نتایج جستجو برای: order batching
تعداد نتایج: 908693 فیلتر نتایج به سال:
Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems. The protocol based on action an ideal class group set supersingular elliptic curves and comes with some very attractive features, e.g. ability serve as “drop-in” replacement standard curve protocol. Unfortun...
The order batching problem (OBP) is the problem of determining the number of orders to be picked together in one picking tour. Although various objectives may arise in practice, minimizing the average throughput time of a random order is a common concern. In this paper, we consider the OBP for a 2-block rectangular warehouse with the assumptions that orders arrive according to a Poisson process...
In this article, we describe the algorithm and study the performance of a Hessian free optimization technique applied to machine learning problems. We implement the commonly used black box model for optimization and solve a particular challenging recursive neural network learning problem, which exhibits a non-convex and non-di erentiable function output. In order to adapt the method to machine ...
Assisted reproductive technology (ART) in small island states like Trinidad and Tobago is usually provided in batches so as to minimize the cost of providing the service. As a result, patients 'cycles have to be synchronized in order to coincide with the arrival of a visiting embryologist. This is a retrospective study which evaluates the experience of pre-treatment with an oral contraceptive p...
Companies have been trying continuously to reduce their logistics costs in the current competitive markets. Warehouses are important components of systems and they must be managed effectively efficiently production cost as well maintain customer satisfaction. Order-picking is core warehouse operations an order-picking system (OPS) essential meet needs orders. Failure perform OPS process properl...
Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. We address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks. Intermediaries delay and reroute exchanged messages, reorder them, pad t...
Secure socket layer (SSL) is the most popular protocol to secure Internet communications. Since SSL handshake requires a large amount of computational resource, batch RSA was proposed to speedup SSL session initialization. However, the batch method is impractical since it requires a multiple of certificates. In this paper, we overcome this problem without modifying SSL protocol. To select the o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید