Placement optimisation for station‐free bicycle‐sharing under 1D distribution assumption
نویسندگان
چکیده
منابع مشابه
Optimisation for Surface Mount Placement Machines
Optimisation of feeder setup and component placement sequence are very important to the efficiency of surface mount placement machines. Much works have been conducted to solve this problem. However, the technological characteristics of the placement machine influences the nature of the planning problems to be solved and the formulation of the associated models. As a result, little consensus exi...
متن کاملApplication of Fuzzy and ABC Algorithm for DG Placement for Minimum Loss in Radial Distribution System
Distributed Generation (DG) is a promising solution to many power system problems such as voltage regulation, power loss, etc. This paper presents a new methodology using Fuzzy and Artificial Bee Colony algorithm(ABC) for the placement of Distributed Generators(DG) in the radial distribution systems to reduce the real power losses and to improve the voltage profile. A two-stage methodology is u...
متن کاملVoltage Profile Optimisation for Weak Distribution Networks
Recent advances in power electronic technology have seen the development of a range of converter based power compensation systems which have the potential to improve supply quality and increase line utilisation in weak distribution networks at relatively low cost. However, the interaction of these devices with the supply network has not been well documented. In this paper we investigate the ste...
متن کاملPopulation dynamics under the Laplace assumption
In this paper, we describe a generic approach to modelling dynamics in neuronal populations. This approach models a full density on the states of neuronal populations but finesses this high-dimensional problem by re-formulating density dynamics in terms of ordinary differential equations on the sufficient statistics of the densities considered (c.f., the method of moments). The particular form ...
متن کاملRethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption
Any software claiming to cryptographically protect the data should use an encryption algorithm that meets public standards, and has an extensive history of independent cryptanalytic validation. However, even though they encrypt with strong encryption algorithm, most existing public-key cryptosystems, including RSA-OAEP, do not consider the “memory reconstruction attack” or the “memory core-dump...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Intelligent Transport Systems
سال: 2020
ISSN: 1751-9578,1751-9578
DOI: 10.1049/iet-its.2019.0363