首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   0篇
无线电   1篇
自动化技术   1篇
  2013年   1篇
  1993年   1篇
排序方式: 共有2条查询结果,搜索用时 406 毫秒
1
1.
Genetic neuro-scheduler for job shop scheduling   总被引:1,自引:0,他引:1  
This paper describes a hybrid approach between two new techniques, Genetic Algorithms and Artificial Neural Networks, for generating Job Shop Schedules (JSS) in a discrete manufacturing environment based on non-linear multi-criteria objective function. Genetic Algorithm (GA) is used as a search technique for an optimal schedule via a uniform randomly generated population of gene strings which represent alternative feasible schedules. GA propagates this specific gene population through a number of cycles or generations by implementing natural genetic mechanism (i.e. reproduction operator and crossover operator). It is important to design an appropriate format of genes for JSS problems. Specifically, gene strings should have a structure that imposes the most common restrictive constraint; a precedence constraint. The other is an Artificial Neural Network, which uses its highly connected-neuron network to perform as a multi-criteria evaluator. The basic idea is a neural network evaluator which maps a complex set of scheduling criteria (i.e. flowtime, lateness) to evaluate values provided by experienced experts. Once, the network is fully trained, it will be used as an evaluator to access the fitness or performance of those stimulated gene strings.

The proposed approach was prototyped and implemented on JSS problems based on different model sizes; namely small, medium, and large. The results are compared to the Shortest Proceesing Time heuristic used extensively in industry.  相似文献   

2.
Protecting privacy is an important goal in designing location‐based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k‐anonymity, timed fuzzy logic, and a one‐way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one‐way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k‐anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号