Considering that the vehicle routing problem (VRP) with many extended features is widely used in actual life, such as multi-depot, heterogeneous types of vehicles, customer service priority and time windows etc., a ...Considering that the vehicle routing problem (VRP) with many extended features is widely used in actual life, such as multi-depot, heterogeneous types of vehicles, customer service priority and time windows etc., a mathematical model for multi-depot heterogeneous vehicle routing problem with soft time windows (MDHVRPSTW) is established. An improved ant colony optimization (IACO) is proposed for solving this model. First, MDHVRPSTW is transferred into different groups according to the nearest principle, and then the initial route is constructed by the scanning algorithm (SA). Secondly, genetic operators are introduced, and crossover probability and mutation probability are adaptively adjusted in order to improve the global search ability of the algorithm. Moreover, the smooth mechanism is used to improve the performance of the ant colony optimization (ACO). Finally, the 3-opt strategy is used to improve the local search ability. The proposed IACO was tested on three new instances that were generated randomly. The experimental results show that IACO is superior to the other three existing algorithms in terms of convergence speed and solution quality. Thus, the proposed method is effective and feasible, and the proposed model is meaningful.展开更多
Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes...Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes of the network, such as Oracle, Sybase, Informix, MS SQL Server, SQL Anywhere and Foxpro. The conversion system adopts the Client/Server architecture and provides visual integrated interface for users.展开更多
This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Qu...This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Queueing modeling and steady-state operational analysis techniques are also used for analytic modeling. Both simulation and analysis studies on the HT-7 data processing system indicate that in comparison with conventional time-shared systems,a client/server system can significantly reduce the completion time of raw data display,real-time data processing and data transfer in the online system,raise the workload capacity and reduce the average waiting time of the off-line system.展开更多
A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The...A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments.展开更多
This paper investigates the device-to-device(D2D) communication underlaying cellular network assisted by a two-way decode-and-forward relay node. We assume the base station(BS) is equipped with M-antenna and serves it...This paper investigates the device-to-device(D2D) communication underlaying cellular network assisted by a two-way decode-and-forward relay node. We assume the base station(BS) is equipped with M-antenna and serves its own cellular user while the D2D users communicate via a two-way decode-and-forward relay node. Both beamforming(BF) and interference cancellation(IC) strategies at the BS are considered to improve the performance for the cellular link and D2D link, respectively. We first analyze the received signal-to-interference-plus-noise for the cellular link under BF and IC strategies and then derive the exact closed-form expressions for the cellular link. Asymmetric and symmetric cases are discussed for various locations of each user. Finally, the approximations for high signal-to-noise regime are also presented. Numerical results demonstrate the accuracy of the analytical and asymptotic results.展开更多
Nursing education in the United States began in the 1870s with hospital training schools modeled after the Nightingale plan. Presently there are three educational paths that students may take to become a registered nu...Nursing education in the United States began in the 1870s with hospital training schools modeled after the Nightingale plan. Presently there are three educational paths that students may take to become a registered nurse (RN). These are the baccalaureate degree (BS), the associate degree (AD) and the diploma. Accelerated nursing programs are also available for people who have a baccalaureate degree in another field. Nursing education and nursing practice in the United States is regulated by each of the 50 states. The focus of nursing education is the preparation of nurses who use critical thinking skills to provide comprehensive patient-centered care to a variety of clients. It is expected that nurses will function using evidence-based practice in a culturally competent, safe manner. Nursing schools must be approved by the state in which they exist. In addition to this, most nursing schools are also accredited, a voluntary process that is done by a non-governmental association. All graduates take the same licensing exam, a computer adaptive test that is from 75 to 265 items long educated graduates were first time test takers; 85.5% passed the exam. Trends in nursing education In 2008 almost 120,000 US include a focus on evidence based practice, an emphasis on safety and quality, patient education and management of chronic conditions, genetics and genomics and the use of simulation in nursing education展开更多
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an...Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.展开更多
Service modeling offers fundamental guidance to the construction and operation of mobile telecommunication networks. As the domestic LTE networks have been deployed massively, the refined LTE services model needs to b...Service modeling offers fundamental guidance to the construction and operation of mobile telecommunication networks. As the domestic LTE networks have been deployed massively, the refined LTE services model needs to be established urgently. In this paper, we firstly extract characteristic parameters of services from statistical data in 3G networks, especially in time, space and user dimension. Secondly, the development trends of LTE services are analyzed. And the refined LTE service model is established. Finally, prediction results of LTE service development in China is given, which could provide effi cient support for networks' optimization and evolution.展开更多
In this paper,a generic retailer-oriented portfolio simulation system linking manufacturer,retailer,and customer in apparel supply chain is presented.The purpose of the simulator is to generate a portfolio consisting ...In this paper,a generic retailer-oriented portfolio simulation system linking manufacturer,retailer,and customer in apparel supply chain is presented.The purpose of the simulator is to generate a portfolio consisting of replenishment strategy and performance index under different sales forecasting errors to satisfy the retailer-defined customer service level in apparel industry.After analyzing the main parameters in the portfolio simulator,the procedure and detailed structure of the simulator are then described.With the use of data from the industry,one case study of the portfolio simulator is achieved and the process of the simulation is validated.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
基金The National Natural Science Foundation of China(No.61074147)the Natural Science Foundation of Guangdong Province(No.S2011010005059)+2 种基金the Foundation of Enterprise-University-Research Institute Cooperation from Guangdong Province and Ministry of Education of China(No.2012B091000171,2011B090400460)the Science and Technology Program of Guangdong Province(No.2012B050600028)the Science and Technology Program of Huadu District,Guangzhou(No.HD14ZD001)
文摘Considering that the vehicle routing problem (VRP) with many extended features is widely used in actual life, such as multi-depot, heterogeneous types of vehicles, customer service priority and time windows etc., a mathematical model for multi-depot heterogeneous vehicle routing problem with soft time windows (MDHVRPSTW) is established. An improved ant colony optimization (IACO) is proposed for solving this model. First, MDHVRPSTW is transferred into different groups according to the nearest principle, and then the initial route is constructed by the scanning algorithm (SA). Secondly, genetic operators are introduced, and crossover probability and mutation probability are adaptively adjusted in order to improve the global search ability of the algorithm. Moreover, the smooth mechanism is used to improve the performance of the ant colony optimization (ACO). Finally, the 3-opt strategy is used to improve the local search ability. The proposed IACO was tested on three new instances that were generated randomly. The experimental results show that IACO is superior to the other three existing algorithms in terms of convergence speed and solution quality. Thus, the proposed method is effective and feasible, and the proposed model is meaningful.
文摘Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes of the network, such as Oracle, Sybase, Informix, MS SQL Server, SQL Anywhere and Foxpro. The conversion system adopts the Client/Server architecture and provides visual integrated interface for users.
文摘This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Queueing modeling and steady-state operational analysis techniques are also used for analytic modeling. Both simulation and analysis studies on the HT-7 data processing system indicate that in comparison with conventional time-shared systems,a client/server system can significantly reduce the completion time of raw data display,real-time data processing and data transfer in the online system,raise the workload capacity and reduce the average waiting time of the off-line system.
文摘A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments.
基金supported by the National Science Foundation for Distinguished Young Scholars of China(No.61701201)the Natural Science Foundation of Jiangsu Province(No.BK20170758,BK20170757)+1 种基金the Natural Science Foundation for colleges and universities of Jiangsu Province(No.17KJB510011)Project of Key Laboratory of Wireless Communications of Jiangsu Province
文摘This paper investigates the device-to-device(D2D) communication underlaying cellular network assisted by a two-way decode-and-forward relay node. We assume the base station(BS) is equipped with M-antenna and serves its own cellular user while the D2D users communicate via a two-way decode-and-forward relay node. Both beamforming(BF) and interference cancellation(IC) strategies at the BS are considered to improve the performance for the cellular link and D2D link, respectively. We first analyze the received signal-to-interference-plus-noise for the cellular link under BF and IC strategies and then derive the exact closed-form expressions for the cellular link. Asymmetric and symmetric cases are discussed for various locations of each user. Finally, the approximations for high signal-to-noise regime are also presented. Numerical results demonstrate the accuracy of the analytical and asymptotic results.
文摘Nursing education in the United States began in the 1870s with hospital training schools modeled after the Nightingale plan. Presently there are three educational paths that students may take to become a registered nurse (RN). These are the baccalaureate degree (BS), the associate degree (AD) and the diploma. Accelerated nursing programs are also available for people who have a baccalaureate degree in another field. Nursing education and nursing practice in the United States is regulated by each of the 50 states. The focus of nursing education is the preparation of nurses who use critical thinking skills to provide comprehensive patient-centered care to a variety of clients. It is expected that nurses will function using evidence-based practice in a culturally competent, safe manner. Nursing schools must be approved by the state in which they exist. In addition to this, most nursing schools are also accredited, a voluntary process that is done by a non-governmental association. All graduates take the same licensing exam, a computer adaptive test that is from 75 to 265 items long educated graduates were first time test takers; 85.5% passed the exam. Trends in nursing education In 2008 almost 120,000 US include a focus on evidence based practice, an emphasis on safety and quality, patient education and management of chronic conditions, genetics and genomics and the use of simulation in nursing education
基金supported by HONG KONG RGC and HONG KONG PolyU under the Grant G-U752/PolyU5103/09Ethe National Natural Science Foundation of Chinaunder Grant No.61003040,No.61202354
文摘Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.
文摘Service modeling offers fundamental guidance to the construction and operation of mobile telecommunication networks. As the domestic LTE networks have been deployed massively, the refined LTE services model needs to be established urgently. In this paper, we firstly extract characteristic parameters of services from statistical data in 3G networks, especially in time, space and user dimension. Secondly, the development trends of LTE services are analyzed. And the refined LTE service model is established. Finally, prediction results of LTE service development in China is given, which could provide effi cient support for networks' optimization and evolution.
文摘In this paper,a generic retailer-oriented portfolio simulation system linking manufacturer,retailer,and customer in apparel supply chain is presented.The purpose of the simulator is to generate a portfolio consisting of replenishment strategy and performance index under different sales forecasting errors to satisfy the retailer-defined customer service level in apparel industry.After analyzing the main parameters in the portfolio simulator,the procedure and detailed structure of the simulator are then described.With the use of data from the industry,one case study of the portfolio simulator is achieved and the process of the simulation is validated.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.