Vehicle Routing Problem
Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.
Подобные документы
FAT ? NTFS. ??????? cmd: CD, DIR, TYPE, MORE ? ?-????????, SORT, RD, DEL, COPY, XCOPY, >> , > ? <, COROL, EXIT, FIND. ????????? ?????: ECHO OFF, ECHO ON, > ? >>, %0, %1, …,%9, SHIFT, SET, PAUSE, FOR … IN … DO, ?ALL ????, ????? – ":" ? GOTO, IF, CHOISE.
???????? ??????, добавлен 08.05.2012?????? ? ???????? CRM-??????? (Customer Relationship Management) - ?????????? ????????????????? ????? ????????? ? ROI (return on investment) – ???????????? ??????????? ??????????. ?????????? ??????? ? ???? ???-??????? ??? ??????? ????????-????????.
????? ?? ????????, добавлен 18.05.2018- 103. Web-???????
??????????? ??????? ??????? ? ????????-??????????????? ??????????? (Service-Oriented Architecture). ?????????????? ???????? ??????????? ?????????? ? SOA. ???? Web-????????, ????? ?? ??????. ???????? SOAP — Simple Object Access: ProtocolWSDL, UDDI ? WSDL.
???????, добавлен 13.10.2014 Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
??????, добавлен 30.08.2016????????????? ?????????? OPC ??? ??????? ? ?????? ??????????????? ?????????? ???????????? ? SCADA-??????. ?????? ?????? ?? ????????????. ????????? ???????????? ???????????. ?????????? ?????? ? ?????????? ?????? ??? ???????. ?????????? ?????????? OPC UA.
???????? ??????, добавлен 15.09.2017?????????? ????????? "Find" ??? ??????????? ??????? ?????????????? ?????? ???????? ?????????. ???????? ???????????? ???????? ?? ????? Object-Pascal ? ????? Delphi. ?????????? ???????????? ? ??????? ?????????, ????? ?????????? ?? ????? ??????????.
???????? ??????, добавлен 22.02.2019???????????? ?????, ??????????? ????????? "Epam Systems". ?????? ? ????? ???????? ???????????? ??????? ???????????? ????????????? ?? ??????? ?????? ? ?????? ?????? ? ?????????? Microsoft. ?????????? Find&Replace dialog ??? ????????? MS Office Word.
???????, добавлен 17.12.2014Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
??????, добавлен 15.09.2012A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
??????, добавлен 15.09.2012?????? ?????????????? ??????? ????????? ?????????????? ? ????????? ??? ?????? ?? ?????? ? ????????? ????? ???????????. ?????????????? ???????????? ???????? ?? ??????? ?? ???????? ??? ???????????. ??????????? ?????? ???????????????? ??????-?????????.
????????? ??????, добавлен 18.05.2017A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
?????, добавлен 08.03.2014???????? ????? ?????? ? Genetic Algorithm ? MatLAB, ???????????? ??????????? ??????? ? ??????? ???????????? ?????????? ??? ????????? ???????? ??????? ? ?????????? ? ????????????? ?????????? Crossover fraction ?? ??????? Reproduction ? 1.0 ? ? 0.
???????????? ??????, добавлен 28.12.2016The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.
??????, добавлен 27.03.2016Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023- 116. ???? ??????????
?????????? ???????????? ??????. ?????? ???? Industry Standard Architecture. ?????????????? ???????????. PCI local bus ??? ???????? ???? ?????????? ??????????? ???????????. AGP ??? ???????? ??????????? ??????????? ?????????. ???????????? ???? PCI-Express.
???????????, добавлен 25.06.2013 In this research paper, the author analyzes the impact of artificial intelligence (AI) technologies on business performance. It provides an overview of the use of AI to optimize complex processes, predict trends, and personalize customer interactions.
??????, добавлен 26.02.2025The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.
??????, добавлен 15.09.2012??????? ????? ? ????????, ????? ??????? ?????????. CRM (Customer Relationships Management) ???????, ?? ??????? ? ??????????? ??? ??????: ??????, ???? ??????????, ???????? ? ?????????, ????????????? ? ??????? ??????????. ?????????? IP-?????????, Wi-Fi.
??????, добавлен 03.05.2014- 120. CISSP Certification
Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
??????? ???????, добавлен 08.03.2014 Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
?????, добавлен 08.03.2014???????????? ??????????? SPARC (Scalable Processor Architecture) ???????? Sun Microsystems ??? ???? ?? ???????????????? ????? RISC-??????. ??????????????, ??????????? ? ???????????? ?????????? UltraSPARC-1. ?????????????? ?????????????????? ??????????.
??????????? ??????, добавлен 14.09.2010The economic implications and practical applications of Generative Artificial Intelligence various business domains, including marketing, customer support, product design, and data analysis. The recommendations for strategy of implementing GenAI.
??????, добавлен 21.07.2024Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
?????, добавлен 08.03.2014