Research Article  Open Access
Nitish Das, P. Aruna Priya, "A GradientBased InteriorPoint Method to Solve the ManytoMany Assignment Problems", Complexity, vol. 2019, Article ID 8405036, 13 pages, 2019. https://doi.org/10.1155/2019/8405036
A GradientBased InteriorPoint Method to Solve the ManytoMany Assignment Problems
Abstract
The manytomany assignment problem (MMAP) is a recent topic of study in the field of combinatorial optimization. In this paper, a gradientbased interiorpoint method is proposed to solve MMAP. It is a deterministic method which assures an optimal solution. In this approach, the relaxation of the constraints is performed initially using the cardinality constraint detection operation. Then, the logarithmic barrier function (LBF) based gradient descent approach is executed to reach an accurate solution. Experiments have been performed to validate the practical implementation of the proposed algorithm. It also illustrates a significant improvement in convergence speed for the large MMAPs (i.e., if group size, ) over stateoftheart literature.
1. Introduction
Recently, the manytomany assignment problem (MMAP) has drawn the attention of the researchers in the field of combinatorial optimization. It is the topic of interest because MMAP serves as an authentic model for the activities such as group role assignment, job scheduling, and machine routing, in an organizational structure [1, 2].
The performance of an organizational structure depends on its capability of handling a shared task [3]. Rolebased collaboration (RBC) plays a vital role in managing a shared task efficiently [3, 4]. In an RBC system, the rating of each constituent agent is performed. Then, a role is assigned to an agent into a particular group based on their rating value [5, 6]. If there exists a onetoone mapping between a task and an agent, then it is called a linear assignment problem (LAP) or onetoone assignment problem [7]. Hence, RBC problem is termed as onetomany assignment problem [6, 7]. Similarly, if a single agent can handle many tasks which are not assigned to any other agent and viceversa, then a LAP turns into a MMAP by adding the constraint as mentioned earlier [6, 7]. MMAP is also known as the generalized assignment problem.
RBC is the widely investigated topic and many exhaustion techniques are proposed to solve it. If an agent is free of tasks in a group, then it can be assigned to any other group to perform a specific task. MMAP takes care of the condition as mentioned earlier. Therefore, MMAP is more appropriate to simulate the real world role assignment problem in an organizational structure as compared with RBC problem [6, 7]. To the best of author’s knowledge, only a few approaches are proposed to solve MMAP in the literature. Hence, this study is confined to create a new framework to solve MMAP.
The KuhnMunkres (KM) technique is the most fundamental technique to solve any combinatorial optimization problem. It works well with the rectangular cost matrices where rows are considered as agents and columns are considered as tasks. A backtracking method is added to the KM algorithm to solve MMAP [6, 7]. This approach consists of two stages which are as follows: (a) preparation stage; (b) processing stage. In the preparation stage, normalization of the cost matrix is performed for MMAP using the constraints. Then, in the processing stage, reduction of the cost matrix is conducted to allocate agents to tasks efficiently.
In literature, Lagrangian boundbased algorithms are explored to solve kcardinality assignment problem, which is a conjugate dual of the MMAP [8, 9]. In the Lagrangian relaxation approach, the problem is divided into two subproblems which are as follows: “easy” problem and “complicating” problem. The “easy” problem is referred to optimizing the objective function by relaxing the constraints associated with it. The “complicating” problem is stipulated for optimizing the objective function with constraints. In this technique, relaxation of the constraints is performed by embedding a penalty function into the objective function. Hence, the violation of the penalty function is depressed. In the case of the maximization problem, the fixedmultiplier term of objective function sets the upper bound. Further, the semiLagrangian technique is developed [8]. It works well when applied to the objective function with the inequality constraints.
The convergence speed and accuracy of an algorithm serve as the most prominent parameters while solving MMAP. Hence, a technique with high accuracy and convergence rate is desired.
The fundamental heuristic algorithms which operate on the evolutionary principle like the genetic algorithm (GA), particle swarm optimization (PSO), and differential evolution (DE) are explored in the literature to solve a combinatorial optimization problem. GA’s convergence rate decreases while reaching the global optimum, which is a severe drawback [10, 11]. DE and PSO offer high convergence speed but demonstrate a premature convergence, that is a compromise with the accuracy of the obtained solution [12, 13]. On the other hand, the deterministic techniques like interiorpoint method, and Lagrangian approach have shown promising results for combinatorial problems as they reach the global optimum with high accuracy and convergence rate [14]. The mentioned deterministic approaches are beneficial in addressing a combinatorial as well as a discrete optimization problem [15].
The interiorpoint method is investigated extensively in the literature for solving convex optimization problems (i.e., both linear and nonlinear problems) with inequality constraints [16]. This method follows a linear programming (LP) model which contains a uniquely defined objective function with constraints [17, 18]. The constraints of the objective function are twice continuously differentiable. The interiorpoint technique performs the relaxation of the constraints of the LP model as a set of boundary conditions surrounding a specific solution region. From the geometric point of view, it moves towards a solution from either the exterior of the solution region or the interior of the solution region [16, 17]. The barrier method, such as the logarithmic barrier function (LBF) approach, is the fundamental type of interiorpoint technique explored in the literature [16].
Therefore, an interiorpoint method is adopted to solve MMAP. In the proposed technique, the relaxation of the constraints is performed initially using the cardinality constraint detection operation. Then, the LBFbased gradient descent approach is executed to obtain an optimal solution.
Experiments are performed to substantiate the feasibility of the proposed algorithm and its comparative performance analysis with the existing literature [7] is made. It requires only a limited number of iterations to perform the complete search. Therefore, the proposed algorithm outperforms for the large MMAPs (i.e., if group size, ) as compared with [7]. The computation time for each of its iteration is larger than [7]. Therefore, it offers a comparatively large convergence period w.r.t. [7] for the small MMAPs. Thus, the practical implication of the proposed algorithm is to solve the machine routing and scheduling problem in Manufacturingbased organizations [1, 2].
The rest of the paper is regulated as follows. Section 2 consists of problem formulation. The framework for the gradientbased interiorpoint method is described in Section 3. Section 4 presents the experimental setup for the proposed work and its comparative analysis with the stateoftheart literature. In the end, conclusions are devised in Section 5.
2. Research Problem Formulation
A graph , where represents the nodes and denotes the edges, is described as a bipartite graph, if it satisfies the criteria such as and , where is a null set, and [7].
A bipartite graph is described as a weighted bipartite graph if its every edge (i.e., ) consists of a weight (i.e., ) [7]. The weight of onetoone matching (i.e., ) is described in (1).
A matching (i.e., ) is called a perfect matching, if each node of is assigned to one of the nodes. Therefore, a linear assignment problem (LAP) is defined as determining a perfect matching in which is maximally weighted [7]. In this paper, it is considered that there are agents and tasks.
Let an ability limit vector of agents be . Here, an element indicates the number of tasks that can be maximally assigned to an agent (i.e., ) [7].
Let a task range vector of tasks be . Here, an element represents the quantity of task (i.e., ) which are needed to be assigned [7].
Let a potential matrix, , be an matrix, where denotes a potential value of an agent for the task . Hence, represents the highest value, while 0 represents the least value for a particular element.
Let an assignment matrix, , be defined as matrix, where opts only the binary labels (i.e., 0 or 1). Hence, which denotes agent is assigned to task , whereas symbolizes agent is not assigned to task .
Let an agent (i.e., ) can execute many but different tasks. Similarly, let a task (i.e., ) can be assigned to many but different agents. A LAP turns into a manytomany assignment problem by adding the two constraints, as mentioned earlier. From literature [7], a manytomany assignment problem is thus defined mathematically by (2).with the constraints as given in (3), (4), and (5).
3. Methodology
Initially, the potential matrix of dimension is created. Hence, each element of denotes the efficiency of a particular agent (i.e., out of agents) performing a specific task (i.e., out of tasks). Then, and are defined according to the problem constraints. In literature [7], it is proven in Theorem 6 (i.e., Decidable theorem) that MMAP becomes unsolvable, when the inequality defined by (6) occurs.
Thus, it becomes mandatory to perform cardinality constraint detection (CCD) to avoid the condition described in (6). Therefore, CCD is performed using (7).
The cardinality of is always greater than or equal to the cardinality of after performing CCD. Hence, matrix of dimension is expanded into a matrix of dimension , where using and . The new columns of are appended with zeroes. It is expressed in (8), where an agent contains rows in and the task contains columns in .
From the literature [9], the concept of conjugate duality is used to transform the objective function for maximization (i.e., (8)) into a minimization problem. A dualparameter is defined by (9) because the elements of vary from 0 to 1.
By applying (9) into (8), the objective function reduces to (10).
Let a graph defined by , characterizes Equation (10). Thus, denotes the total number of nodes in it. In the graph , ( i.e., ) symbolizes the edge weights between the specific nodes (i.e., between an agent and a task ), and ( i.e., column vectors of ) denotes the set of nodes. Therefore, each node , represents a specific state code as can take only binary labels.
In the field of circuit design, the hypercube embedding based techniques, such as HARD [19] and ImprovedFSMIM [20], are developed for hardware optimization. These techniques have never been examined to solve a generalized assignment problem such as MMAP. To the best of author’s knowledge, the proposed work makes the first attempt to address the MMAP by employing the hypercube embedding process, which proves its novelty.
Let a hypercube be characterized as , where is the dimension, is the set of vertices of , and is the set of edges of [21]. The total number of elements present in and , are defined by (11) and (12).
The hypercube embedding is applied to minimize (10). It is executed from graph into the hypercube [21, 22]. It is symbolized as . It is a 1 to 1 mapping function. Hence, if a node of graph is represented by a particular binary state code, then the corresponding vertex of the hypercube (i.e., ) is denoted by the same code. Therefore, binary vectors are defined by (13).
In the hypercube , (where ) symbolizes the Hamming distance between the vertices and . The pictorial representation for evaluation of is given in [20]. Its mathematical representation is shown in Equation (14), where is the instantaneous value of . value varies between 1 and 1 (a detailed description is provided in Section 3.1). Therefore, the cost function of this embedding process is given in (15) and (16).
Thus, minimizing the cost function presented in (16) becomes the ultimate goal for solving the MMAP.
The convergence speed and accuracy of an algorithm serve as the most prominent parameters while solving the MMAP. Hence, a technique with high accuracy and convergence rate is chosen to minimize the cost function given in (16).
The basic heuristic algorithms which operate on the evolutionary principle like the genetic algorithm (GA), particle swarm optimization (PSO), and differential evolution (DE) are explored in the literature to solve a combinatorial optimization problem. GA’s convergence rate decreases while reaching the global optimum, which is a severe drawback [10, 11]. DE and PSO offer high convergence speed but demonstrate a premature convergence, that is a compromise with the accuracy of the obtained solution [12, 13]. On the other hand, the deterministic techniques like interiorpoint method and Lagrangian approach have shown promising results for combinatorial problems as they reach the global optimum with high accuracy and convergence rate [14]. The mentioned deterministic approaches are beneficial in addressing a combinatorial as well as a discrete optimization problem [15]. The barrier method, such as the logarithmic barrier function (LBF) approach, is the fundamental type of interiorpoint technique explored in literature [16]. Hence, the LBFbased gradient descent technique is selected to minimize the cost function given in (16). The steps involved in the proposed gradientbased interiorpoint approach are presented in Figure 1.
3.1. Logarithmic Barrier Function Based Gradient Descent Approach
An interiorpoint method, such as logarithmic barrier function method (LBF), is widely investigated to solve discrete optimization problems [14, 23]. It is a deterministic technique that guarantees a feasible solution. The cost function for MMAP is formulated using LBF. Then, its minimization is performed using the gradientprojection technique in an iterative manner. In the LBF method, optimization of the objective function is accomplished in the continuous space domain. The obtained analytic solution is then discretized to produce the exact discrete solution [24]. Thus, the objective function for LBF, which is subjected to inequality constraints, is defined by (17).
LBF to reduce the objective function (as given in (16)) is presented in (18). Its representation at the iteration is shown in (19). In (18) and (19), the second term acts as a barrier for any move that excludes constraint (i.e., ) [25].
At the initial stage, LBF chooses and a feasible . It selects , where . The process continues until arrives at a substantially small value.
A line search method is essential to reduce (19) w.r.t. iteratively. The firstorder gradient descent approach is pertinent for this purpose [26]. In this method, weight vectors (i.e., the model parameters) are determined to reduce the objective function [27, 28]. Its mathematical representation is given in (20).
In the firstorder gradient descent method, a particular iteration (i.e., ) is defined by (21), where represents the step size. A small positive real number is selected as value [26].
From (21), small moves (i.e., with a step size ) are made in negative direction of the gradient. At the next iteration (i.e., ), (22) is employed to determine value over the constraint surface.
The convergence norm for the proposed gradientbased interiorpoint method is given in (23), where (ranges from 0 to 1) is the upper bound.
Hence, the hypercube embedding problem is interpreted as determining binary vectors that minimizes (16). It is given in (24).
Thus, (16) is deduced using Hamming distance between vertices of the hypercube (i.e., ). It is presented in (25).
In this optimization problem, any two vertices of the hypercube (i.e., ) should not be defined by the same binary state code (i.e., ). This condition serves as a constraint for this optimization process. It is given in (26).
Equations (25) and (26) are applied into (18) to reduce the cost function. The reduced cost function is given in (27).
Therefore, the entity (from (22)) is defined by (28).
From (21), the computation of the derivative term (i.e., ) is essential to approach towards the gradient descent direction. The required derivative term is deduced by substituting (29), (30), (31), and (32) into (27). Hence, is defined by (33).
By applying (28) into (22), in its normalized form is given in (34).
At the end of the gradient descent iterative process (i.e., when (23) is satisfied), discretization of the analytic solution is performed. Hence, a set of optimal state codes (i.e., ) is determined by discretizing (i.e., value of at the iteration ) by (35).
The pseudocode for the proposed gradientbased interiorpoint method is conferred in Algorithm 1.
Input: and potential matrix (i.e., )  
Output: (i.e., the final solution)  
begin  
Initialization: ;  
Cardinality constraint detection is performed using Equation (7);  
Expansion of the potential matrix (i.e., ) is executed using Equation (8);  
Conversion of the objective function into a minimization problem  
(i.e., Equation (10)) is conducted using Equation (9);  
Hypercube embedding is performed & objective function is defined by Equation (16);  
while () do/ Start the LBFbased gradient projection method /  
repeat  
for  
;  
/ by Equation (21) and Equation (33)/  
end  
return (i.e., value when );  
evaluate by Equation (35)/  
Compute for the new value of by Equation (16);  
case: then  
update, ;  
case: then  
update, ;  
end case  
until the gradient based interior point method converges  
;  
end  
return ;  
end 
4. Numerical Results and Discussions
The fundamental goal of this numerical study is to substantiate the feasibility of the proposed algorithm and to demonstrate the comparison with the stateoftheart literature [7]. All optimizations are performed using Eclipse Kepler JDK 1.7 package [7]. The workstation configuration to perform computations is as follows: Intel(R) Core i7 (6th Gen), 16 GB RAM and 3.5 GHz CPU.
The proposed approach is a deterministic approach. Therefore, its convergence period for optimal assignment is constant. Experiments are performed between two random groups (where ) to validate its feasibility. For range, such as , , and , the range is set to , where , to present the comparison with [7].
Similarly, for range , the range is set to , where , to present the comparison with [7]. Simulations are performed to evaluate the cost for optimal assignment and convergence time for different combinations of , and range. The cost for a particular assignment matrix is evaluated using (16). The convergence plot for different combinations of , and range is presented in Figure 2. A parameter, , is also defined which provides the average of successful assignments within 100 iterations. It is presented in Table 1. The ranges from 95.78 to 100%. It indicates that the proposed algorithm takes only a limited number of iterations to converge.

(a)
(b)
(c)
(d)
Another set of analysis is conducted to determine the overall performance (for ranging from 20 to 300) of the proposed algorithm. Experiments are performed between 100 random groups (where ). Simulations are run to evaluate the cost for optimal assignment and convergence time for three combinations (i.e., , , and ) with various range. The cost for a particular assignment matrix is evaluated using (16). The convergence analysis of the proposed algorithm for and are shown in Figure 3. For range, such as , , , and , the range is set to , where . Similarly, for range, , the range is set to , where, , to present the comparison with [7]. The performance measures using the convergence time for various range is presented in Tables 2 and 3. An analysis of computation time required for the optimal assignment is presented in Figure 4. Therefore, the performance of the proposed algorithm in comparison with [7] when and are shown in Figure 5.


(a)
(b)
(c)
(d)
(e)
(f)
(a) For
(b) For
(c) For
(a) For when
(b) For when
(c) For when
(d) For when
(e) For when
(f) For when
The proposed technique optimally defines the most feasible solution region. Hence, only a limited number of iterations are required to perform the complete search. Therefore, the proposed algorithm outperforms for the large MMAPs (i.e., if group size, ) as compared with [7].
The comparative analysis presented in Figure 5 indicates that each iteration of the proposed technique requires a substantial computation time as compared with [7]. Therefore, it offers a comparatively large convergence period w.r.t. [7] for the small MMAPs. It is a limitation of the proposed approach.
The problem of machine routing and scheduling is the primary issue in manufacturingbased industries. The mentioned problems become severe in the multisite manufacturing organizations when the number of operators working on a shared task is large [1, 2]. Therefore, the practical implication of the proposed algorithm is to solve the machine routing and scheduling problem in Manufacturingbased organizations. The proposed technique can also be investigated to create reconfigurable FSMbased architecture efficiently [29].
5. Conclusion
The framework for a gradientbased interiorpoint method to solve the manytomany assignment problem (MMAP) is proposed in this study. It is a deterministic approach which assures an optimal solution. At the initial stage of this approach, the relaxation of the constraints is performed using the cardinality constraint detection operation. Then, the logarithmic barrier function (LBF) based gradient descent approach is executed to obtain an optimal solution for MMAP. The proposed technique requires only a limited number of iterations to perform the complete search. Therefore, the proposed algorithm outperforms for the large MMAPs (i.e., if group size, ) as compared with the existing literature. The practical implication of the proposed algorithm is to solve the machine routing and scheduling problem in manufacturingbased organizations [1, 2]. The proposed technique can also be investigated to create reconfigurable FSMbased architecture efficiently [29].
In organizational structures, the role assignment problem is more often strictly limited to LAPs, RBCs, or MMAPs. Hence, a unified algorithm is required that can handle the issues mentioned earlier. The proposed technique will be examined further for creating a unified method to efficiently solve LAPs, RBCs, or MMAPs by adding an adaptive operator (see [30]) in it.
Data Availability
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
Disclosure
This research did not receive any specific grant from funding agencies in the public, commercial, or notforprofit sectors.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This research work is performed in the Department of Electronics and Communication Engg., SRM Institute of Science and Technology, Kanchipuram Dist. 603203, Chennai, India.
References
 Y. Hadad and B. Keren, “A revised method for allocating the optimum number of similar machines to operators,” International Journal of Productivity and Performance Management, vol. 65, no. 2, pp. 223–244, 2016. View at: Publisher Site  Google Scholar
 M. A. Beheshtinia, A. Ghasemi, and M. Farokhnia, “Supply chain scheduling and routing in multisite manufacturing system (case study: a drug manufacturing company),” Journal of Modelling in Management, vol. 13, no. 1, pp. 27–49, 2018. View at: Publisher Site  Google Scholar
 Y. Sheng, H. Zhu, X. Zhou, and W. Hu, “Effective approaches to adaptive collaboration via dynamic role assignment,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 1, pp. 76–92, 2016. View at: Publisher Site  Google Scholar
 X. Zhu, X. Fangxiong, H. Zhu, W. Qilin, X. Zhou, and H. Wenting, “Group role assignment with flexible formation based on the genetic algorithm,” in Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017, pp. 2661–2666, Canada, October 2017. View at: Google Scholar
 H. Zhu and Y. Zhu, “Group role assignment with agents' busyness degrees,” in Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017, pp. 3201–3206, Canada, October 2017. View at: Google Scholar
 H. Zhu, D. Liu, S. Zhang, S. Teng, and Y. Zhu, “Solving the group multirole assignment problem by improving the ILOG approach,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, no. 12, pp. 3418–3424, 2017. View at: Publisher Site  Google Scholar
 H. Zhu, D. Liu, S. Zhang, Y. Zhu, L. Teng, and S. Teng, “Solving the Many to Many assignment problem by improving the Kuhn–Munkres algorithm with backtracking,” Theoretical Computer Science, vol. 618, pp. 30–41, 2016. View at: Publisher Site  Google Scholar
 I. Belik and K. Jörnsten, “A new SemiLagrangean Relaxation for the kcardinality assignment problem,” Journal of Information and Optimization Sciences, vol. 37, no. 1, pp. 75–100, 2016. View at: Publisher Site  Google Scholar
 P. T. Thach and T. V. Thang, “Conjugate duality for vectormaximization problems,” Journal of Mathematical Analysis and Applications, vol. 376, no. 1, pp. 94–102, 2011. View at: Publisher Site  Google Scholar
 G. Pavai and T. V. Geetha, “New crossover operators using dominance and codominance principles for faster convergence of genetic algorithms,” Soft Computing, vol. 23, no. 11, pp. 3661–3686, 2019. View at: Publisher Site  Google Scholar
 S. Ganjefar and M. Tofighi, “Optimization of quantuminspired neural network using memetic algorithm for function approximation and chaotic time series prediction,” Neurocomputing, vol. 291, pp. 175–186, 2018. View at: Publisher Site  Google Scholar
 H. Huang, L. Lv, S. Ye, and Z. Hao, “Particle swarm optimization with convergence speed controller for largescale numerical optimization,” Soft Computing, pp. 1–17, 2018. View at: Google Scholar
 R. Knobloch, J. Mlýnek, and R. Srb, “The classic differential evolution algorithm and its convergence properties,” Applications of Mathematics, vol. 62, no. 2, pp. 197–208, 2017. View at: Publisher Site  Google Scholar  MathSciNet
 P. Armand and R. Omheni, “A mixed logarithmic barrieraugmented Lagrangian method for nonlinear optimization,” Journal of Optimization Theory and Applications, vol. 173, no. 2, pp. 523–547, 2017. View at: Publisher Site  Google Scholar  MathSciNet
 W. Murray and K.M. Ng, “An algorithm for nonlinear optimization problems with binary variables,” Computational optimization and applications, vol. 47, no. 2, pp. 257–288, 2010. View at: Publisher Site  Google Scholar  MathSciNet
 R. W. Cottle and M. N. Thapa, “Interiorpoint methods,” in Linear and Nonlinear Optimization, C. C. Price, J. Zhu, and F. S. Hillier, Eds., pp. 517–536, Springer Nature, New York, NY, USA, 2017. View at: Google Scholar
 N. Ploskas and N. Samaras, “Interior point methods,” in Linear Programming Using MATLAB, P. M. Pardalos and D.Z. Du, Eds., pp. 491–540, Springer Nature, Cham, Swizerland, 2017. View at: Publisher Site  Google Scholar
 D. G. Luenberger and Y. Ye, “Interiorpoint methods,” in Linear and Nonlinear Programming, C. C. Price, J. Zhu, and F. S. Hillier, Eds., pp. 115–143, Springer International Publishing, Switzerland, 4th edition, 2016. View at: Google Scholar
 I. Ahmad, “HARD: A hypercube embedding algorithm for state assignment of finite state machines,” Computers and Electrical Engineering, vol. 29, no. 2, pp. 327–356, 2003. View at: Publisher Site  Google Scholar
 N. Das and P. Aruna Priya, “FPGA implementation of an improved reconfigurable FSMIM architecture using logarithmic barrier function based gradient descent approach,” International Journal of Reconfigurable Computing, vol. 2019, 17 pages, 2019. View at: Publisher Site  Google Scholar
 K. Kabyl, A. Berrachedi, and É. Sopena, “A note on the cubical dimension of new classes of binary trees,” Czechoslovak Mathematical Journal, vol. 65, no. 1, pp. 151–160, 2015. View at: Publisher Site  Google Scholar  MathSciNet
 M. Liu and H.M. Liu, “Vertexfaulttolerant cycles embedding on enhanced hypercube networks,” Acta Mathematicae Applicatae Sinica, vol. 32, no. 1, pp. 187–198, 2016. View at: Publisher Site  Google Scholar  MathSciNet
 R. Gárciga Otero and A. Iusem, “A proximal method with logarithmic barrier for nonlinear complementarity problems,” Journal of Global Optimization, vol. 64, no. 4, pp. 663–678, 2016. View at: Publisher Site  Google Scholar  MathSciNet
 L. Menniche and D. Benterki, “A logarithmic barrier approach for linear programming,” Journal of Computational and Applied Mathematics, vol. 312, pp. 267–275, 2016. View at: Publisher Site  Google Scholar  MathSciNet
 R. Shen, Z. Meng, C. Dang, and M. Jiang, “Algorithm of barrier objective penalty function,” Numerical Functional Analysis and Optimization, vol. 38, no. 11, pp. 1–17, 2017. View at: Publisher Site  Google Scholar  MathSciNet
 I. Chakroun, T. Haber, and T. J. Ashby, “SWSGD: the sliding window stochastic gradient descent algorithm,” Procedia Computer Science, vol. 108, pp. 2318–2322, 2017. View at: Publisher Site  Google Scholar
 A. Senov and O. Granichin, “Projective approximation based gradient descent modification,” IFACPapersOnLine, vol. 50, no. 1, pp. 3899–3904, 2017. View at: Publisher Site  Google Scholar
 B. Kheirfam and M. Haghighi, “A wide neighborhood interiorpoint algorithm for linear optimization based on a specific kernel function,” Periodica Mathematica Hungarica, 2018. View at: Google Scholar
 N. Das and P. A. Priya, “FPGA implementation of reconfigurable finite state machine with input multiplexing architecture using hungarian method,” International Journal of Reconfigurable Computing, vol. 2018, Article ID 6831901, 15 pages, 2018. View at: Google Scholar
 E. Özcan, J. H. Drake, C. Altıntaş, and S. Asta, “A selfadaptive Multimeme Memetic Algorithm coevolving utility scores to control genetic operators and their parameter settings,” Applied Soft Computing, vol. 49, pp. 81–93, 2016. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 Nitish Das and P. Aruna Priya. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.