亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Privacy-preserving scheduling model for minimizing the makespan on unrelated parallel machines

        2021-07-23 09:40:16LiHaohao

        Li Haohao

        (School of Data Sciences, Zhejiang University of Finance and Economics,Hangzhou 310018, China)

        Abstract:In this paper the scheduling problem Rm||Cmax is cast in a privacy-preserving framework. Consider the situation that the parameters in problem Rm||Cmax are partitioned into groups. Each group is owned by a distinct private entity that is unwilling to share or make public its own data. We construct a secure program based on the privately held data without revealing it by employing random matrix transformation. The secure program has the same optimal minimum value as the original mixed 0-1 linear program model of the problem Rm||Cmax, and the optimal solution to the secure program is publicly generated and is available to all entities. The 0-1 components in optimal solution to the secure program are coincident to those in optimal solution to the original solution.

        Keywords: scheduling, 0-1 programming, privacy-preserving, secure program

        1 Introduction

        Recent interest in privacy-preserving classification and computation, wherein the data to be classified is owned by different entities that are unwilling to reveal the data they hold or make it public, has spread to the field of optimization[1]. In this work we deal with a privacy-preserving scheduling problem.

        The scheduling problem ofRm||Cmaxis discussed widely which schedulesnjobs onmunrelated parallel machines with the objective of minimizing the makespan, i.e.,the total timespan required to process all the given tasks. Each jobjhas a processing requirementpijwhich depends on the machineijobjwill be processed on. In reality, the machines may be partitioned into groups where the processing information of different jobs depending on each group is owned by a distinct entity. Each entity is unwilling to share its information data to the others.

        In this paper we considered about the unrelated parallel machine scheduling problem mentioned above, and propose a privately held solution method by recasting the original privacy-preserving problem into a public one.

        2 Problem formulation

        Considering about scheduling model on unrelated parallel machines to minimize makespan, it can be simply thought of a 0-1 linear programming problem. If let LetP=(pij)m×n. Suppose that the matrixPis divided intopblocks ofm1,m2,···,mp,n-dimensional rows withm1+m2+···+mp=m. Each block of rows of matrixPcorresponding to the index setsI1,I2,··· ,Ipis owned by a distinct entity that is unwilling to make this block of data public or share it with other entities. We wish to solve this scheduling problem without revealing any privately held data.

        The constraints in problem (3) can be separated into two parts, the privacy ones and the public ones. Recast the problem (3) into matrix notation we have

        where

        in whichs1,s2,··· ,smare slack variables,

        According to our knowledge, this kind of problem, optimization of a privacypreserving mixed linear 0-1 program,has not been solved so far and it is a very demanding problem. References[2-5]presented some efficient algorithms based on transformation techniques methods for privacy-preserving linear programming problems. Using those methods,the user is no longer bound to use simplex,but can take advantage of the all improvements to linear-programming algorithms, e.g., interior point methods and some newly proposed effective algorithms for linear optimization[6-7]. However, their methods cannot be used for the proposed problem in this paper because the proposed problem is confronted with 0-1 variables.

        3 Problem solving

        In this section,we propose a solution method for this privacy-preserving scheduling model, based on a random transformation technique, which was first used for privacypreserving linear programming model with inequality constraints[2]. However, this technique is not applicable directly to model(4), otherwise the 0-1 variables will reveal the private data.

        It is useful to discuss more on model (4). Note that for a real variablex, the conditionx ∈{0,1}is equivalent to the equationx(x ?1) = 0. Thus, the privacypreserving scheduling model (4) is reformulated equivalently as

        Better, he said to himself, trust to a thread than to the mercies of a king; and, gliding26 down, he found himself safe on the other side of the wall

        To keep the privacy,each of entityIichooses its own privately held random matrixBIi ∈Rk×miwithk ≥m+n(i=1,··· ,p) and random numbers

        where

        whereOi ∈Rmi×(mn+1)is a zero matrix and

        Let

        and

        where

        We note immediately that the rank of the randomly generated matrixB ∈Rk×(n+m)(k ≥m+n) ism+n[8]. Utilizing this fact we define the following transformations:With this transformation our program (5) turns into the following “secure” program:

        We now relate our original program (5) to the secure program (7).

        Theorem 3.1Letk ≥m+nfor the random matrixB ∈Rk×(n+m). The secure program (7) is solvable if and only if the program (5) is solvable in which case the optimal objective values of the two programs are identical.

        ProofBecause the rank of the random matrixBism+n, the following equivalence is obviously true

        We now turn to a specific example to show the privacy-preserving process.

        4 An illustrative example

        In this section,a specific example is discussed to demonstrate the proposed method.

        Example 4.1Consider the scheduling problemR2||Cmax: two unrelated parallel machines are available to process a set of three jobs with processing time given in a matrix

        LetI1={1},I2={2}. The specific matrices and vectors corresponding to program(5) of the scheduling problem are

        wherex11,x12,x13,x21,x22,x23are 0-1 variables andt,s1,s2are non-negative variables.

        It can be shown that the optimal solution of this scheduling problem is

        and the optimal objective value is 3, i.e., job 3 should be processed on machine 1 and job 1 and job 2 should be processed on machine 2,the makespan of the whole scheduling is 3.

        Setk=5. The entity 1 generates its own privately held matrix

        and random numbersr11=5, a11=2, and makes public only its matrix products

        Also, the entity 2 generates its own privately held matrix

        and random numbersr21=3, a21=2, and makes public only its matrix products

        5 Conclusions

        In this paper, we have shown how to securely model the scheduling problemRm||Cmaxwhen its processing information is horizontally partitioned among entities unwilling to share their data or make it public. The model integrates the public and the privacy-preserving data of the scheduling problem. An example illustrating the model has been given to demonstrate the utility of the model and the method to retrieve the optimal solution of the model. It would be interesting to extend this idea to other scheduling problems.

        夜夜躁日日躁狠狠久久av| 极品美女尤物嫩模啪啪| 亚洲色欲色欲大片WWW无码| 中文字幕亚洲区第一页| 免费在线国产不卡视频| 亚洲中文字幕在线一区| 公与淑婷厨房猛烈进出| 日本最大色倩网站www| 久久精品国产四虎| 日韩精品视频免费福利在线观看| 日本最新视频一区二区| 怡红院av一区二区三区 | 99国产精品无码| 熟妇人妻中文av无码| 亚洲制服无码一区二区三区| 一区二区三区人妻在线| 一个色综合中文字幕人妻激情视频| 成人影院yy111111在线| 无码精品人妻一区二区三区人妻斩| 亚州综合激情另类久久久| 无码视频一区二区三区在线播放| 亚洲午夜经典一区二区日韩| 蜜桃视频免费进入观看| 久久国产精品-国产精品| 成人国产午夜在线视频| 男女羞羞的视频免费网站| 91一区二区三区在线观看视频| 久久亚洲av成人无码电影| 亚洲精华国产精华液的福利| 亚洲九九九| 伊人久久大香线蕉综合av| 人人妻人人澡人人爽欧美一区| 中文在线8资源库| 97一区二区国产好的精华液| 欧美丝袜秘书在线一区 | 少妇av射精精品蜜桃专区| AV无码中文字幕不卡一二三区| 国产一区,二区,三区免费视频 | 亚洲精品一区三区三区在线| 国产精品亚洲欧美大片在线看| 美女扒开内裤让男生桶|