<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Quadratic Optimization Problem on Permutation Set with Simulation of Applied Tasks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Kyiv International University</institution>
          ,
          <addr-line>Lvivska str., 49, Kyiv, 03179</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Poltava University of Economics and Trade</institution>
          ,
          <addr-line>Koval str., 3, Poltava, 36000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Lodz</institution>
          ,
          <addr-line>Uniwersytecka Str. 3, 90-137 Lodz</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article discusses the formulation of an optimization problem with a quadratic target function and additional constraints on the permutation set, which can be a model of many applied problems. An algorithm for solving an optimization problem with a quadratic target function and additional constraints on permutations is proposed. During the implementation of the method the first reference plan is found and additional restrictions for it are checked at the first stage. Thus, in the beginning of the algorithm, the number of considered solutions decreases. This makes it possible at the first stage to reduce the number of possible solutions and narrow the area of the problem study. An example of solving a theoretical problem using this method, demonstrating its effectiveness, is proposed. Such task can be used to modeling various technological processes. The reason for this is the optimization of mathematical models and algorithms for the proposed models.</p>
      </abstract>
      <kwd-group>
        <kwd>optimization problems</kwd>
        <kwd>combinatorial set of permutations</kwd>
        <kwd>model of optimization problems</kwd>
        <kwd>quadratic target function</kwd>
        <kwd>optimal solutions</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Computer simulation of technological processes consists in optimization of the study
object by a mathematical model, and further model study with the help of
implemented computational algorithms on personal computers. The computer simulation
process, as a single process of building and researching a model, is used for research,
analysis, design and optimization of technological objects and systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Today,
computer modeling approaches combines both theory and practice. Working with a
model that represents a research object gives you the opportunity to explore its
properties and behavior in all situations.
      </p>
      <p>
        Computer modeling is the process of building a real study object's model and
setting up computational experiments on this model in order to understand and evaluate
various strategies based on the use of algorithms that ensure the functioning of this
study object. Thus, the process of computer simulation includes the model design, and
its application to solve the problem of optimization and design of technological
processes in production. All these problems are extremely complex and include numerous
elements, variables, parameters, constraints, etc. Such problems can be modeled by
combinatorial optimization tasks [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1-8</xref>
        ].
      </p>
      <p>
        The combinatorial optimization problems study comprises a fairly wide range of
mathematical models associated with the need to solve various important practical
problems of optimal planning, management and design [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref2 ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref5 ref7 ref9">1, 2, 5, 7, 9, 10-12, 20-29</xref>
        ]. In
this regard, many papers have recently appeared which investigate the combinatorial
optimization problems and propose approaches to their solution [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref36 ref8">8, 11-34, 36-38</xref>
        ].
      </p>
      <p>The paper presents a model of optimization problems on a combinatorial set of
permutations, which is a model of many applied problems. It is proposed the
algorithm for solving an optimization problem with a quadratic target function and
additional restrictions on permutations.</p>
      <p>During the method's implementation the first reference plan is located and
additional restrictions are checked, which reduces the number of considered solutions at
the beginning of the algorithm</p>
      <p>It is offered an example of solving a theoretical problem by the given method and
demonstrating its efficiency.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Literature review</title>
      <p>Computer models have become a common tool for mathematical modeling and are
used in various areas of electronics, engineering, industry, and so on. Computer
models are used to obtain new knowledge about the object or for an approximate
assessment of the system’s behavior that are too complex for analytical research.</p>
      <p>
        Computer modeling is one of the effective methods for studying complex systems.
The construction of a computer model is based on abstracting from the specific nature
of the phenomena or the original object under study and consists of two stages – first,
the creation of a qualitative, and then a quantitative model. The more significant
properties will be identified and transferred to the computer model – the more
approximate it will be to the real model, the greater the capabilities that the system
using this model will have. Today the works of many scientists are devoted to this
research area [
        <xref ref-type="bibr" rid="ref1 ref10 ref2 ref21 ref3 ref4 ref5 ref8 ref9">1-5, 8-10, 21</xref>
        ].
      </p>
      <p>
        An important computer simulation area is analytical and simulation modeling. In
analytical modeling, mathematical (abstract) models of a real object are studied in the
algebraic equations form, as well as providing for the implementation of an
unambiguous computational procedure leading to their exact solution. In simulation,
mathematical models are studied in the algorithms form, which reproduce the
functioning of the system under study by sequentially performing numerous
elementary operations. Very relevant today for simulation and analytical modeling are
discrete models, in particular, combinatorial optimization, their study is the subject of
a great number of papers [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1–17</xref>
        ], [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31">22–31</xref>
        ].
      </p>
      <p>A significant contribution to the development of modern discrete optimization
theory, the development and implementation of its methods in the study and solving
of important applied problems have been made over the course of more than forty
years under the scientific guidance of Academician I.V. Sergienko scientists of the
Institute of Cybernetics named by V.M. Glushkov National Academy of Sciences of
Ukraine. They obtained important results, which became the basis for the theory
development and the creation of n lines in discrete optimization.</p>
      <p>
        At present, intensive studies of the stability problems of vector discrete
optimization problems are carried out at the Institute of Cybernetics named by V.M.
Glushkov of the National Academy of Sciences of Ukraine (I.V. Sergienko, T.T.
Lebedev, N.V. Semenova, T.I. Sergienko) [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ], Belarusian State University
(V.O.Emelyichev, D.P. Podkopayev, Yu.V. Nikulin, etc.) [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ], the Joint Institute of
Computer Sciences of the National Academy of Sciences of Belarus (Yu.N.Sotskov),
the Computational Center of the Russian Academy of Sciences (E.M. Gordeyev, V.K.
Leontiev), Omsk Branch of the Institute of System Studies of the Polish Academy of
Sciences (M. Libura), a number of universities of the Federal Republic of Germany
(E. Girlich), the Netherlands (ES van der Poort, G. Sierkma, APM Wagelmans, JAA
van der Veen), in the uniquely Colorado US (H.J. Greenberg).
      </p>
      <p>Belarusian scientists under the scientific guidance of Professor V.O. Yemelycheva
successfully develops a constructive approach to the problem of the vector discrete
optimization problems correctness associated with the reception of quantitative
characteristics of the stability of specified problem statements, a mathematical
apparatus for studying the stability of multicriteria discrete problems with different
types, vector criteria functions, principles of optimality, as well as generalized and
parameterized principles of optimality are developed.</p>
      <p>
        It is important to study the relation between different classes of point
configurations triangulation (regular, weakly regular, deployed, symmetric, political,
etc.), in particular, the study of the structure of a partially ordered set constructed on
the family of triangulation classes considered in relation to the inclusion relation.
Recently, algorithms for solving convex polyhedral admissibility problems are
actively explored [
        <xref ref-type="bibr" rid="ref11 ref18 ref19">11, 18, 19</xref>
        ]. One of the interesting computational approaches is the
reduction of the admissibility problem for a polyhedron to the projection problem on a
normal cone generated by a dual system of inequalities [
        <xref ref-type="bibr" rid="ref18 ref29 ref31">18, 29, 31</xref>
        ], which is
sufficiently close to the projection problem for a binary polyhedron. Today, in the
research area of various classes of combinatorial models, the new methods
development for their solution, great attention is paid to methods based on the use of
structural properties of combinatorial sets. The properties of combinatorial sets study
is closely related to the theory of polyhedral and graphs. The use of information about
the structure of the convex shell of admissible multivariate solutions, which is the
basis for many methods, is one of the most successful approaches to solving
combinatorial optimization problems for today. But when solving such tasks there are
problems related to the complexity of mathematical models, large volume of
information, etc.
      </p>
      <p>Applied problems simulated by extreme discrete tasks often have a high
dimensionality, so they are quite complex from a computational point of view. The
main task is to determine the value of an argument belonging to a certain
combinatorial configuration for which the target function acquires the global
optimum. So it is necessary to develop the most effective algorithm, which is based
on the specific properties of the combinatorial configurations.</p>
      <p>For the extreme problems of combinatorial optimization, polynomial algorithms
for finding an optimal solution based on the properties of the input data structure have
been developed, but there are few such work compared to methods based on partial
overview of the options. One of the approaches to solving such problem is to carry
out research and analysis of the combinatorial configurations properties, in which the
target function, which reflects the combinatorial nature of the tasks, is determined.
Analysis and study of combinatorial configurations as a target function argument,
setting the change in the values of the target function, depending on the elements
ordering of the selected combinatorial configuration and the structure of the input data
specificity, does not pay sufficient attention in the literature. But it should be noted
that the study of the certain tasks properties in order to identify their characteristic
properties and their use for solving the problem, gives the possibility of constructing
new approaches and the development of known methods.</p>
      <p>Hence, one of the important problems in the discrete optimization area is the
detection of the properties of combinatorial configurations in extreme problems, the
use of which would allow to establish the regularity of the change in the values of the
target functions, depending on the argument ordering and on the specificity and
structure of the combinatorial configurations sets.</p>
      <p>
        Today, significant results have been obtained in the area of research of
combinatorial models' various classes and the development of new methods for their
solution. The following foreign scientists made a fundamental contribution to the
development of discrete, in particular, combinatorial optimization: M. Gary, S. Berge,
D. Johnson, H. Papadimitriou, P. Pardalos, K. Staiglich, R. Stanley, F. Harari, V.A.
Emelichev, V.M. Sachkov [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1-8, 10, 11, 12</xref>
        ].
      </p>
      <p>In turn, the many Ukrainian scientists' works are devoted to the various classes of
combinatorial optimization problems' study: L.F. Gulyanitsky, P.I. Stetsyuka, I.V.
Sergienko, N.S. Shor, Yu.G. Stoyan, S.V. Yakovlev, A.O. Yemetsa, V.O. Perepelitsy
and many others.</p>
      <p>
        In particular, in [
        <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18–21</xref>
        ], the authors describe the convex extensions theory and its
applications in combinatorial optimization problems. Combinatorial models'
applications in practical problems of geometric design are presented in the works of
L.F. Gulyanitsky, I.V. Sergienko, Yu.G. Stoyan, S.V. Yakovlev, N.S. Shor [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27">22-27,
38</xref>
        ].
      </p>
      <p>
        Quadratic optimization on the permutation set is reflected in [
        <xref ref-type="bibr" rid="ref28 ref29 ref30 ref31">28–31</xref>
        ].
      </p>
      <p>
        The permutation set's representation as the intersection of a permutation
polyhedron and a hypersphere is interesting, as well as optimization methods on
permutation configurations using the intersection described in [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ].
      </p>
      <p>The development of an integrated approach to the analysis of the properties of
combinatorial optimization supplies covers a wide range of studies of combinatorial
functions, combinatorial polyhedral, combinatorial configurations as an argument of
the target function. The results give the opportunity to improve existing methods for
solving such problems and develop new methods for optimal solutions searching. The
problems based on the properties of combinatorial configurations are actual problems
of combinatorial optimization. Of particular importance in this aspect is the
consideration of extreme problems in combinatorial configurations using graph
theory.</p>
      <p>The research of tasks in graphs deals with such scientists as F. Harari, O. Ore,
I.V. Sergienko, V. O. Yemelichev, A. O. Zikov, V. O. Perepelytsya, R. I. Tyshkevich
and others. Despite quite large achievements in the area of discrete optimization, in
the process of modeling, there are extreme problems classes for which a number of
issues have not yet been investigated. Principal difficulties that arise during modeling
are also related to various types of uncertainty. These include: the availability of
many criteria for evaluating the quality of solutions, interval setting of task
parameters, etc. In these conditions, classical methods are not sufficiently suitable for
solving problems. As you know, most combinatorial optimization tasks can be
reduced to integer programming tasks, but this is not always justified, since it
eliminates the possibility of taking into account the combinatorial properties of task
solutions.</p>
      <p>This work is a continuation of research in the extreme discrete problem’s area, in
particular, combinatorial optimization, as well as optimization problems under the
conditions of multicriteria, which arise in the study of many theoretical and applied
problems.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Formal problem statement</title>
      <p>
        We consider the permutation as an ordered sample of elements a  (ai1 , ai2 ,..., aik ) ,
where ai j  A , i j  Nn , j  Nn is  it if s  t s  Nn , t  Nn from some
multi-set A  {a1, a2 ,..., aq} , which is characterized by the base S ( A)  {e1, e2 ,..., ek } ,
where
e j  R1, j  Nk
and the
multiplicity of the elements
k (e j )  rj ,
j  Nk , r1  r2  ...  rk  q j  Nk , according to [
        <xref ref-type="bibr" rid="ref14 ref17">14, 17</xref>
        ].
      </p>
      <p>A set of permutations with repetitions of n real numbers, among which k different,
is called the general permutation set and is denoted as Pnk ( A) . This is the set of
ordered n-samples from the multiset A under the condition n  q  k .</p>
      <p>If we have n  k  q set of permutations without repetition, we denote it as P .
n
Obviously, Pn ( A)  Pnn ( A) . In cases where the form of the set of permutations is not
indicated, it will be possible to write down these sets as P( A) .</p>
      <p>
        It is known [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] that the convex hull of the set of permutations is a permutation
polyhedron   conv P( A) , which vertex set P( A) is equal to the set of
permutations: vert ( A)  P( A) .
      </p>
      <p>Without loss of generality, we order the elements of the multiset A in
nondescending order: a1  a2  ...  aq and the elements of its foundation –in descending
order: e1  e2  ...  ek .</p>
      <p>Then the convex hull of a common set of P( A) permutations is a generic
polyhedron ( A)  conv P( A) , that is described by a well-known system of linear
inequalities:
 j  Nn ,  j   t , j  t, j, t  Ni , i  Nn and P( A)  vert ( A) .</p>
      <p>Consider the optimization problem:
 n n
 x j   a j ,
 j1 j1
 i i
 xj   a j ,
 j1 j1
Z (, P( A)) : max{(a) | a  P( A)}</p>
      <p>D  {x  R n | Gx  ()b}
where G  R mn , b  R m</p>
      <p>n n n
(a)   c j x 2j    aij xi x j</p>
      <p>j1 i1 j1
on a set of permutations Pn ( A) .</p>
      <p>Additional linear constraints form a multifaceted set D  R n .</p>
      <p>Then, to every point a  Pn ( A) will match point x  X , one that satisfies equality
F (x)  (a) :</p>
      <p>Z (F , X ) : max{F (x) | x  X }</p>
      <p>n n n
where, F (x)   c j x 2j    aij xi x j</p>
      <p>j1 i1 j1
and additional constraints:</p>
      <p>D  {x  R n | Gx  ()b}
(1)
(2)
(3)
(4)
(5)
(6)</p>
      <p>X - nonempty set in R n , which is defined as follows:</p>
      <p>X  vert ( A) ,   conv P( A)
(8)</p>
      <p>It is natural to assume that the maximum of a quadratic function will be one of the
vertices of the permutation polyhedron, and the vertices of the graph G(Pn ) will
match to all points of the set of permutations Pn ( A) .</p>
      <p>
        The adjacency of the vertices of a permutation polyhedron is determined by a
onetime transposition of two vertex elements. The number of transpositions in the graph
is determined by the formula [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]:
Cn2 
n(n 1)
2
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>The algorithm for solving an optimization problem with a quadratic target function and additional constraints on the set is rearranged</title>
      <p>The algorithm for finding the problem optimal solution consists of four steps, which
in a few steps make it possible to obtain an optimal solution.</p>
      <p>STEP 1. Finding the first support solution.</p>
      <p>Consider the first transposition of the target function:
x1  x2 , (i  2,..., n) :
f12  (x1  x2 )(a1x1  a1x2  ...  an2 xn )
We form the necessary conditions for finding the first solution:
x1  x2 ,

xi  max, (max ai ).</p>
      <p>Variants of transpositions:
x1  x2 , (i  2,..., n) :
f12  (x1  x2 )(a1x1  a1x2  ...  an2 xn )
x1  x3 : f13  (x1  x3 )(a13 x1  a23 x2  ...  an3 xn )</p>
      <p>… … …
x1  xn : f1n  (x1  xn )(a1n x1  a2n x2  ...  ann xn )
x2  xi , (i  3,..., n);
(9)
(10)
(11)
… … …
… … …
x2  x3 : f 23  (x2  x3 )(a12 x1  a22 x2  ...  an2 xn )
x2  xn : f 2n  (x2  xn )(a1n x1  a2n x2  ...  ann xn )
xn1  xn : f n1n  (xn1  xn )(a1n1 x1  a2n1 x2  ...  ann1 xn )</p>
      <p>The first solution will be: (x1, x2 ,..., xn ) . It should be noted that there may be
several first solutions.</p>
      <p>STEP 2. Check constraints: (g1, g 2 ,..., gn ) .</p>
      <p>When checking constraints, the following options are possible:
All constraints are satisfied, then go to step 3.</p>
      <p>At least one of the restrictions is not satisfied, then the next solution found for the
given transposition is considered. If there are none, then we consider the next point in
ascending order and proceed to step 1.</p>
      <p>In the case of consideration of all transpositions, it is necessary to consider the
point in ascending order by three transpositions, four, etc.</p>
      <p>STEP 3. Formation of conditions for finding the optimal solution.</p>
      <p>Initial conditions for finding the optimal solution:
f (x1, x2 ,..., xn )  b,
g1 (x1, x2 ,..., xn )  ()b1, b1  b1  g1(x1, x2 ,..., xn ),

g 2 (x1, x2 ,..., xn )  ()b2 , b2  b2  g 2 (x1, x2 ,..., xn ),

...............................................................................,
g n (x1, x2 ,..., xn )  ()bn , bn  bn  g n (x1, x2 ,..., xn ).</p>
      <p>STEP 4. Improved support solution.</p>
      <p>Choose the next point from the set of permutations, which is better than the first
support solution. Next, we transpose this point with respect to the first support
solution and find the numerical value of the transposition of the target function:
(12)
ftr (x1, x2 ,..., xn )  b
(13)
Prerequisite:</p>
      <p>ftr (x1, x2 ,..., xn )  b – growth.
4.1. If this condition is true, then it is necessary to check the growth of restrictions:
2 2 1 1
gi  gi2  gi1   xigi * c j  x gji * ci    x gji * c j  xigi * ci 
 
(14)</p>
      <p>All increments satisfy conditions (12), then the found point is the optimal solution.
Otherwise, we return to the beginning of the step 4.</p>
      <p>4.2. If condition (13) is not fulfilled, we return to the beginning of step 4.</p>
      <p>It should be noted that conditions (12) are sufficient for finding the optimal
solution, and the fulfillment of inequality (13) is necessary for finding the optimal
solution.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Example</title>
      <p>Find the maximum value of the target function:
max F (x) 
on the permutations set A4 ,where A  (1,2,3,4) , with the following restrictions:
g1  5x1  2x2  3x3  4x4  15,
g 2  3x1  6x2  8x3  x4  31.</p>
      <p>Solving.</p>
      <p>For formula (1), the number of possible transpositions is: С42  6 .</p>
      <p>Consider the first transposition x1  x2 , presenting the target function as a
product:</p>
      <p>f12  (x1  x2 )(x1  x2  6x3  x4 ) ,
accordingly, when searching for the first solution, it is necessary to consider the
following conditions: 
x1  x2 ,

x3  min .
g1 (4,3,1,2)  25  15,
g 2 (4,3,1,2)  12  31.
max f1 (4,3,1,2)  40,
Then the first solution may be the following points of the permutations set: (4,3,1,2),
(4,2,1,3), (3,2,1,4).</p>
      <p>Consider the first point (4,3,1,2):
Additional restrictions are enforced. Then the initial conditions for improving the first
support solution will be:
g11 (4,3,1,2)  10,

g12 (4,3,1,2)  19.</p>
      <p>When considering point 2, it is necessary to fulfill the condition f i - increases:
f 2 (4,2,1,3)  (x2  x4 )(4x1  0.5x2  0.5x4  7x3 )  6,5.</p>
      <p>Consequently, the target function increases by 6.5 units, so there is a need to check
the increment of additional restrictions:
g11 (4,2,1,3)  6  10,

g 12 (4,2,1,3)  7  19.</p>
      <p>Constraints are met, so the support solution can be improved:</p>
      <p>max f 2 (4,2,1,3)  f1 (4,3,1,2)  f 2 (4,2,1,3)  46,5.
g11 (4,2,1,3)  16,

g12 (4,2,1,3)  26.
Consider the point (3,2,1,4) , then you need to transpose x1  x4 regarding point
2 (4,2,1,3) :</p>
      <p>1 1
f14 (3,2,1,4)  ( x1  x4 )(3x1  6x2  2x3  3x4 ) </p>
      <p>2 2
Since the target function decreases by 5.5 units, there is no point in considering this
point of the set of permutations.</p>
      <p>Consider ascending, point (4,2,3,1) , respectively, transposition, x3  x4 regarding
point 2 (4,2,1,3) :
(3  4)(9  12  2  12)  5,5.
f 34 (3,2,1,4) 
(x3  x4 )(6x2  8x1  x3  x4 ) </p>
      <p>(3  1)(12  32  3  1)  16.
The target function decreases by 16 units, respectively, this point is not considered.</p>
      <p>Therefore, point 2 (4,2,1,3) is optimal and cannot be improved.</p>
      <p>max f 2 (4,2,1,3)  46,5.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>The article represents an optimization problem model with a quadratic target function
and additional constraints on the combinatorial set of permutations as a model of
many applied problems. An algorithm for solving the optimization problem is
proposed and a numerical example is demonstrated. It should be noted that the problem
are very complex from a computational point of view. Therefore, their solutions
require a lot of time and resources. This method significantly simplifies the procedure
for finding the optimal solution of an optimization problem with a quadratic target
function and additional constraints on the combinatorial set of permutations, since the
inequality of restrictions increments allows you to immediately determine whether the
point of the permutation set is a support solution or not. There is not a necessity to do
complex calculations of all constraints and the target function; it suffices to find the
increment of constraint and functions in the case of an improvement the solution.</p>
      <p>The further development of this study is going to be aimed at realizing and
adapting the formulated method on other combinatorial constructions, as well as
developing new methods for solving combinatorial optimization problems, taking into
account the input data.
37. Kolechkina, L. M., Dvirna, O. A., Nagornaya, A. N.: Modified coordinate method to solve
multicriteria optimization problems on combinatorial configurations. Cybernetics and
Systems Analysis. 50(4): pp. 620-626 (2014)
38. Koliechkina, L., Pichugina, O.: Multiobjective Optimization on Permutations with
Applications, In DEStech Transactions on Computer Science and Engineering, 2018 IX
International Conference on Optimization and Applications (OPTIMA 2018) (Supplementary
Volume), pp. 61-75 (2018)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Korte</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vygen</surname>
          </string-name>
          , J.:
          <source>Combinatorial Optimization: Theory and Algorithms</source>
          . Springer, New York (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Pardalos</surname>
            ,
            <given-names>P.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Du</surname>
            , D.-
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Graham</surname>
            ,
            <given-names>R.L</given-names>
          </string-name>
          . (Eds.).
          <source>: Handbook of combinatorial optimization</source>
          . Springer, New York (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bernhard</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jens</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Combinatorial Optimization, Theory and Algorithms</article-title>
          . SpringerVerlag, Berlin (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Karin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saoub</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Tour through Graph Theory</article-title>
          . Chapman and Hall/CRC, New York (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Berge</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          : Principes de combinatoire. Dunod, Paris (
          <year>1968</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Yemelichev</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalev</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravtsov</surname>
            ,
            <given-names>M.K.</given-names>
          </string-name>
          :
          <article-title>Polytopes, graphs and optimisation</article-title>
          . Cambridge University Press, Cambridge (
          <year>1984</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Sachkov</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          :
          <article-title>Combinatorial methods of discrete mathematics</article-title>
          . Nauka, Moscow (
          <year>1975</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Hulianytskyi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riasna</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Formalization and classification of combinatorial optimization problems</article-title>
          .
          <source>Springer Optimization and its Applications</source>
          .
          <volume>130</volume>
          : pp.
          <fpage>239</fpage>
          -
          <lpage>250</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grebennik</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          :
          <article-title>Localization of solutions of some problems of nonlinear integer optimization</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>29</volume>
          (
          <issue>5</issue>
          ): pp.
          <fpage>727</fpage>
          -
          <lpage>734</lpage>
          (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Schrijver</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Combinatorial Optimization: Polyhedra and Efficiency</source>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          , Berlin (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Balakrishnan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sridharan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Foundations of Discrete Mathematics with Algorithms and Programming</article-title>
          . Chapman and Hall/CRC, New York (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bona</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Combinatorics of Permutations, Second Edition</article-title>
          . Chapman and Hall/CRC, New York (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Shor</surname>
            ,
            <given-names>N.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stetsyuk</surname>
            ,
            <given-names>P.I.</given-names>
          </string-name>
          :
          <article-title>Modified r-algorithm to find the global minimum of polynomial functions Cybernetics and Systems Analysis</article-title>
          .
          <volume>33</volume>
          (
          <issue>4</issue>
          ): pp.
          <fpage>482</fpage>
          -
          <lpage>497</lpage>
          (
          <year>1997</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Emets</surname>
            ,
            <given-names>O.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koliechkina</surname>
            ,
            <given-names>L. N.</given-names>
          </string-name>
          :
          <article-title>Solution of optimization problems with fractional-linear objective functions and additional linear constraints on permutations</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>40</volume>
          (
          <issue>3</issue>
          ): pp.
          <fpage>329</fpage>
          -
          <lpage>339</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Donec</surname>
            ,
            <given-names>G. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolechkina</surname>
            ,
            <given-names>L. M.:</given-names>
          </string-name>
          <article-title>Method of ordering the values of a linear function on a set of permutations</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>45</volume>
          (
          <issue>2</issue>
          ):
          <fpage>204</fpage>
          -
          <lpage>213</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Sergienko</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volkovich</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roshchin</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          :
          <article-title>Models and methods of solution of quadratic integer programming problems</article-title>
          .
          <source>Cybernetics</source>
          .
          <volume>23</volume>
          (
          <issue>3</issue>
          ):
          <fpage>289</fpage>
          -
          <lpage>305</lpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Semenova</surname>
            ,
            <given-names>N.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolechkina</surname>
            ,
            <given-names>L.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagornaya</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          :
          <article-title>On Approach to Solving Vector Problems with Fractionally Linear Functions of the Criteria on the Combinatorial Set of Arrangements</article-title>
          .
          <source>Journal of Automation and Information Sciences</source>
          .
          <volume>42</volume>
          (
          <issue>1</issue>
          ): pp.
          <fpage>67</fpage>
          -
          <lpage>80</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>The theory of convex continuations of functions on vertices of convex polygons</article-title>
          .
          <source>Computational Mathematics and Mathematical Physics</source>
          .
          <volume>34</volume>
          : pp.
          <fpage>959</fpage>
          -
          <lpage>965</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Convex extensions in combinatorial optimization and their applications</article-title>
          .
          <source>Springer Optimization and its Applications</source>
          .
          <volume>130</volume>
          : pp.
          <fpage>567</fpage>
          -
          <lpage>584</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.:</given-names>
          </string-name>
          <article-title>Bounds on the minimum of convex functions on Euclidean combinatorial sets</article-title>
          .
          <source>Cybernetics</source>
          .
          <volume>25</volume>
          (
          <issue>3</issue>
          ): pp.
          <fpage>385</fpage>
          -
          <lpage>391</lpage>
          (
          <year>1989</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Pichugina</surname>
            ,
            <given-names>O.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Continuous representations and functional extensions in combinatorial optimization</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>52</volume>
          (
          <issue>6</issue>
          ): pp.
          <fpage>921</fpage>
          -
          <lpage>930</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Тhe method of artificial space dilation in problems of optimal packing of geometric objects</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>53</volume>
          (
          <issue>5</issue>
          ): pp.
          <fpage>725</fpage>
          -
          <lpage>732</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Stoyan</surname>
            ,
            <given-names>Y.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Configuration space of geometric objects</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>54</volume>
          (
          <issue>5</issue>
          ):
          <fpage>716</fpage>
          -
          <lpage>726</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>On some classes of spatial configurations of geometric objects and their formalization</article-title>
          .
          <source>Journal of Autom and Information Sciences</source>
          .
          <volume>50</volume>
          (
          <issue>9</issue>
          ):
          <fpage>38</fpage>
          -
          <lpage>50</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Stoyan</surname>
            ,
            <given-names>Yu.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolovskii</surname>
            ,
            <given-names>V.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Method of balancing rotating discretely distributed masses</article-title>
          .
          <source>Energomashinostroenie</source>
          . 2: pp.
          <fpage>4</fpage>
          -
          <lpage>5</lpage>
          (
          <year>1982</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Stoyan</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romanova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pankratov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stetsyuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Balance layout problems: mathematical modeling and nonlinear optimization</article-title>
          .
          <source>Springer Optimization and its Applications</source>
          . vol.
          <volume>114</volume>
          , рр.
          <fpage>369</fpage>
          -
          <lpage>400</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Gulianitsky</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          <string-name>
            <surname>Sergienko</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          :
          <article-title>Meta-evolutionary method of deformed polyhedron in combinatorial optimization. Cybernetics and system analysis</article-title>
          .
          <volume>44</volume>
          (
          <issue>6</issue>
          ): pp.
          <fpage>70</fpage>
          -
          <lpage>79</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Stoyan</surname>
            ,
            <given-names>Y.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parshin</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Quadratic optimization on combinatorial sets in Rn. Cybernetics and Systems Analysis</article-title>
          .
          <volume>27</volume>
          (
          <issue>4</issue>
          ): pp.
          <fpage>561</fpage>
          -
          <lpage>567</lpage>
          (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Valuiskaya</surname>
            ,
            <given-names>O.A.</given-names>
          </string-name>
          :
          <article-title>Optimization of linear functions at the vertices of a permutation polyhedron with additional linear constraints</article-title>
          .
          <source>Ukrainian Mathematical Journal</source>
          .
          <volume>53</volume>
          (
          <issue>9</issue>
          ): pp.
          <fpage>1535</fpage>
          -
          <lpage>1545</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Pichugina</surname>
            ,
            <given-names>O.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Functional and analytic representations of the general permutations</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          .
          <volume>1</volume>
          (
          <issue>4</issue>
          ): pp.
          <fpage>27</fpage>
          -
          <lpage>38</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Pichugina</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Convex extensions and continuous functional representations in optimization, with their applications</article-title>
          .
          <source>Journal of Coupled Systems and Multiscale Dynamics</source>
          .
          <volume>4</volume>
          (
          <issue>2</issue>
          ): pp.
          <fpage>129</fpage>
          -
          <lpage>152</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pichugina</surname>
            ,
            <given-names>O.S.:</given-names>
          </string-name>
          <article-title>Properties of combinatorial optimization problems over polyhedral-spherical sets</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>54</volume>
          (
          <issue>1</issue>
          ): pp.
          <fpage>99</fpage>
          -
          <lpage>109</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Koliechkina</surname>
            ,
            <given-names>L. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dvirna</surname>
            ,
            <given-names>O. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagornaya</surname>
            ,
            <given-names>A. N.</given-names>
          </string-name>
          :
          <article-title>Modified Coordinate Method to Solve Multicriteria Optimization Problems on Combinatorial Configurations</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>59</volume>
          (
          <issue>4</issue>
          ): pp.
          <fpage>620</fpage>
          -
          <lpage>626</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Koliechkina</surname>
            ,
            <given-names>L. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dvirna</surname>
            ,
            <given-names>O. A.</given-names>
          </string-name>
          :
          <article-title>Solving Extremum Problems with Linear Fractional Objective Functions on the Combinatorial Configuration of Permutations Under Multicriteriality</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>53</volume>
          (
          <issue>4</issue>
          ): pp.
          <fpage>590</fpage>
          -
          <lpage>599</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Donec</surname>
            ,
            <given-names>G. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolechkina</surname>
            ,
            <given-names>L. M.</given-names>
          </string-name>
          :
          <article-title>Construction of hamiltonian paths in graphs of permutation polyhedra</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>46</volume>
          (
          <issue>1</issue>
          ): pp.
          <fpage>7</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Kolechkina</surname>
            ,
            <given-names>L. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dvirna</surname>
            ,
            <given-names>O. A.</given-names>
          </string-name>
          :
          <article-title>Solving extremum problems with linear fractional objective functions on the combinatorial configuration of permutations under multicriteriality</article-title>
          .
          <source>Cybernetics and Systems Analysis</source>
          .
          <volume>53</volume>
          (
          <issue>4</issue>
          ): pp.
          <fpage>590</fpage>
          -
          <lpage>599</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>