Vehicle Routing Problem
Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.
Подобные документы
The theoretical workbench for real time network modeling. Implement different transition firing rules in A-nets. The Matlab as a Simulink block library. Execution time and facilitating model understanding. A-nets for message transmission modeling.
статья, добавлен 22.07.2014Find the ratio of root-mean-square deviations of pixel distortions and rotations in the learning process to avoid classification errors. Simulation, training and testing of a two-layer perceptron with 250 neurons in its hidden layer for training traingda.
статья, добавлен 27.09.2016Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
статья, добавлен 08.03.2014Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.
статья, добавлен 25.12.2016Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
дипломная работа, добавлен 01.12.2019- 81. Automation of data from video cameras of small and medium-sized unmanned aerial vehicles processing
The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.
статья, добавлен 28.01.2017 Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.
статья, добавлен 19.03.2024Theoretical bases of construction of geographically distributed networks and mechanisms to ensure quality of service (QoS) in such networks. Principles of construction of networks with guaranteed quality of service. The main types of interfaces.
методичка, добавлен 11.10.2014- 84. Improving the efficiency of the solution of linear programming tasks applying the CUDA-technology
Methods for improving the efficiency of the solution of large dimensional linear programming tasks based on application of parallel data processing technology – CUDA. The specific features and algorithmic peculiarities of implementing of the program.
статья, добавлен 26.09.2016 Linear Programming is concerned with maximizing or minimizing an equation over certain criteria. Mixed Integer Linear Programming: Techniques for Solving, Contribution of the Project, Solving Using Branch. Schematic for Branch and Cut algorithm.
научная работа, добавлен 09.10.2012Характеристика программы Time Boss, легкость ее использования и особенности функционала. Анализ понятия родительский контроль и его необходимость. Определение временных параметров работы пользователя. Настройка окна предупреждения, установка фильтров.
статья, добавлен 25.07.2018New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.
статья, добавлен 26.06.2016The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
статья, добавлен 28.08.2016One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
статья, добавлен 15.09.2012Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
курс лекций, добавлен 11.10.2014Electroencephalography and Magnetoencephalography provide insight into neuronal processes in the brain in a real-time scale. This renders these modalities particularly interesting for online analysis methods to visualize brain activity in real-time.
статья, добавлен 23.06.2016A new general mathematical problem, suitable for public-key cryptosystems, is proposed: morphism computation in a category of Abelian groups. The problem seems to be hard for solving with a quantum computer. A demonstrative example of encryption.
статья, добавлен 15.09.2012Анализ виртуальных частных сетей, выбор программных и технических средств для организации защищенного канала связи. Преимущества Generic Routing Encapsulation, Point-to-Point Tunneling Protocol, ipSecurity. Выбор протоколов для защищенного канала.
дипломная работа, добавлен 19.06.2017The problem of three-dimensional reconstruction on Android devices, sensors system. Process of reconstructing three-dimensional models. Camera calibration, finding matching points between images, the use of sensors Android device to solve the problem.
магистерская работа, добавлен 27.08.2016The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
статья, добавлен 15.06.2012A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
статья, добавлен 28.10.2020Изучение системы управления отношениями с клиентами (Customer Relationship Management) как неотъемлемой функциональной области современной комплексной информационной системы предприятия. Опыт применения CRM технологий для ведения клиентской базы.
статья, добавлен 29.05.2017Управление взаимоотношениями с клиентами. Наиболее часто встречающаяся классификация Customer Relationships Management (CRM). Модели CRM-анализа на основании данных, полученных с помощью клиентской базы. Применение моделей страхования в CRM-анализе.
курсовая работа, добавлен 25.08.2016FAT и NTFS. Команды cmd: CD, DIR, TYPE, MORE и І-конвейер, SORT, RD, DEL, COPY, XCOPY, >> , > и <, COROL, EXIT, FIND. Командные файлы: ECHO OFF, ECHO ON, > и >>, %0, %1, …,%9, SHIFT, SET, PAUSE, FOR … IN … DO, СALL файл, Метка – ":" и GOTO, IF, CHOISE.
курсовая работа, добавлен 08.05.2012Анализ и изучение CRM-системы (Customer Relationship Management) - управления взаимоотношениями между клиентами и ROI (return on investment) – коэффициента окупаемости инвестиций. Разработка системы в виде веб-сервиса для анализа интернет-магазина.
отчет по практике, добавлен 18.05.2018