The problem of vehicle routing planning(VRP) has far-reaching influence, and is widely used in vehicle scheduling,industrial production, transportation, logistics and distribution. The study of VRP and its associated ...
The problem of vehicle routing planning(VRP) has far-reaching influence, and is widely used in vehicle scheduling,industrial production, transportation, logistics and distribution. The study of VRP and its associated derivations has grown significantly in recent years. So, starting with the fundamental VRP, this paper categorizes the VRP based on its traits and real-world applications. It then in-depth analyses the capacity constrained VRP, time window VRP, batched delivery VRP,dynamic VRP, and stochastic demand VRP, and provides an update on each type of VRP's research. Additionally, a summary of the VRP problem-solving methods is provided. The study of evolutionary algorithms is the main topic of this paper, and the fundamental solution method is provided in accordance with the development of the algorithms.
Continuous-variable quantum key distribution (CVQKD) [1-7] allows two remote parties (Alice and Bob) to share a secret key,even in the presence of an eavesdropper (Eve) with unlimited computational power [8-17].While,...
Continuous-variable quantum key distribution (CVQKD) [1-7] allows two remote parties (Alice and Bob) to share a secret key,even in the presence of an eavesdropper (Eve) with unlimited computational power [8-17].While,a highly efficient reconciliation protocol [18-21] is crucial in a CVQKD system,which can not only extract the errorless secret keys,but also provide a promising way to achieve a long distance CVQKD at a low signal-to-noise ratio (SNR).There are some practical reconciliation protocols [18-21] for CVQKD systems,such as,sliced reconciliation protocol (SEC) [18],sign reconciliation protocol [19],and multidimensional reconciliation protocol (MR) [21].Compared with the others,MR utilized the algebraic properties of a multidimensional method,which did not require quantization or any other post-selection technique.
In this paper,we present an edge detection scheme based on ghost imaging(GI)with a holistically-nested neural *** so-called holistically-nested edge detection(HED)network is adopted to combine the fully convolutional ...
详细信息
In this paper,we present an edge detection scheme based on ghost imaging(GI)with a holistically-nested neural *** so-called holistically-nested edge detection(HED)network is adopted to combine the fully convolutional neural network(CNN)with deep supervision to learn image edges *** data are used to train the HED network,and the unknown object’s edge information is reconstructed from the experimental *** experiment results show that,when the compression ratio(CR)is 12.5%,this scheme can obtain a high-quality edge information with a sub-Nyquist sampling ratio and has a better performance than those using speckle-shifting GI(SSGI),compressed ghost edge imaging(CGEI)and subpixel-shifted GI(SPSGI).Indeed,the proposed scheme can have a good signal-to-noise ratio performance even if the sub-Nyquist sampling ratio is greater than 5.45%.Since the HED network is trained by numerical simulations before the experiment,this proposed method provides a promising way for achieving edge detection with small measurement times and low time cost.
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ...
详细信息
This paper presents a joint parallel loop filtering algorithm based on multi-thread load balancing in HEVC decoding, which implements the parallel processing of deblocking filtering (DBF) and sample adaptive compensat...
详细信息
The PROMETHEE (Preference Ranking Organization METHod for Enrichment Evaluation) algorithm is applied in the vertical handoff decision technology for heterogeneous wireless networks and researched on its performance. ...
详细信息
The PROMETHEE (Preference Ranking Organization METHod for Enrichment Evaluation) algorithm is applied in the vertical handoff decision technology for heterogeneous wireless networks and researched on its performance. Four 3GPP defined traffic classes are considered in performance evaluation. An attribute matrix is constructed by considering the SINR in the source network and the equivalent SINR in the target network, the required bandwidth, the traffic cost and the available bandwidth of participating access networks. Handoff decision meeting multi-attribute QoS requirement is made according to the traffic features. The weight relation of decision elements is determined with Least Square (LS) method. Finally decision is made by using PROMETHEE algorithm based on the attribute matrix and weight vector. The simulation results show that the PROMETHEE algorithm can provide satisfactory vertical handoff performance and the proposed LS-PROMETHEE algorithm can be fit for the characteristics of the traffic.
At present, speech recognition has become a keytechnology of human-computer interaction, which can be used in semantic recognition and speaker identification and other related applications. This paper focuses on a sp...
详细信息
Target tracking is currently a hot research topic in Computer Vision and has a wide range of use in many research fields. However, due to factors such as occlusion, fast motion, blur and scale variation, tracking meth...
详细信息
This paper presents an Mobile Agent based Coding Aware Routing (MA-CAMR) for wireless sensornetwork, which exploits mobile agent to discovery the routing and coding opportunities, reducing complexity of node design. ...
详细信息
To bridge the gap between limited energy supplies of the sensor nodes and the system lifetime, duty-cycle Wireless sensornetworks (WSNs) with data aggregation are studied in this paper. We proposed a load-balanced an...
详细信息
暂无评论