In the paper flexible job shop scheduling problem FJSP (an extension of the classical job shop scheduling) is analyzed. We discuss the influence of different production factors on makespan. For the analysis of the pro...
详细信息
ISBN:
(纸本)9783642279652
In the paper flexible job shop scheduling problem FJSP (an extension of the classical job shop scheduling) is analyzed. We discuss the influence of different production factors on makespan. For the analysis of the production process the greedy randomized adaptive search procedure (GRASP) heuristic was used. Experiments with different levels of factors have been considered and compared. The GRASP algorithm has been tested and illustrated with results for the serial route and the parallel one.
The comparative study of gene order rearrangements has been restricted to the case when the genes in one genome are homologous to at most one gene in the other genome. Sankoff (1999) proposes the estimation of true ex...
详细信息
ISBN:
(纸本)9783642279652
The comparative study of gene order rearrangements has been restricted to the case when the genes in one genome are homologous to at most one gene in the other genome. Sankoff (1999) proposes the estimation of true exemplars, a selection of one gene from each gene family in both genomes such that the distance between the resulting exemplar strings is minimized, which is called exemplar distance. David Bryant in his paper show that the calculation of the exemplar distance between two genomes is NP-hard for both the signed reversals distance and the breakpoint distance, even with quite restrictive conditions on the input. Limite the input according to strictive conditions used by David Bryants' proof, here we provides two algorithm to solve problem under some input conditions, one is branch and bound algorithms. the other is Greedy Algorithm for both distances. different DATA can use different Algorithm to get better performance.
The paper features the method of application of a neural network for improving the quality of the digital images generated by means of devices for backup and processing of data into a digital form which construction i...
详细信息
ISBN:
(纸本)9783642279652
The paper features the method of application of a neural network for improving the quality of the digital images generated by means of devices for backup and processing of data into a digital form which construction is based on the Charge Coupled Device (CCD) structure. In order to introduce the problem, the digital images were generated by means of two scanners (including a high class and a low class scanner) and afterwards the images were subject to an objective and a subjective evaluation. An objective evaluation was performed using two quality criteria, i.e. MSE (Mean Square Error) and NMSE (Normalized Mean Square Error). A FIR (Finite Impulse Response) filter applied for filtration of a low quality image was obtained as the result of the neural network learning process. The image so generated as the result of filtration features a superior quality in comparison to the original.
Research on the impacts of foreign direct investment has been the theoretical frontier with the increasing impacts of foreign direct investment on globe economy. Based on the analysis of the effects on the development...
详细信息
ISBN:
(纸本)9783642279652
Research on the impacts of foreign direct investment has been the theoretical frontier with the increasing impacts of foreign direct investment on globe economy. Based on the analysis of the effects on the development of regional economy and the research conditions of foreign direct investment, the article expounds the impacts of foreign direct investment on the buildup of regional economic sustainable development from six aspects. that is, structure. scale and technique of foreign direct investment. Based on the foregoing works. we bring forward regulation tactics and measures on foreign direct investment to promote sustainable development of regional economy.
At the present time, some filter algorithms are generally employed for the research of tracking target in wireless sensor network. However, due to the difficulty of collecting accurate sensor data and the huge computa...
详细信息
ISBN:
(纸本)9783642279652
At the present time, some filter algorithms are generally employed for the research of tracking target in wireless sensor network. However, due to the difficulty of collecting accurate sensor data and the huge computational burden, using particle filter for tracking in wireless sensor network is not suitable for practice. In this paper, a distributed estimation algorithm is proposed, and the work is concentrated on how to obtain the moving trajectory effectively in binary sensor network. For rational use of network resources, a new routing mechanism is designed based on Gabriel Graph. Moreover, we present the velocity estimation, which can efficiently estimate the speed of the moving target. And according to the relative position between nodes, two distributed tracking algorithms are proposed for different situations. As a result, the performance evaluation demonstrates that the proposed algorithm has a good performance on accuracy of tracking and effective energy saving.
To further enhance the safety of Ad Hoc Network, the paper presents a new trust transfer model with Trusted Platform Module (TPM) in Ad Hoc Network. A scheme which takes a trust chain from the node of Ad Hoc Network t...
详细信息
ISBN:
(纸本)9783642279652
To further enhance the safety of Ad Hoc Network, the paper presents a new trust transfer model with Trusted Platform Module (TPM) in Ad Hoc Network. A scheme which takes a trust chain from the node of Ad Hoc Network to Ad Hoc Network as its design objective is proposed, and the trust relationships between peers can be evaluated with a trust model in Ad Hoc Network. Authenticated routing for Ad Hoc Network (ARAN) is improved by introduction of trust level and then selects the routing of highest trust level. At last the trust transfer model in Ad Hoc network is analyzed.
Modern malicious applications use advanced anti-debugger, anti-virtualization, and code packing techniques to obfuscate the malware's true activities and divert security analysts. Malware analysts currently do not...
详细信息
ISBN:
(纸本)9783642279652
Modern malicious applications use advanced anti-debugger, anti-virtualization, and code packing techniques to obfuscate the malware's true activities and divert security analysts. Malware analysts currently do not have a simple method for tracing malicious code activity at the instruction-level in a highly undetectable environment. This paper presents an enhanced instruction tracer as an extension to the Xen Ether virtualization framework to aid in the task of malicious software analysis. It places a malware binary into a virtualized environment and records the contents of all processor general register values that occur during its execution. Evaluation shows its new level of introspection for advanced malware that was not available with the previous state-of-the-art analysis tools.
Firstly, based on the information at home and abroad, combining the actual conditions in our country. the paper described China's status for development of Fourth-Party logistics. Second, on the basis of that, the...
详细信息
ISBN:
(纸本)9783642279652
Firstly, based on the information at home and abroad, combining the actual conditions in our country. the paper described China's status for development of Fourth-Party logistics. Second, on the basis of that, the paper discusses the four operation modes of Fourth-Party Logistics in China in detail: coordinated operation type, integrated program type. innovative industry type, and dynamic alliance type. Finally, this article analyzes those modes and internal and external logistics business environment, firm size and industry conditions that the four types of models adapt to.
This paper gave a bird's-eye view of the Embedded Real-Time Database Management System (ERTDBMS) and its transaction model of the characteristics of the status quo, Analysis Services and Analysis, alternative /com...
详细信息
ISBN:
(纸本)9783642279652
This paper gave a bird's-eye view of the Embedded Real-Time Database Management System (ERTDBMS) and its transaction model of the characteristics of the status quo, Analysis Services and Analysis, alternative /compensation model, based on function and value of the object-oriented framework Panel model Analysis Servicese and Analysis of the ERTDBMS, and discussed the scheduling strategy ERTDBMS Affairs and concurrency control, the Panel stated ERTDBMS model of significance.
China has gained outstanding achievements in economic development since she began opening up 30 years ago. Many dominant firms rise in the Chinese market and overseas and accelerate the economic development. But compa...
详细信息
ISBN:
(纸本)9783642279652
China has gained outstanding achievements in economic development since she began opening up 30 years ago. Many dominant firms rise in the Chinese market and overseas and accelerate the economic development. But compared with that in the developed countries, there is still a long way to go. Dominant firms both home and abroad have common feature in the process of growing, so based on some theories and proceeded from China's actual conditions, the analysis on the forming reason of dominant firm will provide scientific basis for the development of dominant firms.
暂无评论