Optimization of Product Flows in Flexible Manufacturing Systems

Total Page:16

File Type:pdf, Size:1020Kb

Optimization of Product Flows in Flexible Manufacturing Systems Optimization of product flows in flexible manufacturing systems Citation for published version (APA): van Pinxten, J. H. H. (2018). Optimization of product flows in flexible manufacturing systems. Technische Universiteit Eindhoven. Document status and date: Published: 20/12/2018 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement: www.tue.nl/taverne Take down policy If you believe that this document breaches copyright please contact us at: [email protected] providing details and we will investigate your claim. Download date: 01. Oct. 2021 OWS SYSTEMS OF TION CTURING A PRODUCT FL OPTIMIZA IN FLEXIBLE MANUF AN PINXTEN V JOOST Optimization of Product Flows in Flexible Manufacturing Systems PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de rector magnificus prof.dr.ir. F.P.T. Baaijens, voor een commissie aangewezen door het College voor Promoties, in het openbaar te verdedigen op donderdag 20 december 2018 om 13:30 uur door Joost Hendrikus Hubertus van Pinxten geboren te Sint-Michielsgestel Dit proefschrift is goedgekeurd door de promotor en de samenstelling van de pro- motiecommissie is als volgt: voorzitter: prof.dr.ir. J.H. Blom 1e promotor: prof.dr.ir. T. Basten co-promotor: dr.ir. M.C.W. Geilen leden: prof.dr. Sebastian Engell (Technische Universität Dortmund) prof.dr. Frits Vaandrager (Radboud Universiteit Nijmegen) prof.dr.ir. Jeroen Voeten dr. Lou Somers Het onderzoek dat in dit proefschrift wordt beschreven is uitgevoerd in overeenstemming met de TU/e Gedragscode Wetenschapsbeoefening. Optimization of Product Flows in Flexible Manufacturing Systems J.H.H. van Pinxten Advanced School for Computing and Imaging This work was carried out in the ASCI graduate school. ASCI dissertation series number 402. This work is part of the research program Integrated Scheduling and Control with project number 12693, which is (partly) financed by the Netherlands Organisation for Scientific Research (NWO). Copyright © 2018, J.H.H. van Pinxten. All rights reserved. Reproduction in part or in whole is prohibited with- out the written consent of the copyright owner. Printed by Proefschriftmaken, The Netherlands A catalogue record is available from the Eindhoven University of Tech- nology Library. ISBN 978-94-6380-165-2 To my family and our purrito’s. Summary Optimization of Product Flows in Flexible Manufacturing Systems Wafer scanners, robotic assembly lines, and industrial printers are examples of flexible manufacturing systems (FMSs) that manufacture customized products. Wafer scanners expose silicon wafers with UV-light in a process to create com- puter chips, and industrial printers transfer digital images onto sheets of paper. Each product may have different requirements or characteristics, which can lead to different timing constraints between operations. The productivity of FMSs is limited by cyber constraints, such as the computation time of an on-line schedul- ing algorithm, as well as physical constraints, such as limitations on the movement of a product. The interaction between components in FMSs as well as their pro- ductivity requirements are ever increasing. In this thesis, we provide techniques to perform on-line scheduling of the product flows of such cyber-physical FMSs, and to analyse the impact of system design parameters on total system performance. FMSs can take many forms. We focus on scheduling algorithms for re-entrant FMSs, i.e., where the product re-enters one of the machines. Such a use case is found in industrial printing, where a sheet (i.e., the product) needs to be printed on both sides, by passing through an image transfer station twice. The media types and output order of the sheets are determined by the customer, and are not al- lowed to be changed. After processing a sheet, the image transfer station may need to be reconfigured before it can process the next sheet. The reconfiguration times typically depend on the differences in length, thickness, coating, and other me- dia characteristics. The characteristics for a particular product, and therefore their timing requirements, are known only moments before the FMS must receive the processing instructions. Therefore, a scheduler must quickly calculate efficient timing instructions for each operation. The challenge is to merge the streams of unprinted sheets and re-entering printed sheets without collisions and without violating reconfiguration times, while optimizing the performance of the system. The sequence of the products at the image transfer station plays an important role in the performance of industrial printers, since it directly impacts the reconfigu- ration times between products. The performance is therefore determined by the interplay of user input, the physical parameters of the system components, and the scheduling decisions. vi First, we present an efficient on-line sheet scheduling algorithm for indus- trial printers. The problem is modelled using a re-entrant flow shop with set-up times, due dates, and fixed output order. Given a particular sequence of prod- ucts (i.e., a print job), the sheet scheduling algorithm determines a feasible and efficient sequence of operations at the re-entrant machine (i.e., the image trans- fer station). The timing instructions for each of the operations on the sheets can then be efficiently found. Our heuristic algorithm uses multi-objective optimiza- tion to explore intermediate sequencing options without performing backtracking. The heuristic leverages several properties of the scheduling problem, such as the output ordering of the sheets and limitations on the number of products that are partially processed. For the type of FMS considered, the output order of products within a batch (e.g., a print job is a batch of sheets) is fixed, but the batches still need to be ordered. The second contribution is a scheduling heuristic that determines the orders of batches and selects system settings for each batch, such that Pareto-optimal productivity and quality trade-offs are found. Optimizing input order is particu- larly relevant for FMSs that may need reconfiguration between different products, such as industrial printers. The problem is modelled as a Multi-objective Gener- alized Traveling Salesman Problem (MOGTSP) and the ordering algorithm is an on-line, multi-objective heuristic that yields good results in less computation time than the state-of-the-art approaches for MOGTSP. Third, we contribute a parametric critical path analysis for design-time ana- lysis. During the design phase, a designer needs to create a physical layout that realizes a particular topology, i.e., a set of machines and their interrelations. Such a layout is constrained by limitations from many different domains. Constraints may, for example, come from minimal and maximal heating times, minimal seg- ment lengths, or maximal velocities. The designer needs to choose a realization that simultaneously optimizes the total system behaviour and cost. Design pa- rameters such as segment length or travelling velocity directly influence the total system behaviour, as e.g. processing a product becomes faster or slower. Our para- metric critical path analysis identifies relationships between (physical) parameters and the productivity of an FMS. The scheduling graphs used in the sheet schedul- ing heuristic are annotated with affine expressions that relate timing constraints to design parameters. The analysis identifies bottlenecks in the productivity of an FMS in terms of affine expressions for different sets of parameter combinations. This analysis enables designers to identify how productivity depends on combina- tions of parameters. As a fourth contribution, we present an algorithm that determines the impact of certain parameters on scheduling. Changes in the parameters may lead to se- lecting different scheduling choices, and therefore creating different schedules. We show that for some classes of schedulers it is possible to retrieve information about which scheduling decisions are chosen for different parameter
Recommended publications
  • Modeling Ddos Attacks by Generalized Minimum Cut Problems
    Modeling DDoS Attacks by Generalized Minimum Cut Problems Qi Duan, Haadi Jafarian and Ehab Al-Shaer Jinhui Xu Department of Software and Information Systems Department of Computer Science and Engineering University of North Carolina at Charlotte State University of New York at Buffalo Charlotte, NC, USA Buffalo, NY, USA Abstract—Distributed Denial of Service (DDoS) attack is one applications in many different areas [24]–[26], [32]. In this of the most preeminent threats in Internet. Despite considerable paper, we investigate two important generalizations of the progress on this problem in recent years, a remaining challenge minimum cut problem and their applications in link/node cut is to determine its hardness by adopting proper mathematical models. In this paper, we propose to use generalized minimum based DDoS attacks. The first generalization is denoted as cut as basic tools to model various types of DDoS attacks. the Connectivity Preserving Minimum Cut (CPMC) problem, Particularly, we study two important extensions of the classical which is to find the minimum cut that separates a pair (or pairs) minimum cut problem, called Connectivity Preserving Minimum of source and destination nodes and meanwhile preserve the Cut (CPMC) and Threshold Minimum Cut (TMC), to model large- connectivity between the source and its partner node(s). The scale DDoS attacks. In the CPMC problem, a minimum cut is sought to separate a source node from a destination node second generalization is denoted as the Threshold Minimum and meanwhile preserve the connectivity between the source Cut (TMC) problem in which a minimum cut is sought to and its partner node(s).
    [Show full text]
  • Thesis and Analysis of Probabilistic Models
    Diagnosis, Synthesis and Analysis of Probabilistic Models Tingting Han Graduation committee: prof. dr. ir. L. van Wijngaarden University of Twente, The Netherlands (chairman) prof. dr. ir. J.-P. Katoen RWTH Aachen University / University of Twente, (promotor) Germany / The Netherlands prof. dr. P. R. D’Argenio Universidad Nacional de C´ordoba, Argentina prof. dr. ir. B. R. Haverkort University of Twente, The Netherlands prof. dr. S. Leue University of Konstanz, Germany prof. dr. J. C. van de Pol University of Twente, The Netherlands prof. dr. R. J. Wieringa University of Twente, The Netherlands prof. dr. F. W. Vaandrager Radboud University Nijmegen, The Netherlands IPA Dissertation Series 2009-21. CTIT Ph.D.-Thesis Series No. 09-149, ISSN 1381-3617. ISBN: 978-90-365-2858-0. The research reported in this dissertation has been carried out under the auspices of the Institute for Programming Research and Algorithmics (IPA) and within the context of the Center for Telematics and Information Technology (CTIT). The research funding was provided by the NWO Grant through the project: Verifying Quantitative Properties of Embedded Software (QUPES). Translation of the Dutch abstract: Viet Yen Nguyen. Translation of the German abstract: Martin R. Neuh¨außer. Typeset by LATEX. Cover design: Tingting Han. Picture from www.vladstudio.com. Publisher: W¨ohrmann Printing Service - www.wps.nl. Copyright c 2009 by Tingting Han, Aachen, Germany. DIAGNOSIS, SYNTHESIS AND ANALYSIS OF PROBABILISTIC MODELS PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Twente, op gezag van de rector magnificus prof. dr. H. Brinksma, volgens besluit van het College voor Promoties, in het openbaar te verdedigen op vrijdag 25 september 2009 om 13:15 uur door Tingting Han geboren op 27 december 1980 te Hangzhou, Volksrepubliek China Dit proefschrift is goedgekeurd door de promotor, prof.
    [Show full text]
  • Scheduling on Uniform and Unrelated Machines with Bipartite Incompatibility Graphs Tytus Pikies ! Dept
    Scheduling on uniform and unrelated machines with bipartite incompatibility graphs Tytus Pikies ! Dept. of Algorithims and System Modelling, ETI Faculty, Gdańsk University of Technology, 11/12 Gabriela Narutowicza Street, 80-233 Gdańsk, Poland Hanna Furmańczyk ! Institute of Informatics, Faculty of Mathematics, Physics and Informatics, University of Gdańsk, 57 Wita Stwosza Street, 80-309 Gdańsk, Poland Abstract In this paper the problem of scheduling of jobs on parallel machines under incompatibility relation is considered. In this model a binary relation between jobs is given and no two jobs that are in the relation can be scheduled on the same machine. In particular, we consider job scheduling under incompatibility relation forming bipartite graphs, under makespan optimality criterion, on uniform and unrelated machines. We show that no algorithm can achieve a good approximation ratio for uniform machines, even for a case of unit time jobs, under P ≠ NP. We also provide an approximation algorithm that achieves the best possible approximation ratio, even for the case of jobs of arbitrary lengths pj , under the same assumption. Precisely, we present an O(n1/2−ϵ) inapproximability bound, for any pP ϵ > 0; and pj -approximation algorithm, respectively. To enrich the analysis, bipartite graphs generated randomly according to Gilbert’s model Gn,n,p(n) are considered. For a broad class of p(n) functions we show that there exists an algorithm producing a schedule with makespan almost surely at most twice the optimum. Due to our knowledge, this is the first study of randomly generated graphs in the context of scheduling in the considered model.
    [Show full text]
  • Curriculum Vitae
    Curriculum Vitae Tandy Warnow Grainger Distinguished Chair in Engineering 1 Contact Information Department of Computer Science The University of Illinois at Urbana-Champaign Email: [email protected] Homepage: http://tandy.cs.illinois.edu 2 Research Interests Phylogenetic tree inference in biology and historical linguistics, multiple sequence alignment, metage- nomic analysis, big data, statistical inference, probabilistic analysis of algorithms, machine learning, combinatorial and graph-theoretic algorithms, and experimental performance studies of algorithms. 3 Professional Appointments • Co-chief scientist, C3.ai Digital Transformation Institute, 2020-present • Grainger Distinguished Chair in Engineering, 2020-present • Associate Head for Computer Science, 2019-present • Special advisor to the Head of the Department of Computer Science, 2016-present • Associate Head for the Department of Computer Science, 2017-2018. • Founder Professor of Computer Science, the University of Illinois at Urbana-Champaign, 2014- 2019 • Member, Carl R. Woese Institute for Genomic Biology. Affiliate of the National Center for Supercomputing Applications (NCSA), Coordinated Sciences Laboratory, and the Unit for Criticism and Interpretive Theory. Affiliate faculty member in the Departments of Mathe- matics, Electrical and Computer Engineering, Bioengineering, Statistics, Entomology, Plant Biology, and Evolution, Ecology, and Behavior, 2014-present. • National Science Foundation, Program Director for Big Data, July 2012-July 2013. • Member, Big Data Senior Steering Group of NITRD (The Networking and Information Tech- nology Research and Development Program), subcomittee of the National Technology Council (coordinating federal agencies), 2012-2013 • Departmental Scholar, Institute for Pure and Applied Mathematics, UCLA, Fall 2011 • Visiting Researcher, University of Maryland, Spring and Summer 2011. 1 • Visiting Researcher, Smithsonian Institute, Spring and Summer 2011. • Professeur Invit´e,Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Summer 2010.
    [Show full text]
  • A Gentle Introduction to Matroid Algorithmics
    A Gentle Introduction to Matroid Algorithmics Matthias F. Stallmann April 14, 2016 1 Matroid axioms The term matroid was first used in 1935 by Hassler Whitney [34]. Most of the material in this overview comes from the textbooks of Lawler [25] and Welsh [33]. A matroid is defined by a set of axioms with respect to a ground set S. There are several ways to do this. Among these are: Independent sets. Let I be a collection of subsets defined by • (I1) ; 2 I • (I2) if X 2 I and Y ⊆ X then Y 2 I • (I3) if X; Y 2 I with jXj = jY j + 1 then there exists x 2 X n Y such that Y [ x 2 I A classic example is a graphic matroid. Here S is the set of edges of a graph and X 2 I if X is a forest. (I1) and (I2) are clearly satisfied. (I3) is a simplified version of the key ingredient in the correctness proofs of most minimum spanning tree algorithms. If a set of edges X forms a forest then jV (X)j − jXj = jc(X)j, where V (x) is the set of endpoints of X and c(X) is the set of components induced by X. If jXj = jY j + 1, then jc(X)j = jc(Y )j − 1, meaning X must have at least one edge x that connects two of the components induced by Y . So Y [ x is also a forest. Another classic algorithmic example is the following uniprocessor scheduling problem, let's call it the scheduling matroid.
    [Show full text]
  • Lecture Notes: “Graph Theory 2”
    Lecture notes: \Graph Theory 2" November 28, 2018 Anders Nedergaard Jensen Preface In this course we study algorithms, polytopes and matroids related to graphs. These notes are almost complete, but some of the examples from the lectures have not been typed up, and some background information, such as proper definitions are sometimes lacking. For proper definitions we refer to: Bondy and Murty: "Graph Theory". Besides these minor problems, the notes represent the content of the class very well. 1 Contents 1 Matchings 6 1.1 Matchings . .6 1.2 When is a matching maximum? . .7 1.2.1 Coverings . .8 1.2.2 Hall's Theorem . 10 1.3 Augmenting path search . 11 1.4 Matchings in general graphs . 16 1.4.1 Certificates . 16 1.4.2 Edmonds' Blossom Algorithm . 18 1.5 Maximum weight matching in bipartite graphs . 23 1.6 Distances in graphs (parts of this section are skipped) . 26 1.6.1 Warshall's Algorithm . 28 1.6.2 Bellman-Ford-Moore . 30 1.6.3 Floyd's Algorithm . 33 1.7 Maximal weight matching in general graphs . 34 1.7.1 The Chinese postman problem . 35 1.7.2 Edmonds' perfect matching polytope theorem . 36 1.7.3 A separation oracle . 40 1.7.4 Some ideas from the ellipsoid method . 43 2 Matroids 44 2.1 Planar graphs . 44 2.2 Duality of plane graphs . 46 2.3 Deletion and contraction in dual graphs . 47 2.4 Matroids . 48 2.4.1 Independent sets . 48 2.4.2 The cycle matroid of a graph .
    [Show full text]
  • Algorithms for Weighted Multidimensional Search and Perfect Phylogeny Richa Agarwala Iowa State University
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1994 Algorithms for weighted multidimensional search and perfect phylogeny Richa Agarwala Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Agarwala, Richa, "Algorithms for weighted multidimensional search and perfect phylogeny " (1994). Retrospective Theses and Dissertations. 10669. https://lib.dr.iastate.edu/rtd/10669 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. U-M-I MICROFILMED 1994 INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality iUustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps.
    [Show full text]
  • Alyson “Allie” Fletcher Education Academic
    ALYSON “ALLIE”FLETCHER Assistant Professor Research Scientist University of California, Los Angeles University of California, Berkeley 8125 Math Sciences Bldg. Redwood Center for Theoretical Neuroscience Los Angeles, CA 90095-1554 Helen Wills Neuroscience Institute Tel: +1 201 965 1900 Citizenships: US & United Kingdom http://www.stat.ucla.edu/∼akfletcher/ Email: akfl[email protected] EDUCATION University of California, Berkeley: Ph.D. in Electrical Engineering and Computer Sciences (EECS), January 2006 A Jump Linear Framework for Estimation with Markovian Source and Channel Dynamics Committee - EECS: Kannan Ramchandran (chair) & Venkat Anantharam Mathematics: Alexandre J. Chorin M.S. in Mathematics, May 2005 Estimation via Sparse Approximation: Error Bounds and Random Frame Analysis Committee - Mathematics: F. Alberto Grunbaum¨ (chair) Statistics: David J. Aldous & Bin Yu M.S. in Electrical Engineering, May 2002 Denoising via Recursive Wavelet Thresholding Committee - EECS: Kannan Ramchandran (chair) & Laurent El Ghaoui University of Iowa, Iowa City, Iowa: B.S. with honors in Mathematics Minors: Physics & Music ACADEMIC APPOINTMENTS Assistant Professor, January 2016– Statistics, Mathematics, and Electrical Engineering University of California, Los Angeles Assistant Professor, September 2012–present Department of Electrical Engineering University of California, Santa Cruz Research Scientist, September 2012–present Redwood Center for Theoretical Neuroscience Helen Wills Neuroscience Institute University of California, Berkeley Postdoctoral
    [Show full text]
  • Scheduling in and out Forests in the Presence of Communication Delays
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 7, NO. 10, OCTOBER 1996 1065 Scheduling In and Out Forests in the Presence of Communication Delays Theodora A. Varvarigou, Member, IEEE, Vwani P. Roychowdhury, Member, IEEE, Thomas Kailath, Fellow, /€E€, and Eugene Lawler Abstract-We consider the problem of scheduling tasks on multiprocessor architectures in the presence of communication delays. Given a set of dependent tasks, the schedulingproblem is to allocate the tasks to processors such that the pre-specified precedence constraints among the tasks are obeyed and certain cost-measures(such as the computation time) are minimized. Several cases of the scheduling problem have been proven to be NP-complete [16],[lo]. Nevertheless, there are polynomial time algorithms for interesting special cases of the general scheduling problem [12], [14], [lo]. Most of these results, however, do not take into consideration the delays due to message passing among processors. In this paper we study the increase in time complexity of scheduling problems due to the introduction of communication delays. In particular, we address the open problem of scheduling Out-forests (In-forests)in a multiprocessor system of m identical processors when communication delays are considered. The corresponding problem of scheduling Out-forests (In-forests) without communication delays admits an elegant polynomial time solution as presentedfirst by Hu in 1961 1121; however, the problem in the presence of communication delays has remained unsolved. We present here first known polynomial time algorithms for the computation of the optimal schedule when the number of available processors is given and bounded and both computation and communication delays are assumed to take one unit of time.
    [Show full text]
  • UC Berkeley UC Berkeley Electronic Theses and Dissertations
    UC Berkeley UC Berkeley Electronic Theses and Dissertations Title Learned Human-in-the-Loop Decision Making Permalink https://escholarship.org/uc/item/0787m66c Author Basso, Brandon Publication Date 2012 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California Learned Human-in-the-Loop Decision Making by Brandon Basso A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Engineering - Mechanical Engineering in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J. Karl Hedrick, Chair Professor Hugh Durrant-Whyte Professor David Auslander Professor Pieter Abbeel Fall 2012 Learned Human-in-the-Loop Decision Making Copyright 2012 by Brandon Basso 1 Abstract Learned Human-in-the-Loop Decision Making by Brandon Basso Doctor of Philosophy in Engineering - Mechanical Engineering University of California, Berkeley Professor J. Karl Hedrick, Chair Human beings are decision making engines. From low level automatic activities, such as walking, to high-level reasoning, we readily solve complex perception and decision problems in real time. On the other end of the spectrum, computers and robots have proven particu- larly useful in dull, dirty, and dangerous domains|inspecting nuclear disaster sites, solving vast optimization problems, and generally accomplishing tasks difficult for humans. Recent advances in robotics and computer science have only served to underscore the difference be- tween humans and robots, namely that robots tend to excel at lower level structured tasks, while humans are unmatched at higher level decision making, particularly when problems involve unstructured data, soft constraints, and ambiguous objectives. This thesis explores decision problems that lie in the gap between current robot capabil- ity and human ability.
    [Show full text]
  • 14 NP, NP Completeness, and the Cook-Levin Theorem
    Learning Objectives: • Introduce the class NP capturing a great many important computational problems • NP-completeness: evidence that a problem might be intractable. • The P vs NP problem. 14 NP, NP completeness, and the Cook-Levin Theorem “In this paper we give theorems that suggest, but do not imply, that these problems, as well as many others, will remain intractable perpetually”, Richard Karp, 1972 “Sad to say, but it will be many more years, if ever before we really understand the Mystical Power of Twoness… 2-SAT is easy, 3-SAT is hard, 2-dimensional matching is easy, 3-dimensional matching is hard. Why? oh, Why?” Eugene Lawler So far we have shown that 3SAT is no harder than Quadratic Equa- tions, Independent Set, Maximum Cut, and Longest Path. But to show that these problems are computationally equivalent we need to give re- ductions in the other direction, reducing each one of these problems to 3SAT as well. It turns out we can reduce all three problems to 3SAT in one fell swoop. In fact, this result extends far beyond these particular problems. All of the problems we discussed in Chapter 13, and a great many other problems, share the same commonality: they are all search problems, where the goal is to decide, given an instance 푥, whether there exists a solution 푦 that satisfies some condition that can be verified inpoly- nomial time. For example, in 3SAT, the instance is a formula and the solution is an assignment to the variable; in Max-Cut the instance is a graph and the solution is a cut in the graph; and so on and so forth.
    [Show full text]
  • Analysis of Cumulants
    Analysis of cumulants Lek-Heng Lim University of California, Berkeley March 6, 2009 Joint work with Jason Morton L.-H. Lim (Applied Math Seminar) Analysis of cumulants March 6, 2009 1 / 46 Cover Story: January 4, 2009 L.-H. Lim (Applied Math Seminar) Analysis of cumulants March 6, 2009 2 / 46 January 4, 2009 Risk Mismanagement By JOE NOCERA THERE AREN’T MANY widely told anecdotes about the current financial crisis, at least not yet, but there’s one that made the rounds in 2007, back when the big investment banks were first starting to write down billions of dollars in mortgage-backed derivatives and other so-called toxic securities. This was well before Bear Stearns collapsed, before Fannie Mae and Freddie Mac were taken over by the federal government, before Lehman fell and Merrill Lynch was sold and A.I.G. saved, before the $700 billion bailout bill was rushed into law. Before, that is, it became obvious that the risks taken by the largest banks and investment firms in the United States — and, indeed, in much of the Western world — were so excessive and foolhardy that they threatened to bring down the financial system itself. On the contrary: this was back when the major investment firms were still assuring investors that all was well, these little speed bumps notwithstanding — assurances based, in part, on their fantastically complex mathematical models for measuring the risk in their various portfolios. There are many such models, but by far the most widely used is called VaR — Value at Risk. Built around statistical ideas and probability theories that have been around for centuries, VaR was developed and popularized in the early 1990s by a handful of scientists and mathematicians — “quants,” they’re called in the business — who went to work for JPMorgan.
    [Show full text]