A container vessel carries containers of various characteristics, in terms of size, weight, and contents. The cargo load of a container vessel, being subjected to a set of operational conditions and restrictions regar...
详细信息
A container vessel carries containers of various characteristics, in terms of size, weight, and contents. The cargo load of a container vessel, being subjected to a set of operational conditions and restrictions regarding ship stability and safety, is a fundamental element in decision-making when a shipping line provides logistics services to clients. This study presents a constraint programming-based model for the capacity planning of a container vessel under various operational conditions. The proposed model generates base solutions and is complemented with a rich scenario-based analysis that utilizes real-life ship data of a container vessel operated by a liner shipping company with a significant market presence. Solutions obtained from the model provide insights on containership capacity planning with differing settings and search strategies. Recommendations to container carriers, regarding improved capacity planning, are the highlights of the study.
In this paper, we propose a constraint programming model for the design problem of cellular wireless communication networks. It consists of selecting the location of the base station controllers (BSCs) and mobile serv...
详细信息
ISBN:
(纸本)0780377818
In this paper, we propose a constraint programming model for the design problem of cellular wireless communication networks. It consists of selecting the location of the base station controllers (BSCs) and mobile service switching centres (MSCs), selecting their types, designing the network topology and selecting the link types, and considering the location of base transceiver stations (BTSs). Next, we propose a heuristic to find a good solution of the model in a reasonable amount of time. This heuristic is a local search combined with constraint programming techniques. Numerical results show that our approach, on average, found better solutions than the best algorithm of the literature.
We propose a method for finding CRMs in a set of co-regulated genes. Each CRM consists of a set of binding sites of transcription factors. We wish to find CRMs involving the same transcription factors in multiple sequ...
详细信息
ISBN:
(纸本)9781424483075
We propose a method for finding CRMs in a set of co-regulated genes. Each CRM consists of a set of binding sites of transcription factors. We wish to find CRMs involving the same transcription factors in multiple sequences. Finding such a combination of transcription factors is inherently a combinatorial problem. We solve this problem by combining the principles of itemset mining and constraint programming. The constraints involve the putative binding sites of transcription factors, the number of sequences in which they co-occur and the proximity of the binding sites. Genomic background sequences are used to assess the significance of the modules. We experimentally validate our approach and compare it with state-of-the-art techniques.
Requirements Engineering (RE) covers not only the capture and structuring of various properties the system should achieve but also the identification of high-level choices on how to achieve such goals or to avoid rela...
详细信息
ISBN:
(纸本)9781728183589
Requirements Engineering (RE) covers not only the capture and structuring of various properties the system should achieve but also the identification of high-level choices on how to achieve such goals or to avoid related obstacles. Generic RE frameworks support simple formalisation of alternatives using AND/OR refinements while more specialised fields such as safety and security engineering have richer analysis capabilities respectively through fault and attack trees. In this paper, we review the various constructs proposed in those domains and state their semantics at RE level to support safety and security co-engineering. As a supplementary step, we propose a mapping on the semantics provided by constraint programming in order to search for optimal configurations in the design space of a RE model. We consider multiple objectives stated as non-functional requirements and formalised using quantified attributes over goal models. Our work is validated on the complex design of an oil pipe system mixing safety and security critical properties.
This paper surveys hybrid algorithms from a constraint programming perspective. It introduces techniques used within a constructive search framework, such as propagation and linear relaxation, as well as techniques us...
详细信息
ISBN:
(纸本)9783540738169
This paper surveys hybrid algorithms from a constraint programming perspective. It introduces techniques used within a constructive search framework, such as propagation and linear relaxation, as well as techniques used in combination with search by repair.
Interest in the channel assignment problem (CAP) has been growing rapidly with both the spread of wireless data networks and the increasing scarcity of electromagnetic (EM) spectrum. The ability to efficiently reuse a...
详细信息
ISBN:
(纸本)9783030192129;9783030192112
Interest in the channel assignment problem (CAP) has been growing rapidly with both the spread of wireless data networks and the increasing scarcity of electromagnetic (EM) spectrum. The ability to efficiently reuse available EM channels is heavily dependent on co-channel interference, i.e., interference occurring between two radios using the same channel but not communicating on the same network. The vast majority of CAP research considers only the interference between any pair of radios, but many radio systems - including the mobile ad-hoc networks we consider - are sensitive to the effects of cumulative interference. In previous work, we describe the vast computational challenges of considering cumulative interference within a CAP. We present a new method to solve this problem via heuristics, integer optimization, and constraint programming techniques. We apply our methods to realistic data sets from a large U.S. Marine Corps operational scenario and provide detailed performance results. To our knowledge, we are the first to describe algorithms for solving realistic, large-scale cumulative-interference minimum-order and minimum-cost channel assignment problems to global or near-global optimality.
We describe constraint programming (CP) models to solve a cryptanalytic problem: the chosen key differential attack against the standard block cipher AES. We show that CP solvers are able to solve these problems quick...
详细信息
ISBN:
(纸本)9780999241103
We describe constraint programming (CP) models to solve a cryptanalytic problem: the chosen key differential attack against the standard block cipher AES. We show that CP solvers are able to solve these problems quicker than dedicated cryptanalysis tools, and we prove that a solution claimed to be optimal in two recent cryptanalysis papers is not optimal by providing a better solution.
In this paper, we describe innovative approaches for the design of intelligent virtual environments (VE) for interactive problem solving. Thus, we propose to extend VEs to support constraint-based interaction through ...
详细信息
ISBN:
(纸本)9789896740269
In this paper, we describe innovative approaches for the design of intelligent virtual environments (VE) for interactive problem solving. Thus, we propose to extend VEs to support constraint-based interaction through the use of constraint programming (CP) techniques. The aim of this paper is to argue for the need of CP integration in VEs and its high relevance in the 3D-objects layout problem. The user manipulation will be translated as incoming queries of the intelligent module (solver) which will generate a solution compatible with the design requirements. Thus, the task of the solver is to satisfy the constraints specified by the system in response to user interaction. In order to exhibit a high degree of visual richness and realism, the use of human-scale multi-modal 3D interaction techniques and tools is proposed.
This paper exploits the point of view of constraint programming as computation in a logical system, namely constraint logic We define the basic ingredients of constraint logic, such as constraint models and generalise...
详细信息
ISBN:
(纸本)3540616292
This paper exploits the point of view of constraint programming as computation in a logical system, namely constraint logic We define the basic ingredients of constraint logic, such as constraint models and generalised polynomials. We show that constraint logic is an institution, and we internalise the study of constraint logic to the framework of category-based equational logic. By showing that constraint logic is a special case of category-based equational logic, we integrate the constraint logic programming paradigm into equational logic programming. Results include a Herbrand theorem for constraint logic programming characterising Herbrand models as initial models in constraint logic.
Juxtapositianing manuallycreated business process models with diagrams generated using process discovery algorithms exposes high complexity of the latter. As a consequence, their formal verification requires significa...
详细信息
ISBN:
(纸本)9788394941956
Juxtapositianing manuallycreated business process models with diagrams generated using process discovery algorithms exposes high complexity of the latter. As a consequence, their formal verification requires significant computational resources due to a large state space. Nevertheless, an analysis of the generated model is needed to assure its correctness and the ability to represent source data. As a solution to this problem, we present an approach for constraint-based generation of a complete workflow log for a given BPMN model. In this paper, we propose a method to extract directed subgraphs representing token flows in the process together with a set of predefined constraints. Likewise, in the case of process simulation, these constraints ensure the correctness of the generated traces. Ultimately, the obtained results can be compared to the original workflow log used for process discovery in order to verify the obtained model.
暂无评论