The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposed a co-evolutionary methodology to optimize the layout of a practical tandem automated guided vehicles (AGV) workshop aiming to reduce the costs for material transporting in manufacturing process. This methodology provided a fresh line to address the machine assignment, internal and external loop layout, as well as the loops arrangement on the floor synthetically, the transfer station...
This paper proposes an individual phase current control (IPCC) method based on optimal zero-sequence current separation for star-connected cascade STATCOMs under unbalanced grid voltage. The IPCC is adopted to get better adaptation to unbalanced conditions. Each cluster of the cascade STATCOM has its own phase current control loop and dc-voltage feedback loop, and it can generate the necessary negative-sequence...
We herein present a tabu search algorithm with variable cluster grouping (TSVCG for short) to deal with Multi-depot vehicle routing problem (MDVRP for short). In TSVCG, we firstly adopt variable cluster grouping to convert a complicated MDVRP to typical single depot vehicle routing problem (SDVRP for short). And then we apply a tabu search algorithm to solve each SDVRP. In the grouping process, we...
Classical trust model for Peer to Peer networks calculates the global trust value by iteration of local trust value. Every transaction will cause iteration throughout the whole networks resulting in huge communication traffic and computational complexity. Collusion attack, sleeping attack, slander attack, and so on are also faced, which are caused by sparse transactions data and inaccurate computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.