Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by LIAAD

2006

A hybrid genetic algorithm for the early/tardy scheduling problem

Authors
Valente, JMS; Goncalves, JF; Alves, RAFS;

Publication
ASIA-PACIFIC JOURNAL OF OPERATIONAL RESEARCH

Abstract
In this paper, we present a hybrid genetic algorithm for a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome representation of the problem is based on random keys. The genetic algorithm is used to establish the order in which the jobs are initially scheduled, and a local search procedure is subsequently applied to detect possible improvements. The approach is tested on a set of randomly generated problems and compared with existing efficient heuristic procedures based on dispatch rules and local search. The computational results show that this new approach, although requiring slightly longer computational times, is better than the previous algorithms in terms of solution quality.

2006

Local and global dominance conditions for the weighted earliness scheduling problem with no idle time

Authors
Valente, JMS;

Publication
COMPUTERS & INDUSTRIAL ENGINEERING

Abstract
In this paper, we present dominance conditions for the single machine weighted earliness scheduling problem with no idle time. We also propose an algorithm that can be used to improve upper bounds for the weighted earliness criterion and lower bounds for an earliness/tardiness problem. The computational tests show that the algorithm is superior to an initial heuristic schedule and an existing adjacency condition.

2006

An analysis of the importance of appropriate tie breaking rules in dispatch heuristics

Authors
Valente, JMS;

Publication
Pesquisa Operacional

Abstract
In this paper, we analyse the effect of using appropriate tie breaking criteria in dispatch rules. We consider four different dispatch procedures, and for each of these heuristics we compare two versions that differ only in the way ties are broken. The first version breaks ties randomly, while the second uses a criterion that incorporates problem-specific knowledge. The computational results show that using adequate tie breaking criteria improves the performance of the dispatch heuristics. The magnitude of the improvement is different for the four heuristics, and also depends on the characteristics of each specific instance. The use of problem-related knowledge for breaking ties should therefore be given some consideration in the implementation of dispatch rules.

2006

A new insight to the matrices extraction in a MOESP type subspace identification algorithm

Authors
Delgado, CJM; Dos Santos, PL; De Carvalho, JLM;

Publication
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE

Abstract
In this paper we analyse the estimates of the matrices produced by the non-biased deterministic-stochastic subspace identification algorithms (NBDSSI) proposed by Van Overschee and De Moor ( 1996). First, an alternate expression is derived for the A and C estimates. It is shown that the Chiuso and Picci result ( Chiuso and Picci 2004) stating that the A and C estimates delivered by this algorithm robust version and by the Verhaegen's MOESP (Verhaegen and Dewilde 1992a, Verhaegen and Dewilde 1992b, Verhaegen 1993, Verhaegen 1994) are equal, can be obtained from this expression. An alternative approach for the estimation of matrices B and D in subspace identification is also described. It is shown that the least squares approach for the estimation of these matrices estimation can be just expressed as an orthogonal projection of the future outputs on a lower dimension subspace in the orthogonal complement of the column space of the extended observability matrix. Since this subspace has a dimension equal to the number of outputs, a simpler and numerically more efficient ( but equally accurate) new subspace algorithm is provided.

2006

A dynamic model for a settler unit using a kinetic formulation

Authors
Gomes, EF; Guimaraes, MML; Pinto, GA; Ribeiro, LM;

Publication
Proceedings of the 5th International Conference on Engineering Computational Technology

Abstract
Design and control of mixer-settler batteries is very important for the technical and economical viability of the industrial processes of liquid-liquid extraction. Direct experimentation with these equipments is not always feasible, due to their complexity and cost. Computer simulation allows predicting the behaviour and optimizing the design of this type of equipments thus reducing costs. In previous works, we have already proposed a model to simulate the behaviour of a dispersion band in a gravitational settler unit of a mixer-settler system. Although the algorithm developed was able to simulate the band thickness for the transient state and the results obtained were in agreement with previously published results, some possible physical as well as conceptual limitations of this algorithm were detected. To overcome these problems, a new dynamic model using a kinetic formulation was proposed. This paper describes a new model for the shallow-layer settler unit which is able to describe the transient state of a liquid-liquid system, the hydrodynamic phenomena of drop-drop and drop-interface coalescence as well as the transport processes being explicitly taken into account. © 2006 Civil-Comp Press.

2006

Establishing fraud detection patterns based on signatures

Authors
Ferreira, P; Alves, R; Belo, O; Cortesao, L;

Publication
ADVANCES IN DATA MINING: APPLICATIONS IN MEDICINE, WEB MINING, MARKETING, IMAGE AND SIGNAL MINING

Abstract
All over the world we have been assisting to a significant increase of the telecommunication systems usage. People are faced day after day with strong marketing campaigns seeking their attention to new telecommunication products and services. Telecommunication companies struggle in a high competitive business arena. It seems that their efforts were well done, because customers are strongly adopting the new trends and use (and abuse) systematically communication services in their quotidian. Although fraud situations are rare, they are increasing and they correspond to a large amount of money that telecommunication companies lose every year. In this work, we studied the problem of fraud detection in telecommunication systems, especially the cases of superimposed fraud, providing an anomaly detection technique, supported by a signature schema. Our main goal is to detect deviate behaviors in useful time, giving better basis to fraud analysts to be more accurate in their decisions in the establishment of potential fraud situations.

  • 478
  • 514