Smart home is an extension of modern home automation system which possesses computational intelligence to solve problems in ubiquitous environment. Multiagent algorithm is frequently used to reduce uncertainty in pervasive environment. This research involves designing a multiagent model which consists of distributed task organizing agents. Each agent is responsible for specific task which is partially shared with a supervisor agent for final prediction. The agents are organized for time, place and event prediction. Agent architecture follows a layered approach with interconnected processing units. The system provides an efficient method to predict events with temporal characteristics based on user location.
{"title":"A Task Oriented Multiagent Model for Smart Home Utilizing Hierarchical Agent Architecture","authors":"Muhammad Raisul Alam, M. Reaz, M. Ali, S. Samad","doi":"10.1109/AMS.2010.32","DOIUrl":"https://doi.org/10.1109/AMS.2010.32","url":null,"abstract":"Smart home is an extension of modern home automation system which possesses computational intelligence to solve problems in ubiquitous environment. Multiagent algorithm is frequently used to reduce uncertainty in pervasive environment. This research involves designing a multiagent model which consists of distributed task organizing agents. Each agent is responsible for specific task which is partially shared with a supervisor agent for final prediction. The agents are organized for time, place and event prediction. Agent architecture follows a layered approach with interconnected processing units. The system provides an efficient method to predict events with temporal characteristics based on user location.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, outsourcing as a strategic goal is becoming a critical success factor used by different organizations in order to provide high quality, and low price products for their customers. In this context, supplier selection has become an extremely important decision for companies. Management and human resource researchers have focused more on qualitative aspects and conceptual models, whereas engineering science researchers have developed quantitative and full-mathematical models and techniques. Since it is important to consider both aspects of supplier performance, this paper develops a fuzzy-based model to evaluate the leanness of supplier performance. The model presented here, gives a single unit-less score, which clearly shows the leanness of supplier performance. Based on the final score, managers can easily decide on supplier selection. The model includes a systematic measurement of supplier performance with six characteristics: flexible, dynamic, fuzzy logical, continuous improvement, easy to use, and single unit-less (dimensionless) score.
{"title":"A Fuzzy-Based Model to Measure Supplier Performance with Lean Attributes","authors":"Farzad Behrouzi, K. Wong, Chuen Tse Kuah","doi":"10.1109/AMS.2010.81","DOIUrl":"https://doi.org/10.1109/AMS.2010.81","url":null,"abstract":"Nowadays, outsourcing as a strategic goal is becoming a critical success factor used by different organizations in order to provide high quality, and low price products for their customers. In this context, supplier selection has become an extremely important decision for companies. Management and human resource researchers have focused more on qualitative aspects and conceptual models, whereas engineering science researchers have developed quantitative and full-mathematical models and techniques. Since it is important to consider both aspects of supplier performance, this paper develops a fuzzy-based model to evaluate the leanness of supplier performance. The model presented here, gives a single unit-less score, which clearly shows the leanness of supplier performance. Based on the final score, managers can easily decide on supplier selection. The model includes a systematic measurement of supplier performance with six characteristics: flexible, dynamic, fuzzy logical, continuous improvement, easy to use, and single unit-less (dimensionless) score.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. Among the types of biometric being used currently, iris is the most accurate and it remains stable throughout a person’s life. However the major challenge on iris and other biometric for authentication is the intra user variability in the acquired identifiers. Iris of the same person captured at different time may differ due to the signal noise of the iris camera. Traditional cryptography method is unable to encrypt and store biometric template, then perform the matching directly. Minor changes in the bits of the feature set extracted from the iris may lead to a huge difference in the results of the encrypted feature. In our approach, an iris biometric template is secured using iris biometric and passwords. Error Correction Code, ECC is introduced to reduce the variability and noise of the iris data. Experimental results show that this approach can assure a higher security with a low false rejection or false acceptance rate. The successful iris recognition rate using this approach is up to 97%.
{"title":"Error Correction on IRIS Biometric Template Using Reed Solomon Codes","authors":"Sim Hiew Moi, Puteh Saad, N. A. Rahim, S. Ibrahim","doi":"10.1109/AMS.2010.50","DOIUrl":"https://doi.org/10.1109/AMS.2010.50","url":null,"abstract":"Pin number or password that is used for authentication can be easily attacked. This limitation triggered the utilization of biometric for secured transactions. Biometric is unique to each individual and is reliable. Among the types of biometric being used currently, iris is the most accurate and it remains stable throughout a person’s life. However the major challenge on iris and other biometric for authentication is the intra user variability in the acquired identifiers. Iris of the same person captured at different time may differ due to the signal noise of the iris camera. Traditional cryptography method is unable to encrypt and store biometric template, then perform the matching directly. Minor changes in the bits of the feature set extracted from the iris may lead to a huge difference in the results of the encrypted feature. In our approach, an iris biometric template is secured using iris biometric and passwords. Error Correction Code, ECC is introduced to reduce the variability and noise of the iris data. Experimental results show that this approach can assure a higher security with a low false rejection or false acceptance rate. The successful iris recognition rate using this approach is up to 97%.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elizabeth Chia, M. S. Shamsir, Z. Hussein, Siti Zaiton Mohd Hashim
We developed GridMACS, a grid-enabled web portal with the aim of providing GUI for GROMACS and running a molecular dynamics simulation in a grid environment. The portal is developed according to the basic grid system architecture by integrating the main grid layers such as the Gridsphere Portal Framework, Vine Toolkit (grid service) and Globus Toolkit (grid middleware). The integration with the computing resources was achieved by the deployment of the main grid layers on a cluster grid environment. Creation of this portal will provide a GUI based user-friendly environment that will assist biologist in providing them the availability and usability. GridMACS will serve as an initial proof of concept and in the future will subsequently become a platform for other bioinformatics tools to be implemented on a grid platform as a port let application. The portal is easily accessible via the internet on any browsers at www.gridmacs.fbb.utm.my:8080/gridsphere/gridsphere.
{"title":"GridMACS Portal: A Grid Web Portal for Molecular Dynamics Simulation Using GROMACS","authors":"Elizabeth Chia, M. S. Shamsir, Z. Hussein, Siti Zaiton Mohd Hashim","doi":"10.1109/AMS.2010.103","DOIUrl":"https://doi.org/10.1109/AMS.2010.103","url":null,"abstract":"We developed GridMACS, a grid-enabled web portal with the aim of providing GUI for GROMACS and running a molecular dynamics simulation in a grid environment. The portal is developed according to the basic grid system architecture by integrating the main grid layers such as the Gridsphere Portal Framework, Vine Toolkit (grid service) and Globus Toolkit (grid middleware). The integration with the computing resources was achieved by the deployment of the main grid layers on a cluster grid environment. Creation of this portal will provide a GUI based user-friendly environment that will assist biologist in providing them the availability and usability. GridMACS will serve as an initial proof of concept and in the future will subsequently become a platform for other bioinformatics tools to be implemented on a grid platform as a port let application. The portal is easily accessible via the internet on any browsers at www.gridmacs.fbb.utm.my:8080/gridsphere/gridsphere.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Virtual slaughtering and dissection is a way to learn about anatomy and dissect animals without harming any real-life animals or feeling ill from that nauseating formaldehyde smell. The virtual slaughtering and dissections also have detailed scientific explanations.We are to develop interactive virtual environments that can simulate several common tasks performed during animal dissection. In this paper, we describe the imaging modality used to reconstruct the cow, provide an overview of the simulation environment and briefly discuss some of the techniques used to manipulate the virtual cow.The system will consists of an anatomically computer model of a cow, a simulation engine capable of providing soft-tissue modeling, rigid body dynamics, collision detection and response, haptic force calculations, and a number of user interface and display devices to interact with the user. The behaviour of the tissue will be modeled by modulating the stiffness coefficients between adjacent internal organs in order to propagate the effects of grasping connected components. This simulation system will be written in C# using Open GL, GLUT and GLUI libraries for visualization and user interface. Several supporting virtual reality tools for grasping, cutting and probing will be used such as haptic devices, non-haptic devices, and display devices.
{"title":"Accuracy of Determination for Virtual Animal Halal Slaughtering: A Case Study","authors":"N. Lili","doi":"10.1109/AMS.2010.98","DOIUrl":"https://doi.org/10.1109/AMS.2010.98","url":null,"abstract":"Virtual slaughtering and dissection is a way to learn about anatomy and dissect animals without harming any real-life animals or feeling ill from that nauseating formaldehyde smell. The virtual slaughtering and dissections also have detailed scientific explanations.We are to develop interactive virtual environments that can simulate several common tasks performed during animal dissection. In this paper, we describe the imaging modality used to reconstruct the cow, provide an overview of the simulation environment and briefly discuss some of the techniques used to manipulate the virtual cow.The system will consists of an anatomically computer model of a cow, a simulation engine capable of providing soft-tissue modeling, rigid body dynamics, collision detection and response, haptic force calculations, and a number of user interface and display devices to interact with the user. The behaviour of the tissue will be modeled by modulating the stiffness coefficients between adjacent internal organs in order to propagate the effects of grasping connected components. This simulation system will be written in C# using Open GL, GLUT and GLUI libraries for visualization and user interface. Several supporting virtual reality tools for grasping, cutting and probing will be used such as haptic devices, non-haptic devices, and display devices.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"16 2-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. K. Nayak, Manaw Modi, G. K. Santhalia, Milan Das
Today the world wants XML. Extended Markup Language (XML) is a universal markup language for exchanging and publishing data in web applications. There are other Markup Languages such as MathML, CML, and MusicML etc which are specifically designed for particular purpose. Data containing system does not wish to expose its schema for simple security and privacy reasons. So writing query against is not advisable or possible. Hence, an intermediate data exchange protocol using XML is essential. In this Project we have designed a Middleware Layer component where clients request are through XML which are in there own grammar not the database schema grammar. When the Server receives such request it maps the client grammar with database schema and then translates the said mapped XML Language to SQL query language which will fetch data from relational database schema. Once the data is fetched it is then translated to XML format, which is the request of the customer or a client for a specific set of data and again this XML format data is mapped with the client grammar and transmitted. Hence we can provide service to a client without exposing the schema of a database.
{"title":"Middleware Design - A Nobel Approach to Publish Relational Database to XML without Exposing the Schema of RDBMS","authors":"G. K. Nayak, Manaw Modi, G. K. Santhalia, Milan Das","doi":"10.1109/AMS.2010.44","DOIUrl":"https://doi.org/10.1109/AMS.2010.44","url":null,"abstract":"Today the world wants XML. Extended Markup Language (XML) is a universal markup language for exchanging and publishing data in web applications. There are other Markup Languages such as MathML, CML, and MusicML etc which are specifically designed for particular purpose. Data containing system does not wish to expose its schema for simple security and privacy reasons. So writing query against is not advisable or possible. Hence, an intermediate data exchange protocol using XML is essential. In this Project we have designed a Middleware Layer component where clients request are through XML which are in there own grammar not the database schema grammar. When the Server receives such request it maps the client grammar with database schema and then translates the said mapped XML Language to SQL query language which will fetch data from relational database schema. Once the data is fetched it is then translated to XML format, which is the request of the customer or a client for a specific set of data and again this XML format data is mapped with the client grammar and transmitted. Hence we can provide service to a client without exposing the schema of a database.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115326796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Routing in MANET is very important issue as dynamic topology of MANET makes routing very difficult. In this paper we are comparing two on-demand routing protocol namely Ad hoc on demand distance vector (AODV) and Dynamic source routing (DSR) protocol. Performance is compared on the parameters like Packet delivery fraction i.e. throughput, Average end to end delay and Normalized routing overhead using network simulator-2. The performance analysis is done by varying mobility pattern (pause time and speed) and traffic pattern (sending rate). The simulation result will help to select the best one for MANET. Our work shows that DSR slightly outperformed AODV.
由于MANET的动态拓扑结构使得路由问题变得非常困难,路由问题在MANET中是一个非常重要的问题。本文比较了两种按需路由协议,即AODV (Ad hoc on demand distance vector)和DSR (Dynamic source routing)协议。性能比较的参数,如数据包传送分数,即吞吐量,平均端到端延迟和标准化路由开销使用网络模拟器-2。性能分析是通过改变移动模式(暂停时间和速度)和流量模式(发送速率)来完成的。仿真结果将有助于在MANET中选择最佳方案。我们的工作表明,DSR略优于AODV。
{"title":"Comparison of On-Demand Routing Protocols","authors":"Kapil Suchdeo, D. Mishra","doi":"10.1109/AMS.2010.112","DOIUrl":"https://doi.org/10.1109/AMS.2010.112","url":null,"abstract":"Routing in MANET is very important issue as dynamic topology of MANET makes routing very difficult. In this paper we are comparing two on-demand routing protocol namely Ad hoc on demand distance vector (AODV) and Dynamic source routing (DSR) protocol. Performance is compared on the parameters like Packet delivery fraction i.e. throughput, Average end to end delay and Normalized routing overhead using network simulator-2. The performance analysis is done by varying mobility pattern (pause time and speed) and traffic pattern (sending rate). The simulation result will help to select the best one for MANET. Our work shows that DSR slightly outperformed AODV.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We try to reveal the reason behind a haptic illusion called Velvet Hand Illusion (VHI) by mean of FEM analysis. In VHI, a person rubs his/her hands together on either side of wires strung through a frame, producing the sensation of rubbing a very smooth and soft surface like velvet. We focus on VHI to determine the specifications of an actuator for a tactile display enhanced by VHI. A simulated fingertip is modeled under the same contact condition that an actual finger is believed to undergo when under VHI. We collected the simulated responses of a number of SAI afferents (responsible for edges) for the purpose of relating them to the mechanism of the illusion. Even with a simple model which treats only one finger we notice a considerable difference between the responses of a number of SAI receptors, compared with that of a fingertip touching wires without the effect of the opposing finger. This study could help in the design of a haptic display which utilizes the illusion and make the person feels the same feeling using the proposed display
{"title":"An Investigation of the Reason of Velvet Hand Illusion Perception Using FEM Analysis","authors":"A. Chami, M. Ohka, H. Yussof","doi":"10.1109/AMS.2010.36","DOIUrl":"https://doi.org/10.1109/AMS.2010.36","url":null,"abstract":"We try to reveal the reason behind a haptic illusion called Velvet Hand Illusion (VHI) by mean of FEM analysis. In VHI, a person rubs his/her hands together on either side of wires strung through a frame, producing the sensation of rubbing a very smooth and soft surface like velvet. We focus on VHI to determine the specifications of an actuator for a tactile display enhanced by VHI. A simulated fingertip is modeled under the same contact condition that an actual finger is believed to undergo when under VHI. We collected the simulated responses of a number of SAI afferents (responsible for edges) for the purpose of relating them to the mechanism of the illusion. Even with a simple model which treats only one finger we notice a considerable difference between the responses of a number of SAI receptors, compared with that of a fingertip touching wires without the effect of the opposing finger. This study could help in the design of a haptic display which utilizes the illusion and make the person feels the same feeling using the proposed display","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126873888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Underwater wireless sensor networks (UWSN) consist of a certain number of sensors that interact to send the sensed data to the sink node and perform collaborative task. Most UWSN choose acoustic as a communication medium for wireless transmission. However, electromagnetic waves are also offer a great merit in special underwater environment such as shallow water. UWSN is significantly different from terrestrial sensor networks in many aspects such as mobility of sensor nodes due to water current, propagation delay and propagation loss. These distinctions feature of underwater sensor network pose many new challenges for delivering information from sensor nodes to sink node effectively in UWSN. To achieve reliable data transfer in underwater sensor network scenarios, a new event MAC protocol need to be developed to provide energy efficient and reliable upstream data transfer.
{"title":"A Survey of Existing Medium Access Control (MAC) for Underwater Wireless Sensor Network (UWSN)","authors":"F. Yunus, S. Ariffin, Y. Zahedi","doi":"10.1109/AMS.2010.110","DOIUrl":"https://doi.org/10.1109/AMS.2010.110","url":null,"abstract":"Underwater wireless sensor networks (UWSN) consist of a certain number of sensors that interact to send the sensed data to the sink node and perform collaborative task. Most UWSN choose acoustic as a communication medium for wireless transmission. However, electromagnetic waves are also offer a great merit in special underwater environment such as shallow water. UWSN is significantly different from terrestrial sensor networks in many aspects such as mobility of sensor nodes due to water current, propagation delay and propagation loss. These distinctions feature of underwater sensor network pose many new challenges for delivering information from sensor nodes to sink node effectively in UWSN. To achieve reliable data transfer in underwater sensor network scenarios, a new event MAC protocol need to be developed to provide energy efficient and reliable upstream data transfer.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127008604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Location Routing Problem (LRP) is combination of Facility location Problem and Vehicle Routing Problem. The classic LRP considers a discrete number of locations as possible candidates for facilities locations. However, the continuous location routing problem (CLRP) as an extension to the classic LRP allows any location for the facilities and thus the solution space is continuous. There is a very scarce literature available for CLRP. In this paper, the CLRP with pickup and delivery is first formulated and to solve the problem, a Variable Neighborhood Search algorithm is used considering different neighborhoods and acceptation levels. Problems from small to large size can be solved and the experimentation results are promising.
{"title":"A Variable Neighborhood Search Algorithm for Continuous Location Routing Problem with Pickup and Delivery","authors":"R. Ghodsi, A. S. Amiri","doi":"10.1109/AMS.2010.131","DOIUrl":"https://doi.org/10.1109/AMS.2010.131","url":null,"abstract":"Location Routing Problem (LRP) is combination of Facility location Problem and Vehicle Routing Problem. The classic LRP considers a discrete number of locations as possible candidates for facilities locations. However, the continuous location routing problem (CLRP) as an extension to the classic LRP allows any location for the facilities and thus the solution space is continuous. There is a very scarce literature available for CLRP. In this paper, the CLRP with pickup and delivery is first formulated and to solve the problem, a Variable Neighborhood Search algorithm is used considering different neighborhoods and acceptation levels. Problems from small to large size can be solved and the experimentation results are promising.","PeriodicalId":437153,"journal":{"name":"2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131945324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}