Professional Documents
Culture Documents
9
Petru L. Iv~nescu
Institute of Mathematics, Romanian Academy of Sciences,
Bucharest
Pseudo-Boolean
Programming
and Applications
Presented at the Colloquium on Mathematics
and Cybernetics in the Economy, Berlin, October 1964
1965
All fights, especiallythat of translation into foreign languages, reserved. It is also forbidden to reproduce this book, either
whole or in part, by photomechanical means (photostat, microfilm and/or microcard)or by other procedure without
written permission from Springer Verlag. 9 by Springer-Verlag Berlin " Heidelberg 1965.
Library of Congress Catalog Card Number 65-29241. Printed in Germany. Tide No. 7329
Introduction
Part I
CHAPTER 4 Pseudo-BooleanProgramming
w I The General Procedure
w 2 Problems with Non-Negative Restraints
Appendix
References
I n t r o d u c t i o n
The first was our close affiliation with the research team
lead by Professor Gr. C. Moisil, whose important contributions
on the applicat~on~of Boolean algebras and Galois fields in
switching theory (see for instance /93/,/94/,/95/,/96/,/~7/,etc.)
- 2 -
Chapter I
0 1
1 i
,,a~_ t o1 01
L
aOb = a + b - ab (z.1)
a=l -a
U ai=O (1.4)
and
--~ ai = i; (1.4')
aUb Uc =
= a + b + c - ab - bc - ca + abe, (1.6)
aub(JcUd =
w 2 Pseudo-Boolean Functions
(Xl,...,x n) E n
L2
the PBF
VlX 1 + ... + VnX n (1.11)
!I~ 0 1
1 0
aAb = a + b - 2 ab (i.i2)
=abUab (i .i3)
and that
-- a A z (z.14)
aUb = a~b~ab (l.15)
-- a A a b (1.16)
-- a6Ab
The operations of sum modulo 2 being commutative and associative,
we may introduce the symbol,
-7 -
i~l ai = a l ~ . . . ~ a k (1.17)
and we consider
A ai~=0 (I .z8)
Chapter 2
(Xl,...,Xn)' ~ L~ (2.1)
for which the FBF
F l (Xl,...,Xn) (2.2.1]
attains its minimum.
Using theorem, i, we see that we may write
i~l ai = a l ~ . . . ~ a k (1.17)
and we consider
A ai~=0 (I .z8)
Chapter 2
(Xl,...,Xn)' ~ L~ (2.1)
for which the FBF
F l (Xl,...,Xn) (2.2.1]
attains its minimum.
Using theorem, i, we see that we may write
o
Xl = I x2
a2 ...x na n (2.6.1 ~ )
(a2,...,an)~ M1
a~ a
Xl+ = x 2 " ..x n n (2.6.1 + )
(l~,...,a n)'~ M 1
where this time every ~ will be replaced by l-x.
and
J
( a 3 , . - . , a n)~ M2
x3a 3 ...x na n [.J u 2
b3,.., bn)'~ ~2
x3 ...X
b FI
Fl
(~.~ 2)
(where u 2 is an arbitrary parameter in L2),
-9-
+ > a3 an
x2 = x3 9 xn (2.6.2 + )
(a3,...,a n ~ M 2
etc.
Generally,
Fi(xi,...,Xn) - Fi_ 1 i.l(Xi,...,Xn ), xi,...,x j (2.2.i)
Mi = ((ai+l,...,an)~L~-ilgi(ai+l,...,an)<O I
Ni = {(bi+l,...,bn)~L~'ilgi(bi+l,...,bn)= O; (2.5.1)
and
xi-- i i
(ai+l,...,an)~Mi
I al+l
xi+ 1 ~ "x~n U ui I I
(bi+l,'' .,bn~N i
bi+l
xi+ I 9 bn1
(2.6.i)
(where u i is an arbitrary parameter in L2),
+ ~ ai+l an (2.6.i +)
x I =~ Xi+l ---x n
(ai+l' " " "" a n ~ i
Finally, we obtain
Fn(X n) = Xng n + h n (2.3.n)
We put now
I 1 if the constant gn4~ 0 (2.6.n.1)
Xn = 0 if the constant g n ~ 0 (2.6.n.2)
u n if the constant g n S 0 (2.6.n.3)
x : X (un) (2.7.n)
n n
(which, of course, may be a constant).
Analogously, we obtain
9 9 o 9 o 9 ~ D 9 i i i e . 9 9 o . ~ ~ . o i 9 m
x'= ~I if gn ~ 0
(2.6.n')
n (0 if gn ~ 0
of M I,...,M n, N I , 9 . ., Nn is required.
(Xih+l''''xi n)
w 2 An Example
Here
gl = 2 - 5 x2x 3,
and
NI =
and hence
xI = x x 3i = x2x3 (2.8 i)
g2 = - 3 x 3 + 3 + 3 x 4,
and
M1 =
NI = ~(i,0)},
- 12 -
and hence
x 2 = u 9 x~ 9 X~ o --- U . x3 . x4 , (2.8.2)
x~-O. (2.8.2 + )
F 3 = - 7 x 3 + 9 x4x 5,
g3 = -7,
x3 = I (2.8.3)
F 4 = - 7 + 9 x4x 5,
g4 = 9 x 5
t44. =
.,, (co)J,
and hence
x4 = vx~ = vY 5 (2.8.~-)
- o (2.8.a. +)
F5 = -7,
g5 = O,
X5 ---- W . (2.8.5)
X5 = W.
x4 = v~
x3 = 1 (2.9)
x 2 = u(l-v + vw)
x I = u(l-v + vw)
FI(O,O, 1,0,0
F 1(0,0,1,0,1)
) =
=
)
F1(1,1,1,0,01 = ( -- - 7
F1(1,1,1,0,1) =
F1(0,0,1,1,0) = /
Chapter
w 1A Direct Approach
fl(Xl,...,Xn)4 0 (3.1)
FI(O,O, 1,0,0
F 1(0,0,1,0,1)
) =
=
)
F1(1,1,1,0,01 = ( -- - 7
F1(1,1,1,0,1) =
F1(0,0,1,1,0) = /
Chapter
w 1A Direct Approach
fl(Xl,...,Xn)4 0 (3.1)
A system
~~i(Xl,...,Xn) + I] = i (3.4)
f (x I, ...,x n ) = o. (3.1)
A set of PBF :
if f(xl,...,x n) ~ 0
f'(xl,...,Xn)=(f(xl,...,x n))' = ~ i 0
if f ( x I, ...,x n ) = 0
tion of it will be
(i=l, ...,n)
f3 2 = (x4''''' )x 3 + (x4'''''Xn)X3 = 0
9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9
fn = n-i Yn-i n Xn + ~n --
0
(k=l,...,n-l)
where
-Z /Xs .. xt (3.1o)
where all the coefflclents 4#.._ .~are positive.
Using the bynary development of the coefficients
. . . . . . . . . ~ ... (3.11)
~-~ 2 j
J L~'"~" ~"1~i
X
""
XpTr- 2j d~,'~..~' X X
s "
. .Xt (3.12)
THEOREM 5
where
R(Xl,-..,Xn)~jm_~l~i(Xl,...,Xn) A 1 ~ 1 (3.17)
1 2
Rn = xn Rn A Rn ~--- o (mod 2) (3.19.n)
Chapter 4
Pseudo-Boolean Programming
1 2
Rn = xn Rn A Rn ~--- o (mod 2) (3.19.n)
Chapter 4
Pseudo-Boolean Programming
De termine
(Xl,...,Xn)s
n
2 (4.1)
satisfying the PBR
fo(Xl, ....~x n)
Phase I Solve the system (4.2) with one of the methods descri-
bed in Chapter 3. Let the general solution of (4.2) be
xj. = x j (Pl ,. "" , Pn ) (j:l,...,n) (4.4)
Minimizing now the unconstrained PBF F(p I, ...,pn ) with the me-
thod given in chapter 2, we find
xj = Xj(Ul,...,Un) (4.7)
and
9 in o fo EI UlUn Xn UlUn ]
- 20 -
fi (Xl'''''Xn) ~ 0. (4.9)
In this case denoting with D and E sums of the positive and
negative coefficients of a polynomial expression of fo(Xl, ...Xn),We have
Chapter 5
fi (Xl'''''Xn) ~ 0. (4.9)
In this case denoting with D and E sums of the positive and
negative coefficients of a polynomial expression of fo(Xl, ...Xn),We have
Chapter 5
yl,...,yn in Y (5.1)
and
z 1,...,z k in Z (5.2)
minimizing the polynomial
"if pj(Yl,...,yh;zl,...,Zk)R'0
t then p ~(Yl ,... "Yh; Zl ,..., Zk) R"O "
(5.5)
"at least one of the relations
holds"
Let us put
Mq --Mq = mq (5.9)
and let
z' = 2~ , i z' + . $ 2s(q)z '
q z oq + 2 lq "" s(q),q (5.1o)
w 3 Logical Condi,t,ions
0 =i (5.5')
- 23 -
(5.6')
Pjt § # Pj" = 0
(5-7')
~ = i
PA RT II
Chapter 6
(5.6')
Pjt § # Pj" = 0
(5-7')
~ = i
PA RT II
Chapter 6
cij k0 i'? i
n n
X ,
J
1 i ~I' j ~ ~
[
1 , " " "'j
qul (6.4)
0 if j Jl''' "'Jq
A
P1 = MI /
P2 = M2 - M1
9 9 9 9 9 9
i-1
9
L
Pi = Mi - j~--i Mj (6.6)
C:
j=l
3 ..J
O~,(G) = mRS,
a % IRI (6.7)
We have
THEOREM II o o
For any (Xl,...,Xn)EL 2n minimizing the pseu-
do-Boolean function
n n n
E = (n+l 4--- c jxix j - xk (6.8)
i=l j =l i =
and for
R~ = {I
vi vi6V, o }
xi = 1 (6.9)
we have n
~(a) : xi =
i=l
and any maximal interiorly stable set may be obtained in this
way.
and for
so : i Ivis x~ (6.~4)
we have
n
(6.15)
i=l
We have
10 i j
i=i j=l i=l j =i
9 : I o:
is a kernel, and any kernel may be obtained in this way.
Chapter 7
and for
so : i Ivis x~ (6.~4)
we have
n
(6.15)
i=l
We have
10 i j
i=i j=l i=l j =i
9 : I o:
is a kernel, and any kernel may be obtained in this way.
Chapter 7
in which the node w (called the sink) has the property that
n
W i ~ w n, (i=l,2,...,n) (7.2)
f
n n Ii if i = i
> cijfij - > cjifji :-- I_~ if i ~ l,n (7.4)
j=l j=l if i = n
~ij~kij (7.5)
g(U,U') =
i ~ Iu
Z_ gij
(7.6)
J 6 IU '
vector (l,q2,...,qn_l,O)6L n
2 where qi is equal to 1 if i ~ I Q
and to 0 if i ~ I Q .
then
qo =
{ioIwi qi = (7,8)
fying
0~ hij~kij (7.1o)
and we are seeking the maximal L for which f.. satisfy (7.4) and
13
Chapter 8
fying
0~ hij~kij (7.1o)
and we are seeking the maximal L for which f.. satisfy (7.4) and
13
Chapter 8
finding a system
be minimized.
This problem leads us to that of finding the minimum of
the function
m n
F(YI'''''Ym ; Zl'''''Zn) =
>i=l aiYi +
7-j=i
(8.3)
tions
yi~zj = 1 if i 6 S j , (8.4)
o
z = x. (j=l,...,n) (8.7)
i
J
(yO ,yO o o) ( o 'x o)
F i'''" ; Zl'''"Zn = G Xl,... (8.8)
Chapter 9
o
z = x. (j=l,...,n) (8.7)
i
J
(yO ,yO o o) ( o 'x o)
F i'''" ; Zl'''"Zn = G Xl,... (8.8)
Chapter 9
that
if (Xl,...,Xn) E N f
of f if
let us put
I
i if X i is an implicant of pj (9.3)
zj
0 if X i is not an implicant of pj
j-1
we have (/72/):
Io) In fact the method permits also the choice of any other
criterion of minimization, which fulfiles certains axioms
(see /72/).
- 34 -
(9.4)
+ 8 ~ il~- a i j y j ) , =
j--i
m
O
YjPj (Xl,...,Xn), (9.5)
Chapter lo
Minimal decomposition of finite partially
ordered sets in chains
if s i sj
bij = (Io.I)
0 if si,~s j
(9.4)
+ 8 ~ il~- a i j y j ) , =
j--i
m
O
YjPj (Xl,...,Xn), (9.5)
Chapter lo
Minimal decomposition of finite partially
ordered sets in chains
if s i sj
bij = (Io.I)
0 if si,~s j
a subset D = {Sjl ' ' ' " s " E ] ~ D S' s~' thatj f~ rany Sju'S"Jv
decomposition , ..., , .
Let us consider a finite graph G = (V,A') and two sub-
sets V' and V" of V, so that
V'r~V" = r (lo.2)
w 1 Maximal Anti-Chains
then
D~ = {s ~ I di = i, i=l,...,n} (lo.5)
, = ~(~1,...,~ ~ (lo.6)
§ :{siEsl s , (10.8)
G = - Z>
h:l
th -
j_-1 Y[
b..=l
zj
~i + n (io.Io)
then
.---0(t~, o) (lo.11)
- 37 -
rcs 9
v,=iv ' " 9 "
Vnt v" {v" = n+l' " " "'
Vnt "
The cuts and joins below are relative to (V',V"). The results
of F u l k e r s o n based on a theorem of K~nig ~79/,p.232) permit to
construct a minimal decomposition of S if we know a maximal
join of G, and to construct a maximal anti-chain of S, if we
know a minimal cut of G.
We have ~/58/):
o o o o 2n
THEOREM 19 Let (cl,...,c n ; Cn+l,...,C2n)~L 2 be a
COROLARY
j 9 9 e~ (1o.15)
- 38 -
Appendix
Acknowls
REFERENCES
/5/. BALAS, E., IVANESCU, P.L. (HAMMER) : ,"A Method for Solving
Transportation Problems", (in Rumanian), Comunic~rile
Academiei RPR, II,1961,n.9.
/21/. CHARNES, A., KIRBY, M.: "The Dual Method and the Method of
Balas and Iv~nescu for the Transportation Problem",
Cahiers du Centre d'Etudes de Recherche 0p@rationelle,
vol.6,1964,n.l.pp.5-18-
/49/. HARARY, F., ROSS, !.C.: "A Procedure for Clique Detection
Using the Group Matrix", Sociometry, 2o, 1957,pp.2o5-215.
- 44 -
/73/. IVANESCU, P.L. (HAMMER) and RUDEANU, S.: "On the Egervary
Method for Solving Transportation Problems, I", (in Rumanian),
Comuni~arile Academiei RPR, 11, 1961,n.7.
/74/. IVANESCU, P.L. and RUDEANU, S.: " On the Egervary Method for
Solving Transportation Problems, II", (in Rumanian), Studii
~i Cercet~ri Matematice, 14, 1963, n.l.
/78/. KOLUMBAN, I.: "On the Egervary Method for Solving the Trans-
portation Problem", Comm. at the Coll. on Numer.Anal.,CluJ,
Rumania, December 1962.
/85/. LAND, A.H. and D01G, A.G.: "An Automadc Method of Sol-
ving Discrete Programming Problems", London School of
Economics, 1957.