Computing holes in semi-groups and its applications to transportation problems

نویسندگان

  • Raymond Hemmecke
  • Akimichi Takemura
  • Ruriko Yoshida
چکیده

An integer feasibility problem is a fundamental problem in many areas, such as operations research, number theory, and statistics. To study a family of systems with no nonnegative integer solution, we focus on a commutative semigroup generated by a finite set of vectors in Z and its saturation. In this paper we present an algorithm to compute an explicit description for the set of holes which is the difference of a semi-group Q generated by the vectors and its saturation. We apply our procedure to compute an infinite family of holes for the semi-group of the 3× 4× 6 transportation problem. Furthermore, we give an upper bound for the entries of the holes when the set of holes is finite. Finally, we present an algorithm to find all Q-minimal saturation points of Q.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the Reaction Delay as the Driver Effects in the Development of Car-Following Models

Car-following models, as the most popular microscopic traffic flow modeling, is increasingly being used by transportation experts to evaluate new Intelligent Transportation System (ITS) applications. A number of factors including individual differences of age, gender, and risk-taking behavior, have been found to influence car-following behavior. This paper presents a novel idea to calculate ...

متن کامل

Toward the Design of Rural Intelligent Public Transportation System Rural Public Transportation of Iran

In order to improve the level of intelligence, availability, being on demand, convenience, information and humanization of rural public transportation systems, they are more willing to use modern information and communicative technologies. In addition to management services, intelligent transportation systems can provide passengers, drivers, travel agencies and other institutions with other ser...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Proposing a Constrained-GSA for the Vehicle Routing Problem

In the past decades, vehicle routing problem (VRP) has gained considerable attention for its applications in industry, military, and transportation applications. Vehicle routing problem with simultaneous pickup and delivery is an extension of the VRP. This problem is an NP-hard problem; hence finding the best solution for this problem which is using exact method, take inappropriate time, and th...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Contributions to Discrete Mathematics

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2009