Optimization with Least Constraint Violation
نویسندگان
چکیده
منابع مشابه
Sensitivity shaping with degree constraint by nonlinear least-squares optimization
This paper presents a new approach to shaping of the frequency response of the sensitivity function. A sensitivity shaping problem is formulated as an approximation problem relative to a desired frequency response and with respect to a function in a class of sensitivity functions with a degree bound. It is reduced to a finite dimensional constrained nonlinear least-squares optimization problem....
متن کاملConstraint violation in vehicle routing
Nowadays, automated route planning models and algorithms are supporting decision makers in designing efficient delivery plans. Anyway, in practical applications the management of constraints is not as rigorous as in mathematical models. Human planners tend to evaluate solutions with a potential violation of some constraints if they estimate to obtain some clear benefit from that. In this paper ...
متن کاملScenario Realizability with Constraint Optimization
This work considers implementation of requirements expressed as High-level Message Sequence Charts (HMSCs). All HMSCs are not implementable, but a particular subclass called local HMSCs can be implemented using a simple projection operation. This paper proposes a new technique to transform an arbitrary HMSC specification into a local HMSC, hence allowing implementation. We show that this transf...
متن کاملA Semidefinite Optimization Approach to Quadratic Fractional Optimization with a Strictly Convex Quadratic Constraint
In this paper we consider a fractional optimization problem that minimizes the ratio of two quadratic functions subject to a strictly convex quadratic constraint. First using the extension of Charnes-Cooper transformation, an equivalent homogenized quadratic reformulation of the problem is given. Then we show that under certain assumptions, it can be solved to global optimality using semidefini...
متن کاملCoping with Constraint Violation: the Practical Face of Database Integrity
We consider the problems of coping with violations of semantic integrity constraints in applications requiring long-duration, user-controlled transaction. Such a transaction will typically violate many constraints, and will have a complicated semantics that is non-trivial to repair. We propose an approach to the related problems of explaining integrity violations, and presenting possible repair...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: CSIAM transaction on applied mathematics
سال: 2021
ISSN: ['2708-0560', '2708-0579']
DOI: https://doi.org/10.4208/csiam-am.2020-0043