Guided vehicles (GVs) are commonly used for the internal transportation of loads in warehouses, production plants and terminals. These guided vehicles can be routed with a variety of vehicle dispatching rules in an attempt to meet performance criteria such as minimizing the average load waiting times. In this research, we use simulation models of three companies to evaluate the performance of several real-time vehicle dispatching rules, in part described in the literature. It appears that there
is a clear difference in average load waiting time between the different dispatching rules in the different environments. Simple rules, based on load and vehicle proximity (distance-based) perform best for all cases. The penalty for this is a relatively high maximum load waiting time. A distance-based rule with time truncation, giving more priority to loads that have to wait longer than a time threshold, appears to yield the best possible overall performance. A rule that particularly considers load-waiting time performs poor overall. We also show that using little pre-arrival information of loads leads to a significant improvement in the performance of the dispatching rules without changing their performance ranking.
標簽:
Testing and classifying vehicle dispatching rules in three real-world settings
上傳時間:
2016-04-01
上傳用戶:五塊錢的油條
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
標簽:
Fundamental
Limits
Secure
Class
on
of
上傳時間:
2020-01-04
上傳用戶:kddlas
配電網中,各種配電終端的電流、電壓、有功功率及無功功率等模擬量的采集是配電網自動化的重要環節。這些模擬量的采集也是各種儀器和家用電器的必要功能。因此,設計了基于嵌入式STM32F103單片機的交流電壓、交流電流及有功功率的采集系統,通過電壓互感器TV1005M和電流互感器TA1005M分別檢測交流電壓和交流電流值;屏幕或者手機APP和WiFi模塊互聯后,可以實時顯示交流電壓、交流電流、功率及電量值;通過設定閾值功率,可以實現對電流的監控和對電路的保護。In the distribution network,the collection of analog,such as current,voltage,active power,and reactive power at various distribution terminals is a very important part of distribution network automation. These analog acquisitions are also for various instruments and household appliances. Very important technology. Therefore,an AC voltage,AC current and active power acquisition system based on embedded STM32 F103 machine is designed,and AC voltage and AC current values are detected by voltage transformer TV1005 M and current Transformer TA1005 M respectively;After the screen or mobile phone APP and WiFi modules are interconnected,AC voltage,AC current,power,and power values can be displayed in real time;By setting the threshold power,the current can be monitored and the circuit can be protected.
標簽:
stm32f103
單片機
電流電壓采集
上傳時間:
2022-03-27
上傳用戶:shjgzh