中目标是最小化流量成本的平均和标准偏差的线性组合。由于目标的非线性和不可分割性,该问题不适用于为网络流问题开发的标准算法。我们证明了MSDMCF问题的解与特定均值-方差最小成本流(MVMCF)问题的解一致。利用这一结果,我们提出了平分(BSC)、Newton–Raphson(NR)和混合(NR‐BSC)方法,试图找到特定的MVMCF问题,其最优解与给定MSDMCF问题的最优解一致。我们进一步证明,在一定条件下,这种方法可以推广到求解更广义的不可分离参数最小成本流问题。计算实验表明,在使用NETGEN生成的基准网络上,NR算法的速度大约是CPLEX求解器的两倍。
{"title":"Mean‐standard deviation model for minimum cost flow problem","authors":"C. Gokalp, S. Boyles, A. Unnikrishnan","doi":"10.1002/net.22135","DOIUrl":"https://doi.org/10.1002/net.22135","url":null,"abstract":"We study the mean‐standard deviation minimum cost flow (MSDMCF) problem, where the objective is minimizing a linear combination of the mean and standard deviation of flow costs. Due to the nonlinearity and nonseparability of the objective, the problem is not amenable to the standard algorithms developed for network flow problems. We prove that the solution for the MSDMCF problem coincides with the solution for a particular mean‐variance minimum cost flow (MVMCF) problem. Leveraging this result, we propose bisection (BSC), Newton–Raphson (NR), and a hybrid (NR‐BSC)—method seeking to find the specific MVMCF problem whose optimal solution coincides with the optimal solution for the given MSDMCF problem. We further show that this approach can be extended to solve more generalized nonseparable parametric minimum cost flow problems under certain conditions. Computational experiments show that the NR algorithm is about twice as fast as the CPLEX solver on benchmark networks generated with NETGEN.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"378 - 398"},"PeriodicalIF":2.1,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48255060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving vehicle routing problems with intermediate stops using VRPSolver models 利用VRPSolver模型求解中间站点车辆路径问题
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-07 DOI: 10.1002/net.22137
M. C. Roboredo, R. Sadykov, Eduardo Uchoa
In this article, we propose graph‐based models for several vehicle routing problems with intermediate stops: the capacitated multi‐trip vehicle routing problem with time windows, the multi‐depot vehicle routing problem with inter‐depot routes, the arc routing problem with intermediate facilities under capacity and length restrictions and the green vehicle routing problem. In these models, the set of feasible routes is represented by a set of resource constrained paths in one or several graphs. Intermediate stops are supported by the possibility to define negative resource consumption for some arcs. The models that we propose are then solved by VRPSolver, which implements a generic branch‐cut‐and‐price exact algorithm. Thus, a simple parameterization enables us to use several state‐of‐the‐art algorithmic components: automatic stabilization by dual price smoothing, limited‐memory rank‐1 cuts, reduced cost‐based arc elimination, enumeration of elementary routes, and hierarchical strong branching. For each problem, we numerically compare the proposed methodology with the best exact approach found in the literature. State‐of‐the‐art computational results were obtained for all problems except one.
在本文中,我们提出了几个具有中间站点的车辆路径问题的基于图的模型:具有时间窗口的容量多行程车辆路径问题、具有车间间路径的多站点车辆路径问题,具有容量和长度限制的中间设施的弧形路径问题以及绿色车辆路径问题。在这些模型中,可行路径集由一个或多个图中的一组资源约束路径表示。为某些圆弧定义负资源消耗的可能性支持中间停止。然后,我们提出的模型由VRPSolver求解,该算法实现了一种通用的分支切割和价格精确算法。因此,一个简单的参数化使我们能够使用几个最先进的算法组件:通过双重价格平滑的自动稳定、有限的内存秩1切割、降低成本的消弧、基本路径的枚举和分层强分支。对于每个问题,我们将所提出的方法与文献中发现的最佳精确方法进行了数值比较。除一个问题外,所有问题都获得了最先进的计算结果。
{"title":"Solving vehicle routing problems with intermediate stops using VRPSolver models","authors":"M. C. Roboredo, R. Sadykov, Eduardo Uchoa","doi":"10.1002/net.22137","DOIUrl":"https://doi.org/10.1002/net.22137","url":null,"abstract":"In this article, we propose graph‐based models for several vehicle routing problems with intermediate stops: the capacitated multi‐trip vehicle routing problem with time windows, the multi‐depot vehicle routing problem with inter‐depot routes, the arc routing problem with intermediate facilities under capacity and length restrictions and the green vehicle routing problem. In these models, the set of feasible routes is represented by a set of resource constrained paths in one or several graphs. Intermediate stops are supported by the possibility to define negative resource consumption for some arcs. The models that we propose are then solved by VRPSolver, which implements a generic branch‐cut‐and‐price exact algorithm. Thus, a simple parameterization enables us to use several state‐of‐the‐art algorithmic components: automatic stabilization by dual price smoothing, limited‐memory rank‐1 cuts, reduced cost‐based arc elimination, enumeration of elementary routes, and hierarchical strong branching. For each problem, we numerically compare the proposed methodology with the best exact approach found in the literature. State‐of‐the‐art computational results were obtained for all problems except one.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"399 - 416"},"PeriodicalIF":2.1,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46703993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Two new mixed‐integer programming models for the integrated train formation and shipment path optimization problem 列车编组和运输路径优化问题的两个新的混合整数规划模型
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-05 DOI: 10.1002/net.22133
Pouria Arsalani, M. Reisi, Vahid Dardashti, G. Moslehi
Railcars are known as the heart of the freight rail transportation industry. Hence, any improvements in their operations can lead to sharp reductions in various operating costs. One of the most critical operations on railcars is blocking and routing their transportation. Railway companies face continuous challenged about what blocks should be formed to carry shipments across different origin–destination pairs (O–D pairs) and reclassify them in intermediate yards to minimize transportation reclassification costs. In addition, it is necessary to determine train service between O–D pairs and the number of trains. Along with the shipment routing plans, this problem is called train formation and shipment path optimization (TFSP). In TFSP, some substructure and rail network operational constraints should be considered, including link capacity, classification capacity, the number of sorting tracks, and path length. This paper presents two arc‐based mixed‐integer linear programming (MILP) models to formulate the TFSP problem. To the best of the authors' knowledge, no MILP arc‐based model has been published for the problem that does not need any preprocess before solving. Computational results of solving models on the datasets showed that the first model could obtain a feasible solution with a maximum 0.05% gap up to 48 yards instance. The second model also could find a solution with a small gap compared to the optimal solution in a reasonable time for instances up to 128 yards. Also, the proposed models were compared to the best methods in the literature, and their superiority was shown.
铁路车辆被称为货运铁路运输业的心脏。因此,他们运营的任何改进都可以大幅降低各种运营成本。轨道车最关键的操作之一是阻塞和安排运输路线。铁路公司面临着持续的挑战,即应形成哪些区块来运送不同始发地-目的地对(O–D对)的货物,并在中间堆场对其进行重新分类,以最大限度地降低运输重新分类成本。此外,有必要确定O–D对之间的列车服务和列车数量。与运输路线计划一起,这个问题被称为列车编组和运输路径优化(TFSP)。在TFSP中,应考虑一些子结构和铁路网的运营约束,包括链路容量、分类容量、分拣轨道数量和路径长度。本文提出了两个基于圆弧的混合整数线性规划(MILP)模型来公式化TFSP问题。据作者所知,对于解决之前不需要任何预处理的问题,尚未发布基于MILP弧的模型。在数据集上求解模型的计算结果表明,第一个模型可以在48码的情况下获得最大间隙为0.05%的可行解。对于高达128码的情况,第二个模型也可以在合理的时间内找到与最佳解决方案相比差距较小的解决方案。同时,将所提出的模型与文献中的最佳方法进行了比较,并表明了它们的优越性。
{"title":"Two new mixed‐integer programming models for the integrated train formation and shipment path optimization problem","authors":"Pouria Arsalani, M. Reisi, Vahid Dardashti, G. Moslehi","doi":"10.1002/net.22133","DOIUrl":"https://doi.org/10.1002/net.22133","url":null,"abstract":"Railcars are known as the heart of the freight rail transportation industry. Hence, any improvements in their operations can lead to sharp reductions in various operating costs. One of the most critical operations on railcars is blocking and routing their transportation. Railway companies face continuous challenged about what blocks should be formed to carry shipments across different origin–destination pairs (O–D pairs) and reclassify them in intermediate yards to minimize transportation reclassification costs. In addition, it is necessary to determine train service between O–D pairs and the number of trains. Along with the shipment routing plans, this problem is called train formation and shipment path optimization (TFSP). In TFSP, some substructure and rail network operational constraints should be considered, including link capacity, classification capacity, the number of sorting tracks, and path length. This paper presents two arc‐based mixed‐integer linear programming (MILP) models to formulate the TFSP problem. To the best of the authors' knowledge, no MILP arc‐based model has been published for the problem that does not need any preprocess before solving. Computational results of solving models on the datasets showed that the first model could obtain a feasible solution with a maximum 0.05% gap up to 48 yards instance. The second model also could find a solution with a small gap compared to the optimal solution in a reasonable time for instances up to 128 yards. Also, the proposed models were compared to the best methods in the literature, and their superiority was shown.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"359 - 377"},"PeriodicalIF":2.1,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42953095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A two‐stage network interdiction‐monitoring game 两阶段网络拦截监控游戏
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-04 DOI: 10.1002/net.22136
D. Nguyen, Yongjia Song, J. Smith
We study a network interdiction problem involving two agents: a defender and an evader. The evader seeks to traverse a path from a source node to a terminus node in a directed network without being detected. The game takes place in two stages. In the first stage, the defender removes a set of arcs in the network. In the second stage, the defender and evader play a simultaneous game. The defender monitors a set of arcs, thus increasing the probability that the evader will be detected on that arc (if the evader uses the arc). The evader selects a source‐terminus path. Because the second stage is played simultaneously, both agents use mixed‐strategy solutions. We approach the solution of the second‐stage problem by proposing a constraint‐and‐column generation algorithm. We show that both the constraint‐generation and column‐generation problems are NP‐hard. Accordingly, we prescribe approximate versions of these problems that can be solved more efficiently. Our algorithm relies on solving the approximate versions until it is necessary to obtain an exact solution of the constraint‐generation and column‐generation problems. Then, to link the first‐ and second‐stage problems, we model the original problem using an epigraph reformulation, which we solve using a Benders‐decomposition based approach. The efficacy of our approach is demonstrated on a set of randomly generated test instances.
我们研究了一个涉及两个特工的网络拦截问题:一个是防御者,另一个是逃避者。逃避者试图在没有被检测到的情况下穿越定向网络中从源节点到终端节点的路径。比赛分两个阶段进行。在第一阶段,防守队员移除网络中的一组弧线。在第二阶段,防守队员和躲避队员同时进行比赛。防御者监视一组弧线,从而增加在该弧线上检测到躲避者的概率(如果躲避者使用该弧线)。躲避者选择一条源-终点路径。因为第二阶段是同时进行的,所以两个代理都使用混合策略解决方案。我们通过提出一种约束和列生成算法来解决第二阶段问题。我们证明了约束生成和列生成问题都是NP难问题。因此,我们规定了可以更有效地解决这些问题的近似版本。我们的算法依赖于求解近似版本,直到有必要获得约束生成和列生成问题的精确解。然后,为了将第一阶段和第二阶段的问题联系起来,我们使用题词重新表述对原始问题进行建模,并使用基于Benders分解的方法进行求解。我们的方法的有效性在一组随机生成的测试实例上得到了证明。
{"title":"A two‐stage network interdiction‐monitoring game","authors":"D. Nguyen, Yongjia Song, J. Smith","doi":"10.1002/net.22136","DOIUrl":"https://doi.org/10.1002/net.22136","url":null,"abstract":"We study a network interdiction problem involving two agents: a defender and an evader. The evader seeks to traverse a path from a source node to a terminus node in a directed network without being detected. The game takes place in two stages. In the first stage, the defender removes a set of arcs in the network. In the second stage, the defender and evader play a simultaneous game. The defender monitors a set of arcs, thus increasing the probability that the evader will be detected on that arc (if the evader uses the arc). The evader selects a source‐terminus path. Because the second stage is played simultaneously, both agents use mixed‐strategy solutions. We approach the solution of the second‐stage problem by proposing a constraint‐and‐column generation algorithm. We show that both the constraint‐generation and column‐generation problems are NP‐hard. Accordingly, we prescribe approximate versions of these problems that can be solved more efficiently. Our algorithm relies on solving the approximate versions until it is necessary to obtain an exact solution of the constraint‐generation and column‐generation problems. Then, to link the first‐ and second‐stage problems, we model the original problem using an epigraph reformulation, which we solve using a Benders‐decomposition based approach. The efficacy of our approach is demonstrated on a set of randomly generated test instances.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"334 - 358"},"PeriodicalIF":2.1,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45791463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variable neighborhood search approach with intensified shake for monitor placement 用于监视器放置的具有增强抖动的可变邻域搜索方法
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-01 DOI: 10.1002/net.22134
A. Casado, N. Mladenović, J. Sánchez-Oro, A. Duarte
Several problems are emerging in the context of communication networks and most of them must be solved in reduced computing time since they affect to critical tasks. In this research, the monitor placement problem is tackled. This problem tries to cover the communications of an entire network by locating a monitor in specific nodes of the network, in such a way that every link remains surveyed. In case that a solution cannot be generated in the allowed computing time, a penalty will be assumed for each link uncovered. The problem is addressed by considering the variable neighborhood search framework, proposing a novel constructive method, an intelligent local search to optimize the improvement phase, and an intensified shake to guide the search to more promising solutions. The proposed algorithm is compared with a hybrid search evolutionary algorithm over a set of instances derived from real‐life networks to prove its performance.
在通信网络的背景下出现了一些问题,其中大多数问题必须在减少的计算时间内解决,因为它们会影响关键任务。在本研究中,显示器的放置问题得到了解决。这个问题试图通过在网络的特定节点中定位监视器来覆盖整个网络的通信,从而使每个链路都保持被调查的状态。如果无法在允许的计算时间内生成解决方案,则将对未覆盖的每个链接进行惩罚。通过考虑可变邻域搜索框架来解决该问题,提出了一种新的构造方法,一种智能局部搜索来优化改进阶段,以及一种强化抖动来引导搜索找到更有前景的解决方案。在一组来自真实网络的实例上,将所提出的算法与混合搜索进化算法进行了比较,以证明其性能。
{"title":"Variable neighborhood search approach with intensified shake for monitor placement","authors":"A. Casado, N. Mladenović, J. Sánchez-Oro, A. Duarte","doi":"10.1002/net.22134","DOIUrl":"https://doi.org/10.1002/net.22134","url":null,"abstract":"Several problems are emerging in the context of communication networks and most of them must be solved in reduced computing time since they affect to critical tasks. In this research, the monitor placement problem is tackled. This problem tries to cover the communications of an entire network by locating a monitor in specific nodes of the network, in such a way that every link remains surveyed. In case that a solution cannot be generated in the allowed computing time, a penalty will be assumed for each link uncovered. The problem is addressed by considering the variable neighborhood search framework, proposing a novel constructive method, an intelligent local search to optimize the improvement phase, and an intensified shake to guide the search to more promising solutions. The proposed algorithm is compared with a hybrid search evolutionary algorithm over a set of instances derived from real‐life networks to prove its performance.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"319 - 333"},"PeriodicalIF":2.1,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42965473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formulations and valid inequalities for the capacitated dispersion problem 赋能色散问题的公式和有效不等式
IF 2.1 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-11-22 DOI: 10.1002/net.22132
M. Landete, Juanjo Peiró, H. Yaman
This work focuses on the capacitated dispersion problem for which we study several mathematical formulations in different spaces using variables associated with nodes, edges, and costs. The relationships among the presented formulations are investigated by comparing the projections of the feasible sets of the LP relaxations onto the subspace of natural variables. These formulations are then strengthened with families of valid inequalities and variable‐fixing procedures. The separation problems associated with the valid inequalities that are exponential in number are shown to be polynomially solvable by reducing them to longest path problems in acyclic graphs. The dual bounds obtained from stronger but larger formulations are used to improve the strength of weaker but smaller formulations. Several sets of computational experiments are conducted to illustrate the usefulness of the findings, as well as the aptness of the formulations for different types of instances.
这项工作的重点是电容色散问题,我们使用与节点、边和成本相关的变量研究了不同空间中的几种数学公式。通过比较LP松弛的可行集在自然变量子空间上的投影,研究了所提出的公式之间的关系。然后用有效不等式族和变量固定程序来加强这些公式。与有效不等式相关的分离问题是指数的,通过将它们简化为非循环图中的最长路径问题,证明了它们是多项式可解的。从更强但更大的配方中获得的对偶边界用于提高较弱但更小的配方的强度。进行了几组计算实验,以说明这些发现的有用性,以及公式对不同类型实例的适用性。
{"title":"Formulations and valid inequalities for the capacitated dispersion problem","authors":"M. Landete, Juanjo Peiró, H. Yaman","doi":"10.1002/net.22132","DOIUrl":"https://doi.org/10.1002/net.22132","url":null,"abstract":"This work focuses on the capacitated dispersion problem for which we study several mathematical formulations in different spaces using variables associated with nodes, edges, and costs. The relationships among the presented formulations are investigated by comparing the projections of the feasible sets of the LP relaxations onto the subspace of natural variables. These formulations are then strengthened with families of valid inequalities and variable‐fixing procedures. The separation problems associated with the valid inequalities that are exponential in number are shown to be polynomially solvable by reducing them to longest path problems in acyclic graphs. The dual bounds obtained from stronger but larger formulations are used to improve the strength of weaker but smaller formulations. Several sets of computational experiments are conducted to illustrate the usefulness of the findings, as well as the aptness of the formulations for different types of instances.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"294 - 315"},"PeriodicalIF":2.1,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45689750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1