Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Code and Data Repository for A Heuristic for Complementarity Problems Using Difference of Convex Functions

View through CrossRef
The repository contains the implementation of a heuristic for solving linear and nonlinear complementarity problems (LCPs and NCPs) using a difference of convex functions (DC) approach. The method is referred to as DCA-BL (Difference of Convex Function Algorithms for Bilinear Terms). All algorithms are implemented in Python. LCP problem instances are implemented using the Pyomo modeling language, while NCP instances are implemented using gurobipy. The heuristic is based on the DCA framework, which iteratively solves a sequence of convex approximations to the original non-convex problem.
Title: Code and Data Repository for A Heuristic for Complementarity Problems Using Difference of Convex Functions
Description:
The repository contains the implementation of a heuristic for solving linear and nonlinear complementarity problems (LCPs and NCPs) using a difference of convex functions (DC) approach.
The method is referred to as DCA-BL (Difference of Convex Function Algorithms for Bilinear Terms).
All algorithms are implemented in Python.
LCP problem instances are implemented using the Pyomo modeling language, while NCP instances are implemented using gurobipy.
The heuristic is based on the DCA framework, which iteratively solves a sequence of convex approximations to the original non-convex problem.

Related Results

A Heuristic for Complementarity Problems Using Difference of Convex Functions
A Heuristic for Complementarity Problems Using Difference of Convex Functions
We present a new difference of convex functions algorithm (DCA) for solving linear and nonlinear mixed complementarity problems (MCPs). The approach is based on the reformulation o...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
This research aims to describe the use of language in community interactions at the Motabuik terminal, Atambua City. The use of language in question is the form and function of cod...
A large-scale analysis of bioinformatics code on GitHub
A large-scale analysis of bioinformatics code on GitHub
AbstractIn recent years, the explosion of genomic data and bioinformatic tools has been accompanied by a growing conversation around reproducibility of results and usability of sof...
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Abstract Background: AI-based code assistants are on the rise in software development as powerful technologies offering streamlining of code generation and better-quality c...
Advances in the Biogeochemical Role of Microorganisms in High‐Level Waste Repository
Advances in the Biogeochemical Role of Microorganisms in High‐Level Waste Repository
ABSTRACT The deep geological repository of high‐level radioactive waste (HLW) is widely recognized as a safe and effective long‐term management strategy, which hi...

Back to Top