ORF 307: Lecture 14. Linear Programming: Chapter 14: Network Flows: Algorithms

Similar documents
ORF 307 Network Flows: Algorithms

Iterative Deletion Routing Algorithm

Heuristic Search & Local Search

Algorithms, Lecture 3 on NP : Nondeterministic Polynomial Time

Part I: Graph Coloring

Post-Routing Layer Assignment for Double Patterning

Route optimization using Hungarian method combined with Dijkstra's in home health care services

Yale University Department of Computer Science

An Experimental Comparison of Fast Algorithms for Drawing General Large Graphs

Chapter 12. Synchronous Circuits. Contents

Chapter 2 An Abbreviated Survey

Modbus Register Tables for SITRANS RD300 & WI100

ABSTRACT. Figure 1. Continuous, 3-note, OP-Space (Mod-12) (Tymoczko 2011, fig )

Real-Time Systems Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Adaptive decoding of convolutional codes

Investigation on Technical Feasibility of Stronger RS FEC for 400GbE

VISSIM TUTORIALS This document includes tutorials that provide help in using VISSIM to accomplish the six tasks listed in the table below.

FUNDAMENTAL MANUFACTURING PROCESSES Computer Numerical Control

Analysis of Different Pseudo Noise Sequences

EE 200 Problem Set 3 Cover Sheet Fall 2015

A High- Speed LFSR Design by the Application of Sample Period Reduction Technique for BCH Encoder

Brian Holden Kandou Bus, S.A. IEEE GE Study Group September 2, 2013 York, United Kingdom

Decision-Maker Preference Modeling in Interactive Multiobjective Optimization

Section 2.1 How Do We Measure Speed?

Problem 1 - Protoss. bul. Alexander Malinov 33., Sofia, 1729, Bulgaria academy.telerik.com

Experiment: Real Forces acting on a Falling Body

Business Intelligence & Process Modelling

Scanning Electron Microscopy (FEI Versa 3D Dual Beam)

On the Infinity of Primes of the Form 2x 2 1

Reverb 8. English Manual Applies to System 6000 firmware version TC Icon version Last manual update:

An optimal broadcasting protocol for mobile video-on-demand

Total Minimal Dominating Signed Graph

Musical Sound: A Mathematical Approach to Timbre

QCN Transience and Equilibrium: Response and Stability. Abdul Kabbani, Rong Pan, Balaji Prabhakar and Mick Seaman

Logic Design II (17.342) Spring Lecture Outline

Comment #147, #169: Problems of high DFE coefficients

OPERATIONS SEQUENCING IN A CABLE ASSEMBLY SHOP

base calling: PHRED...

Connection for filtered air

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

2. ctifile,s,h, CALDB,,, ACIS CTI ARD file (NONE none CALDB <filename>)

Series Digital Dimmer. User Manual (VER: 2.0) Net.DO LIGHTING CONTROL EQUIPMENT CO.,LTD

Exploring Persian Rug Design Using a Computational Evolutionary Approach

NanoGiant Oscilloscope/Function-Generator Program. Getting Started

Power-Driven Flip-Flop p Merging and Relocation. Shao-Huan Wang Yu-Yi Liang Tien-Yu Kuo Wai-Kei Tsing Hua University

Figure 9.1: A clock signal.

Cost-Aware Live Migration of Services in the Cloud

Musical Acoustics Lecture 16 Interval, Scales, Tuning and Temperament - I

Chapter 18: Supplementary Formal Material

EN2911X: Reconfigurable Computing Topic 01: Programmable Logic. Prof. Sherief Reda School of Engineering, Brown University Fall 2014

A STATISTICAL VIEW ON THE EXPRESSIVE TIMING OF PIANO ROLLED CHORDS

Mitigation of Cascading Outages and Prevention of Blackouts:System-Wide Corrective Control

CHAPTER I BASIC CONCEPTS

AskDrCallahan Calculus 1 Teacher s Guide

Jazz Melody Generation from Recurrent Network Learning of Several Human Melodies

Overview. Teacher s Manual and reproductions of student worksheets to support the following lesson objective:

1360 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH Optimal Encoding for Discrete Degraded Broadcast Channels

Asynchronous IC Interconnect Network Design and Implementation Using a Standard ASIC Flow

data and is used in digital networks and storage devices. CRC s are easy to implement in binary

Negation Switching Equivalence in Signed Graphs

Processing data with Mestrelab Mnova

Keywords Xilinx ISE, LUT, FIR System, SDR, Spectrum- Sensing, FPGA, Memory- optimization, A-OMS LUT.

Research on sampling of vibration signals based on compressed sensing

Student resource files

Color Image Compression Using Colorization Based On Coding Technique

Efficient Trace Signal Selection for Post Silicon Validation and Debug

Advanced Devices. Registers Counters Multiplexers Decoders Adders. CSC258 Lecture Slides Steve Engels, 2006 Slide 1 of 20

Table of contents: All understand Piano - Key Center (Most of this workbook is a review, the goal is to totally understand key center)

Embedded Signal Processing with the Micro Signal Architecture

Revelation Principle; Quasilinear Utility

Fast Quadrature Decode TPU Function (FQD)

If you have questions or problems in providing anything described as Customer

Algorithmic Composition: The Music of Mathematics

For an alphabet, we can make do with just { s, 0, 1 }, in which for typographic simplicity, s stands for the blank space.

ARC-MFSAT INSTALLATION MANUAL

Xpress-Tuner User guide

Module 8 : Numerical Relaying I : Fundamentals

Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR

AutoChorale An Automatic Music Generator. Jack Mi, Zhengtao Jin

Linear programming is a quantitative technique that can optimally allocate

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

Using Scan Side Channel to Detect IP Theft

Area-efficient high-throughput parallel scramblers using generalized algorithms

EDL8 Race Dash Manual Engine Management Systems

Cable Calibration Function for the 2400B/C and 2500A/B Series Microwave Signal Generators. Technical Brief

Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill

MindMouse. This project is written in C++ and uses the following Libraries: LibSvm, kissfft, BOOST File System, and Emotiv Research Edition SDK.

Good afternoon! My name is Swetha Mettala Gilla you can call me Swetha.

Comprehensive Citation Index for Research Networks

140 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 12, NO. 2, FEBRUARY 2004

Fugue generation using genetic algorithms

DISTRIBUTION STATEMENT A 7001Ö

Week 14 Music Understanding and Classification

CSC 373: Algorithm Design and Analysis Lecture 17

Lecture 9 Source Separation

A QUARTERLY OF ART AND CULTURE ISSUE 57 CATASTROPHE US $12 CANADA $12 UK 7

Keysight Technologies De-Embedding and Embedding S-Parameter Networks Using a Vector Network Analyzer. Application Note

Cedar Rapids Community School District

Basic Information for MAT194F Calculus Engineering Science 2004

ORTHOGONAL frequency division multiplexing

Transcription:

ORF 307: Lecture 14 Linear Programming: Chapter 14: Network Flows: Algorithms Robert J. Vanderbei April 16, 2014 Slides last edited on April 16, 2014 http://www.princeton.edu/ rvdb

Agenda Primal Network Simplex Method Dual Network Simplex Method Two-Phase Network Simplex Method One-Phase Primal-Dual Network Simplex Method Planar Graphs Integrality Theorem

Primal Network Simplex Method Used when all primal flows are nonnegative (i.e., primal feasible). Pivot Rules: Entering arc: Pick a nontree arc having a negative (i.e. infeasible) dual slack. Entering arc: (g,e) Leaving arc: (g,d) Leaving arc: Add entering arc to make a cycle. Leaving arc is an arc on the cycle, pointing in the opposite direction to the entering arc, and of all such arcs, it is the one with the smallest primal flow.

Primal Method Second Pivot Entering arc: (d,e) Leaving arc: (d,a) Explanation of leaving arc rule: Increase flow on (d,e). Each unit increase produces a unit increase on arcs pointing in the same direction. Each unit increase produces a unit decrease on arcs pointing in the opposite direction. The first to reach zero will be the one pointing in the opposite direction and having the smallest flow among all such arcs.

Primal Method Third Pivot Entering arc: (c,g) Leaving arc: (c,e) Optimal!

Dual Network Simplex Method Used when all dual slacks are nonnegative (i.e., dual feasible). Pivot Rules: Leaving arc: Pick a tree arc having a negative (i.e. infeasible) primal flow. Leaving arc: (g,a) Entering arc: (d,e) Entering arc: Remove leaving arc to split the spanning tree into two subtrees. Entering arc is an arc reconnecting the spanning tree with an arc in the opposite direction, and, of all such arcs, is the one with the smallest dual slack.

Dual Network Simplex Method Second Pivot Leaving arc: (d,a) Entering arc: (b,c) Optimal!

Explanation of Entering Arc Rule Recall initial tree solution: Leaving arc: (g,a) Entering arc: (d,e) Remove leaving arc. Need to find a reconnecting arc. Since the leaving arc has a negative flow, there is a net supply at the subtree attached to the head node and a net demand at the subtree attached to the tail node. So, reconnecting with an arc that spans in the same direction does not improve anything. Hence, only consider arcs spanning the two subtrees in the opposite direction. Consider a potential arc reconnecting in the opposite direction, say (b,c). Its dual slack will drop to zero. All other reconnecting arcs pointing in the same direction will drop by the same amount. To maintain nonnegativity of all the others, must pick the one that drops the least.

Two-Phase Network Simplex Method Example. Turn off display of dual slacks. Turn on display of artificial dual slacks.

Two-Phase Method First Pivot Use dual network simplex method. Leaving arc: (d,e) Entering arc: (e,f) Primal Feasible!

Two-Phase Method Phase II Turn off display of artificial dual slacks. Turn on display of dual slacks.

Two-Phase Method Second Pivot Entering arc: (g,b) Leaving arc: (g,f)

Two-Phase Method Third Pivot Entering arc: (f,c) Leaving arc: (f,a) Optimal!

Online Network Simplex Pivot Tool Click here (or on any displayed network) to try out the online network simplex pivot tool.

One-Phase Primal-Dual Method Artificial flows and slacks are multiplied by a parameter µ. In the Figure, 6, 1 represents 6 + 1µ. Question: For which µ values is dictionary optimal? Answer: 1 + µ 0 (a, b) µ 0 (f, b) 2 + µ 0 (a, c) 20 + µ 0 (c, e) µ 0 (a, d) 1 + µ 0 (f, c) µ 0 (e, a) 9 + µ 0 (g, d) 3 + µ 0 (a, g) 12 + µ 0 (f, e) µ 0 (b, c) 6 + µ 0 (g, e) 3 + µ 0 (b, d) That is, 9 µ <. Lower bound on µ is generated by arc (g,d). Therefore, (g,d) enters. Arc (a,d) leaves.

Second Iteration Range of µ values: 2 µ 9. Entering arc: (a,c) Leaving arc: (b,c) New tree:

Third Iteration Range of µ values: 1.5 µ 2. Leaving arc: (a,g) Entering arc: (g,e) New tree:

Fourth Iteration Range of µ values: 1 µ 1.5. A tie: Arc (f,b) enters, or Arc (f,c) leaves. Decide arbitrarily: Leaving arc: (f,c) Entering arc: (f,b)

Fifth Iteration Range of µ values: 1 µ 1. Leaving arc: (f,b) Nothing to Enter. Primal Infeasible!

Online Network Simplex Pivot Tool Click here (or on any displayed network) to try out the online network simplex pivot tool.

Planar Networks A Definition. Network is called planar if can be drawn on a plane without intersecting arcs. Theorem. Every planar network has a geometric dual dual nodes are faces of primal network. 2 f 5 a B 5 1 4 C b -2 2 e -1 D 1 1 c 1 1 d -3 Notes: Dual node A is node at infinity. Primal spanning tree shown in red. Dual spanning tree shown in blue (don t forget node A). Theorem. A dual pivot on the primal network is exactly a primal pivot on the dual network.

Integrality Theorem Theorem. Assuming integer data, every basic feasible solution assigns integer flow to every arc. Corollary. Assuming integer data, every basic optimal solution assigns integer flow to every arc.