Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Cold chain electric vehicle routing problem based on hybrid ant colony optimization
Zhishuo LIU, Ruosi LIU, Zhe CHEN
Journal of Computer Applications    2022, 42 (10): 3244-3251.   DOI: 10.11772/j.issn.1001-9081.2021091572
Abstract289)   HTML11)    PDF (1652KB)(111)       Save

The trend of green logistics pushes the use of electric vehicles into cold chain logistics. Concerning the problem that maintaining a low temperature environment requires a lot of energy in electric vehicle cold chain distribution, as well as the phenomena that the limited driving range and long charging time of electric vehicles make high operation cost, the Refrigerated Electric Vehicle Routing Problem (REVRP) in electric vehicle distribution was thought deeply. Considering the characteristics of electric vehicle energy consumption and the charging requirements of social recharging stations, a linear programming model was developed with the objective of minizing total distribution cost, and the objective function was composed of fixed cost and variable cost, in the variable cost, transportation cost and cooling cost were included. The capacity constraints and power constraints were considered in the model, and a Hybrid Ant Colony Optimization (HACO) algorithm was designed to solve this model. Especially, more attention was paid to designing transfer rules suitable for social recharging stations and four local optimization operators. Based on improving the Solomon benchmark examples, the small-scale and large-scale example sets were formed, and the performance of ACO algorithm and the optimization operators were through experiments. The experiment results show that ACO algorithm and CPLEX (WebSphere ILOG CPLEX) solver can find the exact solution in the small-scale example set, and ACO algorithm can save the operation time by 99.6% . In the large-scale example set, compared with ACO algorithm, HACO algorithm combing the four optimization operators has the average optimization efficiency increased by 4.45%. The proposed algorithm can obtain a feasible solution for REVRP in a limited time.

Table and Figures | Reference | Related Articles | Metrics
Hybrid recommendation algorithm based on rating filling and trust information
SHEN Xueli, LI Zijian, HE Chenhao
Journal of Computer Applications    2020, 40 (10): 2789-2794.   DOI: 10.11772/j.issn.1001-9081.2020020267
Abstract474)      PDF (904KB)(837)       Save
Aiming at the problem of poor recommendation effect caused by the data sparsity of the recommendation system, a hybrid recommendation algorithm based on rating filling and trust information was proposed namely RTWSO (Real-value user item restricted Boltzmann machine Trust Weighted Slope One). Firstly, the improved restricted Boltzmann machine model was used to fill the rating matrix, so as to alleviate the sparseness problem of the rating matrix. Secondly, the trust and trusted relationships were extracted from the trust relationship, and the matrix decomposition based implicit trust relationship similarity was also used to solve the problem of trust relationship sparsity. The modification including trust information was performed to the original algorithm, improving the recommendation accuracy. Finally, the Weighted Slope One (WSO) algorithm was used to integrate the matrix filling and trust similarity information as well as predict the rating data. The performance of the proposed hybrid recommendation algorithm was verified on Epinions and Ciao datasets. It can be seen that the proposed hybrid recommendation algorithm has the recommendation accuracy improved by more than 3% compared with the composition algorithm, and recommendation accuracy increased by more than 1.2% compared with the existing social recommendation algorithm SocialIT (Social recommendation algorithm based on Implict similarity in Trust). Experimental results show that the proposed hybrid recommendation method based on rating filling and trust information, improves the recommended accuracy to a certain extent.
Reference | Related Articles | Metrics
Mesh slicer: novel algorithm for 3D mesh compression
HE Chen, WANG Lei, WANG Chunmeng
Journal of Computer Applications    2016, 36 (2): 546-550.   DOI: 10.11772/j.issn.1001-9081.2016.02.0546
Abstract792)      PDF (818KB)(778)       Save
To solve the storage and network transmission problem of the three-Dimensional (3D) mesh model, a new 3D model compression algorithm was proposed. Based on the slicing for 3D mesh, the proposed algorithm was composed of the following three steps: slice vertex calculation, slice boundary sampling and encoding for the image obtained by slicing. For a given 3D mesh model, the bounding box of the model was firstly calculated; then the model was sliced along the longest direction of the bounding box. In the procedure of slicing, the intersection point of the slice with the edge of the mesh was calculated, and as a result, all the intersection points in the same slice constituted a polygon. Then the boundary of the polygon was uniformly resampled so that each layer of the slice had the same number of vertices. After resampling of the polygon boundary, the coordinates of vertices in each slice were converted into the polar form. In this way, all ρ-coordinates and θ-coordinates of the vertices in each slice could constitute one image respectively, and the original 3D model could be represented by these two images. The new representation method has two obvious advantages: first, the dimension of the data is reduced, thus the amount of the data is effectively reduced; second, the data in these two images have great data correlation, and as a result, the entropy of the data is further reduced. Based on these two advantages, the proposed algorithm compressed these two images by difference coding technique and arithmetic coding technique, and then the compressed files were obtained. Compared with Incremental Parametric Refinement (IPR) method, the coding efficiency of the proposed algorithm was increased by 23% under the same quality of the decoded model. The experimental results show that the proposed algorithm can obtain good compression efficiency, and effectively reduce the data amount in the application of 3D model storage and transmission.
Reference | Related Articles | Metrics
Modified K-means clustering algorithm based on good point set and Leader method
ZHANG Yan-ping ZHANG Juan HE Cheng-gang CHU Wei-cui ZHANG Li-na
Journal of Computer Applications    2011, 31 (05): 1359-1362.   DOI: 10.3724/SP.J.1087.2011.01359
Abstract1352)      PDF (743KB)(916)       Save
Traditional K-means algorithm is sensitive to the initial start center. To solve this problem, a method was proposed to optimize the initial center points through adopting the theory of good point set and Leader method. According to the different combination ways, the new algorithms were called KLG and KGL respectively. Better points could be obtained by the theory of good point set rather than random selection. The Leader method could reflect the distribution characteristics of the data object. The experimental results conducted on the UCI database show that the KLG and KGL algorithms significantly outperform the traditional and other initialization K-means algorithms.
Related Articles | Metrics
Probabilistic routing algorithm based on contact duration in DTN
WANG Gui-zhu HE Cheng WANG Bing-ting
Journal of Computer Applications    2011, 31 (05): 1170-1172.   DOI: 10.3724/SP.J.1087.2011.01170
Abstract1261)      PDF (622KB)(979)       Save
Considering that contact duration has significant influence on whether packet can be transmitted successfully or not, the authors proposed a Probabilistic Routing Protocol using History of Encounters and Transitivity based on Contact Duration (PRoPHET-CD), which combined contact duration with encounter frequency to estimate delivery probability. This protocol could improve the delivery probability significantly and reduce the interruption of packet transmission. The simulation results show that the protocol of PRoPHET-CD can significantly enhance the message delivery probability and reduce the overhead ratio.
Related Articles | Metrics
Improved Pre-distribution key management scheme for WSN
Hang-zhe CHEN Xiao-ming WANG
Journal of Computer Applications    2009, 29 (11): 2980-2982.  
Abstract1788)      PDF (652KB)(1166)       Save
Wireless Sensor Network (WSN) was usually vulnerable to conspiracy attack from its adversaries when using bivariate polynomial key pre-distribution protocol. In order to solve this problem, a pre-distribution key management scheme for WSN was improved by reducing the amount of pairwise keys sharing between sensor nodes and changing the means of establishing pairwise keys between clusters. Analysis shows that the improved scheme not only maintains the advantages such as higher security of the original scheme, but also saves the limited memory storage of sensor nodes further, reduces the communication overhead of sensor nodes, extends the lifespan of the networks and can withstand conspiracy attack effectively.
Related Articles | Metrics