We consider the revenue management problem of capacity control under realistic purchasing behavior. Similar to EMSR-a, our method aims to compute the protection levels of each level in a single-leg case. this paper es...
详细信息
ISBN:
(纸本)9781450376419
We consider the revenue management problem of capacity control under realistic purchasing behavior. Similar to EMSR-a, our method aims to compute the protection levels of each level in a single-leg case. this paper establishes a model to describe the passenger behavior (purchase upgrade/downgrade or give up) when the demand could not be met. Based on this, we build a nonlinear mixed integer programming model to describe the capacity control problem with purchase upgrade/downgrade. then, an equivalent model easy to solve is presented. Moreover, we proved the equivalence between the two models and presented a two-stage algorithm to solve the equivalent model. Finally, we tested our method on real civil aviation sales data and compared with EMSR methods.
In pair-programming, two developers share a computer to work together on developing one piece of code. To test Pair-programming effects on student performance in a Middle Eastern society where some interaction restric...
详细信息
the high proportion of renewable energy brings new challenges to the power systems, which reduces the security of the systems and increases the difficulty of operation. To alleviate this problem, this paper leverages ...
详细信息
Large-scale energy storage as a new type of flexible market player performs arbitrage in the energy market and can also provide primary frequency regulation (PFR) service to make a profit. this paper proposes a bileve...
详细信息
the goal of this study is to improve cognitive ability, memory and problem-solving skills of people with social anxiety by using game therapy. Social anxiety can have a huge impact on communication, relationships, and...
详细信息
In order to explore the implementation of regional electric-thermal integrated energy system optimization mechanism, deeply excavate the system potential, this paper proposes a programming design of optimized simulati...
详细信息
Most of the web (mobile) applications are using cloud computing technology. Developers who want to develop an application can make use of the provisions and services provided by a cloud service provider. there are a n...
详细信息
Recently, hardware designers have been showing considerable attention to high-level parallelization and hardware synthesis methodologies. State-of-the-art approaches has benefited from the emergence of modern high-den...
详细信息
ISBN:
(纸本)9780889867307
Recently, hardware designers have been showing considerable attention to high-level parallelization and hardware synthesis methodologies. State-of-the-art approaches has benefited from the emergence of modern high-density Field-programmable Gate Arrays (FPGAs). In this paper, we explore the effectiveness of a formal methodology in the design of parallel versions of the F8 cryptographic algorithm. the suggested methodology adopts a functional programming notation for specifying algorithms and for reasoning about them. the parallel behavior of the specification is then derived and mapped onto hardware. Several parallel F8 implementations are developed with different performance characteristics. the refined designs are tested under Celoxica's RC-1000 reconfigurable computer with its 2 million gates Virtex-E FPGA. Performance analysis and evaluation of the proposed implementations are included.
According to the development of robot technology, Human-Robot Interaction (HRI) is the field of study highlighted. the study aims to find the goal of human action considering their intention and behavior based on thei...
详细信息
this article is about applications that can be customized or extended through their own user interface. this is achieved by the interface's ability to interpret users' non-literal expressions, namely metaphori...
详细信息
this article is about applications that can be customized or extended through their own user interface. this is achieved by the interface's ability to interpret users' non-literal expressions, namely metaphorical and metonymic ones. Such increased interpretive intelligence depends on static and dynamic models of the domain and application, from which new figurative meanings are abducted automatically or semiautomatically. the system performs controlled modifications on the underlying models, based on inferences it draws about users' intentions as they produce figurative utterances. (C) 2001 Elsevier science B.V. All rights reserved.
暂无评论