• Nenhum resultado encontrado

[PDF] Top 20 Repositorio ISMT: Network flow models for the local access network expansion problem

Has 10000 "Repositorio ISMT: Network flow models for the local access network expansion problem" found on our website. Below are the top 20 most common "Repositorio ISMT: Network flow models for the local access network expansion problem".

Repositorio ISMT: Network flow models for the local access network expansion problem

Repositorio ISMT: Network flow models for the local access network expansion problem

... explain the characteristics of several problems arising in the context of local access network ...this problem have been considered in the literature. The variants ... See full document

17

Repositorio ISMT: A node rooted flow-based model for the local access network expansion problem

Repositorio ISMT: A node rooted flow-based model for the local access network expansion problem

... compare the linear programming relaxations of our models, we used instances with 100, 200 and 500 ...well the 500-node instances and different scenarios for the smaller ...instances. ... See full document

15

NETWORK FLOW ORIENTED APPROACHES FOR VEHICLE SHARING RELOCATION PROBLEMS

NETWORK FLOW ORIENTED APPROACHES FOR VEHICLE SHARING RELOCATION PROBLEMS

... free access vehicles from excess to deficit stations in order to avoid local ...work flow oriented models and algorithms which deal with a static version of this problem while unifying ... See full document

32

A Complex Network Approach to Distributional Semantic Models.

A Complex Network Approach to Distributional Semantic Models.

... improve the performance of simulating the network properties of a real association network as well as generally expected in the DSM ...on the word-document matrix, but the ... See full document

34

Towards reproducible descriptions of neuronal network models.

Towards reproducible descriptions of neuronal network models.

... describe the dynamics of neurons, synapses, and channels we suggest a combination of prose and ...complex network model (Lumer et ...i.e., the excitatory subpopulation of the infragranular ... See full document

18

Projeto de redes Ad Hoc sem fio ciente de topologia

Projeto de redes Ad Hoc sem fio ciente de topologia

... with the nonlinear models, and hence, nonlinear filtering. On the other hand, other approaches strive to convert the measurements from the sensor coordinates to Cartesian coordinates ... See full document

213

Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud

Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud

... NP-Hard problem [5]. The basis for our research was first presented in [6] where the authors propose an approach to tackling the service composition problem based on Linear Integer ... See full document

11

Braz. J. Chem. Eng.  vol.31 número2

Braz. J. Chem. Eng. vol.31 número2

... prove the closed loop performance of the system. Due to the complexity of the industrial process, a first- principles model cannot be applied and hence a more flexible type of model needs to ... See full document

13

A Wireless MAN in Bragança – Digital City

A Wireless MAN in Bragança – Digital City

... Following the portuguese Digital Cities Program, twelve Information Society related projects where initiated in the city of Bragança, under a common goal: “to reduce interiority ...wireless network ... See full document

6

Complex Network Theory Applied to the Growth of Kuala Lumpur's Public Urban Rail Transit Network.

Complex Network Theory Applied to the Growth of Kuala Lumpur's Public Urban Rail Transit Network.

... Recently, the number of studies involving complex network applications in transportation has increased steadily as scholars from various fields analyze traffic ...rail network growth is relatively ... See full document

22

SENSOR DEPLOYMENT USING PARTICLE SWARM OPTIMIZATION

SENSOR DEPLOYMENT USING PARTICLE SWARM OPTIMIZATION

... in the sensor field which brings the coverage ...unique problem and in maximizing coverage, the sensors need to be placed in a position such that the sensing capability of the ... See full document

7

Swindler Ingress Point Detection by Real Time Recognition of Transfer Characteristics

Swindler Ingress Point Detection by Real Time Recognition of Transfer Characteristics

... a network device that runs in immoral mode at all times. The entire region of interest can be enclosed with the support of wireless range ...of the packet collector's duties is to imprison all ... See full document

7

Performance of Hybrid ARQ for NDMA Access Schemes with Uniform Average Power Control

Performance of Hybrid ARQ for NDMA Access Schemes with Uniform Average Power Control

... simultaneously access a given channel in a wireless system a collision occurs. The conventional approach to cope with collisions is to discard all packets involved in the collision and to retransmit ... See full document

9

A correlation aware algorithm for energy efficiency improvement in FiWi networks

A correlation aware algorithm for energy efficiency improvement in FiWi networks

... FiWi access networks the potential for energy consumption reduction is higher, compared to other ...architectures. The reason is that different routes toward the optical section can be used by ... See full document

65

UAN: underwater acoustic network

UAN: underwater acoustic network

... with the delivery and testing of the COM- LAB communication performance predicting and evaluation ...noise models, as well as network configuration and communication ...algorithms. The ... See full document

7

Enhanced Three Tier Security Architecture for WSN Against Mobile Sink Replication Attacks Using Mutual Authentication Scheme

Enhanced Three Tier Security Architecture for WSN Against Mobile Sink Replication Attacks Using Mutual Authentication Scheme

... Therefore, network security becomes a tough task and it involves the authorization of admittance to data in a ...network. The problem of authentication and pair wise key establishment ... See full document

13

Effects of a silenced gene in Boolean network models

Effects of a silenced gene in Boolean network models

... modeling the qualitative behavior of biological networks where molecules are represented as nodes and the molecular interactions are so called edges (Din, 2014; Zhang, 2012, 2015, 2016a, ...regulatory ... See full document

11

On the potential of ICOS atmospheric CO<sub>2</sub> measurement network for the estimation of the biogenic CO<sub>2</sub> budget of Europe

On the potential of ICOS atmospheric CO<sub>2</sub> measurement network for the estimation of the biogenic CO<sub>2</sub> budget of Europe

... Chen, Y.-H., Ciais, P., Fan, S., Fung, I. Y., Gloor, M., Heimann, M., Higuchi, K., John, J., Maki, T., Maksyutov, S., Masarie, K., Peylin, P., Prather, M., Pak, B. C., Randerson, J., Sarmiento, J., Taguchi, S., ... See full document

53

Bol. Ciênc. Geod.  vol.19 número1

Bol. Ciênc. Geod. vol.19 número1

... 1979). The geoid is an irregular surface so it is not an easy task to approximate it with simple mathematical ...approximating the local geoid surface with relatively simple ...include the ... See full document

14

Practical guidelines for modelling post-entry spread in invasion ecology

Practical guidelines for modelling post-entry spread in invasion ecology

... Analytical models have been used for many years to study dispersal in ecology, beginning with simple diffusion equations (Skellam ...Such models seek to distil the complexity of a system or process ... See full document

26

Show all 10000 documents...