Benders decomposition algorithms for the fixed-charge relay network design in telecommunications
Citations
506 citations
Cites background or methods from "Benders decomposition algorithms fo..."
...Kewcharoenwong and Üster (2014) obtained an encouraging speedup with this approach in the context of fixed-charge relay network design in telecommunications....
[...]
...Many researchers therefore apply heuristic procedures to generate solutions or, as a subordinate method, improve previously generated ones (Gelareh et al., 2015; Kewcharoenwong and Üster, 2014; Oliveira et al., 2014; Botton et al., 2013; Taşkın and Cevik, 2013)....
[...]
...For other uses of VI see Taşkın and Cevik (2013), Kewcharoenwong and Üster (2014), Pishvaee et al. (2014), Jenabi et al. (2015), Emami et al. (2016), and Jeihoonian et al. (2016)....
[...]
...Many researchers therefore apply heuristic procedures to generate solutions or, as a subordinate method, improve previously generated ones (Gelareh et al., 2015; Kewcharoenwong and Üster, 2014; Oliveira et al., 2014; Botton et al., 2013; Taşkın and Cevik, 2013)....
[...]
29 citations
Cites methods from "Benders decomposition algorithms fo..."
...…this analysis of Campbell and O’Kelly (2012), RLP literature discussed in this paper as well as a closely related network design problem with relays of Cabral et al. (2007), Laporte and Pascoal (2011) and Kewcharoenwong and Uster (2014) seem to be confined to the field of telecommunications....
[...]
...Under partial survivability, our designs hedge against failures in the regeneration equipment only, whereas under full survivability failures on any of the network nodes are accounted for by the utilization of extra regeneration equipment....
[...]
22 citations
21 citations
20 citations
References
2,782 citations
1,201 citations
"Benders decomposition algorithms fo..." refers background or methods in this paper
...We then randomly assign a demand value wij to each node pair [i, j ] ∈Q using a uniform distribution U[10,20]....
[...]
...1: Let So and Sc be the set of the opened and closed link obtained from MP; 2: Let UB(So) be the upper bound associated with So (from Algorithm 3); 3: Let S̄c = Sc; 4: while S̄c =∅ do 5: Sort S̄c in descending order of Ukl ; 6: q = min{|S̄c|,R}, R is randomly drawn from U[5,10]; 7: Let Sq be the first q closed links in the sorted closed links S̄c; 8: if UB(So ∪ Sq) < UB(So) then 9: Update So, Sc , and Ukl ; 10: else...
[...]
...Another approach to decreasing the excessive master problem runtime is through the utilization of the ε-optimal approach [10]....
[...]
1,124 citations
756 citations
655 citations