Most Download

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

    Most Downloaded in Recent Month
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Reducing Multivalued Discrete Variables in Solving Separable Task Assignment Problems
    Ling Gai;Qing-Wei Jin;Yuan Tian;Yao-Huei Huang
    Journal of the Operations Research Society of China    2016, 4 (1): 97-.   DOI: 1007/s40305-015-0087-x
    Abstract372)      PDF       Save

    In this paper, we introduce the separable task assignment problem (STAP) in which n separable tasks are assigned tom agents subject to agents’ capacity constraints. The objective is to minimize the costs that occur during the manufacturing and the communication between agents.Atask is separable if it can be divided into two pieces, and both of them can be assigned individually or together to any agents. A separable task is considered as being assigned if and only if its two pieces are both assigned. Since several discrete (ternary) variables may be involved in STAP modeling, computing the problem in a reasonable time period is not an easy work. We replace the ternary variables by binary and continuous variables through extending the logarithmic method introduced by Li et al. (INFORMS J Comput 25(4): 643–653, 2012) and Vielma et al.(Oper Res 58(2): 303–315, 2010). Our numerical experiments demonstrate that the newly generated model performs well in solving difficult separable task-assignment problems for pretty large scale of instance sizes.

    Related Articles | Metrics | Comments0
    Online Scheduling with Rejection to Minimize the Total Weighted Completion Time Plus the Total Rejection Cost on Parallel Machines
    Ran Ma · Jin-Jiang Yuan
    Journal of the Operations Research Society of China    2016, 4 (1): 111-.   DOI: 10.1007/s40305-015-0093-z
    Abstract644)      PDF       Save

    We consider the online scheduling with job rejection to minimize the total weighted completion time of the scheduled jobs plus the total rejection penalty of the rejected jobs. In the problem, a set of independent jobs arriving online over time has to be scheduled with the flexibility of rejecting some of the jobs, where preemption is not allowed and the information of each job, including its processing time, release date, weight, and rejection penalty, is not known in advance. For this problem, using a technique named Greedy-Interval-Rejection, we provide an online algorithm with a competitive ratio of at most 4+ε on identical machines and an online algorithm with a competitive ratio of at most 8 on unrelated machines, respectively.

    Related Articles | Metrics | Comments0
    Cited: Baidu(2)
    An Explicit Solution for a Series and Parallel Queue with Retrial, Losses, and Bernoulli Schedule
    Shi-Zhong Zhou· Li-Wei Liu·Jian-Jun Li
    Journal of the Operations Research Society of China    2016, 4 (1): 121-.   DOI: 10.1007/s40305-015-0098-7
    Abstract456)      PDF       Save

    This paper deals with the series and parallel queueing system in which there are two servers whose service time follow two exponential distributions. Each arriving customer either enters into the tandem service with probability or joins the service of the single server with complementary probability. We assume that the customers of arriving at the first server who find the first server is busy join an orbit and retry to enter the server after some time and of arriving at the second server who find the second server is busy are lost. For this model, we obtain the explicit expressions of the  joint stationary distribution between the number of customers in the orbit and the states of the servers. Keywords Series and parallel queue · Retrial · Bernoulli schedule.

    Reference | Related Articles | Metrics | Comments0
    A Path-Following Full Newton-Step Infeasible Interior-Point Algorithm for P∗(κ)-HLCPs Based on a Kernel Function
    Soodabeh Asadi· Hossein Mansouri ·Maryam Zangiabadi
    Journal of the Operations Research Society of China    2016, 4 (1): 77-.   DOI: 10.1007/s40305-015-0113-z
    Abstract506)      PDF       Save

    In this paper, we present a path-following infeasible interior-point method for P∗(κ) horizontal linear complementarity problems (P∗(κ)-HLCPs). The algorithm is based on a simple kernel function for finding the search directions and defining the neighborhood of the central path. The algorithm follows the central path related to some perturbations of the original problem, using the so-called feasibility and centering steps, along with only full such steps. Therefore, it has the advantage that the calculation of the step sizes at each iteration is avoided. The complexity result shows that the full-Newton step infeasible interior-point algorithm based on the simple kernel function enjoys the best-known iteration complexity for P∗(κ)-HLCPs.

    Related Articles | Metrics | Comments0
    Approximation Algorithms for Stochastic Combinatorial Optimization Problems
    Jian Li· Yu Liu
    Journal of the Operations Research Society of China    2016, 4 (1): 1-.   DOI: 10.1007/s40305-015-0116-9
    Abstract15809)      PDF       Save

    Stochastic optimization has established itself as a major method to handle uncertainty in various optimization problems by modeling the uncertainty by a probability distribution over possible realizations. Traditionally, the main focus in stochastic optimization has been various stochastic mathematical programming (such as linear programming, convex programming). In recent years, there has been a surge of interest in stochastic combinatorial optimization problems from the theoretical computer science community. In this article, we survey some of the recent results on various stochastic versions of classical combinatorial optimization problems. Since most problems in this domain are NP-hard (or #P-hard, or even PSPACE-hard), we focus on the results which provide polynomial time approximation algorithms with provable approximation guarantees. Our discussions are centered around a few representative problems, such as stochastic knapsack, stochastic matching, multi-armed bandit etc. We use these examples to introduce several popular stochastic models, such as the fixed-set model, 2-stage stochastic optimization model, stochastic adaptive probing model etc, as well as some useful techniques for designing approximation algorithms for stochastic combinatorial optimization problems, including the linear programming relaxation approach, boosted sampling, content resolution schemes, Poisson approximation etc.We also provide some open research questions along the way. Our purpose is to provide readers a quick glimpse to the models, problems, and techniques in this area, and hopefully inspire new contributions .

    Related Articles | Metrics | Comments0
    Cited: Baidu(4)
    Chain-to-Chain Competition Under Demand Uncertainty
    Owen Q.Wu ·Hong Chen
    Journal of the Operations Research Society of China    2016, 4 (1): 49-.   DOI: 10.1007/s40305-015-0114-y
    Abstract8967)      PDF       Save

    In this paper, we aim to study the structure choice of supply chains under competitive environment with uncertain demand. We consider two competing supply chains, each of which chooses to either vertically integrate or decentralize with coordinating contracts.We first analyze firms’ strategic behavior under given supply chain structures: two integrated chains (II), two decentralized chains (DD), and a mixed structure with one decentralized chain and one integrated chain. We then compare different supply chain structures and examine the equilibrium structure choice. We find that the equilibrium structure depends on the product characteristics. For substitutable products, DD is the equilibrium supply chain structure choice, whereas for complementary products, II is the equilibrium structure. Furthermore, a high demand uncertainty strengthens these equilibrium choices.

    Related Articles | Metrics | Comments0
    Cited: Baidu(89)
    New Bounds for RIC in Compressed Sensing
    Sheng-Long Zhou · Ling-Chen Kong · Nai-Hua Xiu
    Journal of the Operations Research Society of China    2013, 1 (2): 227-.   DOI: DOI10.1007/s40305-013-0013-z
    Abstract231)      PDF(pc) (3317KB)(401)       Save

    This paper gives new bounds for restricted isometry constant (RIC) in compressed
    sensing. Let Φ be an m×n real matrix and k be a positive integer with k  n.
    The main results of this paper show that if the restricted isometry constant of Φ satisfies
    δ8ak < 1 and some other conditions
    , then k-sparse solution can be recovered exactly via l1 minimization in
    the noiseless case. In particular, when a = 1, 1.5, 2 and 3, we have δ2k < 0.5746 and
    δ8k < 1, or δ2.5k < 0.7046 and δ12k < 1, or δ3k < 0.7731 and δ16k < 1 or δ4k < 0.8445
    and δ24k < 1.

    Related Articles | Metrics | Comments0
    Cited: Baidu(25)
    A New Infeasible-Interior-Point Algorithm Based on Wide Neighborhoods for Symmetric Cone Programming
    Chang-He Liu,Dan Wu,You-Lin Shang
    Journal of the Operations Research Society of China    2016, 4 (2): 147-.   DOI: DOI10.1007/s40305-016-0118-2
    Abstract329)      PDF(pc) (509KB)(189)       Save

    In this paper, we present an infeasible-interior-point algorithm, based on a new wide neighborhood for symmetric cone programming. We treat the classical Newton direction as the sum of two other directions, and equip them with different step sizes.We prove the complexity bound of the new algorithm for the Nesterov-Todd (NT) direction, and the xs and sx directions. The complexity bounds obtained here are the same as small neighborhood infeasible-interior-point algorithms over symmetric cones.

    Related Articles | Metrics | Comments0
    Cited: Baidu(1)
    An Efficient Inexact Newton-CG Algorithm for the Smallest Enclosing Ball Problem of Large Dimensions
    Ya-Feng Liu, Rui Diao,Feng Ye,Hong-Wei Liu
    Journal of the Operations Research Society of China    2016, 4 (2): 167-.   DOI: DOI10.1007/s40305-015-0097-8
    Abstract532)      PDF       Save

    In this paper, we consider the problem of computing the smallest enclosing ball (SEB) of a set of m balls in Rn ,where the product mn is large. We first approximate the non-differentiable SEB problem by its log-exponential aggregation function and then propose a computationally efficient inexact Newton-CG algorithm for the smoothing approximation problem by exploiting its special (approximate) sparsity structure. The key difference between the proposed inexact Newton-CG algorithm and the classical Newton-CG algorithm is that the gradient and the Hessian-vector product are inexactly computed in the proposed algorithm, which makes it capable of solving the large-scale SEB problem. We give an adaptive criterion of inexactly computing the gradient/Hessian and establish global convergence of the proposed algorithm.We illustrate the efficiency of the proposed algorithm by using the classical Newton-CG algorithm as well as the algorithm from Zhou et al. (Comput Optim Appl 30:147–160, 2005) as benchmarks.

    Related Articles | Metrics | Comments0
    Journal of the Operations Research Society of China
    Ya-XiangYuan
    Journal of the Operations Research Society of China    2013, 1 (1): 1-.  
    Abstract258)      PDF(pc) (122KB)(135)       Save
    Related Articles | Metrics | Comments0
    Cited: Baidu(2)
    An Examination of Some Factory Physics Principles
    Hong Chen,Heng-Qing Ye
    Journal of the Operations Research Society of China    2016, 4 (2): 131-.   DOI: 10.1007/s40305-015-0115-x
    Abstract594)      PDF       Save

    In this paper, we examine some principles in managing manufacturing systems. These principles are concerned with the variability, the utilization, the rework, the lead time, and the constant work-in-process efficiency. While these principles are developed through analyzing some simpler disconnected flow line manufacturing systems, we examine whether they can have broad applications. For some of these principles, we provide sufficient conditions, while for others, we provide counterexamples. Our analysis suggests that we should be very cautious about these laws when applied to non-Markov and non-tandem systems.

    Related Articles | Metrics | Comments0
    Transportation Problem with Multi-choice Cost and Demand and Stochastic Supply
    Sankar Kumar Roy
    Journal of the Operations Research Society of China    2016, 4 (2): 193-.   DOI: DOI10.1007/s40305-016-0125-3
    Abstract413)      PDF       Save

    This paper analyzes the multi-choice stochastic transportation problem where the cost coefficients of the objective function and the demand parameters of the constraints follow multi-choice parameters. Assume that the supply parameters of the constraints in a transportation problem (TP) follow logistic distribution. The main objective of this paper is to select an appropriate choice from the multi-choices for the cost coefficients of the objective function and the demand of the constraints in the TP by introducing Lagrange’s interpolating polynomial in such a way that the total cost is minimized and satisfies the required demand. Using stochastic programming, the stochastic supply constraints of the TP are transformed into deterministic constraints. Finally, a non-linear deterministic model is formulated. Using Lingo software, the optimal solution of the proposed problem is derived. To illustrate the methodology, a real-life problem on the TP is considered.

    Related Articles | Metrics | Comments0
    Cited: Baidu(1)
    A Cone Constrained Convex Program: Structure and Algorithms
    Li-qun Qi ·Yi Xu ·Ya-Xiang Yuan ·Xin-Zhen Zhang
    Journal of the Operations Research Society of China    2013, 1 (1): 37-.  
    Abstract256)      PDF(pc) (560KB)(115)       Save
    In this paper, we consider the positive semi-definite space tensor cone constrained convex program, its structure and algorithms. We study defining functions, defining sequences and polyhedral outer approximations for this positive semidefinite space tensor cone, give an error bound for the polyhedral outer approximation approach, and thus establish convergence of three polyhedral outer approximation algorithms for solving this problem. We then study some other approaches for solving this structured convex program. These include the conic linear programming approach, the nonsmooth convex program approach and the bi-level program approach. Some numerical examples are presented.
    Related Articles | Metrics | Comments0
    Cited: Baidu(11)
    General Schemes of Iterative Optimization with Applications to Optimal Control Problems
    Oles Vladimirovich Fesko,Vladimir Iosifovich Gurman
    Journal of the Operations Research Society of China    2016, 4 (2): 223-.   DOI: DOI10.1007/s40305-015-0102-2
    Abstract303)      PDF       Save

    A general (abstract) scheme of iterative improvement and optimization on the base of extension, localization principles which would help to generate new concrete methods and algorithms for new problems is proposed. Application to optimal control problems for continuous systems is considered. Visual example is given.

    Related Articles | Metrics | Comments0
    Cited: Baidu(3)
    Recent Advances in Mathematical Programming with Semi-continuous Variables and Cardinality Constraint
    Xiao-Ling Sun · Xiao-Jin Zheng · Duan Li
    Journal of the Operations Research Society of China    2013, 1 (1): 55-.  
    Abstract472)      PDF(pc) (742KB)(302)       Save
    Mathematical programming problems with semi-continuous variables and cardinality constraint have many applications, including production planning, portfolio selection, compressed sensing and subset selection in regression. This class of problems can be modeled as mixed-integer programs with special structures and are in general NP-hard. In the past few years, based on new reformulations, approximation and relaxation techniques, promising exact and approximate methods have been developed. We survey in this paper these recent developments for this challenging class of mathematical programming problems.
    Related Articles | Metrics | Comments0
    Cited: Baidu(21)
    Approximation Algorithms for Discrete Polynomial Optimization
    Si-Mai He · Zhe-Ning Li · Shu-Zhong Zhang
    Journal of the Operations Research Society of China    2013, 1 (1): 3-.  
    Abstract436)      PDF(pc) (1021KB)(479)       Save
    In this paper, we consider approximation algorithms for optimizing a generic multivariate polynomial function in discrete (typically binary) variables. Such models have natural applications in graph theory, neural networks, error-correcting codes, among many others. In particular, we focus on three types of optimization models: (1) maximizing a homogeneous polynomial function in binary variables; (2) maximizing a homogeneous polynomial function in binary variables, mixed with variables under spherical constraints; (3) maximizing an inhomogeneous polynomial function in binary variables. We propose polynomial-time randomized approximation algorithms for such polynomial optimization models, and establish the approximation ratios (or relative approximation ratios whenever appropriate) for the proposed algorithms. Some examples of applications for these models and algorithms are discussed as well.
    Related Articles | Metrics | Comments0
    Cited: Baidu(24)
    Semidefinite Relaxation for Two Mixed Binary Quadratically Constrained Quadratic Programs: Algorithms and Approximation Bounds
    Zi Xu, Ming-Yi Hong
    Journal of the Operations Research Society of China    2016, 4 (2): 205-.   DOI: DOI10.1007/s40305-015-0082-2
    Abstract342)      PDF       Save

    This paper develops new semidefinite programming (SDP) relaxation techniques for two classes of mixed binary quadratically constrained quadratic programs and analyzes their approximation performance. The first class of problems finds two minimum norm vectors in N-dimensional real or complex Euclidean space, such that M out of 2M concave quadratic constraints are satisfied. By employing a special randomized rounding procedure, we show that the ratio between the norm of the optimal
    solution of this model and its SDP relaxation is upper bounded by 54M2/ π in the real case and by 2√4M/π in the complex case. The second class of problems finds a series of minimum norm vectors subject to a set of quadratic constraints and cardinality constraints with both binary and continuous variables. We show that in this case the approximation ratio is also bounded and independent of problem dimension for both the real and the complex cases.

    Related Articles | Metrics | Comments0
    Cited: Baidu(2)
    Theory of Compressive Sensing via 1_1nimization: a Non-RIP Analysis and Extensions
    Yin Zhang
    Journal of the Operations Research Society of China    2013, 1 (1): 79-.  
    Abstract296)      PDF       Save
    Compressive sensing (CS) is an emerging methodology in computational signal processing that has recently attracted intensive research activities. At present, the basic CS theory includes recoverability and stability: the former quantifies the central fact that a sparse signal of length n can be exactly recovered from far fewer than n measurements via 1-minimization or other recovery techniques, while the latter specifies the stability of a recovery technique in the presence of measurement errors and inexact sparsity. So far, most analyses in CS rely heavily on the Restricted Isometry Property (RIP) for matrices. In this paper, we present an alternative, non-RIP analysis for CS via 1-minimization. Our purpose is three-fold: (a) to introduce an elementary and RIP-free treatment of the basic CS theory; (b) to extend the current recoverability and stability results so that prior knowledge can be utilized to enhance recovery via 1-minimization; and (c) to substantiate a property called uniform recoverability of 1-minimization; that is, for almost all random measurement matrices recoverability is asymptotically identical. With the aid of two classic results, the non-RIP approach enables us to quickly derive from scratch all basic results for the extended theory.
    Related Articles | Metrics | Comments0
    Robust PCA for Ground Moving Target Indication in Wide-Area Surveillance Radar System
    Qing-Na Li · He Yan · Le-Qin Wu · Robert Wang
    Journal of the Operations Research Society of China    2013, 1 (1): 135-.  
    Abstract217)      PDF       Save
    Robust PCA has found important applications in many areas, such as video surveillance, face recognition, latent semantic indexing and so on. In this paper, we study its application in ground moving target indication (GMTI) in wide-area surveillance radar system. MTI is the key task in wide-area surveillance radar system. Due to its great importance in future reconnaissance systems, it attracts great interest from scientists. In (Yan et al. in IEEE Geosci. Remote Sens. Lett., 10:617–621, 2013), the authors first introduced robust PCA to model the GMTI problem, and demonstrate promising simulation results to verify the advantages over other models. However, the robust PCA model can not fully describe the problem. As pointed out in (Yan et al. in IEEE Geosci. Remote Sens. Lett., 10:617–621, 2013), due to the special structure of the sparse matrix (which includes the moving target information), there will be difficulties for the exact extraction of moving targets. This motivates our work in this paper where we will detail the GMTI problem, explore the mathematical properties and discuss how to set up better models to solve the problem. We propose two models, the structured RPCA model and the row-modulus RPCA model, both of which will better fit the problem and take more use of the special structure of the sparse matrix. Simulation results confirm the improvement of the proposed models over the one in (Yan et al. in IEEE Geosci. Remote Sens. Lett., 10:617–621, 2013).
    Related Articles | Metrics | Comments0
    Cited: Baidu(1)
    A Counter-Example to a Conjecture of Ben-Tal, Nemirovski and Roos
    Ya-Xiang Yuan
    Journal of the Operations Research Society of China    2013, 1 (1): 155-.  
    Abstract223)      PDF       Save
    In this short note, we present a counter-example to a conjecture made by Ben-Tal et al. in SIAM J. Optim. 13: 535–560, 2002.
    Related Articles | Metrics | Comments0
    Cited: Baidu(2)