This research addresses a Capacitated Vehicle Routing Problem with Time Windows (CCVRPTW) which is a Vehicle Routing Problem (VRP) with fleet capacity and delivery time constraints. In the research, a Biased Random Ke...
详细信息
For the permutation flow shop scheduling problem, an energy-saving scheduling model has been presented considering the energy consumption and idle time of deferment machines. The mathematical programming model was est...
详细信息
The demand for latest technology is rising and there by changing the way the world lives. The impact of technology is so heavy on our lives that, we are surrounded by technology filled equipments. Ranging from smart h...
详细信息
The demand for latest technology is rising and there by changing the way the world lives. The impact of technology is so heavy on our lives that, we are surrounded by technology filled equipments. Ranging from smart home to smart cities, everything is turning to smart. The ease of life and comfort zone also increasing with the advancement of technology. Hence, the proposed model, The Smart Mirror is a system in which the normal mirror will behave like a smart device. The Smart mirror is designed using Raspberry Pi-3 model and a touch enabled screen. The designed system is having two modes of operation namely regular mode and the triggered mode. In regular mode, it will act like a normal mirror and in triggered mode, the mirror will act like a smart mirror, which will capable of accepting commands and displays the results on the screen. There are three ways in which commands can be issued to the Smart mirror namely Voice, Touch and Mobile controlled commands. The system displays weather, temperature and latest news on the mirror. The system is primarily designed for the purpose of Human Monitoring and also Intrusion Detection. The proposed design is an interactive system and is made as a package bundled with maximum possible features, which not only just displays information over screen, but also can be used for providing security. The system is built using hardware units like Raspberry Pi-3 model, microphone, touch screen, mobile device, camera and PIR (Passive Infrared Sensor) sensors and programming coded in Python language. The Human Intrusion detection and Human Monitoring is implemented using Yolo Machine learning technique with OpenCV.
In this paper, we generalize primal-dual interior-point methods for linear optimization to convex quadratic semidefinite optimization, which is a wide class of optimization problems that contains linear optimization, ...
详细信息
This paper focus on optimization operation problem of ecology and power generation considering uncertainty of inflow on the Three Gorges reservoir. A model with constraint violation as objective is proposed to obtain ...
详细信息
The proceedings contain 37 papers. The special focus in this conference is on Applied Physics, System science and Computers. The topics include: Quantum thermodynamics and coherence in ion channels;micro-pulse stimula...
ISBN:
(纸本)9783319539331
The proceedings contain 37 papers. The special focus in this conference is on Applied Physics, System science and Computers. The topics include: Quantum thermodynamics and coherence in ion channels;micro-pulse stimulation;exploring the therapeutic effects of micro-pulse stimulation;modeling of the waterflooding process in the presence of discontinuities in the oil reservoirs;terahertz spectroscopy applications in medicament analysis;stability of capillary waves of finite amplitude;the numerical scheme for the basset type integro-differential equation in hydrodynamics;on the issue of choosing the measuring zones in a faraday balance when studying magnetic susceptibility of small samples;energy aware autonomous deployment for mobile wireless sensor networks;an optimal process for average value-at-risk portfolios in financial management;on quantification of the hidden distributed generation capacity and its effects;modeling the operating costs for production of the hydrolyzate;the problems of data security in cloud computing and its solution using Petri nets;designing of the pseudorandom number generators on the basis of two-dimensional cellular automata;a mixed fixed point and floating point graphics pipeline;mathematical modeling and computer simulation of simple permutation brainteaser in MS excel;research of methods of learning of programming objects-first and object-later;multichannel queueing systems and their simulation;on computational evaluation of stress concentration using micropolar elasticity;an algorithm for edge detection of the image for application in WSN and training samples construction for energy utilities operational assets management.
Production scheduling of steelmaking-continuous casting includes the collaborative optimization of main equipment (multiple converters, refining positions and casters) and auxiliary equipment (multiple cranes). How to...
详细信息
This article is another attempt of a comprehensive solution in the field of steganography data transmission. We also consider software model prototype that fully implements the process of hidden messages transmission ...
详细信息
The proceedings contain 27 papers. The special focus in this conference is on Applied Informatics. The topics include: Use of Virtual Reality Using Render Semi-realistic as an Alternative Medium for the Treatment of P...
ISBN:
(纸本)9783030015343
The proceedings contain 27 papers. The special focus in this conference is on Applied Informatics. The topics include: Use of Virtual Reality Using Render Semi-realistic as an Alternative Medium for the Treatment of Phobias. Case study: Arachnophobia;a Security Based Reference Architecture for Cyber-Physical Systems;an Effective Wireless Media Access Controls Architecture for Content Delivery Networks;Automating Information Security Risk Assessment for IT Services;Smart-Solar Irrigation System (SMIS) for Sustainable Agriculture;Applying the Flipped Classroom Model Using a VLE for Foreign Languages Learning;an Educational Math Game for High School students in Sub-Saharan Africa;selecting Attributes for Inclusion in an Educational Recommender System Using the Multi-attribute Utility Theory;android Malware Detection: A Survey;evaluation of the Bias of student Performance Data with Assistance of Expert Teacher;architectural Approaches for Phonemes Recognition Systems;towards a Framework for the Adoption of Mobile Information Communication Technology Dynamic Capabilities for Namibian Small and Medium Enterprises;3D Scene Reconstruction Based on a 2D Moving LiDAR;GPU-Implementation of a Sequential Monte Carlo Technique for the Localization of an Ackerman Robot;Modulation of Central Pattern Generators (CPG) for the Locomotion Planning of an articulated Robot;Methodology for the Retrofitting of Manufacturing Resources for Migration of SME Towards Industry 4.0;model Driven engineering Approach to Configure Software Reusable Components;Multi-SPLOT: Supporting Multi-user Configurations with Constraint programming;social Media Competitive Intelligence: Measurement and Visualization from a Higher Education Organization;towards Automated Advertising strategy Definition Based on Analytics;CHIN: Classification with META-PATH in Heterogeneous Information Networks;global Snapshot File Tracker.
Vehicular Ad-hoc Network (VANET) being a key part of Intelligent Transportation Systems (ITS), is gaining interest among road authorities, automotive industry, network operators, and public for its numerous solutions ...
详细信息
暂无评论