120 resultados para Branch and bounds
Resumo:
A unit cube in k dimensions (k-cube) is defined as the Cartesian product R-1 x R-2 x ... x R-k where R-i (for 1 <= i <= k) is a closed interval of the form [a(i), a(i) + 1] on the real line. A graph G on n nodes is said to be representable as the intersection of k-cubes (cube representation in k dimensions) if each vertex of C can be mapped to a k-cube such that two vertices are adjacent in G if and only if their corresponding k-cubes have a non-empty intersection. The cubicity of G denoted as cub(G) is the minimum k for which G can be represented as the intersection of k-cubes. An interesting aspect about cubicity is that many problems known to be NP-complete for general graphs have polynomial time deterministic algorithms or have good approximation ratios in graphs of low cubicity. In most of these algorithms, computing a low dimensional cube representation of the given graph is usually the first step. We give an O(bw . n) algorithm to compute the cube representation of a general graph G in bw + 1 dimensions given a bandwidth ordering of the vertices of G, where bw is the bandwidth of G. As a consequence, we get O(Delta) upper bounds on the cubicity of many well-known graph classes such as AT-free graphs, circular-arc graphs and cocomparability graphs which have O(Delta) bandwidth. Thus we have: 1. cub(G) <= 3 Delta - 1, if G is an AT-free graph. 2. cub(G) <= 2 Delta + 1, if G is a circular-arc graph. 3. cub(G) <= 2 Delta, if G is a cocomparability graph. Also for these graph classes, there axe constant factor approximation algorithms for bandwidth computation that generate orderings of vertices with O(Delta) width. We can thus generate the cube representation of such graphs in O(Delta) dimensions in polynomial time.
Resumo:
We consider single-source, single-sink (ss-ss) multi-hop relay networks, with slow-fading Rayleigh links. This two part paper aims at giving explicit protocols and codes to achieve the optimal diversity-multiplexing tradeoff (DMT) of two classes of multi-hop networks: K-parallel-path (KPP) networks and Layered networks. While single-antenna KPP networks were the focus of the first part, we consider layered and multi-antenna networks in this second part. We prove that a linear DMT between the maximum diversity d(max). and the maximum multiplexing gain of 1 is achievable for single-antenna fully-connected layered networks under the half-duplex constraint. This is shown to be equal to the optimal DMT if the number of relaying layers is less than 4. For the multiple-antenna case, we provide an achievable DMT, which is significantly better than known lower bounds for half duplex networks. Along the way, we compute the DMT of parallel MIMO channels in terms of the DMT of the component channel. For arbitrary ss-ss single-antenna directed acyclic networks with full-duplex relays, we prove that a linear tradeoff between maximum diversity and maximum multiplexing gain is achievable using an amplify-and-forward (AF) protocol. Explicit short-block-length codes are provided for all the proposed protocols. Two key implications of the results in the two-part paper are that the half-duplex constraint does not necessarily entail rate loss by a factor of two as previously believed and that simple AN protocols are often sufficient to attain the best possible DMT.
Resumo:
the leopard tree Caesalpinia ferrea (Leguminosae) a native of eastern Brazil-some of the leader branches connect to and fuse with neighbouring branches of the same tree. The bridge initials project out as pegs or protuberances and apparently extend in a coordinated manner, connecting branches up to 4 ft apart. The fusion of two branches of the same tree implies intra-plant communication involving signaling factor(s). The bridges resemble fusions between hyphae in a fungal colony. Whereas hyphal fusions are common and the process is apparently completed in <1 h, branch fusions in C. ferrea tree are limited and a slow process, apparently requiring several months to years to complete. Branch fusions in C. ferrea are in accord with Claus Mattheck's analysis that tree branches actually seek contact rather than avoid contacts.
Resumo:
A new approach is used to study the global dynamics of regenerative metal cutting in turning. The cut surface is modeled using a partial differential equation (PDE) coupled, via boundary conditions, to an ordinary differential equation (ODE) modeling the dynamics of the cutting tool. This approach automatically incorporates the multiple-regenerative effects accompanying self-interrupted cutting. Taylor's 3/4 power law model for the cutting force is adopted. Lower dimensional ODE approximations are obtained for the combined tool–workpiece model using Galerkin projections, and a bifurcation diagram computed. The unstable solution branch off the subcritical Hopf bifurcation meets the stable branch involving self-interrupted dynamics in a turning point bifurcation. The tool displacement at that turning point is estimated, which helps identify cutting parameter ranges where loss of stability leads to much larger self-interrupted motions than in some other ranges. Numerical bounds are also obtained on the parameter values which guarantee global stability of steady-state cutting, i.e., parameter values for which there exist neither unstable periodic motions nor self-interrupted motions about the stable equilibrium.
Resumo:
We consider a scenario in which a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing a function of the measurements and communicating it to an operator station. We restrict ourselves to the class of type-threshold functions (as defined in the work of Giridhar and Kumar, 2005), of which max, min, and indicator functions are important examples: our discussions are couched in terms of the max function. We view the problem as one of message-passing distributed computation over a geometric random graph. The network is assumed to be synchronous, and the sensors synchronously measure values and then collaborate to compute and deliver the function computed with these values to the operator station. Computation algorithms differ in (1) the communication topology assumed and (2) the messages that the nodes need to exchange in order to carry out the computation. The focus of our paper is to establish (in probability) scaling laws for the time and energy complexity of the distributed function computation over random wireless networks, under the assumption of centralized contention-free scheduling of packet transmissions. First, without any constraint on the computation algorithm, we establish scaling laws for the computation time and energy expenditure for one-time maximum computation. We show that for an optimal algorithm, the computation time and energy expenditure scale, respectively, as Theta(radicn/log n) and Theta(n) asymptotically as the number of sensors n rarr infin. Second, we analyze the performance of three specific computation algorithms that may be used in specific practical situations, namely, the tree algorithm, multihop transmission, and the Ripple algorithm (a type of gossip algorithm), and obtain scaling laws for the computation time and energy expenditure as n rarr infin. In particular, we show that the computation time for these algorithms scales as Theta(radicn/lo- g n), Theta(n), and Theta(radicn log n), respectively, whereas the energy expended scales as , Theta(n), Theta(radicn/log n), and Theta(radicn log n), respectively. Finally, simulation results are provided to show that our analysis indeed captures the correct scaling. The simulations also yield estimates of the constant multipliers in the scaling laws. Our analyses throughout assume a centralized optimal scheduler, and hence, our results can be viewed as providing bounds for the performance with practical distributed schedulers.
Resumo:
Relay selection for cooperative communications promises significant performance improvements, and is, therefore, attracting considerable attention. While several criteria have been proposed for selecting one or more relays, distributed mechanisms that perform the selection have received relatively less attention. In this paper, we develop a novel, yet simple, asymptotic analysis of a splitting-based multiple access selection algorithm to find the single best relay. The analysis leads to simpler and alternate expressions for the average number of slots required to find the best user. By introducing a new contention load' parameter, the analysis shows that the parameter settings used in the existing literature can be improved upon. New and simple bounds are also derived. Furthermore, we propose a new algorithm that addresses the general problem of selecting the best Q >= 1 relays, and analyze and optimize it. Even for a large number of relays, the scalable algorithm selects the best two relays within 4.406 slots and the best three within 6.491 slots, on average. We also propose a new and simple scheme for the practically relevant case of discrete metrics. Altogether, our results develop a unifying perspective about the general problem of distributed selection in cooperative systems and several other multi-node systems.
Resumo:
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.
Resumo:
We revisit four generations within the context of supersymmetry. Wecompute the perturbativity limits for the fourth generation Yukawa couplings and show that if the masses of the fourth generation lie within reasonable limits of their present experimental lower bounds, it is possible to have perturbativity only up to scales around 1000 TeV. Such low scales are ideally suited to incorporate gauge mediated supersymmetry breaking, where the mediation scale can be as low as 10-20 TeV. The minimal messenger model, however, is highly constrained. While lack of electroweak symmetry breaking rules out a large part of the parameter space, a small region exists, where the fourth generation stau is tachyonic. General gauge mediation with its broader set of boundary conditions is better suited to accommodate the fourth generation.
Resumo:
The dispersion relations, frequency distribution function and specific heat of zinc blende have been calculated using Houston's method on (1) A short range force (S. R.) model of the type employed in diamond by Smith and (2) A long range model assuming an effective charge Ze on the ions. Since the elastic constant data on ZnS are not in agreement with one another the following values were used in these calculations: {Mathematical expression}. As compared to the results on the S. R. model, the Coulomb force causes 1. A splitting of the optical branches at (000) and a larger dispersion of these branches; 2. A rise in the acoustic frequency branches the effect being predominant in a transverse acoustic branch along [110]; 3. A bridging of the gap of forbidden frequencies in the S. R. model; 4. A reduction of the moments of the frequency distribution function and 5. A flattening of the Θ- T curve. By plotting (Θ/Θ0) vs. T., the experimental data of Martin and Clusius and Harteck are found to be in perfect coincidence with the curve for the short range model. The values of the elastic constants deduced from the ratio Θ0 (Theor)/Θ0 (Expt) agree with those of Prince and Wooster. This is surprising as several lines of evidence indicate that the bond in zinc blende is partly covalent and partly ionic. The conclusion is inescapable that the effective charge in ZnS is a function of the wave vector {Mathematical expression}.
Resumo:
Stick-slip is usually observed in driven dissipative threshold systems. In these set of lectures, we discuss, some generic and system specific features of stickslip systems by considering a few examples wherein there has been some progress in understanding the associated dynamics. In most stick slip systems, both at low and high drive rates, the system slides smoothly, but within a window of drive rates, the motion becomes intermittent; the system alternately “sticks” till the stress builds up to a threshold value, and then “slips” when the stress is rapidly released. This intermittent motion can be traced to the existence of an unstable branch separating the two resistive branches in the force-drive-rate relation. While the two resistive branches are experimentally measurable, the unstable branch is usually not measurable and is only inferred.
Resumo:
Upper bounds at the weak scale are obtained for all lambda(ij)lambda(im) type product couplings of the scalar leptoquark model which may affect K-0 - (K) over bar (0), B-d - (B) over bar (d), and B-s - (B) over bar (s) mixing, as well as leptonic and semileptonic K and B decays. Constraints are obtained for both real and imaginary parts of the couplings. We also discuss the role of leptoquarks in explaining the anomalously large CP-violating phase in B-s - (B) over bar (s) mixing.
Resumo:
We investigate the scalar K pi form factor at low energies by the method of unitarity bounds adapted so as to include information on the phase and modulus along the elastic region of the unitarity cut. Using at input the values of the form factor at t = 0 and the Callan-Treiman point, we obtain stringent constraints on the slope and curvature parameters of the Taylor expansion at the origin. Also, we predict a quite narrow range for the higher-order ChPT corrections at the second Callan-Treiman point.
Resumo:
For p x n complex orthogonal designs in k variables, where p is the number of channels uses and n is the number of transmit antennas, the maximal rate L of the design is asymptotically half as n increases. But, for such maximal rate codes, the decoding delay p increases exponentially. To control the delay, if we put the restriction that p = n, i.e., consider only the square designs, then, the rate decreases exponentially as n increases. This necessitates the study of the maximal rate of the designs with restrictions of the form p = n+1, p = n+2, p = n+3 etc. In this paper, we study the maximal rate of complex orthogonal designs with the restrictions p = n+1 and p = n+2. We derive upper and lower bounds for the maximal rate for p = n+1 and p = n+2. Also for the case of p = n+1, we show that if the orthogonal design admit only the variables, their negatives and multiples of these by root-1 and zeros as the entries of the matrix (other complex linear combinations are not allowed), then the maximal rate always equals the lower bound.
Resumo:
Utilization bounds for Earliest Deadline First(EDF) and Rate Monotonic(RM) scheduling are known and well understood for uniprocessor systems. In this paper, we derive limits on similar bounds for the multiprocessor case, when the individual processors need not be identical. Tasks are partitioned among the processors and RM scheduling is assumed to be the policy used in individual processors. A minimum limit on the bounds for a 'greedy' class of algorithms is given and proved, since the actual value of the bound depends on the algorithm that allocates the tasks. We also derive the utilization bound of an algorithm which allocates tasks in decreasing order of utilization factors. Knowledge of such bounds allows us to carry out very fast schedulability tests although we are constrained by the fact that the tests are sufficient but not necessary to ensure schedulability.