Results 1 to 10 of about 59 (59)

Evolution of group-theoretic cryptology attacks using hyper-heuristics

open access: yesJournal of Mathematical Cryptology, 2021
In previous work, we developed a single evolutionary algorithm (EA) to solve random instances of the Anshel–Anshel–Goldfeld (AAG) key exchange protocol over polycyclic groups. The EA consisted of six simple heuristics which manipulated strings.
Craven Matthew J., Woodward John R.
doaj   +1 more source

A new conjugate gradient method for acceleration of gradient descent algorithms

open access: yesMoroccan Journal of Pure and Applied Analysis, 2021
An accelerated of the steepest descent method for solving unconstrained optimization problems is presented. which propose a fundamentally different conjugate gradient method, in which the well-known parameter βk is computed by an new formula.
Rahali Noureddine   +2 more
doaj   +1 more source

Conic optimization: A survey with special focus on copositive optimization and binary quadratic problems

open access: yesEURO Journal on Computational Optimization, 2021
A conic optimization problem is a problem involving a constraint that the optimization variable be in some closed convex cone. Prominent examples are linear programs (LP), second order cone programs (SOCP), semidefinite problems (SDP), and copositive ...
Mirjam Dür, Franz Rendl
doaj   +1 more source

Decomposing tournaments into paths

open access: yesProceedings of the London Mathematical Society, Volume 121, Issue 2, Page 426-461, August 2020., 2020
Abstract We consider a generalisation of Kelly's conjecture which is due to Alspach, Mason, and Pullman from 1976. Kelly's conjecture states that every regular tournament has an edge decomposition into Hamilton cycles, and this was proved by Kühn and Osthus for large tournaments. The conjecture of Alspach, Mason, and Pullman asks for the minimum number
Allan Lo   +3 more
wiley   +1 more source

An efficient mathematical model for solving one-dimensional cutting stock problem using sustainable trim

open access: yesAdvances in Industrial and Manufacturing Engineering, 2021
The cutting process is an important stage of the industries which are dealing with cutting of small pieces from large items in such a way so that the wastage should be minimum.
Ravi Vishwakarma, P.L. Powar
doaj   +1 more source

On the rank functions of $\mathcal{H}$-matroids [PDF]

open access: yesJournal of Algebra Combinatorics Discrete Structures and Applications, 2016
The notion of $\mathcal{H}$-matroids was introduced by U. Faigle and S. Fujishige in 2009 as a general model for matroids and the greedy algorithm. They gave a characterization of $\mathcal{H}$-matroids by the greedy algorithm. In this note, we give a characterization of some $\mathcal{H}$-matroids by rank functions.
openaire   +4 more sources

Mobility offer allocations in corporate settings

open access: yesEURO Journal on Computational Optimization, 2021
Corporate mobility is often based on a fixed assignment of vehicles to employees. Relaxing this fixation and including alternatives such as public transportation or taxis for business and private trips could increase fleet utilization and foster the use ...
Sebastian Knopp   +2 more
doaj   +1 more source

Extended blocker, deletion, and contraction maps on antichains

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 2003, Issue 10, Page 607-616, 2003., 2003
Families of maps on the lattice of all antichains of a finite bounded poset that extend the blocker, deletion, and contraction maps on clutters are considered. Influence of the parameters of the maps is investigated. Order‐theoretic extensions of some principal relations for the set‐theoretic blocker, deletion, and contraction maps on clutters are ...
Andrey O. Matveev
wiley   +1 more source

A note on operators of deletion and contraction for antichains

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 31, Issue 12, Page 725-729, 2002., 2002
The operators of deletion and contraction for clutters are generalized to those for antichains of finite bounded posets. A generalization of the result by Seymour (1976), describing the relationship between the operators of deletion, contraction, and the blocker map, is considered as a comparison in the lattice of antichains of a poset.
Andrey O. Matveev
wiley   +1 more source

On blockers in bounded posets

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 26, Issue 10, Page 581-588, 2001., 2001
Antichains of a finite bounded poset are assigned antichains playing a role analogous to that played by blockers in the Boolean lattice of all subsets of a finite set. Some properties of lattices of generalized blockers are discussed.
Andrey O. Matveev
wiley   +1 more source

Home - About - Disclaimer - Privacy