The assignment of the airline planes to appropriate gates is complex combinatorial optimization. Most of the research works in previous literatures take the passengers' walking distance as the optimization objecti...
详细信息
ISBN:
(纸本)9781479974351
The assignment of the airline planes to appropriate gates is complex combinatorial optimization. Most of the research works in previous literatures take the passengers' walking distance as the optimization objective. With the development of the air transportation, more and more transferring services are required. In this paper, a novel AGAP model is developed to meet this demand. A number of heuristic algorithms have been proposed to solve the AGAP. Those heuristics have the disadvantages of slow convergence and precocity, which affect the performance of the algorithms. The GRASP procedures have a series of good features: strong intuitive greedy appeals, prominent empirical track records, and trivial to be efficiently implemented on parallel processors. More important, GRASP can overcome the precocity. In this paper, a GRASP algorithm on AGAP is proposed to solve the AGAP problem. Experimental results demonstrate that our GRASP algorithm on AGAP evidently exceeds GA algorithms on the quality of solutions and time complexity. To explain why GRASP algorithm on AGAP has a better performance than GA, fitness landscape analysis is presented.
Human behavior is one kind of complicated phenomena. Comprehensive and profound understanding of their behavioral characteristics has been the direction of the tireless efforts of people. In recent years, studies have...
详细信息
The understanding of the temporal patterns of individual human interactions is essential in explaining many characteristics of human behavior. The instant communication tool QQ is developing rapidly on the network in ...
详细信息
With the city urbanization and increase in the number of motor vehicle, Study of the city traffic pattern from taxi GPS data has become the research hotspot. This paper analyzes two city taxi GPS data;calculate the pe...
详细信息
Binary hashing is widely used in efficient similarity computing for image/video search. In this work, we propose a Locality Preserving Hashing (LPH) method to improve the image retrieval performance, we first project ...
详细信息
ISBN:
(纸本)9781450328104
Binary hashing is widely used in efficient similarity computing for image/video search. In this work, we propose a Locality Preserving Hashing (LPH) method to improve the image retrieval performance, we first project high-dimensional feature space into low dimension using locality preserving method, in which the locality properties can be well maintained, then binaries the lowdimensional feature into binary index code using a heuristic projection strategy;in retrieval stage, we compute the Hamming distance of the cell indices by implementing XOR and bit-count operations, obtain the similarity result and finally get the target images. We evaluate the algorithm on four public image datasets and compare it with some popular methods, and the experimental results show the validity of our proposed method. Copyright 2014 ACM.
Recently, the problem of traffic jam in major cities is getting worse. By leveraging the taxi GPS data of Shenzhen, this paper analyzes the urban traffic status and proposes rational suggestions for urban traffic mana...
详细信息
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms f...
详细信息
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms for the class diagram and sequence diagram of UML are presented, which provide an engineering specification for the security protocol formalizing. Therefore, for verifying the confidentiality and correspondence of security protocols by Prover if, a transformation from extended UML model to Prover if Spi calculus model is realized with matching rules and knowledge reasoning, and then the verifying results are analyzed through a regular expression. Finally, the handshake, NS public key and buyer-seller watermarking protocols are verified, the attack traces of unsatisfied security properties are exported, that show the validity and applicability of the approach provided by this paper.
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including a...
详细信息
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including asset recognition, weakness analysis, consequence property confirmation and risk calculation. Each object is modeled with Petri net. Specialists recognize software assets by the 1-9 scales method of Analytic Hierarchy Process (AHP). The weaknesses in a system are found by the vulnerability scanner. The damage degree and the exploitation likelihood of a weakness are evaluated by such authorities as Common Weakness Enumeration (CWE). The consequence properties are confirmed by specialists according to the software requirements. Finally, in the risk calculation, risk degree and overall risk value are calculated by using exponential method and weighted average method respectively. Furthermore, we illustrate the application of our OOPN-SRAM method with realistic examples including web-banking and forum, and make a comparison with traditional methods. The results show that OOPN-SRAM not only increases the efficiency of the evaluation process, but also makes the evaluation result more objective and accurate.
Against the tedious process of PPPoE campus network access authentication on the web page,the logic flow of the client used in the router to complete the automatic certification,and part of the kernel technology are g...
详细信息
Against the tedious process of PPPoE campus network access authentication on the web page,the logic flow of the client used in the router to complete the automatic certification,and part of the kernel technology are given to develop the software available for routers using OpenWrt *** communication details are obtained and further simulated through Firebug tool,the graphical user configuration interface,based on the LuCi framework,and the bridging technology is used to solve the IPv6 connectivity issues in subnet *** account login and certification can be completed by the router,and the concise interface enables users to timely view their account status,modify their settings and monitor *** compiling and debugging,the software has successfully achieved these functions.
In this paper, a bayesian statistical inference-based estimation of distribution algorithm (BEDA) is proposed for the re-entrant job-shop scheduling problem with sequence-dependent setup times (RJSSPST) to minimize th...
详细信息
暂无评论