SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 9 (July 2013), PP. 22-28
22
Transportation Programming Under Uncertain
Environment
Subhakanta Dash1
, S. P. Mohanty 2
1
Department. of Mathematics, Silicon Institute of Technology, Bhubaneswar, India
2
Department of Mathematics, College of Engineering and Technology, Bhubaneswar, India.
Abstract:- In a transportation problem the cost of transportation from source to destination depends on many
factors which may not be deterministic in nature. In this work, the unit cost of transportation is considered to be
uncertain and the rough cost is assigned to the model. In the solution of such a model, two solutions as
pessimistic and optimistic solutions are obtained which suggest a range for the actual solution. Further, using
uncertain distribution, one compromise solution process is also proposed.
Keywords:- Transportation Problem, Rough set, Rough variable, Uncertainty measure, Uncertain distribution
I. INTRODUCTION
Transportation problem is one of the important linear programming problems. Many efficient methods
have been developed to solve a transportation problem where the unit cost of transportation, demand and supply
are all deterministic. In many practical situations, the unit cost of transportation may not deterministic in nature.
The cost depends upon many factors like road condition, traffic load causing delay in delivery, break down of
vehicles, labor problem for loading & unloading, which may increase the cost. All these factors are uncertain
which cannot be predicted beforehand due to insufficient information, unpredictable environment.
Transportation problem in various types of uncertain environment such as fuzzy, random are studied by
many researchers. In this paper we have developed a transportation model with rough and uncertain
environment.
Rough set theory was first developed by Pawlak[12] in 1982. Since then many researchers have
developed the theoretical aspects and applied the concept to solve problems related to data mining, data
development analysis, neural network, signal processing etc.
B.Liu [1] has proposed the uncertainty theory to deal with the problems related to uncertain
environment. B Liu [2] has also proposed the concept of rough variable which is a measurable function from
rough space to the set of real numbers.
Many researchers have used concept of rough variables in some optimization problems. Xu and Yao
[8] studied a two-person zero-sum matrix games with payoffs as rough variables. Youness[5] introduced a
rough programming problem considering the decision set as a rough set. Xu et al [9] proposed a rough DEA
model to solve a supply chain performance evaluation problem with rough parameters. Xiao and Lai [11] have
considered power-aware VLIW instruction scheduling problem with power consumption parameters as rough
variables. Kundu [10] proposed some solid transportation models with crisp and rough costs. In this paper we
have formulated transportation problems considering the unit cost of transportation from source to destination as
rough variables where we get pessimistic and optimistic solution of the problem under certain level of trust(level
of confidence). Again using the uncertain distribution, we have proposed solution method for a compromise
solution.
The rest of the paper is organized as follows: In Section II, we provide some definitions and properties
of rough set, rough variable and uncertain distribution. In Section III, we present our proposed transportation
problems and model formulation. The solution procedure is discussed in section IV. One numerical example is
given in section V and finally the conclusion and scope of further work is given in section VI.
II. PRELIMINARIES
A. Rough set:
Rough set theory developed by Z. Pawlak[12],[13] is a mathematical tool for dealing with uncertain
and incomplete data without any prior knowledge about the data. We deal only with the available information
provided by the data to generate conclusion.
Let U be a finite non empty set called the universal and let R be a binary relation defined on U. Let R be a
equivalence relation and R(x) be the equivalence class of the relation which contain x. R shall be referred as
indiscernibility relation.
Transportation Programming Under Uncertain Environment
23
For any X  U, the lower and upper approximation of X is defined by
   R(X) U : R(x) X , R(X) = U : R(x) Xx x       .
The lower approximation R(X) is exact set contained in X so that the object in R(X) are members
of x with certainty on the basis of knowledge in R, where the objects in the upper approximation R(X) can be
classified as possible members of X. The difference between the upper and lower approximation of X will be
called as R-boundary of X and is defined by RBN (X) = R(X) R(X) .
The set X is R-exact if RBN (X) =  , otherwise the set is R- rough set.
B. Rough variable
The concept of rough variable is introduced by Liu[2]as uncertain variable. The following definitions are based
on Liu[2].
Definition 1 : Let  be a non empty set, A be an  - algebra of subsets of  ,  be an element in A , and
 be a non negative, real- valued, additive set function on A. Then  , , ,A   is called a rough space.
Definition 2: A rough variable  on the rough space  , , ,A   is a measurable function from  to the
set of real numbers  such that for every Borel set B of  , we have   | B A     . Then the
lower and upper approximation of the rough variable are defined as follows
}|)({,}|)({  
Definition 3: Let  , , ,A   be a rough space. Then the upper and lower trust of event A is defined by
 
 
 
 
 
 
A A
Tr A and Tr A
 
 
 
 
 
The trust of the event A is defined as
      1
Tr A Tr A T r A
2
 
The trust measure satisfies the followings:
   
   
   c
Tr 1 , Tr 0
Tr A Tr B where A B
Tr A Tr A 1
  
 
 
Definition.4: Let 1 2,  be rough variables defined on the rough space  , , ,A   . Then their sum and
product are defined as
      
      
1 2 1 2
1 2 1 2
+
. .
      
      
 

Definition 5: Let  be rough variables defined on the rough space  , , ,A   and (0,1]  then
    sup sup r | Tr r      is called  -optimistic value of  .
    inf inf r | Tr r      is called  -pessimistic value of  .
Definition 6: Let  be rough variables defined on the rough space  , , ,A   . The expected value of  is
defined by
     
0
0
E Tr Trr dr r dr  


    
Definition 7: The trust density function : R [0, )f   of a rough variable  is a function such that
 x ( )
x
f y dy

  holds for all x  ,   , where  is trust distribution of  . If     = a,b , ,c d
be a rough variable such that c  a < b  d, then the trust distribution  x   Tr x  is
Transportation Programming Under Uncertain Environment
24
 
 
 
  
0 if x c
x
if c x a
2
(b a)+(d c) 2
x if a x b
2
x+d 2c
c
d c
x ac ad bc
b a d c



 

    
  
 

 
if b x d
2
1 if x d
d c









 

 
And the trust density function is defined as
 
   
1
if c x or b x d
2 d c
1 1
f(x) = + if a x b
2 b c 2 d c
0 otherwise
a

    


 
 



α-optimistic value to     = a,b , ,c d is
 
 
 
   
 
      
   
sup
d b
1 2 2 , if ;
2
2d
2 1 2 1 , if ;
2
2
, otherwise.
d c
d c
a c
d c
d c
d b a b d c b a d c
b a d c
  
    

 
  

  
    

      

  
α-pessimistic value to     = a,b , ,c d is
 
 
 
   
 
      
   
inf
a c
1 2 2 , if ;
2
b+d 2c
2 1 2 1 , if ;
2
2
, otherwise.
c d
d c
c d
d c
c b a a d c b a d c
b a d c
  
    

 
  

 
    

      

  
The expected value of  is )(
4
1
)( dcbaE 
C . Uncertainty Theory
B.Liu [1],[2] has developed uncertainty theory which is considered as a new approach to deal with
indeterminacy factors when there is a lack of observed data. In this section, some basic concepts of uncertainty
theory has been reviewed which shall be used to establish a compromise solution of transportation problem
under uncertainty.
Uncertainty Measure
Let L be a  - algebra on a nonempty set . A set function M : L [0,1] is called an uncertain measure if it
satisfies the following axioms
Axiom 1: (Normality axiom) M () = 1 for the universal set 
Axiom 2: (Duality axiom)   c
M M( ) 1    for every event 
Axiom 3: (sub additive axiom) For every countable sequence of events 1 2, ,.....  we have
 i i
1i=1
M M
i
 

 
   
 

The triplet , ,L  is called an uncertain space.
Axiom 4: (Product measure) Let  , ,k k kL  be uncertainty spaces for k = 1, 2……The product uncertain
measure M is an uncertain measure satisfying
)(}{ 1
1
kkk
k
k MM  




where, k an arbitrary chosen events for kL for k = 1,2…… respectively.
Transportation Programming Under Uncertain Environment
25
Uncertain Variable
An uncertain variable  is essentially a measurable function from an uncertainty space to the set of real
numbers. Let  be an uncertain variable. Then the uncertainty distribution of  is defined as
   x M x   for any real number x. An uncertain variable is called linear if it has linear uncertainty
distribution L(a,b)
 
0 if x a
x
x if a x b
1 if x > b
a
b a


 
  


where, a and b are real numbers with a < b.
An uncertain distribution  is said to be regular if its inverse function  1
 
exists and is unique for
each  0,1  . The linear uncertainty distribution L(a, b) is regular and its inverse uncertainty distribution is
     1
1 a b   
   .
III. DESCRIPTION OF THE PROBLEM AND MODEL FORMULATION
A. Crisp Model
Suppose that there are m sources and n destinations. Let ia be the number of supply units available at
source i( i= 1,2….m) and let bj be the number of demands units required at destination j ( j= 1,2….n). Let cij
represents the unit transportation cost for transportation the units from source i to destination j. The objective is
to determine the number of units to be transported from source i to destination j, so that the total transportation
cost is minimum. Let xij be the decision variable which denotes the number of units shipped from source i to
destination j.
m
ij ij
i = 1 1
n
ij
j = 1
m
ij
i = 1
Minimize Z = c x
subject to constraint
, i = 1,2 ,......,m. (1)
, j = 1,2 ,......,n. (2)
and
n
j
i
j
x a
x b






ijx 0 (3)
B. Rough Model
If the cost cij is a rough variable of the form
 2 3 1 4
ij
1 2 3 4
Let c , , , ,
where
ij ij ij ij
ij ij ij ij
c c c c
c c c c
       
  
and the objective function becomes a rough variable of the form
 2 3 1 4
m
r r
ij ij
i = 1 1
Z = Z , Z , Z , Z
where Z c x , r = 1,2,3,4
n
j
      
 
Then the rough model of transportation problem becomes
Minimize Z
s.t the constraints (1) – (3).
IV. SOLUTION PROCEDURE
A. Solution for rough model
Since the objective function of transportation problem with rough cost, so we minimize the smallest
objective Z satisfying  Tr Z Z   where  0,1  is a specified trust (confidence level) i,e. we
Transportation Programming Under Uncertain Environment
26
minimize the α- pessimistic value  infZ  of Z . This implies that the optimum objective value will below
the Z with a trust level at least . So the problem becomes Min(Min Z) .
From the definition of the α- pessimistic value, the above programming becomes
Min Z/
s.t the constraints (1)-(3).
where,
 
 
   
 
     
2 1
1 4
4 1
3 4 1
/ 1 4
4 1
1 3 2 2 4 1 3 2 4
Z Z
1 2 Z 2 Z , if
2 Z Z
Z 2Z
2 1 Z 2 1 Z , if
2 Z Z
2
Z
Z
Z Z Z Z Z Z Z Z Z
  
  


  

 
    

      
   
1
3 2 4 1
, otherwise
Z
Z Z Z Z









   
Now we formulate another model to minimize the greatest objective Z satisfying  Tr Z Z   where
 0,1  is a specified trust (confidence level) i,e. we minimize the α- optimistic value  supZ  of Z .
This implies that the optimum objective value will below the Z with a trust level at least . So the model
becomes Min(Max Z). From the definition of the optimistic value, the above problem becomes
Min Z//
s.t the constraints (1)- (3)
where,
 
 
   
 
     
4 3
4 1
4 1
4 2 1
/ / 4 1
4 1
4 3 2 3 4 1 3 2 4
Z Z
1 2 Z 2 Z , if
2 Z Z
2Z Z
2 1 Z 2 1 Z , if
2 Z Z
2
Z
Z
Z Z Z Z Z Z Z Z Z
  
  


  

 
    

      
   
1
3 2 4 1
, otherwise
Z
Z Z Z Z









   
Since for 0.5 < α  1,    inf supZ Z  , so solving the problem with trust level α, we conclude that the
optimum objective value lie within the range
// /
Z ,Z   with trust level at least α.
B. Compromise Solution
In solving the rough model of transportation problem, we find two solutions as the α- pessimistic solution and
the α-optimistic solution. But in many cases the decision maker shall prefer one set of solution rather being
confused with two sets of solutions. In this section, we proposed one solution procedure as a compromise
solution. When the unit cost of transportation from ith source to jth destination is a rough variable as
 2 3 1 4
ij
1 2 3 4
, , ,
where
ij ij ij ij
ij ij ij ij
c c c c c
c c c c
       
  
We find the α- pessimistic solution as p and the α-optimistic solution as q which gives two real values, where
p < q and corresponding we get an interval [p,q].
We define an uncertain variable  in the interval [p,q] whose distribution function is defined as a linear regular
uncertain distribution define by Liu [1].
 
0 if x p
x
x if p x q
1 if x q
p
q p

 


  

 
The inverse uncertainty distribution will give a crisp value cij as
   -1
ij, 1c p q     
In the above process we will get a set of deterministic cost cij from the set of rough costs. Then the model can be
solved to give a solution which can be considered as a compromise solution.
Transportation Programming Under Uncertain Environment
27
V. NUMERICAL EXAMPLE
A. Problems with unit transportation costs as crisp numbers
Consider a problem with three sources ( i= 1,2,3) and three destinations ( j = 1,2,3).The unit transportation costs,
the availability at each source, demands of each destination are given in the table:
Table I: Unit Transportation Cost cij in Crisp
Availability and Demands : a1=14, a2=12,a3=15,b1=21,b2=12 and b3=8
Then the optimum solution is given by
x11=14 , x22=4, x23=8, x31=7, x32=8 and Minimum Z = 243.
B. Problems with unit transportation costs as rough variable
Consider a problem with three sources ( i= 1,2,3) and three destinations ( j = 1,2,3).The unit transportation costs
are rough variables, the availability at each source, demands of each destination are crisp numbers which is
given in the table:
Table II: Unit Transportation Cost cij in Rough Variable
ji 1 2 3
1 ([7,9],[6,10]) ([12,14],[11,15]) ([10,11],8,12])
2 ([4,5],[3,6]) ([3,4],[2,7]) ([5,7],[4,9])
3 ([5,6],[3,7]) ([2,3],[1,4]) ([10,11],[9,12])
Availability and Demands: a1=14, a2=12,a3=15,b1=21,b2=12 and b3=8
Then the optimum solution is given in rough values as Z = ([193,256],[149,297]).
If we take the trust value α = 0.8, then the α-pessimistic optimal solution will be Z/
=250.56.And the α-optimistic
optimal solution will be Z//
=197.54. So the optimum objective value lie within the range [Z//
,Z/
] i.e, [197.56,
250.56] when the trust value (confidence level) is 0.8.
C. Compromise Solution
(Problems with unit transportation costs as rough variable)
Consider a problem with three sources ( i= 1,2,3) and three destinations ( j = 1,2,3).The unit transportation costs
are rough variables, the availability at each source, demands of each destination are crisp number and the trust
value is 0.8 which is given in the table II.
The cost value cij in terms of α-optimistic and α-pessimistic values with α=0.8 are calculated and shown in the
following table
j/i 1 2 3
1 [7.2, 8.8] [12.2,13.8] [9.6,10.88]
2 [4.05, 4.95] [3.17, 5] [5.28,7]
3 [4.6, 5.88] [2.2, 2.95] [10.05,10.95]
Each cost cij can be considered as an uncertain variable lies in the interval [p , q], where p is the α-optimistic
value and q is the α-pessimistic value of the corresponding uncertain cost. Considering the linear inverse
uncertain distribution, the interval of uncertainty is transformed into a crisp value which is shown in the
following table.
The corresponding optimal solution with trust value 0.8 is calculated as:
x11=14, x21=4, x23=8, x31=3, x32=12 and the Minimum Z = 241.52.
ji 1 2 3
1 8 13 11
2 6 4 7
3 5 3 10
j/i 1 2 3
1 8.48 13.48 10.624
2 4.77 4.634 6.656
3 5.624 2.8 10.77
Transportation Programming Under Uncertain Environment
28
The minimum value of Z under compromise solution lies within the range of objective values as obtained by
rough model.
VI. CONCLUSION
In this work, the cost of transportation from the source to destination is considered to be uncertain and rough
costs are assigned. The availability as well as the demand is considered to be deterministic. Using the
uncertainty distribution the compromise solution is also proposed for the problem. Further investigation of the
work can be made by considering the availability and demand as uncertain.
REFERENCES
[1]. B. Liu, Uncertainty Theory, Springer-Verlag, Berlin, 2007
[2]. B. Liu, Theory and Practice of Uncertain Programming, Physical-Verlag, Heidelberg, 2012
[3]. B. Liu, Uncertainty Theory: An Introduction to its Axiomatic Foundation, Springer-Verlag, Berlin,
2004
[4]. B. Liu, “Inequalities and convergence concepts of fuzzy and Rough variables,” Fuzzy Optimization
and and Decision Making, vol. 2, pp. 87-100, 2003
[5]. E. Youness, ”Characterizing solutions of Rough Programming Problems,” European Journal of
Operational Research, vol.168, pp. 1019-1029, 2006
[6]. F. Jimenez, J. l. Verdegay, “Uncertain Solid Transportation problems”, Fuzzy sets and Systems, vol.
100, pp. 45-57, 1998
[7]. G. Liu, W. Zhu,”The Algebraic Structures of Generalized Rough Set Theory”, Information Sciences,
vol. 178, pp. 4105-4113, 2008
[8]. J. Xu, L. Yao, ”A Class of Two-Person Zero Sum Matrix Games with Rough payoffs”, International
Journal of Mathematics and Mathematical Sciences, doi: 10.1155/ 2010/ 404792, 2010
[9]. J. Xu, B. Li, D. Wu, “Rough data Envelopment Analysis and its Application to Supply Chain
Performance Evaluation”, International Journal of Production Economics, vol. 122, pp. 628-638, 2009
[10]. P. Kundu, S. Kar, M. Maiti, “Some Solid transportation Model with Crisp and Rough Costs”, World
Academy od Science, Engineering and Technology, vol. 73, pp. 185-192, 2013
[11]. Shu, Xiao, Edmund M.K. Lai, “A Rough Programming Approach to Power-Aware VLIW Instruction
Sheduling for Digital Signal Processors, Proc ICASSP, 2005
[12]. Z. Pawlak, “Rough Sets”, International Journal of Information and Computer Science, vol.11(5), pp.
341-356, 1982
[13]. Z. Pawlak, A. Skowron, “Rough Sets, some Extension”, Information Sciences, vol.177, pp. 28-40,
2007

More Related Content

What's hot

B04110710
B04110710B04110710
Data Analysis Homework Help
Data Analysis Homework HelpData Analysis Homework Help
Data Analysis Homework Help
Matlab Assignment Experts
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
Ajay Bidyarthy
 
Q
QQ
test pre
test pretest pre
test pre
farazch
 
Backtracking & branch and bound
Backtracking & branch and boundBacktracking & branch and bound
Backtracking & branch and bound
Vipul Chauhan
 
2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine
nozomuhamada
 
Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...
Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...
Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...
Mengxi Jiang
 
Diffusion Homework Help
Diffusion Homework HelpDiffusion Homework Help
Diffusion Homework Help
Statistics Assignment Help
 
Comparitive Analysis of Algorithm strategies
Comparitive Analysis of Algorithm strategiesComparitive Analysis of Algorithm strategies
Comparitive Analysis of Algorithm strategies
Talha Shaikh
 
Independent component analysis
Independent component analysisIndependent component analysis
Independent component analysis
Vanessa S
 
Assignment 2 daa
Assignment 2 daaAssignment 2 daa
Assignment 2 daa
gaurav201196
 
Dynamic Programming - Part II
Dynamic Programming - Part IIDynamic Programming - Part II
Dynamic Programming - Part II
Amrinder Arora
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
Masahiro Suzuki
 
Greedy method
Greedy method Greedy method
Greedy method
Dr Shashikant Athawale
 
A Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image SimilarityA Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image Similarity
Farah M. Altufaili
 
Penalty Function Method For Solving Fuzzy Nonlinear Programming Problem
Penalty Function Method For Solving Fuzzy Nonlinear Programming ProblemPenalty Function Method For Solving Fuzzy Nonlinear Programming Problem
Penalty Function Method For Solving Fuzzy Nonlinear Programming Problem
paperpublications3
 
Image recogonization
Image recogonizationImage recogonization
Image recogonization
SANTOSH RATH
 
Algorithm chapter 9
Algorithm chapter 9Algorithm chapter 9
Algorithm chapter 9
chidabdu
 

What's hot (19)

B04110710
B04110710B04110710
B04110710
 
Data Analysis Homework Help
Data Analysis Homework HelpData Analysis Homework Help
Data Analysis Homework Help
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
 
Q
QQ
Q
 
test pre
test pretest pre
test pre
 
Backtracking & branch and bound
Backtracking & branch and boundBacktracking & branch and bound
Backtracking & branch and bound
 
2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine
 
Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...
Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...
Application of Graphic LASSO in Portfolio Optimization_Yixuan Chen & Mengxi J...
 
Diffusion Homework Help
Diffusion Homework HelpDiffusion Homework Help
Diffusion Homework Help
 
Comparitive Analysis of Algorithm strategies
Comparitive Analysis of Algorithm strategiesComparitive Analysis of Algorithm strategies
Comparitive Analysis of Algorithm strategies
 
Independent component analysis
Independent component analysisIndependent component analysis
Independent component analysis
 
Assignment 2 daa
Assignment 2 daaAssignment 2 daa
Assignment 2 daa
 
Dynamic Programming - Part II
Dynamic Programming - Part IIDynamic Programming - Part II
Dynamic Programming - Part II
 
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
(DL hacks輪読) How to Train Deep Variational Autoencoders and Probabilistic Lad...
 
Greedy method
Greedy method Greedy method
Greedy method
 
A Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image SimilarityA Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image Similarity
 
Penalty Function Method For Solving Fuzzy Nonlinear Programming Problem
Penalty Function Method For Solving Fuzzy Nonlinear Programming ProblemPenalty Function Method For Solving Fuzzy Nonlinear Programming Problem
Penalty Function Method For Solving Fuzzy Nonlinear Programming Problem
 
Image recogonization
Image recogonizationImage recogonization
Image recogonization
 
Algorithm chapter 9
Algorithm chapter 9Algorithm chapter 9
Algorithm chapter 9
 

Similar to International Journal of Engineering Research and Development (IJERD)

Machine learning (11)
Machine learning (11)Machine learning (11)
Machine learning (11)
NYversity
 
Conference_paper.pdf
Conference_paper.pdfConference_paper.pdf
Conference_paper.pdf
NarenRajVivek
 
Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...
Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...
Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...
ijsrd.com
 
Cs229 notes10
Cs229 notes10Cs229 notes10
Cs229 notes10
VuTran231
 
Propagation of Error Bounds due to Active Subspace Reduction
Propagation of Error Bounds due to Active Subspace ReductionPropagation of Error Bounds due to Active Subspace Reduction
Propagation of Error Bounds due to Active Subspace Reduction
Mohammad
 
On image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDAOn image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDA
Raghu Palakodety
 
Optimistic decision making using an
Optimistic decision making using anOptimistic decision making using an
Optimistic decision making using an
ijaia
 
Materi_Business_Intelligence_1.pdf
Materi_Business_Intelligence_1.pdfMateri_Business_Intelligence_1.pdf
Materi_Business_Intelligence_1.pdf
Hasan Dwi Cahyono
 
A New Method To Solve Interval Transportation Problems
A New Method To Solve Interval Transportation ProblemsA New Method To Solve Interval Transportation Problems
A New Method To Solve Interval Transportation Problems
Sara Alvarez
 
Numerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project ReportNumerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project Report
Shikhar Agarwal
 
principalcomponentanalysis-150314161616-conversion-gate01 (1).pptx
principalcomponentanalysis-150314161616-conversion-gate01 (1).pptxprincipalcomponentanalysis-150314161616-conversion-gate01 (1).pptx
principalcomponentanalysis-150314161616-conversion-gate01 (1).pptx
sushmitjivtode21
 
[PPT]
[PPT][PPT]
[PPT]
butest
 
05_AJMS_255_20.pdf
05_AJMS_255_20.pdf05_AJMS_255_20.pdf
05_AJMS_255_20.pdf
BRNSS Publication Hub
 
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...
IJCSIS Research Publications
 
2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
nozomuhamada
 
An approximate possibilistic
An approximate possibilisticAn approximate possibilistic
An approximate possibilistic
csandit
 
Bigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcas
Bigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcasBigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcas
Bigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcas
king896096
 
New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...
New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...
New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...
BRNSS Publication Hub
 
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
IJERA Editor
 
201977 1-1-4-pb
201977 1-1-4-pb201977 1-1-4-pb
201977 1-1-4-pb
AssociateProfessorKM
 

Similar to International Journal of Engineering Research and Development (IJERD) (20)

Machine learning (11)
Machine learning (11)Machine learning (11)
Machine learning (11)
 
Conference_paper.pdf
Conference_paper.pdfConference_paper.pdf
Conference_paper.pdf
 
Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...
Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...
Sensitivity Analysis of GRA Method for Interval Valued Intuitionistic Fuzzy M...
 
Cs229 notes10
Cs229 notes10Cs229 notes10
Cs229 notes10
 
Propagation of Error Bounds due to Active Subspace Reduction
Propagation of Error Bounds due to Active Subspace ReductionPropagation of Error Bounds due to Active Subspace Reduction
Propagation of Error Bounds due to Active Subspace Reduction
 
On image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDAOn image intensities, eigenfaces and LDA
On image intensities, eigenfaces and LDA
 
Optimistic decision making using an
Optimistic decision making using anOptimistic decision making using an
Optimistic decision making using an
 
Materi_Business_Intelligence_1.pdf
Materi_Business_Intelligence_1.pdfMateri_Business_Intelligence_1.pdf
Materi_Business_Intelligence_1.pdf
 
A New Method To Solve Interval Transportation Problems
A New Method To Solve Interval Transportation ProblemsA New Method To Solve Interval Transportation Problems
A New Method To Solve Interval Transportation Problems
 
Numerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project ReportNumerical Solutions of Burgers' Equation Project Report
Numerical Solutions of Burgers' Equation Project Report
 
principalcomponentanalysis-150314161616-conversion-gate01 (1).pptx
principalcomponentanalysis-150314161616-conversion-gate01 (1).pptxprincipalcomponentanalysis-150314161616-conversion-gate01 (1).pptx
principalcomponentanalysis-150314161616-conversion-gate01 (1).pptx
 
[PPT]
[PPT][PPT]
[PPT]
 
05_AJMS_255_20.pdf
05_AJMS_255_20.pdf05_AJMS_255_20.pdf
05_AJMS_255_20.pdf
 
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...
 
2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
 
An approximate possibilistic
An approximate possibilisticAn approximate possibilistic
An approximate possibilistic
 
Bigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcas
Bigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcasBigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcas
Bigdatanauiduihaunjcinacssdzhniuasdb ahcbsibcas
 
New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...
New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...
New Method for Finding an Optimal Solution of Generalized Fuzzy Transportatio...
 
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
 
201977 1-1-4-pb
201977 1-1-4-pb201977 1-1-4-pb
201977 1-1-4-pb
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 9 (July 2013), PP. 22-28 22 Transportation Programming Under Uncertain Environment Subhakanta Dash1 , S. P. Mohanty 2 1 Department. of Mathematics, Silicon Institute of Technology, Bhubaneswar, India 2 Department of Mathematics, College of Engineering and Technology, Bhubaneswar, India. Abstract:- In a transportation problem the cost of transportation from source to destination depends on many factors which may not be deterministic in nature. In this work, the unit cost of transportation is considered to be uncertain and the rough cost is assigned to the model. In the solution of such a model, two solutions as pessimistic and optimistic solutions are obtained which suggest a range for the actual solution. Further, using uncertain distribution, one compromise solution process is also proposed. Keywords:- Transportation Problem, Rough set, Rough variable, Uncertainty measure, Uncertain distribution I. INTRODUCTION Transportation problem is one of the important linear programming problems. Many efficient methods have been developed to solve a transportation problem where the unit cost of transportation, demand and supply are all deterministic. In many practical situations, the unit cost of transportation may not deterministic in nature. The cost depends upon many factors like road condition, traffic load causing delay in delivery, break down of vehicles, labor problem for loading & unloading, which may increase the cost. All these factors are uncertain which cannot be predicted beforehand due to insufficient information, unpredictable environment. Transportation problem in various types of uncertain environment such as fuzzy, random are studied by many researchers. In this paper we have developed a transportation model with rough and uncertain environment. Rough set theory was first developed by Pawlak[12] in 1982. Since then many researchers have developed the theoretical aspects and applied the concept to solve problems related to data mining, data development analysis, neural network, signal processing etc. B.Liu [1] has proposed the uncertainty theory to deal with the problems related to uncertain environment. B Liu [2] has also proposed the concept of rough variable which is a measurable function from rough space to the set of real numbers. Many researchers have used concept of rough variables in some optimization problems. Xu and Yao [8] studied a two-person zero-sum matrix games with payoffs as rough variables. Youness[5] introduced a rough programming problem considering the decision set as a rough set. Xu et al [9] proposed a rough DEA model to solve a supply chain performance evaluation problem with rough parameters. Xiao and Lai [11] have considered power-aware VLIW instruction scheduling problem with power consumption parameters as rough variables. Kundu [10] proposed some solid transportation models with crisp and rough costs. In this paper we have formulated transportation problems considering the unit cost of transportation from source to destination as rough variables where we get pessimistic and optimistic solution of the problem under certain level of trust(level of confidence). Again using the uncertain distribution, we have proposed solution method for a compromise solution. The rest of the paper is organized as follows: In Section II, we provide some definitions and properties of rough set, rough variable and uncertain distribution. In Section III, we present our proposed transportation problems and model formulation. The solution procedure is discussed in section IV. One numerical example is given in section V and finally the conclusion and scope of further work is given in section VI. II. PRELIMINARIES A. Rough set: Rough set theory developed by Z. Pawlak[12],[13] is a mathematical tool for dealing with uncertain and incomplete data without any prior knowledge about the data. We deal only with the available information provided by the data to generate conclusion. Let U be a finite non empty set called the universal and let R be a binary relation defined on U. Let R be a equivalence relation and R(x) be the equivalence class of the relation which contain x. R shall be referred as indiscernibility relation.
  • 2. Transportation Programming Under Uncertain Environment 23 For any X  U, the lower and upper approximation of X is defined by    R(X) U : R(x) X , R(X) = U : R(x) Xx x       . The lower approximation R(X) is exact set contained in X so that the object in R(X) are members of x with certainty on the basis of knowledge in R, where the objects in the upper approximation R(X) can be classified as possible members of X. The difference between the upper and lower approximation of X will be called as R-boundary of X and is defined by RBN (X) = R(X) R(X) . The set X is R-exact if RBN (X) =  , otherwise the set is R- rough set. B. Rough variable The concept of rough variable is introduced by Liu[2]as uncertain variable. The following definitions are based on Liu[2]. Definition 1 : Let  be a non empty set, A be an  - algebra of subsets of  ,  be an element in A , and  be a non negative, real- valued, additive set function on A. Then  , , ,A   is called a rough space. Definition 2: A rough variable  on the rough space  , , ,A   is a measurable function from  to the set of real numbers  such that for every Borel set B of  , we have   | B A     . Then the lower and upper approximation of the rough variable are defined as follows }|)({,}|)({   Definition 3: Let  , , ,A   be a rough space. Then the upper and lower trust of event A is defined by             A A Tr A and Tr A           The trust of the event A is defined as       1 Tr A Tr A T r A 2   The trust measure satisfies the followings:            c Tr 1 , Tr 0 Tr A Tr B where A B Tr A Tr A 1        Definition.4: Let 1 2,  be rough variables defined on the rough space  , , ,A   . Then their sum and product are defined as               1 2 1 2 1 2 1 2 + . .                  Definition 5: Let  be rough variables defined on the rough space  , , ,A   and (0,1]  then     sup sup r | Tr r      is called  -optimistic value of  .     inf inf r | Tr r      is called  -pessimistic value of  . Definition 6: Let  be rough variables defined on the rough space  , , ,A   . The expected value of  is defined by       0 0 E Tr Trr dr r dr          Definition 7: The trust density function : R [0, )f   of a rough variable  is a function such that  x ( ) x f y dy    holds for all x  ,   , where  is trust distribution of  . If     = a,b , ,c d be a rough variable such that c  a < b  d, then the trust distribution  x   Tr x  is
  • 3. Transportation Programming Under Uncertain Environment 24          0 if x c x if c x a 2 (b a)+(d c) 2 x if a x b 2 x+d 2c c d c x ac ad bc b a d c                    if b x d 2 1 if x d d c               And the trust density function is defined as       1 if c x or b x d 2 d c 1 1 f(x) = + if a x b 2 b c 2 d c 0 otherwise a                α-optimistic value to     = a,b , ,c d is                        sup d b 1 2 2 , if ; 2 2d 2 1 2 1 , if ; 2 2 , otherwise. d c d c a c d c d c d b a b d c b a d c b a d c                                    α-pessimistic value to     = a,b , ,c d is                        inf a c 1 2 2 , if ; 2 b+d 2c 2 1 2 1 , if ; 2 2 , otherwise. c d d c c d d c c b a a d c b a d c b a d c                                   The expected value of  is )( 4 1 )( dcbaE  C . Uncertainty Theory B.Liu [1],[2] has developed uncertainty theory which is considered as a new approach to deal with indeterminacy factors when there is a lack of observed data. In this section, some basic concepts of uncertainty theory has been reviewed which shall be used to establish a compromise solution of transportation problem under uncertainty. Uncertainty Measure Let L be a  - algebra on a nonempty set . A set function M : L [0,1] is called an uncertain measure if it satisfies the following axioms Axiom 1: (Normality axiom) M () = 1 for the universal set  Axiom 2: (Duality axiom)   c M M( ) 1    for every event  Axiom 3: (sub additive axiom) For every countable sequence of events 1 2, ,.....  we have  i i 1i=1 M M i             The triplet , ,L  is called an uncertain space. Axiom 4: (Product measure) Let  , ,k k kL  be uncertainty spaces for k = 1, 2……The product uncertain measure M is an uncertain measure satisfying )(}{ 1 1 kkk k k MM       where, k an arbitrary chosen events for kL for k = 1,2…… respectively.
  • 4. Transportation Programming Under Uncertain Environment 25 Uncertain Variable An uncertain variable  is essentially a measurable function from an uncertainty space to the set of real numbers. Let  be an uncertain variable. Then the uncertainty distribution of  is defined as    x M x   for any real number x. An uncertain variable is called linear if it has linear uncertainty distribution L(a,b)   0 if x a x x if a x b 1 if x > b a b a          where, a and b are real numbers with a < b. An uncertain distribution  is said to be regular if its inverse function  1   exists and is unique for each  0,1  . The linear uncertainty distribution L(a, b) is regular and its inverse uncertainty distribution is      1 1 a b       . III. DESCRIPTION OF THE PROBLEM AND MODEL FORMULATION A. Crisp Model Suppose that there are m sources and n destinations. Let ia be the number of supply units available at source i( i= 1,2….m) and let bj be the number of demands units required at destination j ( j= 1,2….n). Let cij represents the unit transportation cost for transportation the units from source i to destination j. The objective is to determine the number of units to be transported from source i to destination j, so that the total transportation cost is minimum. Let xij be the decision variable which denotes the number of units shipped from source i to destination j. m ij ij i = 1 1 n ij j = 1 m ij i = 1 Minimize Z = c x subject to constraint , i = 1,2 ,......,m. (1) , j = 1,2 ,......,n. (2) and n j i j x a x b       ijx 0 (3) B. Rough Model If the cost cij is a rough variable of the form  2 3 1 4 ij 1 2 3 4 Let c , , , , where ij ij ij ij ij ij ij ij c c c c c c c c            and the objective function becomes a rough variable of the form  2 3 1 4 m r r ij ij i = 1 1 Z = Z , Z , Z , Z where Z c x , r = 1,2,3,4 n j          Then the rough model of transportation problem becomes Minimize Z s.t the constraints (1) – (3). IV. SOLUTION PROCEDURE A. Solution for rough model Since the objective function of transportation problem with rough cost, so we minimize the smallest objective Z satisfying  Tr Z Z   where  0,1  is a specified trust (confidence level) i,e. we
  • 5. Transportation Programming Under Uncertain Environment 26 minimize the α- pessimistic value  infZ  of Z . This implies that the optimum objective value will below the Z with a trust level at least . So the problem becomes Min(Min Z) . From the definition of the α- pessimistic value, the above programming becomes Min Z/ s.t the constraints (1)-(3). where,                 2 1 1 4 4 1 3 4 1 / 1 4 4 1 1 3 2 2 4 1 3 2 4 Z Z 1 2 Z 2 Z , if 2 Z Z Z 2Z 2 1 Z 2 1 Z , if 2 Z Z 2 Z Z Z Z Z Z Z Z Z Z Z                                1 3 2 4 1 , otherwise Z Z Z Z Z              Now we formulate another model to minimize the greatest objective Z satisfying  Tr Z Z   where  0,1  is a specified trust (confidence level) i,e. we minimize the α- optimistic value  supZ  of Z . This implies that the optimum objective value will below the Z with a trust level at least . So the model becomes Min(Max Z). From the definition of the optimistic value, the above problem becomes Min Z// s.t the constraints (1)- (3) where,                 4 3 4 1 4 1 4 2 1 / / 4 1 4 1 4 3 2 3 4 1 3 2 4 Z Z 1 2 Z 2 Z , if 2 Z Z 2Z Z 2 1 Z 2 1 Z , if 2 Z Z 2 Z Z Z Z Z Z Z Z Z Z Z                                1 3 2 4 1 , otherwise Z Z Z Z Z              Since for 0.5 < α  1,    inf supZ Z  , so solving the problem with trust level α, we conclude that the optimum objective value lie within the range // / Z ,Z   with trust level at least α. B. Compromise Solution In solving the rough model of transportation problem, we find two solutions as the α- pessimistic solution and the α-optimistic solution. But in many cases the decision maker shall prefer one set of solution rather being confused with two sets of solutions. In this section, we proposed one solution procedure as a compromise solution. When the unit cost of transportation from ith source to jth destination is a rough variable as  2 3 1 4 ij 1 2 3 4 , , , where ij ij ij ij ij ij ij ij c c c c c c c c c            We find the α- pessimistic solution as p and the α-optimistic solution as q which gives two real values, where p < q and corresponding we get an interval [p,q]. We define an uncertain variable  in the interval [p,q] whose distribution function is defined as a linear regular uncertain distribution define by Liu [1].   0 if x p x x if p x q 1 if x q p q p            The inverse uncertainty distribution will give a crisp value cij as    -1 ij, 1c p q      In the above process we will get a set of deterministic cost cij from the set of rough costs. Then the model can be solved to give a solution which can be considered as a compromise solution.
  • 6. Transportation Programming Under Uncertain Environment 27 V. NUMERICAL EXAMPLE A. Problems with unit transportation costs as crisp numbers Consider a problem with three sources ( i= 1,2,3) and three destinations ( j = 1,2,3).The unit transportation costs, the availability at each source, demands of each destination are given in the table: Table I: Unit Transportation Cost cij in Crisp Availability and Demands : a1=14, a2=12,a3=15,b1=21,b2=12 and b3=8 Then the optimum solution is given by x11=14 , x22=4, x23=8, x31=7, x32=8 and Minimum Z = 243. B. Problems with unit transportation costs as rough variable Consider a problem with three sources ( i= 1,2,3) and three destinations ( j = 1,2,3).The unit transportation costs are rough variables, the availability at each source, demands of each destination are crisp numbers which is given in the table: Table II: Unit Transportation Cost cij in Rough Variable ji 1 2 3 1 ([7,9],[6,10]) ([12,14],[11,15]) ([10,11],8,12]) 2 ([4,5],[3,6]) ([3,4],[2,7]) ([5,7],[4,9]) 3 ([5,6],[3,7]) ([2,3],[1,4]) ([10,11],[9,12]) Availability and Demands: a1=14, a2=12,a3=15,b1=21,b2=12 and b3=8 Then the optimum solution is given in rough values as Z = ([193,256],[149,297]). If we take the trust value α = 0.8, then the α-pessimistic optimal solution will be Z/ =250.56.And the α-optimistic optimal solution will be Z// =197.54. So the optimum objective value lie within the range [Z// ,Z/ ] i.e, [197.56, 250.56] when the trust value (confidence level) is 0.8. C. Compromise Solution (Problems with unit transportation costs as rough variable) Consider a problem with three sources ( i= 1,2,3) and three destinations ( j = 1,2,3).The unit transportation costs are rough variables, the availability at each source, demands of each destination are crisp number and the trust value is 0.8 which is given in the table II. The cost value cij in terms of α-optimistic and α-pessimistic values with α=0.8 are calculated and shown in the following table j/i 1 2 3 1 [7.2, 8.8] [12.2,13.8] [9.6,10.88] 2 [4.05, 4.95] [3.17, 5] [5.28,7] 3 [4.6, 5.88] [2.2, 2.95] [10.05,10.95] Each cost cij can be considered as an uncertain variable lies in the interval [p , q], where p is the α-optimistic value and q is the α-pessimistic value of the corresponding uncertain cost. Considering the linear inverse uncertain distribution, the interval of uncertainty is transformed into a crisp value which is shown in the following table. The corresponding optimal solution with trust value 0.8 is calculated as: x11=14, x21=4, x23=8, x31=3, x32=12 and the Minimum Z = 241.52. ji 1 2 3 1 8 13 11 2 6 4 7 3 5 3 10 j/i 1 2 3 1 8.48 13.48 10.624 2 4.77 4.634 6.656 3 5.624 2.8 10.77
  • 7. Transportation Programming Under Uncertain Environment 28 The minimum value of Z under compromise solution lies within the range of objective values as obtained by rough model. VI. CONCLUSION In this work, the cost of transportation from the source to destination is considered to be uncertain and rough costs are assigned. The availability as well as the demand is considered to be deterministic. Using the uncertainty distribution the compromise solution is also proposed for the problem. Further investigation of the work can be made by considering the availability and demand as uncertain. REFERENCES [1]. B. Liu, Uncertainty Theory, Springer-Verlag, Berlin, 2007 [2]. B. Liu, Theory and Practice of Uncertain Programming, Physical-Verlag, Heidelberg, 2012 [3]. B. Liu, Uncertainty Theory: An Introduction to its Axiomatic Foundation, Springer-Verlag, Berlin, 2004 [4]. B. Liu, “Inequalities and convergence concepts of fuzzy and Rough variables,” Fuzzy Optimization and and Decision Making, vol. 2, pp. 87-100, 2003 [5]. E. Youness, ”Characterizing solutions of Rough Programming Problems,” European Journal of Operational Research, vol.168, pp. 1019-1029, 2006 [6]. F. Jimenez, J. l. Verdegay, “Uncertain Solid Transportation problems”, Fuzzy sets and Systems, vol. 100, pp. 45-57, 1998 [7]. G. Liu, W. Zhu,”The Algebraic Structures of Generalized Rough Set Theory”, Information Sciences, vol. 178, pp. 4105-4113, 2008 [8]. J. Xu, L. Yao, ”A Class of Two-Person Zero Sum Matrix Games with Rough payoffs”, International Journal of Mathematics and Mathematical Sciences, doi: 10.1155/ 2010/ 404792, 2010 [9]. J. Xu, B. Li, D. Wu, “Rough data Envelopment Analysis and its Application to Supply Chain Performance Evaluation”, International Journal of Production Economics, vol. 122, pp. 628-638, 2009 [10]. P. Kundu, S. Kar, M. Maiti, “Some Solid transportation Model with Crisp and Rough Costs”, World Academy od Science, Engineering and Technology, vol. 73, pp. 185-192, 2013 [11]. Shu, Xiao, Edmund M.K. Lai, “A Rough Programming Approach to Power-Aware VLIW Instruction Sheduling for Digital Signal Processors, Proc ICASSP, 2005 [12]. Z. Pawlak, “Rough Sets”, International Journal of Information and Computer Science, vol.11(5), pp. 341-356, 1982 [13]. Z. Pawlak, A. Skowron, “Rough Sets, some Extension”, Information Sciences, vol.177, pp. 28-40, 2007