Vehicle Routing Problem

Develop architecture for route construction, which allows philosophy of insertion and, more importantly, deletion of customer in route. Develop the structure of heuristic in such way, so the algorithm find satisfactory solution in acceptable time period.

Подобные документы

  • FAT ? NTFS. ??????? cmd: CD, DIR, TYPE, MORE ? ?-????????, SORT, RD, DEL, COPY, XCOPY, >> , > ? <, COROL, EXIT, FIND. ????????? ?????: ECHO OFF, ECHO ON, > ? >>, %0, %1, …,%9, SHIFT, SET, PAUSE, FOR … IN … DO, ?ALL ????, ????? – ":" ? GOTO, IF, CHOISE.

    ???????? ??????, добавлен 08.05.2012

  • ?????? ? ???????? CRM-??????? (Customer Relationship Management) - ?????????? ????????????????? ????? ????????? ? ROI (return on investment) – ???????????? ??????????? ??????????. ?????????? ??????? ? ???? ???-??????? ??? ??????? ????????-????????.

    ????? ?? ????????, добавлен 18.05.2018

  • ??????????? ??????? ??????? ? ????????-??????????????? ??????????? (Service-Oriented Architecture). ?????????????? ???????? ??????????? ?????????? ? SOA. ???? Web-????????, ????? ?? ??????. ???????? SOAP — Simple Object Access: ProtocolWSDL, UDDI ? WSDL.

    ???????, добавлен 13.10.2014

  • Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.

    ??????, добавлен 30.08.2016

  • ????????????? ?????????? OPC ??? ??????? ? ?????? ??????????????? ?????????? ???????????? ? SCADA-??????. ?????? ?????? ?? ????????????. ????????? ???????????? ???????????. ?????????? ?????? ? ?????????? ?????? ??? ???????. ?????????? ?????????? OPC UA.

    ???????? ??????, добавлен 15.09.2017

  • ?????????? ????????? "Find" ??? ??????????? ??????? ?????????????? ?????? ???????? ?????????. ???????? ???????????? ???????? ?? ????? Object-Pascal ? ????? Delphi. ?????????? ???????????? ? ??????? ?????????, ????? ?????????? ?? ????? ??????????.

    ???????? ??????, добавлен 22.02.2019

  • ???????????? ?????, ??????????? ????????? "Epam Systems". ?????? ? ????? ???????? ???????????? ??????? ???????????? ????????????? ?? ??????? ?????? ? ?????? ?????? ? ?????????? Microsoft. ?????????? Find&Replace dialog ??? ????????? MS Office Word.

    ???????, добавлен 17.12.2014

  • Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.

    ??????, добавлен 15.09.2012

  • A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.

    ??????, добавлен 15.09.2012

  • ?????? ?????????????? ??????? ????????? ?????????????? ? ????????? ??? ?????? ?? ?????? ? ????????? ????? ???????????. ?????????????? ???????????? ???????? ?? ??????? ?? ???????? ??? ???????????. ??????????? ?????? ???????????????? ??????-?????????.

    ????????? ??????, добавлен 18.05.2017

  • A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.

    ?????, добавлен 08.03.2014

  • ???????? ????? ?????? ? Genetic Algorithm ? MatLAB, ???????????? ??????????? ??????? ? ??????? ???????????? ?????????? ??? ????????? ???????? ??????? ? ?????????? ? ????????????? ?????????? Crossover fraction ?? ??????? Reproduction ? 1.0 ? ? 0.

    ???????????? ??????, добавлен 28.12.2016

  • The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.

    ??????, добавлен 27.03.2016

  • Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.

    ??????, добавлен 19.03.2024

  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    ??????, добавлен 13.08.2023

  • ?????????? ???????????? ??????. ?????? ???? Industry Standard Architecture. ?????????????? ???????????. PCI local bus ??? ???????? ???? ?????????? ??????????? ???????????. AGP ??? ???????? ??????????? ??????????? ?????????. ???????????? ???? PCI-Express.

    ???????????, добавлен 25.06.2013

  • In this research paper, the author analyzes the impact of artificial intelligence (AI) technologies on business performance. It provides an overview of the use of AI to optimize complex processes, predict trends, and personalize customer interactions.

    ??????, добавлен 26.02.2025

  • The logic of authentication of Burrows, Abadi and Needham. which transforms a protocol into a special form and then uses logical rules to analyze it. Using BAN logic and its enhancements in order to find new weaknesses in various cryptographic protocols.

    ??????, добавлен 15.09.2012

  • ??????? ????? ? ????????, ????? ??????? ?????????. CRM (Customer Relationships Management) ???????, ?? ??????? ? ??????????? ??? ??????: ??????, ???? ??????????, ???????? ? ?????????, ????????????? ? ??????? ??????????. ?????????? IP-?????????, Wi-Fi.

    ??????, добавлен 03.05.2014

  • Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.

    ??????? ???????, добавлен 08.03.2014

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    ?????, добавлен 08.03.2014

  • Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.

    ?????, добавлен 08.03.2014

  • ???????????? ??????????? SPARC (Scalable Processor Architecture) ???????? Sun Microsystems ??? ???? ?? ???????????????? ????? RISC-??????. ??????????????, ??????????? ? ???????????? ?????????? UltraSPARC-1. ?????????????? ?????????????????? ??????????.

    ??????????? ??????, добавлен 14.09.2010

  • The economic implications and practical applications of Generative Artificial Intelligence various business domains, including marketing, customer support, product design, and data analysis. The recommendations for strategy of implementing GenAI.

    ??????, добавлен 21.07.2024

  • Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.

    ?????, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.