亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Privacy-preserving scheduling model for minimizing the makespan on unrelated parallel machines

        2021-07-23 09:40:16LiHaohao

        Li Haohao

        (School of Data Sciences, Zhejiang University of Finance and Economics,Hangzhou 310018, China)

        Abstract:In this paper the scheduling problem Rm||Cmax is cast in a privacy-preserving framework. Consider the situation that the parameters in problem Rm||Cmax are partitioned into groups. Each group is owned by a distinct private entity that is unwilling to share or make public its own data. We construct a secure program based on the privately held data without revealing it by employing random matrix transformation. The secure program has the same optimal minimum value as the original mixed 0-1 linear program model of the problem Rm||Cmax, and the optimal solution to the secure program is publicly generated and is available to all entities. The 0-1 components in optimal solution to the secure program are coincident to those in optimal solution to the original solution.

        Keywords: scheduling, 0-1 programming, privacy-preserving, secure program

        1 Introduction

        Recent interest in privacy-preserving classification and computation, wherein the data to be classified is owned by different entities that are unwilling to reveal the data they hold or make it public, has spread to the field of optimization[1]. In this work we deal with a privacy-preserving scheduling problem.

        The scheduling problem ofRm||Cmaxis discussed widely which schedulesnjobs onmunrelated parallel machines with the objective of minimizing the makespan, i.e.,the total timespan required to process all the given tasks. Each jobjhas a processing requirementpijwhich depends on the machineijobjwill be processed on. In reality, the machines may be partitioned into groups where the processing information of different jobs depending on each group is owned by a distinct entity. Each entity is unwilling to share its information data to the others.

        In this paper we considered about the unrelated parallel machine scheduling problem mentioned above, and propose a privately held solution method by recasting the original privacy-preserving problem into a public one.

        2 Problem formulation

        Considering about scheduling model on unrelated parallel machines to minimize makespan, it can be simply thought of a 0-1 linear programming problem. If let LetP=(pij)m×n. Suppose that the matrixPis divided intopblocks ofm1,m2,···,mp,n-dimensional rows withm1+m2+···+mp=m. Each block of rows of matrixPcorresponding to the index setsI1,I2,··· ,Ipis owned by a distinct entity that is unwilling to make this block of data public or share it with other entities. We wish to solve this scheduling problem without revealing any privately held data.

        The constraints in problem (3) can be separated into two parts, the privacy ones and the public ones. Recast the problem (3) into matrix notation we have

        where

        in whichs1,s2,··· ,smare slack variables,

        According to our knowledge, this kind of problem, optimization of a privacypreserving mixed linear 0-1 program,has not been solved so far and it is a very demanding problem. References[2-5]presented some efficient algorithms based on transformation techniques methods for privacy-preserving linear programming problems. Using those methods,the user is no longer bound to use simplex,but can take advantage of the all improvements to linear-programming algorithms, e.g., interior point methods and some newly proposed effective algorithms for linear optimization[6-7]. However, their methods cannot be used for the proposed problem in this paper because the proposed problem is confronted with 0-1 variables.

        3 Problem solving

        In this section,we propose a solution method for this privacy-preserving scheduling model, based on a random transformation technique, which was first used for privacypreserving linear programming model with inequality constraints[2]. However, this technique is not applicable directly to model(4), otherwise the 0-1 variables will reveal the private data.

        It is useful to discuss more on model (4). Note that for a real variablex, the conditionx ∈{0,1}is equivalent to the equationx(x ?1) = 0. Thus, the privacypreserving scheduling model (4) is reformulated equivalently as

        Better, he said to himself, trust to a thread than to the mercies of a king; and, gliding26 down, he found himself safe on the other side of the wall

        To keep the privacy,each of entityIichooses its own privately held random matrixBIi ∈Rk×miwithk ≥m+n(i=1,··· ,p) and random numbers

        where

        whereOi ∈Rmi×(mn+1)is a zero matrix and

        Let

        and

        where

        We note immediately that the rank of the randomly generated matrixB ∈Rk×(n+m)(k ≥m+n) ism+n[8]. Utilizing this fact we define the following transformations:With this transformation our program (5) turns into the following “secure” program:

        We now relate our original program (5) to the secure program (7).

        Theorem 3.1Letk ≥m+nfor the random matrixB ∈Rk×(n+m). The secure program (7) is solvable if and only if the program (5) is solvable in which case the optimal objective values of the two programs are identical.

        ProofBecause the rank of the random matrixBism+n, the following equivalence is obviously true

        We now turn to a specific example to show the privacy-preserving process.

        4 An illustrative example

        In this section,a specific example is discussed to demonstrate the proposed method.

        Example 4.1Consider the scheduling problemR2||Cmax: two unrelated parallel machines are available to process a set of three jobs with processing time given in a matrix

        LetI1={1},I2={2}. The specific matrices and vectors corresponding to program(5) of the scheduling problem are

        wherex11,x12,x13,x21,x22,x23are 0-1 variables andt,s1,s2are non-negative variables.

        It can be shown that the optimal solution of this scheduling problem is

        and the optimal objective value is 3, i.e., job 3 should be processed on machine 1 and job 1 and job 2 should be processed on machine 2,the makespan of the whole scheduling is 3.

        Setk=5. The entity 1 generates its own privately held matrix

        and random numbersr11=5, a11=2, and makes public only its matrix products

        Also, the entity 2 generates its own privately held matrix

        and random numbersr21=3, a21=2, and makes public only its matrix products

        5 Conclusions

        In this paper, we have shown how to securely model the scheduling problemRm||Cmaxwhen its processing information is horizontally partitioned among entities unwilling to share their data or make it public. The model integrates the public and the privacy-preserving data of the scheduling problem. An example illustrating the model has been given to demonstrate the utility of the model and the method to retrieve the optimal solution of the model. It would be interesting to extend this idea to other scheduling problems.

        久久精品国产白丝爆白浆| 一本一本久久a久久精品综合| 日本午夜理伦三级好看| 99精品国产综合久久麻豆| 久久狠狠色噜噜狠狠狠狠97| 国产va免费精品观看| 2017天天爽夜夜爽精品视频| 精品国产中文久久久免费| 亚洲av无码一区二区三区鸳鸯影院| a级毛片100部免费看| 亚洲—本道中文字幕久久66| 高潮av一区二区三区| 久久国产劲爆∧v内射-百度| 色婷婷久久综合中文久久蜜桃av| 一区二区三区内射视频在线观看| 久久影院最新国产精品| 人妻无码一区二区三区| 亚洲成a人片在线观看天堂无码 | 狠狠人妻久久久久久综合蜜桃| 欧美老妇人与禽交| 白白色发布永久免费观看视频 | 台湾佬中文网站| 久久夜色撩人精品国产小说| 日韩午夜在线视频观看| 国产av剧情刺激对白| 久久久老熟女一区二区三区| 亚洲日本欧美产综合在线| 日本岛国视频在线观看一区二区 | 国产免费资源高清小视频在线观看| 日本一区二区三区在线观看免费| 亚洲乱码中文字幕在线| 国产天美传媒性色av| 亚洲女同成av人片在线观看| 亚洲av熟女传媒国产一区二区| 国产偷久久久精品专区| 欧美日韩不卡中文字幕在线| 白白白色视频在线观看播放| 久久久久久久亚洲av无码| 成年女人毛片免费观看97 | 国产亚洲精品一区二区在线观看| 欧美变态另类刺激|