Knapsack problems—An overview of recent advances. Part II: Multiple, multidimensional, and quadratic knapsack problems

V Cacchiani, M Iori, A Locatelli, S Martello - Computers & Operations …, 2022 - Elsevier
After the seminal books by Martello and Toth (1990) and Kellerer, Pferschy, and Pisinger
(2004), knapsack problems became a classical and rich research area in combinatorial …

Literature reviews in operations research: A new taxonomy and a meta review

G Schryen, M Sperling - Computers & Operations Research, 2023 - Elsevier
Literature reviews represent a key genre for preserving and develo** knowledge in many
scientific fields, including the operations research (OR) discipline. Although the body of OR …

An improved version of the augmented ε-constraint method (AUGMECON2) for finding the exact pareto set in multi-objective integer programming problems

G Mavrotas, K Florios - Applied mathematics and computation, 2013 - Elsevier
Generation (or a posteriori) methods in Multi-Objective Mathematical Programming (MOMP)
is the most computationally demanding category among the MOMP approaches. Due to the …

A random forest-assisted evolutionary algorithm for data-driven constrained multiobjective combinatorial optimization of trauma systems

H Wang, Y ** - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
Many real-world optimization problems can be solved by using the data-driven approach
only, simply because no analytic objective functions are available for evaluating candidate …

Energy efficient integration of renewable energy sources in the smart grid for demand side management

N Javaid, G Hafeez, S Iqbal, N Alrajeh, MS Alabed… - ieee …, 2018 - ieeexplore.ieee.org
With the emergence of smart grid (SG), the consumers have the opportunity to integrate
renewable energy sources (RESs) and take part in demand side management. In this paper …

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

A Mourad, H Tout, OA Wahab, H Otrok… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Vehicles and vehicular networks have been compelling targets for malicious
security attacks where several intrusion detection solutions have been proposed for …

A criterion space search algorithm for biobjective integer programming: The balanced box method

N Boland, H Charkhgard… - INFORMS Journal on …, 2015 - pubsonline.informs.org
We present a new criterion space search algorithm, the balanced box method, for finding all
nondominated points of a biobjective integer program. The method extends the box …

A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading

T Dbouk, A Mourad, H Otrok, H Tout… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
While the usage of smart devices is increasing, security attacks and malware affecting such
terminals are briskly evolving as well. Mobile security suites exist to defend devices against …

A binary grey wolf optimizer for the multidimensional knapsack problem

K Luo, Q Zhao - Applied Soft Computing, 2019 - Elsevier
Abstract Grey Wolf Optimizer (GWO) is a new meta-heuristic that mimics the leadership
hierarchy and group hunting mechanism of grey wolves in nature. A binary version is …

Multi-objective variable neighborhood search: an application to combinatorial optimization problems

A Duarte, JJ Pantrigo, EG Pardo… - Journal of Global …, 2015 - Springer
Solutions to real-life optimization problems usually have to be evaluated considering
multiple conflicting objectives. These kind of problems, known as multi-objective …