نتایج جستجو برای: computational efficiency

تعداد نتایج: 623887  

A. Salehipour , H. Kazemipoor , M. Aryanezhad, R. Tavakkoli-Moghaddam,

Abstract : A tandem automated guided vehicle (AGV) system deals with grouping workstations into some non-overlapping zones , and assigning exactly one AGV to each zone. This paper presents a new non-linear integer mathematical model to group n machines into N loops that minimizes both inter and intra-loop flows simultaneously. Due to computational difficulties of exact methods in solving our pr...

Journal: :Sig. Proc.: Image Comm. 2014
Na Zhang Debin Zhao Yi-Wen Chen Jian-Liang Lin Wen Gao

As a 3D extension of the High Efficiency Video Coding (HEVC) standard, 3D-HEVC is developed to improve the coding efficiency of multi-view video. However, the improvement of the coding efficiency is obtained at the expense of a computational complexity increase. How to relieve the computational burden of the encoder is becoming a critical problem in applications. In this paper, a fast encoder d...

2006
Stilian A. Stoev George Michailidis

This paper addresses the problem of estimating the tail index α of distributions with heavy, Pareto–type tails for dependent data, that is of interest in the areas of finance, insurance, environmental monitoring and teletraffic analysis. A novel approach based on the max self–similarity scaling behavior of block maxima is introduced. The method exploits the increasing lack of dependence of maxi...

Farhad Ghassemi-Tari Laya Olfat

Four heuristic algorithms are developed for solving the generalized version of tardiness flow shop problems. We consider the generalized tardiness flow shop model with minimization of the total tardiness as its performance measure. We modify the concept of cost over time (COVERT) for the generalized version of the flow shop tardiness model and employ this concept for developing four algorithms....

The traveling salesman problem (TSP) is the problem of finding the shortest tour through all the nodes that a salesman has to visit. The TSP is probably the most famous and extensively studied problem in the field of combinatorial optimization. Because this problem is an NP-hard problem, practical large-scale instances cannot be solved by exact algorithms within acceptable computational times. ...

The traveling salesman problem (TSP) is the problem of finding the shortest tour through all the nodes that a salesman has to visit. The TSP is probably the most famous and extensively studied problem in the field of combinatorial optimization. Because this problem is an NP-hard problem, practical large-scale instances cannot be solved by exact algorithms within acceptable computational times. ...

F. Esmaeili, H. Safikhani, S. Salehfard

In this paper the numerical simulation of flow field in the new design dynamic cyclone separator is investigated. The effects of different geometrical parameters such as impeller diameter, number of vanes, length and the location of impeller is investigated. The Reynolds averaged Navier–Stokes equations with Reynolds stress turbulence model (RSM) were solved. The Eulerian-Lagrangian computation...

A. Csébfalvi , E. Szendrői ,

This paper presents an experimental investigation of the Sounds of Silence (SoS) harmony search metaheuristic for the multi-mode resource-constrained project scheduling problem (MRCPSP) using a pre-optimized starting repertoire. The presented algorithm is based on the time oriented version of the SoS harmony search metaheuristic developed by Csébfalvi et al. [1] for the single-mode resource-con...

A. Mohammadi, M. Yaghoubi,

Basic understanding of the process of coolant heat transfer inside an engine is an indispensable prerequisite to devise an infallible cooling strategy. Coolant flow and its heat transfer affect the cooling efficiency, thermal load of heated components, and thermal efficiency of a diesel engine. An efficient approach to studying cooling system for diesel engine is a 3D computational fluid dynami...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید