SlideShare a Scribd company logo
1 of 5
Download to read offline
Chapter 4 Partioning And Tearing
Bansi_Kansagra 1
THE BARKLEY AND MOTARD ALGORITHM:-
Barkley and Motard (B&M) (1972) suggest an alternate representation
of a digraph by interchanging nodes and edges known as a ‘signal flow
graph (SFG)’.
It contains as nodes what are the edges in a digraph and vice versa.
The decomposition procedure is then applied on the SFG by tearing or
cutting nodes in place of edges on a digraph.
The following steps are involved in decomposition of a network
using theB&M algorithm:
Step 1 Convert the digraph into an equivalent SFG.
Step 2 Eliminate any node with asingle precursor, sinceit belongs to that
precursor. Replace such a node whenever it appears as a precursor by
its header node.
Step 3 If any self-loops appear, cut those nodes and assign them to the
cut-set. Eliminate such nodes, which may render the graph reducible
again, i.e., nodes may now appear with a single precursor.
Step 4 Two-way edges can also prevent complete reduction of the
SFG. A two- way edge is shown in Figs 12.3 and 12.4. In the figure,
the situation presented is for the jth
node. Before the SFG is totally
reduced, two-way edges as shown below may appear; in such a
situation, assign either the ith
or the yth
node to the cut-set.
Fig. 12.3 Simple two-way edge
Fig. 12.4 Compound two-way
edges
Chapter 4 Partioning And Tearing
Bansi_Kansagra 2
Step 5 If all other conditions fail to appear, select the node with the
maximum number of output edges for cutting.
Step 6 When SFG is totally reduced, the cut-set is found.
Illustration 12.1
Using the Barkley and Motard (1972) method (B&M algorithm) for the
decomposition of a maximal cyclic net (MCN), find out the streams that
are to be teared (i.e., cut-set) for the digraph (Fig. 12.1) of a process:
(decomposition is by a minimum number of tear streams, all of them
assigned unit weight).
Solution
First reduction Eliminate any node with a single precursor, since it
belongs to that precursor. Then, replace such a node whenever it
appears as a precursor by its header node.
Chapter 4 Partioning And Tearing
Bansi_Kansagra 3
Note Replace the nodes which are eliminated with their precursors. In
the above table, (1) eliminate each node with only one precursor (i.e.,
remove nodes 1, 3, 5, 8 since these belong to that precursor) and (2)
replace such nodes in all their occurrences in the list of precursors by
their precursors, i.e., we need to replace node 3 with its precursor 2.
Similarly, we replace node 5 with its precursor 7, node 1 with its
precursor 2, and node 8 with its precursor 7. The remaining nodes are 2,
4, 6, and 7. (If nodes 1, 3, 5, 8 are removed.) The remaining nodes are
shown above in which two ‘self- loops’ are formed at nodes 2 and 7.
Now cut these nodes, remove them from the above table and repeat
the same procedure.
As a result, the SFG is totally reduced and the cut-set found consists of
nodes 2 and 7 (where self-loops are formed) or equivalent streams 2 and 7
in the digraph of Fig. 12.1
Bansi_Kansagra 4
THE BASIC TEARING ALGORITHM:-
This is also based on the concept of SFG. Pho and Lapidus (1973a,
1973b) presented an alternative algorithm which offers the advantage
of assigning any arbitrary weights (weigh each stream with a number
reflecting the probable degree of difficulty that can be encountered in
an iterative procedure to converge) to the edges or streams of a
digraph.
It locates the cut-set of tear streams by minimizing the sum of their
weights. This is equivalent to finding minimum weights of tear
streams when all of them are assigned unit weights.
The features of the basic tearing algorithm (BTA) are as given
below:
1. The reduced digraph (one that excludes feed and product
streams) is first converted into an equivalent SFG.
2. Information on the SFG is provided to the algorithm in the
form of an adjacent matrix.
3. Ineligible nodes arefound according tothefollowing criterion: If
theweight of node i is greater than or equal to the sum of weights
of non-zero elements in the first rows of the matrix, then that
node is ineligible.
4. The reduction of ineligible node I is performed as follows:
Shift the elements of column I to those columns in row I
containing non-zero elements forming a Boolean sum. Make
row I and column I null.
5. Primarily the cut node is found by locating a self-loop.
6. If no ineligible nodes are found, then two-way edges are
searched.
7. When all attempts fail, the branch and bound method is
ultimately applied to totally reduce the SFG.
The algorithm is shown in Fig. 12.5.
Bansi_Kansagra 5

More Related Content

What's hot

L 09(gdr)(et) ((ee)nptel)
L 09(gdr)(et) ((ee)nptel)L 09(gdr)(et) ((ee)nptel)
L 09(gdr)(et) ((ee)nptel)
Pradeep Godara
 
Presentation(11p)
Presentation(11p)Presentation(11p)
Presentation(11p)
Shiqi Zhang
 
Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...
Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...
Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...
Sasidhar Tadanki
 

What's hot (18)

Band nonparabolicity effect on eigenstates
Band nonparabolicity effect on eigenstatesBand nonparabolicity effect on eigenstates
Band nonparabolicity effect on eigenstates
 
Cape phy 2006 u2 pr01
Cape phy 2006 u2 pr01Cape phy 2006 u2 pr01
Cape phy 2006 u2 pr01
 
Ch 1
Ch 1Ch 1
Ch 1
 
Vgg
VggVgg
Vgg
 
A novel method for mounting gunn diode in active slot ring
A novel method for mounting gunn diode in active slot ringA novel method for mounting gunn diode in active slot ring
A novel method for mounting gunn diode in active slot ring
 
Jarrod Hurley: Interactions Between White Dwarfs, Neutron Stars and Black Hol...
Jarrod Hurley: Interactions Between White Dwarfs, Neutron Stars and Black Hol...Jarrod Hurley: Interactions Between White Dwarfs, Neutron Stars and Black Hol...
Jarrod Hurley: Interactions Between White Dwarfs, Neutron Stars and Black Hol...
 
L 09(gdr)(et) ((ee)nptel)
L 09(gdr)(et) ((ee)nptel)L 09(gdr)(et) ((ee)nptel)
L 09(gdr)(et) ((ee)nptel)
 
SFB953.symposium
SFB953.symposiumSFB953.symposium
SFB953.symposium
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
7th Semester Electronic and Communication Engineering (2013-June) Question Pa...
7th Semester Electronic and Communication Engineering (2013-June) Question Pa...7th Semester Electronic and Communication Engineering (2013-June) Question Pa...
7th Semester Electronic and Communication Engineering (2013-June) Question Pa...
 
Presentation(11p)
Presentation(11p)Presentation(11p)
Presentation(11p)
 
IRJET- Design of Memristor based Multiplier
IRJET- Design of Memristor based MultiplierIRJET- Design of Memristor based Multiplier
IRJET- Design of Memristor based Multiplier
 
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...
Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...
Multiple Resonant Multiconductor Transmission line Resonator Design using Cir...
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Computer Science Homework Help
Computer Science Homework HelpComputer Science Homework Help
Computer Science Homework Help
 
Tabla
TablaTabla
Tabla
 

Similar to Decomposition of network part 2 bk

Similar to Decomposition of network part 2 bk (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Design of Phased Array Antenna for Beam Forming Applications using...
IRJET-  	  Design of Phased Array Antenna for Beam Forming Applications using...IRJET-  	  Design of Phased Array Antenna for Beam Forming Applications using...
IRJET- Design of Phased Array Antenna for Beam Forming Applications using...
 
Adiabatic Logic Based Low Power Carry Select Adder for future Technologies
Adiabatic Logic Based Low Power Carry Select Adder for future TechnologiesAdiabatic Logic Based Low Power Carry Select Adder for future Technologies
Adiabatic Logic Based Low Power Carry Select Adder for future Technologies
 
1406
14061406
1406
 
FINAL VERSION sss.pptx
FINAL VERSION sss.pptxFINAL VERSION sss.pptx
FINAL VERSION sss.pptx
 
Toward coordinated transmission and distribution operations
Toward coordinated transmission and distribution operationsToward coordinated transmission and distribution operations
Toward coordinated transmission and distribution operations
 
UDSLF
UDSLFUDSLF
UDSLF
 
Edge-Coupled Bandpass Microstrip Filter Design
Edge-Coupled Bandpass Microstrip Filter DesignEdge-Coupled Bandpass Microstrip Filter Design
Edge-Coupled Bandpass Microstrip Filter Design
 
Edge-Coupled Bandpass Filter Design
Edge-Coupled Bandpass Filter DesignEdge-Coupled Bandpass Filter Design
Edge-Coupled Bandpass Filter Design
 
Js3417611767
Js3417611767Js3417611767
Js3417611767
 
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
Modelling And Miniaturization of A 2-Bits Phase Shifter Using Koch Fractal Sh...
 
04 18696 ijict
04 18696 ijict04 18696 ijict
04 18696 ijict
 
Db4301594597
Db4301594597Db4301594597
Db4301594597
 
My mind.dot
My mind.dotMy mind.dot
My mind.dot
 
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
Integration of Irreversible Gates in Reversible Circuits Using NCT LibraryIntegration of Irreversible Gates in Reversible Circuits Using NCT Library
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf Optimizer
 
A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...
A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...
A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...
 
Implementation of BDDs by Various Techniques in Low Power VLSI Design
Implementation of BDDs by Various Techniques in Low Power VLSI DesignImplementation of BDDs by Various Techniques in Low Power VLSI Design
Implementation of BDDs by Various Techniques in Low Power VLSI Design
 
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...
 
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...
CONCURRENT TERNARY GALOIS-BASED COMPUTATION USING NANO-APEX MULTIPLEXING NIBS...
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Decomposition of network part 2 bk

  • 1. Chapter 4 Partioning And Tearing Bansi_Kansagra 1 THE BARKLEY AND MOTARD ALGORITHM:- Barkley and Motard (B&M) (1972) suggest an alternate representation of a digraph by interchanging nodes and edges known as a ‘signal flow graph (SFG)’. It contains as nodes what are the edges in a digraph and vice versa. The decomposition procedure is then applied on the SFG by tearing or cutting nodes in place of edges on a digraph. The following steps are involved in decomposition of a network using theB&M algorithm: Step 1 Convert the digraph into an equivalent SFG. Step 2 Eliminate any node with asingle precursor, sinceit belongs to that precursor. Replace such a node whenever it appears as a precursor by its header node. Step 3 If any self-loops appear, cut those nodes and assign them to the cut-set. Eliminate such nodes, which may render the graph reducible again, i.e., nodes may now appear with a single precursor. Step 4 Two-way edges can also prevent complete reduction of the SFG. A two- way edge is shown in Figs 12.3 and 12.4. In the figure, the situation presented is for the jth node. Before the SFG is totally reduced, two-way edges as shown below may appear; in such a situation, assign either the ith or the yth node to the cut-set. Fig. 12.3 Simple two-way edge Fig. 12.4 Compound two-way edges
  • 2. Chapter 4 Partioning And Tearing Bansi_Kansagra 2 Step 5 If all other conditions fail to appear, select the node with the maximum number of output edges for cutting. Step 6 When SFG is totally reduced, the cut-set is found. Illustration 12.1 Using the Barkley and Motard (1972) method (B&M algorithm) for the decomposition of a maximal cyclic net (MCN), find out the streams that are to be teared (i.e., cut-set) for the digraph (Fig. 12.1) of a process: (decomposition is by a minimum number of tear streams, all of them assigned unit weight). Solution First reduction Eliminate any node with a single precursor, since it belongs to that precursor. Then, replace such a node whenever it appears as a precursor by its header node.
  • 3. Chapter 4 Partioning And Tearing Bansi_Kansagra 3 Note Replace the nodes which are eliminated with their precursors. In the above table, (1) eliminate each node with only one precursor (i.e., remove nodes 1, 3, 5, 8 since these belong to that precursor) and (2) replace such nodes in all their occurrences in the list of precursors by their precursors, i.e., we need to replace node 3 with its precursor 2. Similarly, we replace node 5 with its precursor 7, node 1 with its precursor 2, and node 8 with its precursor 7. The remaining nodes are 2, 4, 6, and 7. (If nodes 1, 3, 5, 8 are removed.) The remaining nodes are shown above in which two ‘self- loops’ are formed at nodes 2 and 7. Now cut these nodes, remove them from the above table and repeat the same procedure. As a result, the SFG is totally reduced and the cut-set found consists of nodes 2 and 7 (where self-loops are formed) or equivalent streams 2 and 7 in the digraph of Fig. 12.1
  • 4. Bansi_Kansagra 4 THE BASIC TEARING ALGORITHM:- This is also based on the concept of SFG. Pho and Lapidus (1973a, 1973b) presented an alternative algorithm which offers the advantage of assigning any arbitrary weights (weigh each stream with a number reflecting the probable degree of difficulty that can be encountered in an iterative procedure to converge) to the edges or streams of a digraph. It locates the cut-set of tear streams by minimizing the sum of their weights. This is equivalent to finding minimum weights of tear streams when all of them are assigned unit weights. The features of the basic tearing algorithm (BTA) are as given below: 1. The reduced digraph (one that excludes feed and product streams) is first converted into an equivalent SFG. 2. Information on the SFG is provided to the algorithm in the form of an adjacent matrix. 3. Ineligible nodes arefound according tothefollowing criterion: If theweight of node i is greater than or equal to the sum of weights of non-zero elements in the first rows of the matrix, then that node is ineligible. 4. The reduction of ineligible node I is performed as follows: Shift the elements of column I to those columns in row I containing non-zero elements forming a Boolean sum. Make row I and column I null. 5. Primarily the cut node is found by locating a self-loop. 6. If no ineligible nodes are found, then two-way edges are searched. 7. When all attempts fail, the branch and bound method is ultimately applied to totally reduce the SFG. The algorithm is shown in Fig. 12.5.