The mechanism for the generalized dual problem of network programming solving

被引:1
作者
Zimin, A., V [1 ]
Burkova, I., V [2 ]
Kravets, O. Ja [3 ]
Zimin, V. V. [1 ]
机构
[1] Siberian State Ind Univ, 42 Kirova St, Novokuznetsk 654007, Russia
[2] Russian Acad Sci, VA Trapeznikov Inst Control Sci, 65 Profsoyuznaya St, Moscow 117997, Russia
[3] Voronezh State Tech Univ, 14 Moskow Ave, Voronezh 394026, Russia
来源
INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING (APITECH-2019) | 2019年 / 1399卷
关键词
PRIVACY;
D O I
10.1088/1742-6596/1399/3/033031
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The generalized dual problem (GDP) is formulated as a search task of the upper bound minimum (lower bound maximum) for the optimum obtained by solving discrete linear and nonlinear problems by the network programming method. The need for GDP solution arises when, in order to meet the applicability conditions of the method, the right side of the constraint is divided into several unknown summands. The GDP consists in finding of such a partition that ensures achievement of corresponding minimum (maximum). There is no evidence for an existence of the GDP solution for today. However, the conditions for the GDP optimum solution have been formulated. The article proposes an iterative mechanism for search solution of the generalized dual problem. This mechanism is based on the software implementation of the procedure for solving the optimization problem by means of network programming The application of the mechanism is illustrated on the developing competences task of IT services users. It was shown that the GDP solution exists and is not the only one.
引用
收藏
页数:6
相关论文
共 11 条
[1]  
[Anonymous], 2013, Game theory
[2]  
Arrow K J, 1951, SOCIAL CHOICE INDIVI, P204
[3]   MATHEMATICAL ASPECTS OF SCHEDULING THEORY [J].
BELLMAN, R .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1956, 4 (03) :168-205
[4]   A method of network programming in problems of nonlinear optimization [J].
Burkova, I. V. .
AUTOMATION AND REMOTE CONTROL, 2009, 70 (10) :1606-1612
[5]  
Fudenberg D., 1995, GAME THEORY
[6]  
Harsanyi J.C., 1967, Manag. Sci., V14, P159, DOI [10.1287/mnsc.14.3.159, DOI 10.1287/MNSC.1040.0270]
[7]  
Romansky R, 2019, INT J INF TECHNOL SE, V11, P95
[8]   Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection [J].
Romansky, Radi ;
Noninska, Irina .
INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2016, 7 (03) :89-106
[9]  
Wagner G, 1972, BASES RES OPERATIONS
[10]  
[Зимин В.В. Zimin V.V.], 2017, [Известия высших учебных заведений. Черная металлургия, Izvestiya vysshikh uchebnykh zavedenii. Chernaya metallurgiya], V60, P998, DOI 10.17073/0368-0797-2017-12-998-1004