Your selections:

4Ruan, Ning
3Gao, David
3Miller, Mirka
2Sugeng, Kiki Ariyanti
1Ahmed, S. T.
1Al Nuaimat, Alia
1Bagirov, Adil
1Balbuena, Camino
1Barker, Ewan
1Barton, Andrew
1Baskoro, Edy
1Chen, Yi
1Cholily, Yus Mochamad
1Das, K. C.
1Filar, Jerzy
1Lin, Yuqing
1López, Marco
1Mala-Jetmarova, Helena
1Manyem, Prabhu
1Panton, David

Show More

Show Less

5Global optimization
4Canonical duality theories
4Set theory
30103 Numerical and Computational Mathematics
3Graph theory
3Problem solving
20101 Pure Mathematics
20102 Applied Mathematics
2Convex set
2Integer optimization
2Maximization problem
2Optimization techniques
10802 Computation Theory and Mathematics
1Adaptive flight rescheduling
1Air traffic management
1Almost Moore digraph
1Analytic solution
1Artificial bee colonies
1Bijection

Show More

Show Less

Format Type

Advances in canonical duality theory with applications to global optimization

**Authors:**Gao, David**Date:**2008**Type:**Text , Conference proceedings**Relation:**FOCAPO 2008, Boston, June 29th-July 02, Published in Proceedings of the Fifth International Conference Foundations of Computer-Aided Process Operations pg. 73-82 p. 73-81**Full Text:**false**Reviewed:**

A model for adaptive rescheduling of flights in emergencies (MARFE)

- Filar, Jerzy, Manyem, Prabhu, Panton, David, White, Kevin

**Authors:**Filar, Jerzy , Manyem, Prabhu , Panton, David , White, Kevin**Date:**2007**Type:**Text , Journal article**Relation:**Journal of Industrial and Management Optimization Vol. 3, no. 2 (May 2007), p. 335-356**Full Text:****Reviewed:****Description:**Disruptions to commercial airline schedules are frequent and can inflict significant costs. In this paper we continue a line of research initiated by Vranas, Bertsimas and Odoni [15, 16], that aims to develop techniques facilitating rapid return to normal operations whenever disruptions occur. Ground Holding is a technique that has been successfully employed to combat disruptions at North American airports. However, this alone is insufficient to cope with the problem. We develop an adaptive optimization model that allows the implementation of other tactics, such as flight cancellations, airborne holding and diversions. While the approach is generic, our model incorporates features of Sydney airport in Australia, such as a night curfew from 11:00pm to 6:00am. For an actual day when there was a significant capacity drop, we demonstrate that our model clearly outperforms the actions that were initiated by the air traffic controllers at Sydney.**Description:**C1**Description:**2003004883

**Authors:**Filar, Jerzy , Manyem, Prabhu , Panton, David , White, Kevin**Date:**2007**Type:**Text , Journal article**Relation:**Journal of Industrial and Management Optimization Vol. 3, no. 2 (May 2007), p. 335-356**Full Text:****Reviewed:****Description:**Disruptions to commercial airline schedules are frequent and can inflict significant costs. In this paper we continue a line of research initiated by Vranas, Bertsimas and Odoni [15, 16], that aims to develop techniques facilitating rapid return to normal operations whenever disruptions occur. Ground Holding is a technique that has been successfully employed to combat disruptions at North American airports. However, this alone is insufficient to cope with the problem. We develop an adaptive optimization model that allows the implementation of other tactics, such as flight cancellations, airborne holding and diversions. While the approach is generic, our model incorporates features of Sydney airport in Australia, such as a night curfew from 11:00pm to 6:00am. For an actual day when there was a significant capacity drop, we demonstrate that our model clearly outperforms the actions that were initiated by the air traffic controllers at Sydney.**Description:**C1**Description:**2003004883

An efficient classification using support vector machines

- Ruan, Ning, Chen, Yi, Gao, David

**Authors:**Ruan, Ning , Chen, Yi , Gao, David**Date:**2013**Type:**Text , Conference paper**Relation:**Proceedings of 2013 Science and Information Conference, SAI 2013 p. 585-589**Full Text:**false**Reviewed:****Description:**Support vector machine (SVM) is a popular method for classification in data mining. The canonical duality theory provides a unified analytic solution to a wide range of discrete and continuous problems in global optimization. This paper presents a canonical duality approach for solving support vector machine problem. It is shown that by the canonical duality, these nonconvex and integer optimization problems are equivalent to a unified concave maximization problem over a convex set and hence can be solved efficiently by existing optimization techniques. © 2013 The Science and Information Organization.

Enumerations of vertex orders of almost Moore digraphs with selfrepeats

- Baskoro, Edy, Cholily, Yus Mochamad, Miller, Mirka

**Authors:**Baskoro, Edy , Cholily, Yus Mochamad , Miller, Mirka**Date:**2008**Type:**Text , Journal article**Relation:**Discrete Mathematics Vol. 308, no. 1 (2008), p. 123-128**Full Text:**false**Reviewed:****Description:**An almost Moore digraph G of degree d > 1, diameter k > 1 is a diregular digraph with the number of vertices one less than the Moore bound. If G is an almost Moore digraph, then for each vertex u ∈ V (G) there exists a vertex v ∈ V (G), called repeat of u and denoted by r (u) = v, such that there are two walks of length ≤ k from u to v. The smallest positive integer p such that the composition rp (u) = u is called the order of u. If the order of u is 1 then u is called a selfrepeat. It is known that if G is an almost Moore digraph of diameter k ≥ 3 then G contains exactly k selfrepeats or none. In this paper, we propose an exact formula for the number of all vertex orders in an almost Moore digraph G containing selfrepeats, based on the vertex orders of the out-neighbours of any selfrepeat vertex. © 2007 Elsevier B.V. All rights reserved.**Description:**C1

On the degrees of a strongly vertex-magic graph

- Balbuena, Camino, Barker, Ewan, Das, K. C., Lin, Yuqing, Miller, Mirka, Ryan, Joe, Slamin,, Sugeng, Kiki Ariyanti, Tkac, M.

**Authors:**Balbuena, Camino , Barker, Ewan , Das, K. C. , Lin, Yuqing , Miller, Mirka , Ryan, Joe , Slamin, , Sugeng, Kiki Ariyanti , Tkac, M.**Date:**2006**Type:**Text , Journal article**Relation:**Discrete Mathematics Vol. 306, no. 6 (2006), p. 539-551**Full Text:**false**Reviewed:****Description:**Let G=(V,E) be a finite graph, where |V|=n≥2 and |E|=e≥1. A vertex-magic total labeling is a bijection λ from V∪E to the set of consecutive integers {1,2,...,n+e} with the property that for every v∈V, λ(v)+∑w∈N(v)λ(vw)=h for some constant h. Such a labeling is strong if λ(V)={1,2,...,n}. In this paper, we prove first that the minimum degree of a strongly vertex-magic graph is at least two. Next, we show that if 2e≥10n2-6n+1, then the minimum degree of a strongly vertex-magic graph is at least three. Further, we obtain upper and lower bounds of any vertex degree in terms of n and e. As a consequence we show that a strongly vertex-magic graph is maximally edge-connected and hamiltonian if the number of edges is large enough. Finally, we prove that semi-regular bipartite graphs are not strongly vertex-magic graphs, and we provide strongly vertex-magic total labeling of certain families of circulant graphs. © 2006 Elsevier B.V. All rights reserved**Description:**C1**Description:**2003001603

On consecutive edge magic total labeling of graphs

- Sugeng, Kiki Ariyanti, Miller, Mirka

**Authors:**Sugeng, Kiki Ariyanti , Miller, Mirka**Date:**2008**Type:**Text , Journal article**Relation:**Journal of Discrete Algorithms Vol. 6, no. 1 (2008), p. 59-65**Full Text:**false**Reviewed:****Description:**Let G = (V, E) be a finite (non-empty) graph, where V and E are the sets of vertices and edges of G. An edge magic total labeling is a bijection**Description:**C1

Comparison of metaheuristic algorithms for pump operation optimization

- Bagirov, Adil, Ahmed, S. T., Barton, Andrew, Mala-Jetmarova, Helena, Al Nuaimat, Alia, Sultanova, Nargiz

**Authors:**Bagirov, Adil , Ahmed, S. T. , Barton, Andrew , Mala-Jetmarova, Helena , Al Nuaimat, Alia , Sultanova, Nargiz**Date:**2012**Type:**Text , Conference paper**Relation:**14th Water Distribution Systems Analysis Conference 2012, WDSA 2012 Vol. 2; Adelaide, Australia; 24th-27th September 2012; p. 886-896**Relation:**http://purl.org/au-research/grants/arc/LP0990908**Full Text:**false**Reviewed:****Description:**Pumping cost constitutes the main part of the overall operating cost of water distribution systems. There are different optimization formulations of the pumping cost minimization problem including those with application of continuous and integer programming approaches. To date mainly various metaheuristics have been applied to solve this problem. However, the comprehensive comparison of those metaheuristics has not been done. Such a comparison is important to identify strengths and weaknesses of different algorithms which reflects on their performance. In this paper, we present a methodology for comparative analysis of widely used metaheuristics for solving the pumping cost minimization problem. This methodology includes the following comparison criteria: (a) the "optimal solution" obtained; (b) the efficiency; and (c) robustness. Algorithms applied are: particle swarm optimization, artificial bee colony and firefly algorithms. These algorithms were applied to one test problem available in the literature. The results obtained demonstrate that the artificial bee colony is the most robust and the firefly is the most efficient and accurate algorithm for this test problem. Funding :ARC

Canonical duality theory and algorithm for solving challenging problems in network optimisation

**Authors:**Ruan, Ning , Gao, David**Date:**2012**Type:**Text , Conference paper**Relation:**19th International Conference on Neural Information Processing, ICONIP 2012 Vol. 7665 LNCS, p. 702-709**Full Text:****Reviewed:****Description:**This paper presents a canonical dual approach for solving a general nonconvex problem in network optimization. Three challenging problems, sensor network location, traveling salesman problem, and scheduling problem are listed to illustrate the applications of the proposed method. It is shown that by the canonical duality, these nonconvex and integer optimization problems are equivalent to unified concave maximization problem over a convex set and hence can be solved efficiently by existing optimization techniques. © 2012 Springer-Verlag.**Description:**2003010653

**Authors:**Ruan, Ning , Gao, David**Date:**2012**Type:**Text , Conference paper**Relation:**19th International Conference on Neural Information Processing, ICONIP 2012 Vol. 7665 LNCS, p. 702-709**Full Text:****Reviewed:****Description:**This paper presents a canonical dual approach for solving a general nonconvex problem in network optimization. Three challenging problems, sensor network location, traveling salesman problem, and scheduling problem are listed to illustrate the applications of the proposed method. It is shown that by the canonical duality, these nonconvex and integer optimization problems are equivalent to unified concave maximization problem over a convex set and hence can be solved efficiently by existing optimization techniques. © 2012 Springer-Verlag.**Description:**2003010653

Solving facility location problem based on duality approach

**Authors:**Ruan, Ning**Date:**2015**Type:**Text , Conference paper**Relation:**3rd World Congress on Global Optimization in Engineering and Science, WCGO 2013; Anhui, China; 8th-12th July 2013 Vol. 95, p. 165-172**Full Text:**false**Reviewed:****Description:**The facility location problem is one of the most widely studied discrete location problems, whose applications arise in a variety of settings, such as routers or servers in a communication network, warehouses or distribution centres in a supply chain, hospitals or airports in a public service system. The problem involves locating a number of facilities to minimize the sum of the fixed setup costs and the variable costs of serving the market demand from these facilities. First a dual problem is developed for the facility location problem. Then general optimality conditions are also obtained, which generate sequences globally converging to a primal and dual solutions, respectively. © Springer International Publishing Switzerland 2015.

Stability of semi-infinite inequality systems involving min-type functions

- López, Marco, Rubinov, Alex, Vera De Serio, Virginia

**Authors:**López, Marco , Rubinov, Alex , Vera De Serio, Virginia**Date:**2005**Type:**Text , Journal article**Relation:**Numerical Functional Analysis and Optimization Vol. 26, no. 1 (2005), p. 81-112**Full Text:**false**Reviewed:****Description:**We study the stability of semi-infinite inequality systems that arise in monotonic analysis. These systems are defined by certain classes of abstract linear functions. We consider the cone R**Description:**C1**Description:**2003001420

An interesting cryptography study based on knapsack problem

**Authors:**Ruan, Ning**Date:**2013**Type:**Text , Conference paper**Relation:**Proceedings - UKSim 15th International Conference on Computer Modelling and Simulation, UKSim 2013 p. 330-334**Full Text:****Reviewed:****Description:**Cryptography is an art that has been practised through the centuries. Interest in the applications of the knapsack problem to cryptography has arisen with the advent of public key cryptography. The knapsack problem is well documented problem and all research into its properties have lead to the conjecture that it is difficult to solve. In this paper the canonical duality theory is presented for solving general knapsack problem. By using the canonical dual transformation, the integer programming problem can be converted into a continuous canonical dual problem with zero duality gap. The optimality criterion are also discussed. Numerical examples show the efficiency of the method. Â© 2013 IEEE.

**Authors:**Ruan, Ning**Date:**2013**Type:**Text , Conference paper**Relation:**Proceedings - UKSim 15th International Conference on Computer Modelling and Simulation, UKSim 2013 p. 330-334**Full Text:****Reviewed:****Description:**Cryptography is an art that has been practised through the centuries. Interest in the applications of the knapsack problem to cryptography has arisen with the advent of public key cryptography. The knapsack problem is well documented problem and all research into its properties have lead to the conjecture that it is difficult to solve. In this paper the canonical duality theory is presented for solving general knapsack problem. By using the canonical dual transformation, the integer programming problem can be converted into a continuous canonical dual problem with zero duality gap. The optimality criterion are also discussed. Numerical examples show the efficiency of the method. Â© 2013 IEEE.

- «
- ‹
- 1
- ›
- »

Are you sure you would like to clear your session, including search history and login status?