Browsing by Subject "Computational complexity"
Now showing 1 - 20 of 88
- Results Per Page
- Sort Options
Item Open Access An analysis of heuristics in a dynamic job shop with weighted tardiness objectives(Taylor & Francis, 1999) Kutanoglu, E.; Sabuncuoğlu, İ.Meeting due dates as a reflection of customer satisfaction is one of the scheduling criteria that is frequently encountered in today's manufacturing environments. The natural quantification of this qualitative goal involves tardiness related measures. In this study, we consider the dynamic job shop scheduling problem with the weighted tardiness criterion. After we present a comprehensive literature survey on the topic, we measure the long-run performances of more than 20 single-pass dispatching rules under various experimental conditions. In this study, we pay special attention to recently proposed dispatching heuristics such as CEXSPT, CR+ SPT, S/RPT+ SPT, and Bottleneck Dynamics (BD). We also investigate the effects of six resource pricing schemes proposed recently for BD. Moreover, we extend the earlier versions of inserted idleness and identify the conditions in which these techniques can be applied without incurring too much computational cost. Future research directions are also outlined in light of the computational results. © 1999 Taylor & Francis Ltd.Item Open Access AoII-optimum sampling of CTMC information sources under sampling rate constraints(IEEE, 2024) Cosanda, Ismail; Akar, Nail; Ulukus, SennurWe consider a sensor that samples an $N-\mathbf{state}$ continuous-time Markov chain (CTMC)-based information source process, and transmits the observed state of the source, to a remote monitor tasked with timely tracking of the source process. The mismatch between the source and monitor processes is quantified by age of incorrect information (AoII), which penalizes the mismatch as it stays longer, and our objective is to minimize the average AoII under an average sampling rate constraint. We assume a perfect reverse channel and hence the sensor has information of the estimate while initiating a transmission or preempting an ongoing transmission. First, by modeling the problem as an average cost constrained semi-Markov decision process (CSMDP), we show that the structure of the problem gives rise to an optimum threshold policy for which the sensor initiates a transmission once the AoII exceeds a threshold depending on the instantaneous values of both the source and monitor processes. However, due to the high complexity of obtaining the optimum policy in this general setting, we consider a relaxed problem where the thresholds are allowed to be dependent only on the estimate. We show that this relaxed problem can be solved with a novel CSMDP formulation based on the theory of absorbing MCs, with a computational complexity of $\mathcal{O}(N^{4})$, allowing one to obtain optimum policies for general CTMCs with over a hundred states.Item Open Access Applications of hybrid discrete Fourier transform moment method to the fast analysis of large rectangular dipole arrays printed on a thin grounded dielectric substrate(Wiley, 2002) Chou, H.-T.; Ho, H.-K.; Civi, O. A.; Erturk, V. B.Recently a discrete Fourier transform-method of moments (DFT-MoM) scheme was developed for fast analysis of electrically large rectangular planar dipole arrays, which has been shown to be very efficient in terms of number reduction of unknown variables and computational complexity. The applications of this DFT-MoM to treat dipole arrays printed on a grounded dielectric substrate are examined in this Letter. Numerical results are presented to validate its efficiency and accuracy.Item Open Access An approximation algorithm for computing the visibility region of a point on a terrain and visibility testing(IEEE, 2014-01) Alipour, S.; Ghodsi, M.; Güdükbay, Uğur; Golkari, M.Given a terrain and a query point p on or above it, we want to count the number of triangles of terrain that are visible from p. We present an approximation algorithm to solve this problem. We implement the algorithm and then we run it on the real data sets. The experimental results show that our approximation solution is very close to the real solution and compare to the other similar works, the running time of our algorithm is better than their algorithm. The analysis of time complexity of algorithm is also presented. Also, we consider visibility testing problem, where the goal is to test whether p and a given triangle of train are visible or not. We propose an algorithm for this problem and show that the average running time of this algorithm will be the same as running time of the case where we want to test the visibility between two query point p and q.Item Open Access Are stock prices too volatile to be justified by the dividend discount model?(Elsevier, 2007) Akdeniz, L.; Salih, A. A.; Ok, S. T.This study investigates excess stock price volatility using the variance bound framework of LeRoy and Porter [The present-value relation: tests based on implied variance bounds, Econometrica 49 (1981) 555-574] and of Shiller [Do stock prices move too much to be justified by subsequent changes in dividends? Am. Econ. Rev. 71 (1981) 421-436.]. The conditional variance bound relationship is examined using cross-sectional data simulated from the general equilibrium asset pricing model of Brock [Asset prices in a production economy, in: J.J. McCall (Ed.), The Economics of Information and Uncertainty, University of Chicago Press, Chicago (for N.B.E.R.), 1982]. Results show that the conditional variance bounds hold, hence, our hypothesis of the validity of the dividend discount model cannot be rejected. Moreover, in our setting, markets are efficient and stock prices are neither affected by herd psychology nor by the outcome of noise trading by naive investors; thus, we are able to control for market efficiency. Consequently, we show that one cannot infer any conclusions about market efficiency from the unconditional variance bounds tests.Item Open Access Assembly line balancing using genetic algorithms(Kluwer Academic Publishers, 2000) Sabuncuoğlu İ.; Erel, E.; Tanyer, M.Assembly Line Balancing (ALB) is one of the important problems of production/operations management area. As small improvements in the performance of the system can lead to significant monetary consequences, it is of utmost importance to develop practical solution procedures that yield high-quality design decisions with minimal computational requirements. Due to the NP-hard nature of the ALB problem, heuristics are generally used to solve real life problems. In this paper, we propose an efficient heuristic to solve the deterministic and single-model ALB problem. The proposed heuristic is a Genetic Algorithm (GA) with a special chromosome structure that is partitioned dynamically through the evolution process. Elitism is also implemented in the model by using some concepts of Simulated Annealing (SA). In this context, the proposed approach can be viewed as a unified framework which combines several new concepts of AI in the algorithmic design. Our computational experiments with the proposed algorithm indicate that it outperforms the existing heuristics on several test problems.Item Open Access Asymptotically optimal contextual bandit algorithm using hierarchical structures(Institute of Electrical and Electronics Engineers, 2018) Neyshabouri, Mohammadreza Mohaghegh; Gökçesu, Kaan; Gökçesu, Hakan; Özkan, Hüseyin; Kozat, Süleyman SerdarWe propose an online algorithm for sequential learning in the contextual multiarmed bandit setting. Our approach is to partition the context space and, then, optimally combine all of the possible mappings between the partition regions and the set of bandit arms in a data-driven manner. We show that in our approach, the best mapping is able to approximate the best arm selection policy to any desired degree under mild Lipschitz conditions. Therefore, we design our algorithm based on the optimal adaptive combination and asymptotically achieve the performance of the best mapping as well as the best arm selection policy. This optimality is also guaranteed to hold even in adversarial environments since we do not rely on any statistical assumptions regarding the contexts or the loss of the bandit arms. Moreover, we design an efficient implementation for our algorithm using various hierarchical partitioning structures, such as lexicographical or arbitrary position splitting and binary trees (BTs) (and several other partitioning examples). For instance, in the case of BT partitioning, the computational complexity is only log-linear in the number of regions in the finest partition. In conclusion, we provide significant performance improvements by introducing upper bounds (with respect to the best arm selection policy) that are mathematically proven to vanish in the average loss per round sense at a faster rate compared to the state of the art. Our experimental work extensively covers various scenarios ranging from bandit settings to multiclass classification with real and synthetic data. In these experiments, we show that our algorithm is highly superior to the state-of-the-art techniques while maintaining the introduced mathematical guarantees and a computationally decent scalability. IEEEItem Open Access Automated detection and enhancement of microcalcifications in mammograms using nonlinear subband decomposition(IEEE, 1997) Ansari, R.; Gürcan, M. Nafi; Yardımcı, Yasemin; Çetin, A. EnisIn this paper, computer-aided detection and enhancement of microcalcifications in mammogram images are considered. The mammogram image is first decomposed into subimages using a `subband' decomposition filter bank which uses nonlinear filters. A suitably identified subimage is divided into overlapping square regions in which skewness and kurtosis as measures of the asymmetry and impulsiveness of the distribution are estimated. All regions with high positive skewness and kurtosis are marked as a regions of interest. Next, an outlier labeling method is used to find the locations of microcalcifications in these regions. An enhanced mammogram image is also obtained by emphasizing the microcalcification locations. Linear and nonlinear subband decomposition structures are compared in terms of their effectiveness in finding microcalcificated regions and their computational complexity. Simulation studies based on real mammogram images are presented.Item Open Access Clutter detection algorithms for airborne pulse-Doppler radar(IEEE, 2010) Güngör, Ahmet; Gezici, SinanClutter detection is an important stage of target detection. Clutter may not always appear around zero Doppler frequency when realistic terrain models and moving platforms are considered. Two algorithms developed for clutter detection using range-Doppler matrix elements and their performance analysis are presented in this paper. The first algorithm has higher error rates but lower computational complexity whereas the second one has lower error rates but higher computational complexity. The algorithms detect clutter position by filtering range-Doppler matrix elements via non-linear filters. ©2010 IEEE.Item Open Access A comparative study of computational procedures for the resource constrained project scheduling problem(Elsevier, 1994) Oğuz, O.; Bala, H.Performance of two new integer programming based heuristics together with some special purpose algorithms for project scheduling are tested from a computational point of view. The objective of the study is to compare the quality of solutions obtained by using these algorithms and reach conclusions about their relative merits on this specific problem. © 1994.Item Open Access A comparison of historical relational query languages(ASME, 1994-07) Tansel, Abdullah Uz; Tin, E.We introduce a historical relational data model in which N1NF relations are used and 1-level of nesting is allowed. Attributes can either be atomic or temporal atom. An atomic attribute represents a time invariant attribute. A temporal atom consists of two components, a value and a temporal set, which is a set of times denoting the validity period of the value. We define a relational tuple calculus for this model. We follow a comparative approach towards completeness of historical query languages.Item Open Access Comparison of local and global computation and its implications for the role of optical interconnections in future nanoelectronic systems(Elsevier, 1993) Özaktaş, Haldun M.; Goodman J. W.Various methods of simulating diffusion phenomena with parallel hardware are discussed. In particular methods are compared requiring local and global communication among the processors in terms of total computation time. Systolic convolution on a locally connected array is seen to exhibit an asymptotic advantage over Fourier methods on a globally connected array. Whereas this may translate into a numerical advantage for extremely large numbers of ultrafast devices for two-dimensional systems, this is unlikely for three-dimensional systems. Thus global Fourier methods will be advantageous for three-dimensional systems for foreseeable device speeds and system sizes. The fact that optical interconnections are potentially advantageous for implementing the longer connections of such globally connected systems suggests that they can be beneficially employed in future nanoelectronic computers. Heat removal considerations play an important role in our conclusions.Item Open Access Comparisons of FMM implementations employing different formulations and iterative solvers(IEEE, 2003-06) Gürel, Levent; Ergül, ÖzgürThe implementation of multi-level fast multipole algorithm (MLFMA) requires the consideration of several parameters. The preferred combination of the parameters given is not trivially obvious and requires a careful investigation. This paper extensively investigates such parameters by using a series of scattering problems of various sizes containing different numbers of unknowns as a testbed.Item Open Access Competitive location and pricing on a line with metric transportation costs(Elsevier, 2020-04-01) Arbib, C.; Pınar, Mustafa Ç.; Tonelli, M.Consider a three-level non-capacitated location/pricing problem: a firm first decides which facilities to open, out of a finite set of candidate sites, and sets service prices with the aim of revenue maximization; then a second firm makes the same decisions after checking competing offers; finally, customers make individual decisions trying to minimize costs that include both purchase and transportation. A restricted two-level problem can be defined to model an optimal reaction of the second firm to known decision of the first. For non-metric costs, the two-level problem corresponds to Envy-free Pricing or to a special Net- work Pricing problem, and is APX -complete even if facilities can be opened at no fixed cost. Our focus is on the metric 1-dimensional case, a model where customers are distributed on a main communica- tion road and transportation cost is proportional to distance. We describe polynomial-time algorithms that solve two- and three-level problems with opening costs and single 1 st level facility. Quite surpris- ingly, however, even the two-level problem with no opening costs becomes N P -hard when two 1 st level facilities are considered.Item Open Access Complexity of the discrete time-cost tradeoff problem for project networks(Institute for Operations Research and the Management Sciences (INFORMS), 1997) De, P.; Dunne, E. J.; Ghosh, J. B.; Wells, C. E.This note addresses the discrete version of the well-known time-cost tradeoff problem for project networks, which has been studied previously in the standard project management literature as well as in the related literature on Decision-CPM. All the algorithms proposed thus far for the solution of the general problem exhibit exponential worst-case complexity, with the notable exception of the pseudo-polynomial dynamic program due to Hindelang and Muth. We first demonstrate that this algorithm is flawed, and that when we correct it, it no longer remains pseudo-polynomial. Continuing on in the main result of the note, we show that this is not at all surprising, since the problem is strongly NP-hard. Finally, we discuss the complexities of various network structures and validate an old conjecture that certain structures are necessarily more difficult to solve.Item Open Access A complexity-reduced ML parametric signal reconstruction method(2011) Deprem, Z.; Leblebicioglu, K.; Arkan O.; Çetin, A.E.The problem of component estimation from a multicomponent signal in additive white Gaussian noise is considered. A parametric ML approach, where all components are represented as a multiplication of a polynomial amplitude and polynomial phase term, is used. The formulated optimization problem is solved via nonlinear iterative techniques and the amplitude and phase parameters for all components are reconstructed. The initial amplitude and the phase parameters are obtained via time-frequency techniques. An alternative method, which iterates amplitude and phase parameters separately, is proposed. The proposed method reduces the computational complexity and convergence time significantly. Furthermore, by using the proposed method together with Expectation Maximization (EM) approach, better reconstruction error level is obtained at low SNR. Though the proposed method reduces the computations significantly, it does not guarantee global optimum. As is known, these types of non-linear optimization algorithms converge to local minimum and do not guarantee global optimum. The global optimum is initialization dependent. © 2011 Z. Deprem et al.Item Open Access Composite regions of feasibility for certain classes of distance constrained network location problems(INFORMS, 1996) Tansel, B. Ç.; Yeşilkökçen, G. N.Distance constrained network location involves locating m new facilities on a transport network G so as to satisfy upper bounds on distances between pairs of new facilities and pairs of new and existing facilities. The problem is script N sign℘-complete in general, but polynomially solvable for certain classes. While it is possible to give a consistency characterization for these classes, it does not seem possible to give a global description of the feasible set. However, substantial geometrical insights can be obtained on the feasible set by studying its projections onto the network. The j-th projection defines the j-th composite region which is the set of all points in G at which new facility j can be feasibly placed without violating consistency. We give efficient methods to construct these regions for solvable classes without having to know the feasible set and discuss implications on consistency characterization, what if analysis, and recursive solution constructions.Item Open Access Computational aspects of the maximum diversity problem(Elsevier, 1996) Ghosh, J. B.We address two variations of the maximum diversity problem which arises when m elements are to be selected from an n-element population based on inter-element distances. We study problem complexity and propose randomized greedy heuristics. Performance of the heuristics is tested on a limited basis.Item Open Access Computationally efficient wavelet affine invariant functions for 2D object recognition(IEEE, 2003) Bala, E.; Çetin, A. EnisIn this paper, an affine invariant function is presented for object recognition from wavelet coefficients of the object boundary. In previous works, undecimated wavelet transform was used for affine invariant functions. In this paper, an algorithm based on decimated wavelet transform is developed to compute the affine invariant function. As a result, computational complexity is significantly reduced without decreasing recognition performance. Experimental results are presented.Item Open Access Computationally efficient wavelet affine invariant functions for shape recognition(IEEE, 2004) Bala, E.; Çetin, A. EnisAn affine invariant function for object recognition is constructed from wavelet coefficients of the object boundary. In previous works, undecimated dyadic wavelet transform was used to construct affine invariant functions. In this paper, an algorithm based on decimated wavelet transform is developed to compute an affine invariant function. As a result computational complexity is reduced without decreasing recognition performance. Experimental results are presented. © 2004 IEEE.