Search results for "Management Science"
showing 10 items of 1017 documents
A comparison of two different formulations for Arc Routing Problems on Mixed graphs
2006
[EN] Arc routing problems on mixed graphs have been modelled in the literature either using just one variable per edge or associating to each edge two variables, each one representing its traversal in the corresponding direction. In this paper, and using the mixed general routing problem as an example, we compare theoretical and computationally both formulations as well as the lower bounds obtained from them using Linear Programming based methods. Extensive computational experiments, including some big and newly generated random instances, are presented.
New Heuristic Algorithms for the Windy Rural Postman Problem
2005
[EN] In this paper we deal with the windy rural postman problem. This problem generalizes several important arc routing problems and has interesting real-life applications. Here, we present several heuristics whose study has lead to the design of a scatter search algorithm for the windy rural postman problem. Extensive computational experiments over different sets of instances, with sizes up to 988 nodes and 3952 edges, are also presented. (c) 2004 Elsevier Ltd. All rights reserved.
A branch-and-cut algorithm for the Profitable Windy Rural Postman Problem
2016
[EN] In this paper we study the profitable windy rural postman problem. This is an arc routing problem with profits defined on a windy graph in which there is a profit associated with some of the edges of the graph, consisting of finding a route maximizing the difference between the total profit collected and the total cost. This problem generalizes the rural postman problem and other well-known arc routing problems and has real-life applications, mainly in snow removal operations. We propose here a formulation for the problem and study its associated polyhedron. Several families of facet-inducing inequalities are described and used in the design of a branch-and-cut procedure. The algorithm…
Solving the length constrained K-drones rural postman problem
2021
[EN] In this paper we address the Length Constrained K-Drones Rural Postman Problem (LC K-DRPP). This is a continuous optimization problem where a fleet of homogeneous drones have to jointly service (traverse) a set of (curved or straight) lines of a network. Unlike the vehicles in classical arc routing problems, a drone can enter a line through any of its points, service a portion of that line, exit through another of its points, then travel directly to any point on another line, and so on. Moreover, since the range of the drones is restricted, the length of each route is limited by a maximum distance. Some applications for drone arc routing problems include inspection of pipelines, railwa…
Understanding social behavior evolutions through agent-based modeling
2012
Agent-based social simulation as a computational approach to social simulation has been largely used to explore social phenomena. The purpose of this paper is to describe a theoretical model of transmission and evolution of social behaviors in a network of artificial societies (artificial world) using agent-based modeling technology. In this model, each agent (society) is subdivided into social behaviors where individual and social learning occur. The agent-agent interactions are carried out by their social behaviors; otherwise the agent-environment interactions through consumption of ecological resources by its social behaviors in repression and satisfaction. We distinguish social behavior…
Human factor policy testing in the sequencing of manual mixed model assembly lines
2004
In this paper the human resource management in manual mixed model assembly U-lines is considered. The objective is to minimise the total conveyor stoppage time to achieve the full efficiency of the line. A model, that includes effects of the human resource, was developed in order to evaluate human factor policies impact on the optimal solution of this line sequencing problem. Different human resource management policies are introduced to cope with the particular layout of the proposed line. Several examples have been proposed to investigate the effects of line dimensions on the proposed management policies. The examples have been solved through a genetic algorithm. The obtained results conf…
Teaching Green Analytical Chemistry on the Example of Bioindication and Biomonitoring (B & B) Technologies
2019
Teaching of Green Analytical Chemistry (GAC) requires a not inconsiderable willingness on the part of the lecturer to familiarize himself with a relatively new field in analytical chemistry. Although there is much that can be derived from Green and Sustainable Chemistry, the GAC’s forward-looking perspectives in particular are independent approaches that must not be neglected. In the first chapter of this article, approaches are pursued “how (teachers) learn to learn,” ultimately based on a consensus on ethics, which allows dealing with people, society and the environment to become an interdisciplinary unit. The end of all this is a smart method of conflict management which provides solutio…
Using continuous user authentication to detect masqueraders
2003
Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…
Analysis of the authors’ rights collection frontier using PCA-MDEA: an application to the Valencia region
2002
The aim of this paper is to estimate the authors’ rights collection frontier within the collection zones into which the Valencia Region (Spain) has been divided. To be more exact, a nonparametric frontier technique (Modified Data Envelopment Analysis, MDEA) and the Principal Components Analysis (PCA) are jointly employed to map out an initial approach to the potential authors’ rights collection within this region (as divided into collection zones). The analysis has been carried out both jointly and by majority sectors (performing, musical, and audio-visual arts). Publicaciones Econcult: Área de Investigación en Economía de la Cultura y Turismo. Universitat de València
Principles and Elements of Risk Management – Data and Initial Conditions
2014
This chapter is devoted to furnishing background information on Risk Management, explaining the string of steps that comprise it, and the use of techniques within it, as well as their relationships. The chapter follows the widely accepted sequence for risk identification, assessment, execution, remediation and control; it starts with some basic definitions and, in its first topic, analyzes the sources for risks, considering internal and external risks and opportunities. It follows with a guide for identifying and managing risks in different areas of a project and suggests appropriate tools and techniques for each one. Completion of sequence sensitivity analysis, a subject developed in full …