SciELO - Scientific Electronic Library Online

 
vol.20 número39Monitoreo del movimiento de la corteza terrestre asociado a sismos mediante observaciones GPS en el Golfo de CaliforniaMonitoreo de material particulado fino y carbono negro, en microambientes de la ciudad andina de Manizales: estudio piloto índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • En proceso de indezaciónCitado por Google
  • No hay articulos similaresSimilares en SciELO
  • En proceso de indezaciónSimilares en Google

Compartir


Revista Ingenierías Universidad de Medellín

versión impresa ISSN 1692-3324versión On-line ISSN 2248-4094

Rev. ing. univ. Medellín vol.20 no.39 Medellín jul./dic. 2021  Epub 28-Jun-2022

https://doi.org/10.22395/rium.v20n39a7 

Article

A Look at Algorithm BEPtoPNST *

Una mirada al algoritmo BEPtoPNST

** Programa de Ingeniería de Sistemas, Facultad de Ingeniería, Universidad de Cartagena. Avenida del Consulado No. 48 - 152, Bloque G, Oficina G4-136. Email: jcgarciao@unicartagena.edu.co . Orcid: https://orcid.org/0000-0002-3148-0436


Abstract

This work analyzes the computational complexity of algorithm BEPtoPNS T which transforms a building-evacuation problem (BEP) into a time-expanded, process-network synthesis (PNS T ) problem. The solution of the latter is achieved by resorting to the P-graph method which exploits the combinatorial nature of a BEP. Unlike other approaches, the P-graph method provides not only the optimal solution (best evacuation route as a function of egress time), but also the best n sub-optimal solutions. For the complexity analysis, a generic processor, and a Random-access machine (RAM) model were deployed as well as a mathematical model to calculate the number and cost of the operations performed. It was observed that algorithm BEPtoPNS T exhibits an asymptotic complexity of order O ( T | A | (| N | -k)). When solving a BEP, however, the total complexity grows exponentially with order O (T | A | (| N | -k)) + O (2 h )) in the worst case; where h represents the total number of operating units specified in the corresponding PNS T problem. Nevertheless, the computational complexity can be reduced significantly when the P-graph method is deployed.

Keywords: building-evacuation routes; process-network synthesis; rigorous structures; combinatorial optimization; P-graph; pseudocode; RAM model; algorithm complexity; asymptotic notation; Big-O

Resumen

El presente trabajo estudia y analiza la complejidad computacional, en el peor de los casos, del algoritmo BEPtoPNS T . El objetivo de BEPtoPNS T es transformar problemas de rutas de evacuación en edificios (Building- -Evacuation Problems, BEP) en problemas de síntesis de redes procesos de tiempo extendido (Time-Extended, Process-Network Synthesis, PNS T ), los cuales se solucionan por medio del método P-graph. La relevancia de analizar el algoritmo BEPtoPNS T se sustenta en el hecho que el método P-graph explota la naturaleza combinatoria de un BEP luego de ser transformado en un PNS T . El método P-graph no sólo provee la solución óptima (mejor ruta de evacuación en función del tiempo de egreso), sino que también provee las mejores n soluciones subóptimas; característica que a la fecha no ofrecen otros métodos de optimización. Para el análisis del algoritmo BEPtoNPS T , se consideró un procesador genérico, el modelo Random-access machine, RAM, así como un modelo matemático para calcular el número de operaciones ejecutadas y sus costos, resultando en una complejidad asintótica de orden O ( T | A | (| N | -k)). Sin embargo, la complejidad total del proceso, incluyendo el método P-graph, crece de manera exponencial, es decir, O (T | A | (| N | -k)) + O (2 N )), en el peor de los casos.

Palabras clave: rutas de evacuación en edificios; síntesis de redes de procesos; estructuras rigurosas; optimización combinatoria; P-graph; pseudocódigo; modelo RAM; complejidad de algoritmos; notación asintótica; O grande

INTRODUCTION

Colombian standard NSR10 for earthquake-resistant buildings (Reglamento Colombiano de Construcciones Sismo Resistentes in its Spanish original) in its sections J and K describes the minimum safety requirements in the event of fire or any other event that threatens the safety of people inside buildings [1][2]. These requirements include (i) reducing fire risks or any other threat as much as possible; (ii) preventing fire hazards from reaching nearby buildings; (iii) facilitating people-evacuation tasks; (iv) facilitating mitigation of hazards; and (v) minimizing the risk of building collapse when evacuating people and extinguishing the threat [1]. Similarly, the Colombian government has adopted a National Policy for the Management of Disaster Risks (SNGRD) [3]; moreover, it has set out the guidelines for the construction of disaster risk management plans in public and private organizations (see Decree 2157 of 2017) [4]. These guidelines lay out the actions for effecting evacuation plans so that people inside a building (e.g., house, office, school, mall, etc.) can exit from it orderly, rapidly, and safely so that their lives are protected. Such actions concern (i) the identification of the building and its surroundings; (ii) protective measures for evacuations; (iii) evacuation paths; (iv) evacuation signage and warnings; and (v) identification of permanent and temporary safety points [5][6].

Although all these elements are important in the elaboration of an evacuation plan, the ultimate purpose of such a plan is to guarantee the rapid and safe movement of people away from any threat (e.g., fire) or accident (e.g., explosion) in the shortest possible time [7]. However, an evacuation plan may involve the evaluation of an exceedingly large number of evacuation routes in particular scenarios (e.g., buildings, city, etc.), which can be quite complex in view of the combinatorial nature of the problem [8-12]. Currently, research on evacuation routes comprises the following six categories [13]: level of service, mathematical models, heuristic methods, stochastic models, simulation tools, and multiagent systems. However, few works analyze the mathematical complexity of these techniques [14], a fundamental aspect when selecting one option over another. Specifically, in relation to the time and space used by the algorithms to solve the problem according to the size or length of the input [15]. Moreover, when these technologies, at most, generate a single solution to the problem of evacuation routes [16-18]. For this reason, this work analyzes the complexity, in terms of execution time, of algorithm BEPtoPNST [19-24] with the aim to advance in the development of computational strategies that allow efficient planning of evacuation routes. The novel algorithm BEPtoPNST allows not only to generate the optimal evacuation plan, but also sub-optimal plans [19-24], which uses a graph-theoretical approach based on P-graphs (process graphs) [25-31]. In what follows, the methods used are described, algorithm BEPtoPNST is analyzed asymptotically, and finally, conclusions are drawn.

1. METHODS

1.1 Problem Definition

A building-evacuation problem (BEP) can be modeled as a directed graph [8]; the goal is to minimize the evacuation time. Let G = (N, A) be a directed graph with N the set of nodes and A the set of arcs; each node n N represents potential locations of evacuees and other areas on the building (e.g., rooms or stairs). Moreover, the possible movements between locations through k (e.g., corridors or doors) are represented by arcs (i, j, k)A, such that i, j A (see figure 1); furthermore, G must satisfy the restrictions of the building [8]. Specifically, each location n has a limited capacity expressed by a non-negative integer, capn, representing the number of people that can be accommodated in n.

Source: taken from REF _Ref50116325 \r \h \* MERGEFORMAT [20].

Figure 1 Conventional adopted graph-based notation for representing building-floor maps REF_Ref420414599 \r \h \* MERGEFORMAT [8]: {initial contents, node capacity}; (travel time, arc capacity, arc id) 

For each location, a non-negative integer is assigned to initial occupancy, ic n , signifying the number of people at any location in the event of an emergency. In addition, a positive integer, cap (i,j,k) , is assigned to the maximum flow rate of corridor (i,j,k), which represents the maximum number of people that can pass through a corridor simultaneously. Finally, each corridor (i,j,k) is constrained by travel time λ (i,j,k) , a non-negative integer that measures the time a person takes to traverse the total length of a passageway [8-12].

1.2 Process Graphs (P-graphs)

An innovative approach called P-graph has been proposed to facilitate the solution of process-network synthesis (PNS) problems [27]. A P-graph is a mathematically rigorous bipartite graph that allows the graphical representation of a PNS problem [32][33]. The P-graphs together with a solid axiomatic basis facilitate the construction of structures (flowsheets) of a given process by algorithmically combining operating units that are part of the process. A P-graph is formally defined in equation (1) in terms of a set of operating units, O, as a subset of the cartesian product of all subsets of materials, M, as

(1)

where ℘ (M) denotes the power set of M and x, the cartesian product. Moreover, in equation (2), a P-graph is defined as a pair (M, O) whose vertices are elements of set V given by

(2)

Vertices M-type and O-type belong to the M and O sets, respectively. The arcs of the graph are the elements described by the following expressions in equations (3), (4), and (5).

(3)

where

(4)

and

(5)

Thus, X indicates an M-type vertex; Y, an O-type vertex; α, a set of M-type vertices, of which the arcs are directed to the O-type vertices; and β, a set of M-type vertices whose arcs are directed to the O-type vertices [26]. For illustration, let M be a set of materials, M = {A,B,C,D,E,F}, and O a set of operating units given by O = {({B,A}, {A}), ({D,E}, {B,C}), ({F},{A,C}), ({F}, {A,C})}. It can be verified that M and O satisfy the restrictions (1-5), such that (M,O) is a P-graph as shown in figure 2 [27].

Source: adapted from REF _Ref36019017 \r \h \* MERGEFORMAT [27].

Figure 2 P-graph (M,O) where A,B,C,D,E, and F are materials, and 1,2, and 3 are the operating units: represents raw materials or input elements of the whole process; symbolizes intermediate-materials or elements, emerging between the operating units; and represents products or outputs of the entire process 

1.3 Analysis of Algorithms

Algorithm analysis plays a critical role in computer science as it guides the assessment of efficient procedures for addressing any given computational problem [34] [35]. This assessment is based on the execution time of the instructions, or steps, that an algorithm must follow without considering the impact of other factors [35].

Equation (6) embodies the mathematical model used to analyze the complexity of algorithm BEPtoPNS T . At the outset, the basic instructions (q) of the algorithm are identified; then, their costs are determined (cost q ), and finally, the number of times that those operations are executed (times q ) is analyzed [36].

(6)

Most algorithms work well with small inputs; however, we are interested in analyzing the behavior of the algorithm when the input size is large enough. To this end, we define the execution time of an algorithm as in equation (7).

(7)

where nN represents the size of the input, f(n), the number of steps executed by the algorithm given n, and R≥0), the set of non-negative real numbers. Therefore, attention is given to the behavior of f(n) when n increases. The above expression allows to relate the asymptotic behavior of an algorithm through f(n). Based on f(n), functions O(f(n)), Ω(f(n)), and Θ(f(n)) are defined [15],[35-38], thus signifying, respectively, a function that provides an upper limit (worst case, maximum number of instructions performed by an algorithm), one that provides a lower limit (best case, minimum number of instructions performed by an algorithm), and a function that is contained between the upper and lower limits, in the order of growth of the function. The ideal is to analyze the asymptotic behavior in the worst case of any given algorithm [15],[35-38]; therefore, it is important to define the term, O. The notation O, O(f(n)) defines the set of all functions g(n)∶ NR0, such that for some natural number n 0 and some positive real number c, g(n) ≤ c f (n), as long asn ≥ n 0 [35]. Informally, we say that the expression g(n) is less than or equal to some constant multiple of f(n).

2. ALGORITHM BEPTOPNS T

Algorithm BEPtoPNST transforms a BEP into a PNS T problem, thus representing the temporal dimension of a BEP (i.e., evacuation time), which is solved with the aid of the P-graph method [25-31]. The algorithm consists of two parts: initialization and time expansion. During initialization, the materials that describe a PNS problem are identified. Such materials are determined from the nodes specified in the graph that describes the floor map of a building. These materials can be (i) raw materials, (ii) intermediate materials, and (iii) products. The raw materials represent locations in the building where people are located just before the emergency alarm is activated; intermediate materials represent empty locations; and the products represent safety points, or meeting areas, outside of it. On the other hand, the time expansion identifies the operational units of a PNS problem, which describe the way in which people move during an evacuation plan. Such movements can be of two types: (i) from one location to another; or (ii) a momentary pause at the current location. A more detailed discussion on algorithm BEPtoPNS T is presented elsewhere [20]. Table 1 lists the elements involved in the specification of algorithm BEPtoPNS T , as well as the analysis of its complexity.

Table 1 Mathematical notation for specifying algorithm BEPtoPNS T

Symbol Description
R set of raw materials, that is, the locations with people at the beginning of the evacuation in the original problem
r element of R, i.e., rR
U r upper limit of r, that is, the number of people at location r at the start of the evacuation
L r lower limit of r, that is, 0
| | cardinality of a set, that is, the number of elements contained in it
P set of products, that is, the exits or safe points outside the building once the evacuation of the building has begun
the total number of people inside the building at the start of the evacuation
T maximum time expected to evacuate the building
t unit of time
M i_(t+1) number of individuals accommodated in i at t + 1
O i_i_t_(t+1) number of individuals who prefer to be in a specific location, i, at least one more unit of time, i.e., t + 1.
L O _ i_i_t_(t+1) lower limit of O i_i_t_(t+1) , that is, the number of people that can be at location i at least one more time unit, i.e., t + 1
U O_i_i_t_(t+1) upper limit of O i_i_t_(t+1) , that is, the number of people that can be at location i at least one more unit of time, i.e., t + 1, that is cap i
O i_j_t_(t+λ_ijk)_k number of individuals walking from location i at time t to location j through a corridor k at time (i,j,k) + t
L O_i_j_t_(t+λ_ijk)_k lower limit of O i_j_t_(t+λ_ijk)_k , that is, the number of individuals that walk from location i at time t to location j through a corridor k at time (i,j,k) + t
U Oi_j_t_(t+λ_ijk)_k upper limit of O i_j_t_(t+λ_ijk)_k , that is, the number of individuals who walk from location i at time t to location j through a corridor k at time (i,j,k) + t
O evactime_t people who reach a safety point, k, at time t
L Oevactime_t lower limit of people who will reach a safety point, k, at time t
U Oevactime_t upper limit of people who reach a safety point, k, at time t
cp Oevactime_t proportional cost associated with the number of people who reach a safety point, k, at time t

Source: own elaboration

2.1 Complexity Analysis

As mentioned earlier, algorithm BEPtoPNS T comprises two parts, initialization (statementsst1, st2 and loop lp1, lines 4-11) and time expansion (statement st3 and loops lp2 and lp3, lines 12-53). Initially, for each node nN in G where ic n >0, it is transformed into a raw material r and is added to set R (lines 4 and 8). Initially, in loop lp1, for each raw material, r, the lower limit, Lr , and the upper limit, U r , are set, such that the total amount of materials available for the problem PNS T is defined. The complexity of the statement st1 is given by the number of nodes nN that meet the condition ic n >0 and the time required by loop lp1, which in the worst case is bounded by the expression | N | -k + 1 nodes. The above under the assumption that | N |-k represents locations that at the beginning of the emergency shelter people and k safety points outside the building (k> 1), where | | represents set cardinality. Finally, the product, SafetyPoint, is specified and added to the set P (statement st2, line 11). For the product, P SafetyPoint , algorithm BEPtoPNS T sets the lower limit L PSafetyPoint and upper limit U PSafetyPoint ; such that the quantity of products to be manufactured is equal to the quantity of raw material demanded by the problem PNST. The number of people inside the building at the start of the emergency, , must be equal to the number of people evacuated (product, PSafetyPoint). Because the statement st2 describes assignments, its execution time is constant [15], [35-38] (see figure 3).

By assuming a limit to the evacuation time, T, algorithm BEPtoPNST generates materials Mi_(t+1) for 0 ≤ t < T; ; consequently, loop lp2 is executed T + 1 times (line 13). The material Mi_(t+1) represents the number of individuals present in i at time t + 1 (lines 18-19) ([8], p. 7). Subsequently, an operating unit o is created and added to set O for each i and t and operating units Oi_i_t_(t+1) are generated, where 0 ≤ t < T (lines 20-23). Similarly, the lower limit LO(i_i_t_(t+1) and upper limit UOi_i_t_(t+1) are set for each operating unit Oi_i_t_(t+1), such that algorithm BEPtoPNST specifies the number of individuals who prefer to stay in the specific location i for at least one unit of time, t + 1 ([8], p. 7). These instructions are executed T * (| N |-k) times. Subsequently, node j is transformed into material m and added to set M for each arc (i,j)∈A in G, where the value of capj ≠ ∞ o j is the only safety point (lines 24, 28-33). These operations are executed T * (| N |-k) * (| A |-1) times. Then, for each t, i, and j, operating unit o is created and added to O; algorithm BEPtoPNST generates operating units Oi_ j_t_(t+λijk)_k, where 0 ≤ t < T. In addition, the lower limit LO(i_ j_t_(t+λijk)_k) and upper limit UOi_ j_t_(t+λijk)_k are set for each operating unit Oi_ j_t_(t+λijk)_k (lines 34-37), such that algorithm BEPtoPNST specifies the number of evacuees moving from location i at time t to location j through corridor k at time t + λ_ijk ([8], p. 7). Similarly, these instructions are executed T * (| N |-k) * (| A |-1) times.

(8)

where clearly execution time g depends on G and T. Assuming that costs c i are constant [15],[35-38] and rearranging the terms of equation (8), equation (9) yields

(9)

By applying equation (9) to any size of G and T with constant c ≥ 12 , the complexity of BEPtoPNS T can be summarized in equation (10).

(10)

which is the expression of complexity for the worst case. It should be noted, as mentioned in [39], that the computational complexity of a PNS problem is of exponential order given by O(2 h ); where h represents the number of operating units. Thus, equation (11) shows that complexity grows exponentially with order O (T | A | (| N | -k)) + O (2 h )) in the worst case when solving a BEP.

(11)

where h is the sum of |O i_i_t_(t+1) |, |O i_ j_t_(t+λijk)_k) |, and |O evactime_t |.

3. DISCUSSION

Algorithm BEPtoPNST aims at transforming a BEP into a PNST problem by resorting to the P-graph method. However, it must be considered that the complexity involved in solving PNS problems is of exponential order as mentioned in the preceding section. Formally, it has been shown that the complexity of a PNS problem is equivalent to the set covering problem [40]. Because the set covering problem is one of Karp’s original 21 NP-complete problems, it can be inferred that the PNS problem is NP-complete [41]. This sort of problem can be addressed by using the P-graph method [27] because the method can drastically reduce the search space of a given PNS problem [27], [29].

Despite the computational cost of solving a BEP as a PNSTproblem (see equation (11)), the latter can be solved by resorting to the P-graph method which exploits the combinatorial nature of a BEP. Unlike other approaches, such as Hoppe and Tardos or algorithms CCRP and SSEP [14], the P-graph method provides not only the optimal solution (best evacuation route as a function of egress time), but also the best n suboptimal solutions [19]. In addition, the P-graph method can also model multiple starting locations and safety points, a feature not supported in SSEP [14]. The foregoing invites us to continue the work of reducing the computational complexity of solving PNS T problems in relation to BEPs.

4. CONCLUSIONS

This work analyzed the complexity of algorithm BEPtoPNST, which was found to be of order O(T|A|(|N|-k)) in the worst case with k > 1 safety points outside a building. Moreover, the algorithm’s computational complexity grows exponentially with order O(T|A|(|N|-k)) + O(2|h|) when solving a BEP, in the worst case. These results raise issues that deserve further research. First, the complexity of the entire process for finding at least the optimal solution to a BEP must be evaluated in terms of the minimum number of steps involved. The P-graph method with its five (5) fundamental axioms is able of reducing the search space; however, its complexity is of order O(2|h|) in the worst-case scenario. Therefore, it is required to analyze the average complexity [15], [35]. Second, it will be essential to design real-time monitoring systems for evacuation-route planning; such systems could require the adoption of modern computing techniques, e.g., Grid Computing, High-Performance Computing (HPC), and Internet of Things (IoT), to significantly accelerate its computation [42-44]. Finally, it will be necessary to evaluate the adoption of the strategy described in this work in other engineering fields. For instance, the design of Very-Large-Scale Integration (VLSI) circuits commonly faces problems that require the determination of optimal routes between the circuits that interconnect various electronic components, thereby implying the minimization of wiring length [45-48].

5. ACKNOWLEDGEMENTS

The author is grateful to the Faculty of Engineering of Universidad de Cartagena for its financial support as well as to Dr. Andrés Argoti for his editorial review of the manuscript

REFERENCES

[1] Ministerio de Ambiente, Vivienda, y Desarrollo Territorial, Reglamento Colombiano de Construcción Sismo Resistente - NSR10: Capítulo J - Requisito de Protección contra Incendios en Edificaciones. Colombia, 2010, pp. J1-J32. [ Links ]

[2] Ministerio de Ambiente, Vivienda, y Desarrollo Territorial, Reglamento Colombiano de Construcción Sismo Resistente - NSR10: Capítulo K - Requisitos Complementarios. Colombia, 2010, pp. K1-K64. [ Links ]

[3] Ley 1523 de 2012. Congreso de la República de Colombia, Bogotá, Colombia, April 2012. [ Links ]

[4] Decreto 2157 de 2017. Departamento Administrativo de la Presidencia de la República. Bogotá, Diciembre de 2017. [ Links ]

[5] Unidad Nacional para la Gestión de Riesgos y Desastres - Colombia. Guía para la Elaboración de Planes de Evacuación (2da. Ed.), Status Publicidad, Bogotá, 2016, pp. 1-17. [ Links ]

[6] ICONTEC. Norma Técnica Colombiana - NTC 1461, Instituto Colombiano de Normas Técnicas y Certificación, Bogotá, 1987, pp. 1-18. [ Links ]

[7] W.H. Stringfield, Emergency Planning and Management (2nd Edition). Lanham, MD: Government Institutes, 2000, pp. 1-294. [ Links ]

[8] H.W. Hamacher and S.A. Tjandra, “Mathematical modeling of evacuation problems: a state of the art,” in Pedestrian and Evacuation Dynamics, M. Schreckenberg and S.D. Sharma, eds., pp. 227-266, Berlin: Springer, 2002. [ Links ]

[9] M. Skutella, “An introduction to network flows over time,” in Research Trends in Combinatorial Optimization, W. Cook et al., eds., pp. 451-482, Berlin: Springer , 2009. [ Links ]

[10] S. Kim et al., “Contraflow transportation network reconfiguration for evacuation route planning,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, n° 8, pp. 1115-1129, 2008. DOI: 10.1109/TKDE.2007.190722 [ Links ]

[11] E.D. Kuligowski, and R.D. Peacock, A Review of Building Evacuation Models (1st ed.), National Institute of Standards and Technology, Technical Note 1471, 2005. [ Links ]

[12] E.D. Kuligowski et al., A Review of Building Evacuation Models (2nd ed.), National Institute of Standards and Technology, Technical Note 1680, 2010. [ Links ]

[13] J.C. García-Ojeda. On Modeling Building-Evacuation-Route Planning and Organizationbased Multiagent Systems by Resorting to the P-graph Framework, PhD Dissertation, University of Pannonia, Veszprem, Hungary, 2016. [ Links ]

[14] G. Mishra et al., Improved Algorithms for the Evacuation Route Planning Problem. In: Lu Z., Kim D., Wu W., Li W., Du DZ. (eds) Combinatorial Optimization and Applications. Lecture Notes in Computer Science, vol. 9486. Springer, 2015. [ Links ]

[15] T.H. Cormen et al., Introduction to Algorithms, 3a ed., Cambridge: MA, MIT Press, 2009, pp. 1-1320. [ Links ]

[16] L. Han et al., “An Efficient Staged Evacuation Planning Algorithm Applied to Multi-Exit Buildings,” in Int. J. Geo-Inf., vol. 9, n° 46, 2020. [ Links ]

[17] X. Wang and H. Liu, “An evacuation algorithm for large buildings,” in Proceedings of the 10th World Congress on Intelligent Control and Automation, Beijing, 2012, pp. 2497-2502, DOI: 10.1109/WCICA.2012.6358293 [ Links ]

[18] C.H. Oh et al., “An Efficient Building Evacuation Algorithm in Congested Networks,” in IEEE Access, vol. 7, pp. 169480-169494, 2019, DOI: 10.1109/ACCESS.2019.2955477 [ Links ]

[19] J. C. Garcia-Ojeda et al., “Modeling and Assessing Evacuation Route Plans by Resorting to the P-graph Framework,” 2020 Smart City Symposium Prague (SCSP), Prague, Czech Republic, 2020, pp. 1-6, DOI: 10.1109/SCSP49987.2020.9134050 [ Links ]

[20] J.C. Garcia-Ojeda et al., “Building-Evacuation-Route Planning via Time-Expanded Process-Network Synthesis,” Fire Safety Journal, vol. 61, pp. 338-347, 2013. DOI: 10.1016/j.firesaf.2013.09.023 [ Links ]

[21] J.C. Garcia-Ojeda et. al., “Planning evacuation routes with the P-graph framework,” Chemical Engineering Transactions, vol. 29, pp. 1531-1536, 2012. DOI: 10.3303/CET1229256 [ Links ]

[22] J.C. García-Ojeda et al., “Identifying Evacuation Routes via the P-graph Methodology,” presentedat the 10th Colombian Computation Congress, Bogotá, 2015. [ Links ]

[23] J.C. García-Ojeda et al., “Multi-criteria Analysis of Building Evacuation Route Planning by Resorting to the P-graph Framework,” presented at 5th Veszprem Optimisation Conference: Advanced algorithms, Veszprem, 2012. [ Links ]

[24] J.C. Garcia-Ojeda, “On Building Evacuation Route Planning by Resorting to P-graph,” Revista Colombiana de Computación, vol. 12, n° 1, pp. 111-125, 2011. [ Links ]

[25] F. Friedler et al., “Combinatorially Accelerated Branch-and-Bound Method for Solvingthe MIP Model of Process Network Synthesis,” in Global Optimization, Computational Methods and Applications, State of the Art, C.A. Floudasand P.M. Pardalos, eds., pp. 609-626, Dordrecht, Netherlands: Kluwer Academic Publishers, 1996. [ Links ]

[26] F. Friedler et al., “Decision-mapping for design and synthesis of chemical processes: applications to reactor-network synthesis,” In Foundations of Computer-Aided Process Design, AIChE Symposium Series 91, L. T. Biegler and M. F. Doherty, eds. pp. 246 - 250, NY: American Institute of Chemical Engineers, 1995. [ Links ]

[27] F. Friedler et al., “Graph-theoretic approach to process synthesis: axioms and theorems,” Chemical Engineering Science, vol. 47, n° 8, pp. 1972-1988, 1992. DOI: 10.1016/0009-2509(92)80315-4 [ Links ]

[28] F. Friedler et al., “Combinatorial Algorithms for Process Synthesis,” Computers & Chemical Engineering, vol. 16, n° 5, pp. S313-320, 1992. DOI: 10.1016/S0098-1354(09)80037-9 [ Links ]

[29] F. Friedler et al., “Process Network Synthesis: Problem Definition.” Networks, vol. 28, n° 2, pp. 119-124, 1998. DOI: 10.1002/(SICI)1097-0037(199803)31:2<119::AID-NET6>3.0.CO;2-K [ Links ]

[30] J.J. Klemeš and P.S., Varbanov, “Spreading the message: p-graph enhancements: implementations and applications”, Chemical Engineering Transactions, vol. 45, pp. 1333-1338, 2015, DOI: 10.3303/CET1545223 [ Links ]

[31] V. Varga et al., “PNS solutions: a P-graph based programming framework for process network synthesis.” Chemical Engineering Transactions, vol. 21, pp. 1387-1392, 2010, DOI: 10.3303/CET1021232 [ Links ]

[32] M. Minoux, “Networks synthesis and optimum network design problems: Models, solution methods and applications,” Networks , vol. 19, n° 3, pp. 313-360, 1989. DOI: 10.1002/net.3230190305 [ Links ]

[33] L.R. Ford and D.R. Fulkerson, Flows inNetworks . Princeton, NJ: Princeton University Press, 1962, pp. 1-210. [ Links ]

[34] A.M. Turing, “Rounding-off Errors in Matrix Processes,” The Quarterly Journal of Mechanics and Applied Mathematics, vol. 1, n° 1, pp. 287-308, 1948. DOI: 10.1093/qjmam/1.1.287 [ Links ]

[35] R.R., Howell, Algorithms: A Top-Down Approach, 9a ed., Dept. of Computing and Information Sciences: KS, Kansas State University, 2009, pp. 1-617. [ Links ]

[36] D.E. Knuth, The Art of Computer Programming, Volume 1: Fundamental Algorithms, 3a ed., Redwood City: CA, Addison Wesley Longman Publishing Co., 1997, 672 pp. [ Links ]

[37] M.T. Goodrich and R. Tamassia, Algorithm Design and Applications, 1st ed., Hoboken: NJ, Wiley Publishing, 2014, pp. 1-816. [ Links ]

[38] A.V. Aho et al., The Design and Analysis of Computer Algorithms. Reading: MA, Addison Wesley, 1974, pp. 1-470. [ Links ]

[39] M.J. Barany (2015). Industrial Application of the P-graph Framework, PhD. Dissertation, University of Pannonia, Veeszprem, Hungary. [ Links ]

[40] B. Imreh, J. Fülöp, andF. Friedler , “A note on the equivalence of the set covering and process network synthesis problems”, Acta Cybernetica, 14(3), 2000, 497-502. [ Links ]

[41] R. Karp, Reducibility among combinatorial problems. In R. Miller & J. Thatcher (ed.), Complexity of Computer Computations, Plenum Press, 1972, pp. 85-103. [ Links ]

[42] L. Han et al., “FireGrid: an e-infrastructure for next-generation emergency response support”,Journal of Parallel and Distributed Computing 70(11) (2010) 1128-1141. [ Links ]

[43] K. Katayama et al., “Evacuation guidance support using cooperative agent-based IoT devices,” 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), Nagoya, 2017, pp. 1-2, DOI: 10.1109/GCCE.2017.8229431 [ Links ]

[44] I.A. Zualkernan, et al., “An IoT-based Emergency Evacuation System,” 2019 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), BALI, Indonesia, 2019, pp. 62-66, DOI: 10.1109/IoTaIS47347.2019.8980381 [ Links ]

[45] K. Kozminski and E. Kinnen, “An Algorithm for Finding a Rectangular Dual of a Planar Graph for Use in Area Planning for VLSI Integrated Circuits,” 21 st Design Automation Conference Proceedings, Albuquerque, NM, USA, 1984, pp. 655-656. [ Links ]

[46] A.Y. Lvov et al ., “Integer Arithmetic Method for Wire Length Minimization in Global Placement with Convolution Based Density Penalty Computation,” U. S. Patent 10 528 695, Jan 30, 2020. [ Links ]

[47] S., Karimullahet al., Floorplanning for Placement of Modules in VLSI Physical Design Using Harmony Search Technique. In A. Kumar, M. Paprzycki, & V. Gunjan (ed.), ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601, Springer, Singapore, 2020. [ Links ]

[48] | T.-C. Chen and Y.-W. Chang, “Modern floorplanning based on B/sup */-tree and fast simulated annealing,” in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 25, no. 4, pp. 637-650, April 2006, DOI: 10.1109/TCAD.2006.870076 [ Links ]

* This work is based on the second chapter of the doctoral dissertation entitled “On Modeling Building-Evacuation-Route Planning and Organization-based Multiagent Systems by Resorting to the P-graph Framework” [13].

How to cite: García Ojeda, J. C. (2020). A Look at Algorithm BEPtoPNST.Revista Ingenierías Universidad De Medellín,20(39), 115-128. https://doi.org/10.22395/rium.v20n39a7

Received: March 30, 2020; Accepted: September 09, 2021

Creative Commons License This is an open-access article distributed under the terms of the Creative Commons Attribution License