LEADER 06574nam 2200517 450 001 996495171003316 005 20231110223406.0 010 $a981-19-5916-1 035 $a(MiAaPQ)EBC7105512 035 $a(Au-PeEL)EBL7105512 035 $a(CKB)24978818100041 035 $a(PPN)26585993X 035 $a(EXLCZ)9924978818100041 100 $a20230304d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntelligent algorithms for packing and cutting problem /$fYunqing Rao, Qiang Luo 210 1$aGateway East, Singapore :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (338 pages) 225 0 $aEngineering applications of computational methods 311 08$aPrint version: Rao, Yunqing Intelligent Algorithms for Packing and Cutting Problem Singapore : Springer,c2022 9789811959158 320 $aIncludes bibliographical references. 327 $aIntro -- Preface -- Contents -- 1 Introduction to the Packing and Cutting Problem -- 1.1 Problem Definition -- 1.1.1 Packing Problem -- 1.1.2 Cutting Problem -- 1.2 Literature Review -- 1.2.1 Review for 2DRSP -- 1.2.2 Review for 2DISP -- 1.2.3 Review for CSP -- 1.3 Development Trends -- References -- 2 Intelligent Algorithms for Rectangular Packing Problem -- 2.1 Problem Description -- 2.2 Memetic Algorithm for the Problem -- 2.2.1 Introduction -- 2.2.2 The Placement Strategy -- 2.2.3 The Memetic Algorithm -- 2.2.4 Implementation of Memetic Algorithm -- 2.2.5 Experimental Results -- 2.3 Discrete Grey Wolf Optimization -- 2.3.1 Introduction -- 2.3.2 Improved Best-Fit Heuristic Algorithm -- 2.3.3 Discrete Grey Wolf Optimization -- 2.3.4 Experimentation and Results -- 2.4 Conclusions -- References -- 3 Intelligent Algorithms for Irregular Packing Problem -- 3.1 Problem Description -- 3.2 The Geometrical Technique -- 3.3 Memetic Algorithm for the Problem -- 3.3.1 Introduction -- 3.3.2 The Memetic Algorithm -- 3.3.3 The Realization of the Adaptive Memetic Algorithm -- 3.3.4 Experimental Study and Discussions -- 3.4 Beam Search Hybridized with Tabu Search for the Problem -- 3.4.1 Introduction -- 3.4.2 Placement Principle Based on Improved NFP -- 3.4.3 The Hybrid Algorithm for Searching Sequence -- 3.4.4 Experimental Results and Discussions -- 3.5 Biased Genetic Algorithm Hybridized with VNS for the Problem -- 3.5.1 Introduction -- 3.5.2 Placement Method -- 3.5.3 Biased Genetic Algorithm Hybridized with VNS -- 3.5.4 Experimental Results and Discussions -- 3.6 Conclusions -- Appendix -- References -- 4 Novel Algorithms for 2DRSP and 2DISP -- 4.1 Reinforcement Learning Algorithm for 2DRPP -- 4.1.1 Introduction and Problem Description -- 4.1.2 Lowest Centroid Placement Method -- 4.1.3 Sequence Optimization Based on Q-learning. 327 $a4.1.4 Computational Packing Experiments -- 4.2 Reinforcement Learning Algorithm for 2DIPP -- 4.2.1 Introduction -- 4.2.2 Description of Packing Problem -- 4.2.3 Positioning Strategy Based on BL -- 4.2.4 Sequence Optimization Strategy -- 4.2.5 Computational Experiment -- 4.3 Sequential Transfer-Based PSO for 2DIPP -- 4.3.1 Introduction -- 4.3.2 Novel Positioning Strategy Based on NFP -- 4.3.3 Description of Sequence Transfer -- 4.3.4 Computational Experiments -- References -- 5 Solutions for New Variants of Packing Problem -- 5.1 Knapsack Packing Problem with Defects -- 5.1.1 Introduction and Literature Review -- 5.1.2 Problem Description -- 5.1.3 The Approach for the Problem -- 5.1.4 Numerical Experiments and Conclusions -- 5.2 Irregular Packing Problem with Defects -- 5.2.1 Introduction and Problem Description -- 5.2.2 Literature Review -- 5.2.3 Genetic Algorithm and Grey Wolf Optimization -- 5.2.4 Heuristic Placement Algorithm -- 5.2.5 Computational Results and Conclusions -- 5.3 Rectangular Packing Problem with Divisible Items -- 5.3.1 Introduction and Problem Description -- 5.3.2 Related Work -- 5.3.3 The Heuristic Placement Method -- 5.3.4 Integration with Metaheuristic -- 5.3.5 Numerical Experiments and Conclusions -- Appendix -- References -- 6 Integration of Packing and Cutting -- 6.1 An Integrated Approach on Packing and Cut Planning -- 6.1.1 Introduction -- 6.1.2 The Three-Stage Solution -- 6.1.3 Mathematical Modeling -- 6.1.4 The Solving Approach -- 6.1.5 Computational Experiments and Discussion -- 6.2 An Integrated System for Packing and Cutting-Punching -- 6.2.1 Introduction -- 6.2.2 The Overall Structure -- 6.2.3 The Data Structure of IKBS -- 6.2.4 The Knowledge Base of IKBS -- 6.2.5 Case Study and Discussion -- 6.3 An Integrated System for Packing and Sheet Metal Cutting -- 6.3.1 Introduction -- 6.3.2 The System Overall Structure. 327 $a6.3.3 Nest Planning -- 6.3.4 CAD/CAPP/CAM -- 6.3.5 Case Study -- References -- 7 Intelligent Algorithms for Cutting Scheduling Problem -- 7.1 Problem Description -- 7.2 Improved Hierarchical Genetic Algorithm for the CSP -- 7.2.1 Introduction -- 7.2.2 Problem Statement and Mathematical Modeling -- 7.2.3 Ant Colony-Hierarchical Genetic Algorithm -- 7.2.4 Computational Experiments -- 7.2.5 Conclusions -- 7.3 Hybrid Genetic Algorithm for the Bi-Objective CSP -- 7.3.1 Introduction -- 7.3.2 Problem Description and Formulation -- 7.3.3 VNSGA III Based on Reference Points -- 7.3.4 Evaluation Metric -- 7.3.5 Experimental Design and Results -- 7.4 GWO Algorithm for the Bi-Objective CSP -- 7.4.1 Introduction -- 7.4.2 Problem Description and Formulation -- 7.4.3 Reference-Point-Based GWO Algorithm -- 7.4.4 Experimental Design and Results -- References -- 8 Application on Laser Cutting of Metal Sheets -- 8.1 Introduction to LaserCAM Software -- 8.1.1 Graphics Module -- 8.1.2 Packing Module -- 8.1.3 Laser Cutting Module -- 8.1.4 NC and Report Module -- 8.2 Case 1: Rectangular Packing and Cutting -- 8.3 Case 2: Irregular Packing and Cutting. 410 0$aEngineering Applications of Computational Methods 606 $aCutting stock problem 606 $aCybernetics 606 $aCibernètica$2thub 608 $aLlibres electrònics$2thub 615 0$aCutting stock problem. 615 0$aCybernetics. 615 7$aCibernètica 676 $a511.64 700 $aRao$b Yunqing$01261568 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996495171003316 996 $aIntelligent algorithms for packing and cutting problem$93041724 997 $aUNISA LEADER 04032oam 2200637 450 001 9910154926003321 005 20190911103516.0 010 $a9781522519393$belectronic 010 $z9781522519386$bprint 024 7 $a10.4018/978-1-5225-1938-6 035 $a(OCoLC)966368145 035 $a(MiFhGG)GVRL7ZKU 035 $a(EXLCZ)994340000000018260 100 $a20161025h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aThreat mitigation and detection of cyber warfare and terrorism activities /$fMaximiliano E. Korstanje, University of Palermo, Argentina, [editor] 210 1$aHershey, Pennsylvania :$cInformation Science Reference, and imprint of IGI Global,$d[2017] 210 4$d?2017 215 $a1 online resource (xx, 314 pages) $cillustrations (some color), maps 225 1 $aAdvances in Library and Information Science (ALIS) Book Series 311 $a1-5225-1938-6 320 $aIncludes bibliographical references and index. 327 $aA simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje. 330 3 $a"This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests"--Provided by publisher. 410 0$aAdvances in information security, privacy, and ethics (AISPE) book series. 410 0$aPremier reference source. 606 $aInformation warfare$xPrevention 606 $aCyberspace$xSecurity measures 606 $aCyberterrorism$xPrevention 606 $aComputer crimes$xPrevention 606 $aInternet$xPolitical aspects 610 $aBig data analysis 610 $aDigital protests 610 $aE-participation 610 $aOnline blogging 610 $aOnline political behavior 610 $aParameter tampering 610 $aSurveillance and control 615 0$aInformation warfare$xPrevention. 615 0$aCyberspace$xSecurity measures. 615 0$aCyberterrorism$xPrevention. 615 0$aComputer crimes$xPrevention. 615 0$aInternet$xPolitical aspects. 676 $a363.325 700 $aKorstanje$b Maximiliano E.$0865627 702 $aKorstanje$b Maximiliano 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910154926003321 996 $aThreat mitigation and detection of cyber warfare and terrorism activities$92890774 997 $aUNINA