The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an algorithm for nonlinear optimization problem that employs both traditional trust region methods. When solving trust region sub-problem, the traditional trust region algorithm is within the trust region centered at the current iteration point, the two improved trust region algorithms are within the trust region centered at one point located in the direction of the negative...
For solving the problem of calculating two turn angle shooting parameter with predetermined encountering state, by considering with possible process of special trajectory and shifting torpedo velocity, a universal model which satisfied the requirement of different shooting mode was constructed, and a formulas concerning Newton iteration arithmetic was given. The correctness of the model and arithmetic...
This paper describes a mathematical model for natural gas pipeline network which can help the sales company achieve maximum economic profits. In this paper, we analyze the pipeline network and consider many factors, including the end segment of pipeline for storage. Then we choose the feasible direction algorithm for constrained nonlinear programming to solve the model. At the end of this paper, we...
In this paper, we aim to evaluate the system performance of the energy saving mode for Discontinuous Reception (DRX) in Long Term Evolution (LTE) systems. We consider the digital nature of modern communications, and build a discrete-time queueing model with a two-stage vacation. By using the method of an embedded Markov chain, we analyze the system model in the steady-state, and derive the formulas...
This paper studies a two-period model in which a monopolistic manufacturer needs to decide the quantity of new products in the first period, as well as the selling price and quantity of remanufactured products in the second period, in order to maximize his total profit. The market size is fixed and the market segmentation is realized by the consumer's net utility. We focus on the competition between...
Many pairwise models are proposed for ranking problems in the field of information retrieval. Classification problems in the field of data mining also use pairwise comparison. However, conventionally, these pairwise approaches are evaluated based evaluation metrics. The original rating for a single document or instance is not explained faithfully, which makes these algorithms cannot be evaluated by...
Japanese cities always have risks of large-scale earthquakes. Thus, it is very important to establish crisis management systems against large-scale disasters such as big earthquakes, and tsunamis to secure evacuation centers for evacuees. In this respect, it is extremely important to provide sufficient evacuation centers and to appropriately partition the whole region into small areas, such that a...
In this paper we take dynamic traveling salesman problem with deadline based on traveler's risk attitude (DTSPD_TRA) as an example to show Behavioral Operational Research (BOR) in advancing the practice of OR. We present the optimal tour model based on the cumulative prospective theory (CPT), where utility functions are nonlinear in probability and thus the salesman's flexible attitude toward risk...
The problem of epidemic spreading has been widely studied by scientists from various fields, so the corresponding immunization strategy is also been extensively concerned. But the traditional immunization behaviors are performed by deleting edges in the network, which causes changes of the network structure and then possibly severe damage to the network efficiency. In this paper we studied a novel...
This paper provides a novel technique for multiple kernel learning within Support Vector Machine framework. The problem of combining different sources of information arises in several situations, for instance, the classification of data with asymmetric similarity matrices or the construction of an optimal classifier from a collection of kernels. Often, each source of information can be expressed as...
As it is difficult to assess quality of information of ship anti submarine warfare (ASW) operation by traditional methods, this paper gives a new method to solve the problem and builds a model of information quality assessment based on information entropy. Further, ASW ship operation information quality assessment database is given to offer a way to acquire the quality of information (QoI) in time...
This paper studies a novel maintenance model with service contracts. We use a non-cooperative game formulation in which both parties, agent and unit owner, take the decisions by maximizing their expected profits to determine the agent's optimal pricing strategy, the length of warranty and the number of repairmen for a monopolist service agent providing the maintenance service. We find that the optimal...
In this paper, we investigate the best water usage strategy problem of China. Firstly, based on the historical date from 2004 to 2012, we forecast the fresh water supply and demand in each province in the near future by GM(1,1) model. Then we calculate the supply-demand gap and the pure fresh water surplus in each province, and partition all provinces into water-supplying provinces and water-demanding...
In this paper, we propose a new version of support vector machine named biased p-norm support vector machine (BPSVM) involved in learning from positive and unlabeled examples. BPSVM treats the classification of positive and unlabeled examples as an imbalanced binary classification problem by giving different penalty parameters to positive and unlabeled examples. Compared with the previous works, BPSVM...
The timing and magnitude of natural disasters are unpredictable, and thus are stochastic. Number of death and missing people (D&M) caused by natural disasters are often used to measure the magnitude of the disasters. By using statistical analysis, we investigate the relationship between the D&M inflicted and some parameters of natural disasters with case studies of earthquakes and tsunamis...
This paper presents a new phase 1 simplex algorithm for solving linear programming problems. In the algorithm, first, the equation with the auxiliary objective function at the optimality as a new constraint is added to phase 1, and then a pivot is performed to generate one vertex on the associated objective hyperplane. This vertex may be feasible or not feasible. If it is feasible, the phase 1 simplex...
The design of telecommunication network with capacity constraints of links, routers and ports of routers is considered in this paper. Specially, we limit each demand flow traversed through within a pre-specifed number of links (called hops) under node failure scenarios in IP layer network. Such a design must be the most cost-effective and ensure that feasible flows continue to exist even when any...
This paper studies a train ticket overbooking rule and strategy for transportation during the Spring Festival. We determine the expected revenue of train operation by the probability theory. According to the principle which maximizes the expected revenue of the railway sector, we construct a mathematical model to determine the number of overbooking sleeper and seat tickets. Using the optimal solution...
This paper discusses a new kind of inverse data envelopment analysis(DEA) model with considering returns to scale and elasticity of decision making unit(DMU). An inverse DEA model can be used for a DMU to estimate its input/output levels when some or all of its input/output entities are revised. Different from original inverse DEA model, the new model allows the efficiency score being changed, which...
This paper proposes a model, named “a minimum cost k-reliable network interdiction”, which minimizes the cost of setting sensors on arcs for preventing any potential threat to a protected area. Mathematically, given any directed graph with a source and a sink, several arcs need to be selected such that any path from source to sink contains at least k arcs in the selected arcs with as few resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.