2006
Authors
Valente, JMS; Goncalves, JF; Alves, RAFS;
Publication
ASIA-PACIFIC JOURNAL OF OPERATIONAL RESEARCH
Abstract
In this paper, we present a hybrid genetic algorithm for a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome representation of the problem is based on random keys. The genetic algorithm is used to establish the order in which the jobs are initially scheduled, and a local search procedure is subsequently applied to detect possible improvements. The approach is tested on a set of randomly generated problems and compared with existing efficient heuristic procedures based on dispatch rules and local search. The computational results show that this new approach, although requiring slightly longer computational times, is better than the previous algorithms in terms of solution quality.
2006
Authors
Valente, JMS;
Publication
COMPUTERS & INDUSTRIAL ENGINEERING
Abstract
In this paper, we present dominance conditions for the single machine weighted earliness scheduling problem with no idle time. We also propose an algorithm that can be used to improve upper bounds for the weighted earliness criterion and lower bounds for an earliness/tardiness problem. The computational tests show that the algorithm is superior to an initial heuristic schedule and an existing adjacency condition.
2006
Authors
Valente, JMS;
Publication
Pesquisa Operacional
Abstract
In this paper, we analyse the effect of using appropriate tie breaking criteria in dispatch rules. We consider four different dispatch procedures, and for each of these heuristics we compare two versions that differ only in the way ties are broken. The first version breaks ties randomly, while the second uses a criterion that incorporates problem-specific knowledge. The computational results show that using adequate tie breaking criteria improves the performance of the dispatch heuristics. The magnitude of the improvement is different for the four heuristics, and also depends on the characteristics of each specific instance. The use of problem-related knowledge for breaking ties should therefore be given some consideration in the implementation of dispatch rules.
2006
Authors
Delgado, CJM; Dos Santos, PL; De Carvalho, JLM;
Publication
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE
Abstract
In this paper we analyse the estimates of the matrices produced by the non-biased deterministic-stochastic subspace identification algorithms (NBDSSI) proposed by Van Overschee and De Moor ( 1996). First, an alternate expression is derived for the A and C estimates. It is shown that the Chiuso and Picci result ( Chiuso and Picci 2004) stating that the A and C estimates delivered by this algorithm robust version and by the Verhaegen's MOESP (Verhaegen and Dewilde 1992a, Verhaegen and Dewilde 1992b, Verhaegen 1993, Verhaegen 1994) are equal, can be obtained from this expression. An alternative approach for the estimation of matrices B and D in subspace identification is also described. It is shown that the least squares approach for the estimation of these matrices estimation can be just expressed as an orthogonal projection of the future outputs on a lower dimension subspace in the orthogonal complement of the column space of the extended observability matrix. Since this subspace has a dimension equal to the number of outputs, a simpler and numerically more efficient ( but equally accurate) new subspace algorithm is provided.
2006
Authors
Gomes, EF; Guimaraes, MML; Pinto, GA; Ribeiro, LM;
Publication
Proceedings of the 5th International Conference on Engineering Computational Technology
Abstract
Design and control of mixer-settler batteries is very important for the technical and economical viability of the industrial processes of liquid-liquid extraction. Direct experimentation with these equipments is not always feasible, due to their complexity and cost. Computer simulation allows predicting the behaviour and optimizing the design of this type of equipments thus reducing costs. In previous works, we have already proposed a model to simulate the behaviour of a dispersion band in a gravitational settler unit of a mixer-settler system. Although the algorithm developed was able to simulate the band thickness for the transient state and the results obtained were in agreement with previously published results, some possible physical as well as conceptual limitations of this algorithm were detected. To overcome these problems, a new dynamic model using a kinetic formulation was proposed. This paper describes a new model for the shallow-layer settler unit which is able to describe the transient state of a liquid-liquid system, the hydrodynamic phenomena of drop-drop and drop-interface coalescence as well as the transport processes being explicitly taken into account. © 2006 Civil-Comp Press.
2006
Authors
Ferreira, P; Alves, R; Belo, O; Cortesao, L;
Publication
ADVANCES IN DATA MINING: APPLICATIONS IN MEDICINE, WEB MINING, MARKETING, IMAGE AND SIGNAL MINING
Abstract
All over the world we have been assisting to a significant increase of the telecommunication systems usage. People are faced day after day with strong marketing campaigns seeking their attention to new telecommunication products and services. Telecommunication companies struggle in a high competitive business arena. It seems that their efforts were well done, because customers are strongly adopting the new trends and use (and abuse) systematically communication services in their quotidian. Although fraud situations are rare, they are increasing and they correspond to a large amount of money that telecommunication companies lose every year. In this work, we studied the problem of fraud detection in telecommunication systems, especially the cases of superimposed fraud, providing an anomaly detection technique, supported by a signature schema. Our main goal is to detect deviate behaviors in useful time, giving better basis to fraud analysts to be more accurate in their decisions in the establishment of potential fraud situations.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.