Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Knapsack problems—An overview of recent advances. Part II: Multiple, multidimensional, and quadratic knapsack problems
After the seminal books by Martello and Toth (1990) and Kellerer, Pferschy, and Pisinger
(2004), knapsack problems became a classical and rich research area in combinatorial …
(2004), knapsack problems became a classical and rich research area in combinatorial …
Literature reviews in operations research: A new taxonomy and a meta review
G Schryen, M Sperling - Computers & Operations Research, 2023 - Elsevier
Literature reviews represent a key genre for preserving and develo** knowledge in many
scientific fields, including the operations research (OR) discipline. Although the body of OR …
scientific fields, including the operations research (OR) discipline. Although the body of OR …
An improved version of the augmented ε-constraint method (AUGMECON2) for finding the exact pareto set in multi-objective integer programming problems
Generation (or a posteriori) methods in Multi-Objective Mathematical Programming (MOMP)
is the most computationally demanding category among the MOMP approaches. Due to the …
is the most computationally demanding category among the MOMP approaches. Due to the …
A random forest-assisted evolutionary algorithm for data-driven constrained multiobjective combinatorial optimization of trauma systems
Many real-world optimization problems can be solved by using the data-driven approach
only, simply because no analytic objective functions are available for evaluating candidate …
only, simply because no analytic objective functions are available for evaluating candidate …
Energy efficient integration of renewable energy sources in the smart grid for demand side management
With the emergence of smart grid (SG), the consumers have the opportunity to integrate
renewable energy sources (RESs) and take part in demand side management. In this paper …
renewable energy sources (RESs) and take part in demand side management. In this paper …
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection
Internet of Vehicles and vehicular networks have been compelling targets for malicious
security attacks where several intrusion detection solutions have been proposed for …
security attacks where several intrusion detection solutions have been proposed for …
A criterion space search algorithm for biobjective integer programming: The balanced box method
We present a new criterion space search algorithm, the balanced box method, for finding all
nondominated points of a biobjective integer program. The method extends the box …
nondominated points of a biobjective integer program. The method extends the box …
A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading
While the usage of smart devices is increasing, security attacks and malware affecting such
terminals are briskly evolving as well. Mobile security suites exist to defend devices against …
terminals are briskly evolving as well. Mobile security suites exist to defend devices against …
A binary grey wolf optimizer for the multidimensional knapsack problem
K Luo, Q Zhao - Applied Soft Computing, 2019 - Elsevier
Abstract Grey Wolf Optimizer (GWO) is a new meta-heuristic that mimics the leadership
hierarchy and group hunting mechanism of grey wolves in nature. A binary version is …
hierarchy and group hunting mechanism of grey wolves in nature. A binary version is …
Multi-objective variable neighborhood search: an application to combinatorial optimization problems
Solutions to real-life optimization problems usually have to be evaluated considering
multiple conflicting objectives. These kind of problems, known as multi-objective …
multiple conflicting objectives. These kind of problems, known as multi-objective …