Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Integrating Routing Decisions in Public Transportation Problems (Springer Optimization and Its Applications)

Buy

This book treats three planning problems arising in public railway transportation planning: line planning, timetabling, and delay management, with the objective to minimize passengers’ travel time. While many optimization approaches simplify these problems by assuming that passengers’ route choice is independent of the solution, this book focuses on models which take into account that passengers will adapt their travel route to the implemented planning solution. That is, a planning solution and passengers’ routes are determined and evaluated simultaneously.

This work is technically deep, with insightful finding regarding complexity and algorithmic approaches to public transportation problems with integrated passenger routing. It is intended for researchers in the fields of mathematics, computer science, or operations research, working in the field of public transportation from an optimization standpoint. It is also ideal for students who want to gain intuition and experience in doing complexity proofs and designing polynomial-time algorithms for network problems.

The book models line planning, timetabling and delay management as combined design and routing problems on networks. In a complexity analysis, the border between NP-hard and polynomially solvable problems is illustrated. Based on that, the insights gained are used to develop solution approaches for the considered problems. Besides integer programming formulations, a heuristic method iterating planning and routing step is proposed to solve the problems.

(HTML tags aren't allowed.)

Real-Time Marketing for Business Growth: How to Use Social Media, Measure Marketing, and Create a Culture of Execution
Real-Time Marketing for Business Growth: How to Use Social Media, Measure Marketing, and Create a Culture of Execution

Your Hands-On Guide for Creating Continuous, Profitable Growth!

 

Use the proven, six-step Marketing Process to:

• Create a marketing plan with execution built in to the process.

Materials for Engineers and Technicians, Fourth Edition
Materials for Engineers and Technicians, Fourth Edition
Syllabuses have changed since the earlier editions of this book and have thus necessitated a change in emphasis towards providing the readers with the necessary background knowledge and understanding of the properties and processing of materials in order that he/she can make an intelligent selection of materials for specific uses and realise why...
Photoshop Face to Face: Facial Image Retouching, Manipulation and Makeovers with Photoshop 7 or Earlier
Photoshop Face to Face: Facial Image Retouching, Manipulation and Makeovers with Photoshop 7 or Earlier

If we were to say Marilyn to you, what would you be thinking? Monroe? Manson?

Well, you would be thinking about the most inspired use of facial imagery. Anybody in advertising will tell you that the most effective sales tool around is the face. A face can sell you anything. Any product, any idea. And the most striking faces...


Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy