Search results for "Work"

showing 10 items of 14511 documents

Aesthetic considerations for the min-max K-Windy Rural Postman Problem

2017

[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…

021103 operations researchComputer Networks and Communications0211 other engineering and technologiesMin-Max objective02 engineering and technologyMulti-Objective problemsCombinatoricsArc routing problemsAesthetic objectiveHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMATEMATICA APLICADAHumanitiesSoftwareInformation SystemsMathematicsNetworks
researchProduct

A flexible robotic cell for in-process inspection of multi-pass welds

2020

Welds are currently only inspected after all the passes are complete and after allowing sufficient time for any hydrogen cracking to develop, typically over several days. Any defects introduced between passes are therefore unreported until fully buried, greatly complicating rework and also delaying early corrections to the weld process parameters. In-process inspection can provide early intervention but involves many challenges, including operation at high temperatures with significant gradients affecting acoustic velocities and, hence, beam directions. Reflections from the incomplete parts of the weld would also be flagged as lack-of-fusion defects, requiring the region of interest (ROI) t…

021103 operations researchComputer scienceTKMechanical EngineeringGas tungsten arc welding0211 other engineering and technologiesMetals and AlloysReworkProcess (computing)Mechanical engineering02 engineering and technologyWeldingWork in process01 natural scienceslaw.inventionSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineMechanics of MaterialslawRegion of interest0103 physical sciencesMaterials ChemistryRobotUltrasonic sensorRobotics In-process inspection Multi-pass welds010301 acoustics
researchProduct

The minimum mean cycle-canceling algorithm for linear programs

2022

Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…

021103 operations researchInformation Systems and ManagementGeneral Computer ScienceLinear programmingDegenerate energy levels0211 other engineering and technologiesPhase (waves)0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchResidualFlow network01 natural sciencesIndustrial and Manufacturing EngineeringDual (category theory)010201 computation theory & mathematicsModeling and SimulationCoefficient matrixRowAlgorithmMathematicsEuropean Journal of Operational Research
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

Combined column-and-row-generation for the optimal communication spanning tree problem

2018

Abstract This paper considers the exact solution of the optimal communication spanning tree problem (OCSTP), which can be described as follows: Given an undirected graph with transportation costs on every edge and communication requirements for all pairs of vertices, the OCSTP seeks for a spanning tree that minimizes the sum of the communication costs between all pairs of vertices, where the communication cost of a pair of vertices is defined as their communication requirement multiplied by the transportation cost of the unique tree path that connects the two vertices. Two types of compact formulations for OCSTP were presented in the literature. The first one is a four-index model based on …

021103 operations researchSpanning treeGeneral Computer ScienceHeuristicComputer scienceIntersection (set theory)0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchFlow network01 natural sciencesTree (graph theory)GraphVertex (geometry)Combinatorics010201 computation theory & mathematicsModeling and SimulationPath (graph theory)Graph (abstract data type)MathematicsofComputing_DISCRETEMATHEMATICSComputers & Operations Research
researchProduct

Improving the performance of embedded systems with variable neighborhood search

2017

Graphical abstractDisplay Omitted Embedded systems have become an essential part of our lives, mainly due to the evolution of technology in the last years. However, the power consumption of these devices is one of their most important drawbacks. It has been proven that an efficient use of the memory of the device also improves its energy performance. This work efficiently solves the dynamic memory allocation problem, which can be formally defined as follows: given a program that has to be executed by a circuit, the objective is to fit that program in memory in such a way that the computing time required to execute it is minimized. In this work, we propose a parallel variable neighborhood se…

021103 operations researchbusiness.industryComputer scienceC dynamic memory allocationEmbedded systemsWork (physics)0211 other engineering and technologies02 engineering and technologyMetaheuristics[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO]Static memory allocationMemoryEmbedded system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDynamic memory allocationbusinessMetaheuristicSoftwareVariable neighborhood searchVariable neighborhood search
researchProduct

DESDEO : An Open Framework for Interactive Multiobjective Optimization

2018

We introduce a framework for interactive multiobjective optimization methods called DESDEO released under an open source license. With the framework, we want to make interactive methods easily accessible to be applied in solving real-world problems. The framework follows an object-oriented software design paradigm, where functionalities have been divided to modular, self-contained components. The framework contains implementations of some interactive methods, but also components which can be utilized to implement more interactive methods and, thus, increase the applicability of the framework. To demonstrate how the framework can be used, we consider an example problem where the pollution of…

021103 operations researchbusiness.industryComputer scienceDistributed computing0211 other engineering and technologies02 engineering and technologyModular designOpen frameworkMulti-objective optimizationmonitavoiteoptimointiOpen source licenseavoin lähdekoodioptimointiDESDEO0202 electrical engineering electronic engineering information engineeringSoftware design020201 artificial intelligence & image processingmultiobjective optimizationongelmanratkaisubusinessImplementationoptimization
researchProduct

Climate Change and Disasters

2017

Ideas and approaches proven successful within disaster risk reduction (DRR) literature and practice are either bypassed or inadequately considered by contemporary climate change work. This chapter explores the intersections between climate change and hazards, vulnerability, and risk, looking at climate change as both a hazard driver and a hazard inhibitor. The implications of the narrow interpretations of vulnerability employed in climate change work are examined, as well as the ways in which climate change has come to act as a scapegoat for issues, events, and processes caused by hazard-independent factors. The chapter formulates a case for climate change adaptation (CCA) to be seen as a s…

021110 strategic defence & security studies010504 meteorology & atmospheric sciencesDisaster risk reduction0211 other engineering and technologiesVulnerabilityClimate change02 engineering and technology01 natural sciencesHazardClimate change mitigationWork (electrical)Political scienceSustainabilityClimate change adaptationEnvironmental planning0105 earth and related environmental sciences
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct