2018
DOI: 10.1186/s10033-018-0311-9
|View full text |Cite
|
Sign up to set email alerts
|

Improved Ant Colony-Genetic Algorithm for Information Transmission Path Optimization in Remanufacturing Service System

Abstract: The information transmission path optimization (ITPO) can often affect the efficiency and accuracy of remanufacturing service. However, there is a greater degree of uncertainty and complexity in information transmission of remanufacturing service system, which leads to a critical need for designing planning models to deal with this added uncertainty and complexity. In this paper, a three-dimensional (3D) model of remanufacturing service information network for information transmission is developed, which combi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…r is set as volatility coefficient of the pheromone and showed the speed of evaporation. 27,34 When all ants completed one tour, the pheromone on each path is given as 35…”
Section: Picking Order Optimizedmentioning
confidence: 99%
“…r is set as volatility coefficient of the pheromone and showed the speed of evaporation. 27,34 When all ants completed one tour, the pheromone on each path is given as 35…”
Section: Picking Order Optimizedmentioning
confidence: 99%
“…Call the data collection module to collect the original data, the intrusion detection system collects the external threat data in real time, the configuration verification system checks the internal configuration of the target host regularly, and returns the configuration results.The external threat data is the model observation value, the internal configuration is the internal threat data, and the internal and external cause correlation matrix is calculated with the external threat data.After the channel information data is obtained, the internal and external correlation matrix, observation value output matrix and initial state probability are called to calculate a new real-time state transition matrix according to the system changes caused by internal and external threats. Finally, the real-time risk total value of the target host is calculated based on the model algorithm combined with four probability matrices [10].Taking the interruption risk of large-scale wireless communication system channel as an example, if the channel remains constant during the transmission of the whole codeword, the interruption probability can be used to evaluate the system performance, and the corresponding interruption risk probability can be expressed as:…”
Section: Fig 8 Schematic Diagram Of Risk Calculation Data Processingmentioning
confidence: 99%
“…In this study, as we are only interested in the application of GA, a well-established GA tool was used and more detailed information on theory of GA can be found in Refs. [31][32][33][34].…”
Section: Introductionmentioning
confidence: 99%