Professional Documents
Culture Documents
a r t i c l e i n f o a b s t r a c t
Article history: This paper concentrates on sensitivity analysis of the fuzzy assignment problem (FAP). Since most real
Received 30 November 2009 environments are uncertain, the FAP is more realistic than the assignment problem in application. Owing
Received in revised form 8 July 2010 to the high degeneracy of the FAP, as that of the assignment problem, traditional sensitivity analysis,
Accepted 2 May 2011
called Type I sensitivity analysis, which determines the range in which the current optimal basis remains
Available online 7 May 2011
optimal, is impractical. Hence, we attempt to perform other two types of advanced sensitivity analysis,
called Type II and Type III sensitivity analysis, to overcome this problem. A labeling algorithm is then
Keywords:
presented, where Type II sensitivity analysis is to determine the range of perturbation to keep the current
Assignment problem
Fuzzy theory
optimal assignment remaining optimal, and Type III sensitivity analysis is to determine the range for
Sensitivity analysis which the rate of change of optimal value function remains unchanged. The procedure of the labeling
Degeneracy algorithm is divided into two parts: one is when the unassigned cell is perturbed, and the other is when
Labeling algorithm the assigned cell is perturbed. An example is presented to demonstrate that the labeling algorithm is a
useful tool for determining the Type II and Type III sensitivity analysis of the FAP.
© 2011 Elsevier B.V. All rights reserved.
1568-4946/$ – see front matter © 2011 Elsevier B.V. All rights reserved.
doi:10.1016/j.asoc.2011.05.025
5342 C.-J. Lin et al. / Applied Soft Computing 11 (2011) 5341–5349
ij (cij ) =
ij ij ij
if ˛ij ≤ cij ≤ ˇij , xij = 1, (1.2) α ij α ij
⎪
⎩ ˇij − ˛ij Qij
0 otherwise.
γ ij γ ij
Moreover, notation ˛ij , ˇij is employed to denote c̃ij . Matrix [c̃ij ] is
shown as follows:
range in Sections 3 and 4, respectively. Furthermore, two numeri-
[c̃ij ] = [˛ij , ˇij ]
cal examples are presented in order to demonstrate the proposed
In addition, all the ˛ij ’s form the matrix [˛ij ] and all the ˇij ’s form approaches. Section 5 concludes the study with a brief summary.
the matrix [ˇij ].
They also define the membership function of total cost c̃T , which 2. LW algorithm and sensitivity analysis
is related to the performance of the manager, as the linear mono-
tonically decreasing function in (1.3). Numbers a and b are the lower 2.1. Concepts of the LW algorithm
and upper bounds of total cost, respectively; and notation a, b
denotes the fuzzy interval c̃T . It is suggested that a number less 1
Let = n n >0 (2.1)
than or equal to the minimum assignment of matrix [˛ij ] should b−a+ x
i=1 j=1 ij ij
be taken as a, and a number larger than or equal to the maximum
assignment of matrix [ˇij ] should be taken as b. and yij = · xij for i, j = 1, 2, . . . , n (2.2)
⎛ ⎞
(1.4) can then be converted into a linear programming model as
n
n
b− c x n
= i=1 j=1 ij ij b − cT (1.3) s.t. yij − = 0 for i = 1, 2, . . . , n
= , a ≤ cT ≤ b,
⎪
⎪ b−a b−a
⎩ j=1
0, cT ≥ b. n (2.3)
yij − = 0 for j = 1, 2, . . . , n
Assume that a team comprises all workers and the manager. The
i=1
performance of the team is determined by taking the lowest per- n
n
formance of members in the group, the company has to equally ij yij + (b − a) = 1
emphasize the performance of each member in the group. Hence,
i=1 j=1
the Bellman–Zadeh’s criterion [8] is used and the FAP can be derived
yij , ≥ 0 for i, j = 1, 2, . . . , n
as:
n n Suppose u1 ,. . .,un , v1 ,. . .,vn and f are the dual variables of this
b− i=1
˛ x
j=1 ij ij
max n n model, then its corresponding dual problem is as follows:
b−a+ i=1
x
j=1 ij ij
min f
n
• Type I (Basics Invariancy): Type I sensitivity is the traditional sen- identical when there is only one optimal assignment. Multiple opti-
sitivity analysis, which determines Type I Sensitivity Range (Type mal assignments make Type II and III Ranges different and will give
I SR) such that the current optimal basic solution remains optimal more choices for decision-makers. More optimal solutions make
in the perturbed problem. the decision-making more flexible. When decision-makers empha-
• Type II (Support Set Invariancy): Type II sensitivity, depending on size the flexibility of optimal decision-making, Type III SR is the
the current optimal solution (not necessarily a basic solution), is proper display.
to determine Type II Sensitivity Range (Type II SR) so that vari-
ables with a zero and with a positive value in the given optimal 2.3. Various perturbations of the FAP
solution remain zero and positive in the optimal solution of the
perturbed problem, respectively. According to model (1.4), there are four groups of parameters
• Type III (Optimal Partition Invariancy): Type III sensitivity, depend- ˛ij , ˇij , qij and ij . We divide them into five different cases when
ing only on the problem data and perturbed parameter, is to discussing the occurrences of perturbation follows:
determine Type III Sensitivity Range (Type III SR) for which the
rate of change of the optimal value function remains unchanged. Case 1: Perturbation occurs in ˛ij and ˇij while ij and qij are
In case that the range happens to be a breakpoint, Type III SR is unchanged (see Fig. 1(a)). Hence, the variations of ˛ij and ˇij are
defined as [0,0]. kept the same. In real-world applications, this case occurs when
the wages of workers are alerted or a new skill reduces the oper-
Simplex-type algorithms divide variables of the solution into ating time of the workers.
basic variables and nonbasic variables. Type I SR focuses on keep- Case 2: Perturbation occurs in ˛ij while ˇij and ij are unchanged
ing the set of optimal basic variables unchanged and overlooks the (see Fig. 1(b)). This case happens when the managers adjust admis-
effects caused by degeneracy. When degeneracy occurs, Type I SR sible quality level while the rate of the worker unchanged. One has
provides incomplete information. Type II and Type III SRs that dis- to lower (raise) the highest quality qij when the admissible quality
regard the impractically degenerate basic variables are suitable for level is raised (lowered).
the degenerate problems. Type II SRs in FAP, in this paper, are to Case 3: Perturbation occurs in qij with ˛ij and ˇij remain
determine the largest range of variations such that a given optimal unchanged; hence ij changes with the perturbation of qij (as
assignment remains an optimal assignment of the perturbed prob- shown in Fig. 1(c)). It describes the case when the worker is altered
lem. Keeping the assignment unchanged makes the workers work or trained so as to change the highest quality qij and the rate of
with the same machine, the machines settle on its original loca- quality progress ij .
tions, etc. Focusing only on the sensitivity ranges of non-degenerate Case 4: Perturbation occurs in qij with ij and ˛ij remain
basic variables makes Type II SR differ from Type I SR. The opti- unchanged; hence, ˇij changes with the perturbation of qij (as
mal value function of (2.3) is composed of several linearity ranges shown in Fig. 1(d)). It describes the case when the worker can
with different slopes. In mathematical insight, Type III SR is a lin- enhance the highest quality qij because of the job training.
ear range or breakpoint of the optimal value function and depends
only on the model parameters. In managerial insight, Type III SR Generally, Case 1 frequently happens in real practice and sensi-
is to determine the largest range of variations such that all the tivity ranges of Cases 2 and 3 can be determined by the approach of
optimal assignments remain optimal assignments of the perturbed Case 1 though computation may be somewhat tedious. In addition,
problem [10,12]. It is then obvious that Type II and III Ranges are the perturbation of Case 4 will not influence the original optimal
μij μij
qij
qij
(a) (b)
μij μij
qij
qij
(c) (d)
Fig. 1. Membership function of various perturbations.
5344 C.-J. Lin et al. / Applied Soft Computing 11 (2011) 5341–5349
assignment without increasing the upper bounds of total cost b. Labeling procedure: Suppose (h, k) is the pivot cell,
Therefore, we will focus on investigating Case 1 with perturbation
√
in one pair of ˛ij and ˇij in this paper. Suppose ˛st and ˇst is the (1) Label column k with ( ).
√
pair of parameters perturbed with variation st , then the perturbed (2) If column q is labeled, then we label row i with ( ) where xiq = 1.
√
problem can be shown as follows: (3) If row p is labeled, then we label column j with ( ) where Qpj = 0
n n and xpj = 0. In case column j has already been labeled, then we
b− i=1
˛ x
j=1 ij ij
− st xst keep its label.
max n n (2.5) (4) Repeat (2) and (3) until further labeling is impossible.
b−a+ i=1
x
j=1 ij ij
s.t. the constraints of (1.4)
Revaluing procedure: (Expression m ← n stands for “m being
In addition, we assume that any variations of parameter will replaced by n” in the procedure.)
always satisfy the conditions about a and b, as suggested and Let J = {(i,j)|Qij > 0 and row i is labeled, but column j is not labeled}
derived in Lin and Wen [7]. and ε = min {Qij }. If row i is labeled, then ui ← ui − ε. If column j is
(i,j) ∈ J
labeled, then vj ← vj + ε. We then update related Qij and erase all
3. Type II sensitivity analysis labels.
We outline the procedure of Type II SA algorithm for determin-
Assume that the current optimal assignment E* of (1.4) has ing Lst , (s, t) ∈
/ E*, as follows:
been determined by the LW algorithm, and the decision-maker is
going to identify the sensitivity ranges. The proposed LW algorithm Step 1: Update Qst ← Qst + st .
of sensitivity analysis for Type II SR, called Type II SA algorithm Step 2: Assume all Qij ≥ 0, we have (or update) the lower bound
for short hereafter, will be discussed in two parts. The first part st ≥ Lst . Choose (h, k), where Lst occurs, as the pivot cell and pro-
is when the perturbation occurs in a cell (s, t) ∈ / E*, i.e., cell of ceed with the Labeling procedure. If row h has no label, go to Step
∗ = 0, the other is when the perturbation occurs in a cell (s,
xst 3; otherwise, stop, and the current inequality st ≥ Lst is the Type
∗ = 1. In addition, some theorems which help
t) ∈ E*, i.e., cell of xst II SR.
simplify the determination of Type II SRs are derived in this Step 3: Perform the Revaluing procedure and return to Step 2.
section.
3.2. Type II SA algorithm for perturbation in the assigned cell
3.1. Type II SA algorithm for perturbation in the unassigned cell
To determine the Type II SR of an assigned cell is more compli-
Let (2.5) be the perturbed problem. Further, denote Ust and Lst cated than that of an unassigned cell.
as the upper and lower bounds of st ’s Type II SR, respectively. Theorem 3.3. Let E* be the current optimal assignment of (1.4). Fur-
thermore, suppose E* is also the minimal assignment of matrix [ ij ]. If
Theorem 3.1. Let E* be the current optimal assignment of (1.4). If
(s, t) ∈ E* and st ∈ (−∞, 0], then E* remains the optimal assignment
(s, t) ∈
/ E* and st ∈ [0, ∞), then E* remains the optimal assignment of
of model (2.5).
(2.5).
Proof. Let E# , Z0 (E*), Z0 (E# ), Zp (E*) and Zp (E# ) be defined as that
Proof. Let E# be any feasible assignment of (1.4). Denote Z0 (E*)
in Theorem 3.1. We obtain (3.1)–(3.3).
and Z0 (E# ) as the objective values of E* and E# on (1.4), respectively. ∗ = 1, we have
Since (s, t) ∈ E*, i.e., xst
We obtain
(−st )
Z0 (E ∗ ) ≥ Z0 (E # ) (3.1) Zp (E ∗ ) = Z0 (E ∗ ) + (3.5)
b−a+
(i,j) ∈ E ∗ ij
We further denote Zp (E*) and Zp (E# ) as the objective values of E* Furthermore, since E* is the minimal assignment of matrix [ ij ], we
and E# on perturbation of (2.5), respectively. Hence, then have
∗)
(−st · xst ij ≤ ij (3.6)
∗ ∗
Zp (E ) = Z0 (E ) + (3.2)
b−a+
(i,j) ∈ E ∗ ij (i,j) ∈ E ∗ (i,j) ∈ E #
#)
(−st · xst Zp (E ∗ ) ≥ Zp (E # ) (3.7)
Zp (E # ) = Z0 (E # ) + (3.3)
b−a+
(i,j) ∈ E # ij (3.7) shows that E* remains an optimal assignment of (2.5).
The next corollary follows directly from Theorem 3.3.
Since (s, t) ∈ ∗ = 0, ∈ [0, ∞) and x# ∈ {0, 1}, we have
/ E*, i.e., xst st st
Corollary 3.4. Let E* be the current optimal assignment of (1.4).
Zp (E ∗ ) = Z0 (E ∗ ) ≥ Z0 (E # ) ≥ Zp (E # ) (3.4) Furthermore, suppose E* is also the minimal assignment of matrix [ ij ].
If (s, t) ∈ E*, then the lower bound of st ’s Type II SR Lst → −∞.
Therefore, (3.4) shows that E* remains an optimal assignment of
We outline the procedure of Type II SA algorithm, applying the
(2.5).
Labeling procedure and Revaluing procedure, for determining Lst
The following corollary is a direct result of Theorem 3.1.
and Ust for (s, t) ∈ E*, as follows:
Corollary 3.2. Let E* be the current optimal assignment of (1.4). If Phase 0:
(s, t) ∈
/ E*, then the upper bound of st ’s Type II SR Ust → ∞.
Step 1: Suppose st is the variation, then update f value as
As for determining the lower bound of st ’s Type II SR Lst , (s,
t) ∈
/ E*, we may apply Type II SA algorithm. However, we must
b− (i,j) ∈ E ∗
˛ij − st
define two required procedures, namely the Labeling procedure and f ←
b−a+
(i,j) ∈ E ∗ ij
Revaluing procedure in advance.
C.-J. Lin et al. / Applied Soft Computing 11 (2011) 5341–5349 5345
Table 2
After f is updated, we need to update u1 ,. . .,un , v1 ,. . .,vn . One may ij ’s Type I SRs of Example 1.
keep all ui unchanged, and update values vs ← vs + · st − st , and
Type I SR
vj ← vj + · ij , for j = 1,2,. . .,n and (i,j) ∈ E*, i =
/ s, where
[0, ∞) [−8, 0] [0, 20/3]
(−∞, 0] [0, 8] [−8, ∞)
= st [−5, ∞) [0, 5] [−12, ∞)
b−a+
(i,j) ∈ E ∗ ij
Consider the following 3 × 3 fuzzy assignment problem adopted 3.4. Result of Type II sensitivity analysis
from example 1 of Lin and Wen [7]. The matrices [c̃ij ] and [qij ] are:
⎡ ⎤ ⎡ ⎤ According to Type II SA algorithm, we can summarize ij ’s
4, 13 3, 12 2, 6 0.9 0.6 0.8 Type II SRs of the perturbation of Case 1 in Table 7. Comparing
⎢ ⎥ ⎢ ⎥ Tables 2 and 7 shows that Type I SR is a subset of Type II SR since
[c̃ij ] = ⎣ 4, 13 6, 14 7, 15 ⎦ , [qij ] = ⎣ 0.9 0.8 0.8 ⎦
changing the optimal basis does not ensure that the optimal assign-
7, 10 4, 8 6, 12 0.6 0.8 0.6 ment will be changed.
5 5 10
Type II SR will either be the immediate left-side or right-side linear
range of fst at st = 0.
u1 = −5.5 +
Δ13
0 0 (1) If (s, t) ∈ ∀Ei∗ , i ∈ {1, 2,. . .,k}; then m− +
st = mst = −. As shown in
5
Fig. 2(c).
10 15 5 / ∀Ei∗ , ∀i ∈ {1, 2,. . .,k}; then m−
(2) If (s, t) ∈ +
st = mst = 0. As shown in
4 6 7 Fig. 2(a).
Δ13 Δ13 11Δ13 (3) If there exist i and j such that (s, t) ∈ Ei∗ and (s, t) ∈/ Ej∗ , then m−
st =
u2 = −5.5 + 8−
5 10 10 − and m+
st = 0, as shown in Fig. 2(b).
10 10 10
7 4 6 Proof. Since xij in model (1.4) are 0–1 variables and yij = ·xij , (1),
Δ 13Δ13 (2) and (3) of this theorem can easily be proved by m−
st = −max{yst :
i
u3 = −0.5 5 − 13 12 − ∀ i
10 10 i ∈ E ∗ } and m+ = −min{yi : yi ∈ E ∗ } [13].
yst i st st st i
5 5 10 ∀i
5. Conclusions
Table A2
The constraints of FAP are identical to those of AP, which is inher-
ently a highly primal degenerate LP model. Degeneracy negatively
influences the computation of an optimal solution and sensitivity
v1 = −9.5 v2 = −6.5 v3 = −5
analysis of LP. This paper proposes a Type II SA algorithm for iden-
tifying Type II SR, which can also be extended for identifying Type 4+ Δ 11 3 2
III SR of the FAP. The Type II SA algorithm generates a streamlined u1 = 0 0.5+ Δ 11 5.5
procedure from searching the optimal solution till performing the 10 15 5
sensitivity analysis of assignment problem. Commercially available 4 6 7
software can only help to determine Type I SRs, which is impractical u 2 = −0.5 5 7.5
in degenerate problems. However, Type II and Type III SRs pro- 10 10 10
vide more precise and accurate information and help make correct
7 4 6
decisions. We summarize the relationships between three types of
u3 = −0.5 0 6.5
sensitivity ranges as follows: (1) Type I SR is always a subset of
Type II SR; (2) since Type III sensitivity depends only on the prob- 5 5 10
5348 C.-J. Lin et al. / Applied Soft Computing 11 (2011) 5341–5349
Table A3 Table A6
v1 = −4.5 v2 = −6.5 v3 = −5 v1 = −2 v2 = −4 v3 = −5
4+ Δ 11 3 2 4+ Δ 11 3 2
u1 = 0 5.5+ Δ 11 5.5 u1 = 0 8+ Δ 11 8
10 15 5 10 15 5
4 6 7 4 6 7
u 2 = −5.5 0 2.5 u 2 = −8 0 0
10 10 10 10 10 10
7 4 6 7 4 6
u3 = −0.5 5 6.5
u3 = −3 5 4
5 5 10
5 5 10
Table A4
Set Q11 ≥ 0, we update 11 ≥ −8. Choose (1, 1) as the pivot cell,
make the assumption 11 < −8, proceed with the Labeling proce-
v1 = −4.5 v2 = −6.5 v3 = −5 √ √
dure by assigning label ( ) to column 1, and label ( ) to row 2 due
√
4+ Δ 11 3 2 to x21 = 1. Assign label ( ) to column 2 and column 3 due to Q22 = 0
√ √
u1 = 0 5.5+ Δ 11 5.5 and Q23 = 0. Assign label ( ) to row 3 due to x32 = 1, and label ( )
10 15 5 to row 1 due to x13 = 1. Please refer to Table A6.
4 6 7
u 2 = −5.5 0 2.5 Since row 1 has been labeled, we stop. When 11 ≥ −8, the
optimal assignment remains optimal.
10 10 10
7 4 6
References
u3 = −0.5 5 6.5
5 5 10 [1] H. Haken, M. Schanz, J. Starke, Treatment of combinatorial optimal problems
using selection equations with cost terms. Part I. Two-dimensional assignment
problem, Physica D 134 (1999) 227–241.
[2] N. Belacela, M.R. Boulasselb, Multicriteria fuzzy assignment method: a useful
Step 3: tool to assist medical diagnosis, Artificial Intelligence in Medicine 21 (2001)
Find J = {(2,2), (2,3)}, ε = min{5, 7.5} = 5, and update u2 ← −5.5, 201–207.
v1 ← −4.5, Q11 ← 5.5 + 11 , Q22 ← 0, Q23 ← 2.5, Q31 ← 5 as shown [3] M. Ridwan, Fuzzy preference based traffic assignment problem, Transportation
Research Part C 12 (2004) 209–233.
in the following table. Erase all labels and return to Step 2. Please
[4] L. Liu, Y. Li, The fuzzy quadratic assignment problem with penalty: new mod-
refer to Table A3. els and genetic algorithm, Applied Mathematics and Computation 174 (2006)
Step 2: 1229–1244.
[5] Y. Feng, L. Yang, A two-objective fuzzy k-cardinality assignment problem, Jour-
Set Q11 ≥ 0, we update the transient lower bound 11 ≥ −5.5.
nal of Computational and Applied Mathematics 197 (2006) 233–244.
Choose (1, 1) as the pivot cell, make the assumption 11 < −5.5, [6] L. Liu, X. Gao, Fuzzy weighted equilibrium multi-job assignment problem
√
proceed with the Labeling procedure by assigning label ( ) to col- and genetic algorithm, Applied Mathematical Modelling 33 (2009) 3926–
√ 3935.
umn 1, and label ( ) to row 2 due to x21 = 1. Further assign label
√ √ [7] C.J. Lin, U.P. Wen, The labeling algorithm for the fuzzy assignment problem,
( ) to column 2 due to Q22 = 0, and label ( ) to row 3 due to x32 = 1. Fuzzy Sets and Systems 142 (2004) 373–391.
Row 1 has no label, go to Step 3. Please refer to Table A4. [8] R.E. Bellman, L.A. Zadeh, Decision-making in a fuzzy environment, Management
Step 3: Science 17B (1970) 141–164.
[9] T. Koltai, T. Terlaky, The difference between managerial and mathematical
Find J = {(2,3), (3,3)}, ε = min{2.5, 6.5} = 2.5, and update u2 ← −8, interpretation of sensitivity analysis results in linear programming, Interna-
u3 ← −3, v1 ← −2, v2 ← −4, Q11 ← 8 + 11 , Q12 ← 8, Q23 ← 0, tional Journal of Production Economics 65 (2000) 257–274.
Q33 ← 4 as shown in the following table. Erase all labels and return [10] C.J. Lin, U.P. Wen, Sensitivity analysis of the optimal assignment problem, Euro-
pean Journal of Operational Research 149 (2003) 35–46.
to Step 2. Please refer to Table A5. [11] A.G. Hadigheh, T. Terlaky, Sensitivity analysis in linear optimization: invariant
Step 2: support set intervals, European Journal of Operational Research 169 (2006)
1158–1175.
[12] C.J. Lin, U.P. Wen, Sensitivity analysis of objective function coefficients of the
Table A5 assignment problem, Asia–Pacific Journal of Operational Research 24 (2007)
203–221.
[13] J.K. Ho, Computing true shadow prices in linear programming, Informatica 11
(2000) 421–434.
v1 = −2 v2 = −4 v3 = −5
4+ Δ 11 3 2 Chi-Jen Lin is an Associate Professor in the Department of
u1 = 0 8+ Δ 11 8 Industrial Engineering and Management at Ta Hwa Insti-
tute of Technology, Hsinchu, Taiwan, ROC. He received his
10 15 5 Ph.D. in Industrial Engineering and Engineering Manage-
4 6 7 ment from National Tsing Hua University. His research
interests are operations research, fuzzy theory and MCDM.
u 2 = −8 0 0 His papers have appeared in the European Journal of Oper-
10 10 10 ational Research, Fuzzy Set and Systems, Asia-Pacific Journal
of Operational Research, Applied Mathematical Modelling,
7 4 6 Operations Research Letters, and Expert Systems with Appli-
cations.
u3 = −3 5 4
5 5 10
C.-J. Lin et al. / Applied Soft Computing 11 (2011) 5341–5349 5349
Ue-Pyng Wen is a Professor in the Department of Pei-Yi Lin received her M.S. degree in Industrial Engineer-
Industrial Engineering and Engineering Management at ing and Engineering Management from National Tsing
National Tsing Hua University, Hsinchu, Taiwan, ROC. Hua University. Her research interests are operations
He received his Ph.D. in Industrial Engineering from the research and production management.
State University of New York at Buffalo, USA. His primary
research interests are in the area of multi-criteria decision
making, production management, and applied operations
research. He has published his research in journals such as
IIE Transactions, Journal of the Operational Research Society,
European Journal of Operational Research, Computers and
Operations Research, Fuzzy Sets and Systems and Interfaces.