Research article Special Issues

A multiple objective optimization model for aircraft arrival and departure scheduling on multiple runways

  • This study proposes a multi-objective mixed integer linear programming (MOMILP) model for assigning a set of flights to different runways and determining their actual arrival and departure times. The proposed model envisages unique operation model of each runway (i.e., takeoff, landing, or mixed takeoff and landing). Further, interference in two flights between adjacent runways are also fully considered in this model. The work aims at reveal the optimal relationship between traffic stream characteristics, operation mode of each runway and flight scheduling to simultaneously minimizing flight delays and maximizing runway utilization. Since the problem of interest has a non-deterministic polynomial (NP-hard) complexity, a heuristic-based non-dominated sorting genetic algorithm (NSGA-Ⅱ) is also presented to find Pareto-optimal solutions in a reasonable amount of time, where coding structure and heuristic algorithm for producing initial population are defined. Finally, a real-world example is provided to compare the difference in quality between the proposed and traditional models, and reveal changes in trends between delay time of flights and idle time of the runways, which can verify the correctness of the model.

    Citation: Ming Wei, Bo Sun, Wei Wu, Binbin Jing. A multiple objective optimization model for aircraft arrival and departure scheduling on multiple runways[J]. Mathematical Biosciences and Engineering, 2020, 17(5): 5545-5560. doi: 10.3934/mbe.2020298

    Related Papers:

    [1] Meijiao Wang, Yu chen, Yunyun Wu, Libo He . Spatial co-location pattern mining based on the improved density peak clustering and the fuzzy neighbor relationship. Mathematical Biosciences and Engineering, 2021, 18(6): 8223-8244. doi: 10.3934/mbe.2021408
    [2] Hui Du, Depeng Lu, Zhihe Wang, Cuntao Ma, Xinxin Shi, Xiaoli Wang . Fast clustering algorithm based on MST of representative points. Mathematical Biosciences and Engineering, 2023, 20(9): 15830-15858. doi: 10.3934/mbe.2023705
    [3] Zhihe Wang, Huan Wang, Hui Du, Shiyin Chen, Xinxin Shi . A novel density peaks clustering algorithm for automatic selection of clustering centers based on K-nearest neighbors. Mathematical Biosciences and Engineering, 2023, 20(7): 11875-11894. doi: 10.3934/mbe.2023528
    [4] Lei Zhang, Lina Ge . A clustering-based differential privacy protection algorithm for weighted social networks. Mathematical Biosciences and Engineering, 2024, 21(3): 3755-3773. doi: 10.3934/mbe.2024166
    [5] He Ma . Achieving deep clustering through the use of variational autoencoders and similarity-based loss. Mathematical Biosciences and Engineering, 2022, 19(10): 10344-10360. doi: 10.3934/mbe.2022484
    [6] Chunkai Zhang, Ao Yin, Wei Zuo, Yingyang Chen . Privacy preserving anomaly detection based on local density estimation. Mathematical Biosciences and Engineering, 2020, 17(4): 3478-3497. doi: 10.3934/mbe.2020196
    [7] Hao Yuan, Qiang Chen, Hongbing Li, Die Zeng, Tianwen Wu, Yuning Wang, Wei Zhang . Improved beluga whale optimization algorithm based cluster routing in wireless sensor networks. Mathematical Biosciences and Engineering, 2024, 21(3): 4587-4625. doi: 10.3934/mbe.2024202
    [8] Yuan Tian, Biao Song, Mznah Al Rodhaan, Chen Rong Huang, Mohammed A. Al-Dhelaan, Abdullah Al-Dhelaan, Najla Al-Nabhan . A stochastic location privacy protection scheme for edge computing. Mathematical Biosciences and Engineering, 2020, 17(3): 2636-2649. doi: 10.3934/mbe.2020144
    [9] Muhammad Firdaus, Siwan Noh, Zhuohao Qian, Harashta Tatimma Larasati, Kyung-Hyune Rhee . Personalized federated learning for heterogeneous data: A distributed edge clustering approach. Mathematical Biosciences and Engineering, 2023, 20(6): 10725-10740. doi: 10.3934/mbe.2023475
    [10] Yunyun Sun, Peng Li, Zhaohui Jiang, Sujun Hu . Feature fusion and clustering for key frame extraction. Mathematical Biosciences and Engineering, 2021, 18(6): 9294-9311. doi: 10.3934/mbe.2021457
  • This study proposes a multi-objective mixed integer linear programming (MOMILP) model for assigning a set of flights to different runways and determining their actual arrival and departure times. The proposed model envisages unique operation model of each runway (i.e., takeoff, landing, or mixed takeoff and landing). Further, interference in two flights between adjacent runways are also fully considered in this model. The work aims at reveal the optimal relationship between traffic stream characteristics, operation mode of each runway and flight scheduling to simultaneously minimizing flight delays and maximizing runway utilization. Since the problem of interest has a non-deterministic polynomial (NP-hard) complexity, a heuristic-based non-dominated sorting genetic algorithm (NSGA-Ⅱ) is also presented to find Pareto-optimal solutions in a reasonable amount of time, where coding structure and heuristic algorithm for producing initial population are defined. Finally, a real-world example is provided to compare the difference in quality between the proposed and traditional models, and reveal changes in trends between delay time of flights and idle time of the runways, which can verify the correctness of the model.


    Data mining, also, refers as knowledge discovery in database (KDD) [2,8,16,17], is a commonly way to find the useful and meaningful knowledge from databases, which could be utilized in several real-life applications. Although data mining techniques can discover the useful information and knowledge, it reveals, however, the confidential or private message from the discovered information, which may cause the security threats [11,12,39]. Privacy-preserving data mining [3,5,35,37,31,32] has thus become an important issue in recent decades since it can not only hide the private information but also discover the required information by varied data mining techniques. Data sanitization is one of the major research of PPDM that perturbs the database to hide the sensitive information. During the sanitization progress, it usually causes three side effects, for instance, hiding failure, missing cost, and artificial cost. Existing methods are used to minimize those three side effects during the sanitization progress, which can be regarded as the NP-hard problem [3,37]. Several works related to PPDM were respectively discussed and most of them are based on the deletion procedure to hide the sensitive information [13,14,21,27,38].

    Conventional algorithms in PPDM mostly focus on hiding the sensitive information as much as possible; the PPDM is, however considered as the NP-hard problem since it has the trade-off relationships among the derived three side effects. Lin et al. proposed the GA-based algorithms to hide the sensitive itemsets and utilize transaction deletion procedure for sanitization [28,29]. The optimal transactions for deletion are then obtained and the results showed that less side effects can be achieved compared to the greedy-based method. Lin et al. [30] then designed the PSO-based model to handle the sanitization progress in PPDM. However, the above algorithms rely on the pre-defined weights to design the importances of three side effects, which requires the a-priori knowledge to set up the weight values. The pre-defined weights may seriously affect the results to select the transactions for deletion. To handle this problem, Cheng et al. [10] developed the EMO-based algorithm to consider "data distortion" and "knowledge distortion" in the sanitization progress through item deletion. This approach is efficient but it may lead the incomplete knowledge in the mining procedure. For example, the deleted information in the hospital diagnosis may mislead the wrong diagnosis and treatment.

    Multi-objective particle swarm optimization (MOPSO) algorithm [7] is extended from conventional particle swarm optimization algorithm [24], that handles the multi-objective problems to find a set of Pareto solutions. Since the MOPSO-based framework uses the dominance relationship to find better solutions, the traditional method used in the PSO-based framework cannot be used to find better solutions. In this paper, we aim at designing a multiple optimization particle swarm optimization algorithm by adapting the density-based (CMPSO) method for finding better solutions rather than the single objective algorithms. Major contributions are listed below.

    ● We design a multiple optimization particle swarm optimization (named CMPSO) algorithm for hiding the sensitive information, which achieves better performance than the single objective algorithms in terms of three side effects.

    ● The density-based clustering method is adapted here to obtain better diversity of the derived Pareto solutions.

    ● Extensive experiments are conducted to show the performance of the designed algorithm in terms of three side effects, and results outperform the single-objective algorithms.

    The rest of this paper is organized as follows. Literature review is shown in Section 2. Preliminary and problem statement are discussed in Section 3. The designed algorithm is stated in Section 4. Several experiments are carried and conducted in Section 5. Conclusion and future work are discussed in Section 6.

    The related works of privacy-preserving data mining (PPDM) and the evolutionary computation are described as follows.

    In recent two decades, data mining techniques [17,16,33] are efficient to mine and find the potential information from a very large database, especially the relationships between the products may not be easily discovered and visualized. Since the important data can be revealed from the databases, thus the confidential and secure information can also be discovered during the mining procedure, that causes the privacy and security threats to users. Privacy-preserving data mining (PPDM) has become a critical issue in recent years since it can, not only find the useful information but also hide the confidential data after the sanitization progress. Agrawal and Srikant [4] developed a novel reconstruction approach that can accurately estimate the distribution of original data. The classifiers can also be constructed to compare the accuracy between original data and the sanitized one. Verykios et al. [37] developed the hierarchical classification techniques used in PPDM. Dasseni et al. [13] then designed an approach based on the hamming-distance mechanism to decrease the support or confidence of the sensitive information (i.e., association rules) for sanitization. Oliveira and Zaiane [35] provides several sanitization methods, that can hide the frequent itemsets through the heuristic framework. Islam and Brankovic [22] presented a framework using the noise addition method to protect and hide the individual privacy and still maintained high data quality. Hong et al. provided the SIF-IDF method [21] to assign the weight to each transaction, and the sanitization progress is then performed from the transaction with highest score to the lowest one for hiding the sensitive information. Lin et al. [31] then presented a SPMF software to provide several algorithms for handling the sanitization problem in PPDM.

    The PPDM is, however, considered as a NP-hard problem [3,37], it is thus better to provide the meta-heuristic approaches to find the optimal solutions. Han and Ng developed a secure protocol to find a better set of rules without disclosing their own private data based on GAs [18]. Lin et al. then presented several GA-based approaches, such as sGA2DT [29], pGA2DT [29] and cpGA2DT [28] to hide the sensitive information by removing the victim transactions. The encoded chromosome is considered as a set of solutions, and the transaction of the gene within chromosome is concerned as the victim for later deletion. A fitness function is also developed to consider three side effects for evaluation with the pre-defined weights to show the goodness of the chromosome. Several extensions of the evolutionary computation used in PPDM were also developed [20,30]. Although the above algorithms are efficient to find the optimal transactions for deletion, they still require, however, the pre-defined weights of the side effects; this mechanism can seriously affect the final results of the designed approaches. Cheng et al. [10] then developed a EMO-RH algorithm to hide the sensitive itemsets by removing the itemset. This approach is based on multi-objective method, but the incomplete transactions can thus be produced; the mislead decision could thus be made especially in treatment of the hospital diagnoses. Lin et al. also applies the multi-objective model [32] for the deletion problem based on the grid method. An NSGA-II model [34] is also utilized to efficiently sanitize the database for transaction deletion.

    Evolutionary computation is inspired by biological evolution that attempts to find the global optimization as the solutions. An iteratively progress of the candidates is then executed to gradually find the optimized solutions. Holland [18] first applies Darwin theory of natural selection and survival of the fittest to designed the genetic algorithms (GAs), that is widely used in computational intelligence. The GAs is the fundamental method, which is the population-based method to solve the NP-hard problems. It consists of mutation, crossover, and selection operators to find the possible solutions in the evolution progress. Particle swarm optimization (PSO) is a swarm intelligence algorithm proposed by Kennedy and Eberhart that is inspired by bird flocking activities [24]. Each particle in the PSO is concerned as a potential solution. In PSO, each bird has its own velocity, which is used to represent the direction to the other solutions, and each particle is then updated with its own best value (represents as pbest) and the global best value (represented as gbest) according to the designed fitness function during each iteration. The updating equations are listed as follows [24]:

    vi(t+1)=w×vi(t)+c1×r1×(pbestixi(t))+c2×r2×(gbestxi(t)) (2.1)
    xi(t+1)=xi(t)+vi(t+1) (2.2)

    From the above equations, w is considered as a factor that is used to balance the influence of global search and local search; vi represents the velocity of the i-th particle in a population where t presents the t-th iteration. The c1 and c2 are the constant values. Both r1 and r2 are random numbers generated by a uniform distribution in the range of [0, 1]. The velocity of a particle is updated by equation (2.1), and its position is updated by equation (2.2).

    In real-world situations, optimization should consider the multiple objectives [23,36] since we may focus on varied targets to find the solutions. Several algorithms were presented to solve the multi-objective problems for optimization, such as the Non-dominated Sorting Genetic Algorithm (NSGA) [36], the strength pareto evolutionary algorithm (SPEA) [40], and the pareto archived evolution strategy (PAES) [25]. Coello et al. [7] applies the adaptive grid method to maintain the external archive. Several variants of MOPSO were respectively presented to improve the performance, and the development is still in progress.

    Let I = {i1, i2, , im} be a finite set of r distinct items occurring in the database D, and D is a set of transactions where D = {T1, T2, , Tn}, TqD. Each Tq is a subset of I and has a unique identifier q, called TID. The set of sensitive itemsets is denoted as SI = {s1, s2, , sk}, which are given by user. Note that each si of SI is a subset of Tq. The μ is the minimum support threshold in D. If sup(ij)μ×|D|, the itemset (ij) is defined as the frequent (large) itemset.

    Definition 1. For each siSI, the number of transactions for deletion of si is denoted as Nsi and defined as:

    Nsi=sup(si)μ×|D|1μ. (3.1)

    Definition 2. The Maximum number of Deleted Transactions among all sensitive itemsets in SI is denoted as MDL and defined as:

    MDT=max{Ns1,Ns2,,Nsk}. (3.2)

    Thus, the MDT is treated as the size of the particle in the designed CMPSO algorithm. In the PPDM, three side effects can be considered as "hiding failure", "missing cost", and "artificial cost", which should be minimized in the PPDM. We can obtain the definitions for three side effects as follows.

    Definition 3. Let α be the number of sensitive itemsets that fails to be hidden, in which α = |SIL|.

    Definition 4. Let β be the number of missing itemsets (cost), which is the non-sensitive itemset and the large itemset in the original database but will be hidden after the sanitization progress as: β=LSIL.

    Definition 5. Let γ be the number of artificial itemsets (cost), which was not the frequent itemset but will be arisen as the frequent one after the sanitization progress as: γ=LL.

    Problem Statement: The problem of PPDM with transaction deletion based on the multi-objective particle swarm optimization is to minimize three side effects by considering the sanitized results in three objective functions, which can be defined as:

    f=min[f1,f2,f3], (3.3)

    where f1 equals to the number of α, f2 equals to the number of β, and f3 equals to the number of the γ.

    In this section, we develop a CMPSO algorithm to hide the sensitive information by adapting the density-based clustering method to obtain higher diversity of the derived Pareto solutions, and the effects can be shown in terms of three side effects. To obtain better transactions for deletion in PPDM, the database is first processed to project the transactions with any of the sensitive information within the set of SI, and the projected database is named as D. Thus, only the transactions with the sensitive information are projected for later deletion, and those transactions in D are considered as the candidate of the particle in the evolution process. After that, the CMPSO algorithm is then iteratively performed to evaluate three side effects in the evolutionary progress. In CMPSO algorithm, each particle can be represented as a possible solution with MDT vectors, and each vector is the transaction ID, which shows the potential transaction for deletion. Note that a vector in a particle can be a null value. In the updating progress of the CMPSO in PPDM, the formulas are thus defined as follows [30]:

    vi(t+1)=(pbestxi(t))(gbestxi(t)). (4.1)
    xi(t+1)=rand(xi(t),null)+vi(t+1). (4.2)

    Thus, the particles in the designed CMPSO is updated by the above equations for the velocity and its position. The designed CMPSO algorithm is then described in Algorithm 1 as follows.

    From Algorithm 1, the designed CMPSO algorithm generates N particles with MDT size (Line 1). Each particle is then evaluated by the fitness functions with three side effects (Lines 2 to 3) to find the non-dominated solutions (Line 4). In the updating progress, the pbest and gbest are then respectively updated (Lines 6 to 7). The gbest is then updated by the sub-function to obtain a better particle for evolution. After the updating progress (Line 8), the updated particles are then evaluated again to update the non-dominated solutions. The algorithm is recursively performed until the termination criteria is achieved (Lines 5 to 10). After that, the final results will be returned with a set of non-dominated solutions (Pareto solutions).

    To obtain better Pareto solutions with higher diversity, the density-based clustering method is adapted here to select the appropriate gbest in the evolutionary progress, which was described at Line 6 in Algorithm 1. Details are then stated in Algorithm 2.

    For each Pareto solution in Algorithm 2, it finds a cluster center (Line 4) with satisfied solutions (number of Pareto solutions is no less than minpts) within a radius r (Line 3). After that, each solution within a cluster is then assigned with a probability (Lines 6 to 7), and a global solution (gbest) is then derived randomly by the assigned probability (Line 8). This progress increases the diversity of the discovered Pareto solutions in the evolution progress. After that, the gbest is then derived and used in the Algorithm 1 for iteratively evolution.

    Substantial experiments were carried to compare the effectiveness and efficiency of the proposed CMPSO algorithm to the state-of-the-art single-objective cpGA2DT [28] and PSO2DT [30] approaches. The algorithms in the experiments are implemented in Java language, performing on a PC with an Intel Core i7-6700 quad-core processor and 8 GB of RAM under the 64-bit Microsoft Windows 10 operating system. Two real-world datasets [15] called chess and foodmart are used in the experiments. Results in terms of three side effects are respectively discussed and analyzed as follows.

    In this section, the state-of-the-art single-objective algorithms such as cpGA2DT [28] and PSO2DT [30] are then compared to the designed CMPSO algorithm. The number of population for all evolutionary algorithm is set as 50. Since the multi-objective algorithm would produce a set of Pareto-front solutions, we evaluate the side effects by average of the produced solutions. Thus, in the dense dataset such as chess, the CMPSO sometimes shows worse results in terms of side effects compared to the single objective algorithms, but in the sparse dataset such as foodmart, the CMPSO generally obtains good performance than the others. Results for the chess dataset are shown in Figure 1.

    Figure 1.  Compared results of the chess dataset.

    From Figure 1, it can be seen that the single-objective algorithms such as cpGA2DT and PSO2DT sometimes have better performance than the designed CMPSO approach. The reasons are that the designed CMPSO algorithm evaluates three side effects by the average value of the derived solutions. For the dense dataset such as chess, the diversity of the derived solutions is not high; the discovered Pareto solutions could be converged together due to the characteristics of the dataset. Moreover, The designed CMPSO algorithm produces a set of solutions, for example in the experiments, the number of Pareto solutions can be more than 20. Thus, the average values of three side effects sometimes could not achieve better results. Experiments under the sparse foodmart dataset are shown in Figure 2.

    Figure 2.  Compared results of the foodmart dataset.

    From Figure 2, we can observe that the designed CMPSO algorithm has good performance than the single-objective cpGA2DT and PSO2DT algorithms in most cases. For example, when the sensitive percentages are respectively set as 8%, 10%, 12%, and 14%, the designed CMPSO achieves best performance than the other single-objective algorithms. The reasons are that when the dataset is a sparse dataset, higher diversity of the designed CMPSO algorithm can be obtained. Thus, the selected transactions may contain the minimal side effects for deletion. Moreover, all three algorithms have no artificial cost under varied percentages of sensitivity.

    In recent years, many algorithms were presented to hide the private/confidential information in privacy-preserving data mining (PPDM) and most of them were designed to sanitize the database for hiding the sensitive information. In this paper, we first introduce a CMPSO algorithm for hiding the sensitive information based on density clustering method for sanitizing the databases. The designed updating algorithm for gbest can achieve good performance compared to the single objective algorithms, especially for the sparse dataset, which can be seen in the experiments.

    This research was partially supported by the Shenzhen Technical Project under KQJSCX20170726103424709 and JCYJ20170307151733005



    [1] B. Sun, M. Wei, W. Wu, B. B. Jing. A novel group decision making method for airport operational risk management, Math. Biosci. Eng., 17 (2020), 2402-2417.
    [2] S. L. Wu, P. C. Chen, K. Y. Chang, C. C. Huang, Robust gain-scheduled control for vertical/short take-off and landing aircraft in hovering with time-varying mass and moment of inertia, Proc. Inst. Mech. Eng. Part G., 222 (2008), 473-482.
    [3] H. Nazini, T. Sasikala, Simulating aircraft landing and takeoff scheduling in distributed framework environment using Hadoop file system, Cluster. Comput., 22 (2019), 13463-13471.
    [4] Y. Ding, J. Valasek, Aircraft landing scheduling optimization for single runway noncontrolled airports: Static Case, J. Guid. Control Dynam., 30 (2007), 252-255.
    [5] M. Ahmed, S Alam, M. Barlow, A cooperative co-evolutionary optimization model for best-fit aircraft sequence and feasible runway configuration in a multi-runway airport, Aerospace, 5 (2018), 345-353.
    [6] L. Bianco, P. Dell'Olmo, S. Giordani, Scheduling models for air trafic control in terminal areas, J. Scheduling, 9 (2006), 180-197.
    [7] D. Briskorn, R. Stolletz, A dynamic programming approach for the aircraft landing problem with aircraft classes, Eur. J. Oper. Res., 43 (2015), 61-69.
    [8] R. G. Dear, The dynamic scheduling of aircraft in the near terminal area, MIT Libraries, (1976).
    [9] H. N. Psaraftis, A dynamic programming approach for sequencing identical groups of jobs, Oper. Res., 28 (1980), 1347-1359.
    [10] V. J. Hansen, Genetic search methods in air traffic control, Comput. Oper. Res., 31 (2004), 445- 459.
    [11] H. Pinol, J. E. Beasley, Scatter search and bionomic algorithms for the aircraft landing problem, Eur. J. Oper. Res., 171 (2006), 439-462.
    [12] A. Salehipour, L. M. Naeni, H. Kazemipoor, Scheduling aircraft landings by applying a variable neighborhood descent algorithm: runway-dependent landing time case, J. Appl. Oper. Res., 1 (2009), 39-49.
    [13] Y. H. Liu, A genetic local search algorithm with a threshold accepting mechanism for solving the runway dependent aircraft landing problem, Optim. Lett., 5 (2011), 229-245.
    [14] G. Bencheikh, J. Boukachour, A. E. H. Alaoui, Improved ant colony algorithm to solve the aircraft landing problem, Int. J. Comput. Theory Eng., 3 (2011), 224-233.
    [15] A. Salehipour, M. Modarres, L. Moslemi Naeni, An efficient hybrid meta-heuristic for aircraft landing problem, Comput. Oper. Res., 40 (2013), 207-213.
    [16] A. Faye, Solving the aircraft landing problem with time discretization approach, Eur. J. Oper. Res., 242 (2015), 1028-1038.
    [17] A. T. Ernst, M. Krishnamoorthy, R. H. Storer, Heuristic and exact algorithms for scheduling aircraft landings, Networks, 34 (1999), 229-241.
    [18] J. E. Beasley, M. Krishnamoorthy, Y. M. Sharaiha, D. Abramson, Scheduling aircraft landings - The static case, Transport. Sci., 34 (2000), 180-197.
    [19] H. N. Psaraftis, A dynamic programming approach for sequencing groups of identical jobs, Oper. Res., 28 (1980), 1347-1359.
    [20] C. S. Venkatakrishnan, A. Barnett, A. M. Odoni, Landings at Logan airport: Describing and increasing airport capacity, Transport. Sci., 27 (1993), 211-227.
    [21] F. Farhadi, A. Ghoniem, M. Al-Salem, Runway capacity management - an empiricalstudy with application to Doha international airport, Transp. Res. Part E: Logist. Transp. Rev., 68 (2014), 53-63.
    [22] F. Furini, M. P. Kidd, C. A. Persiani, P. Toth, State space reduced dynamic programming for the aircraft sequencing problem with constrained position shifting, Int. Symp. Comb. Optim. (ISCO), 2014 (2014), 267-279.
    [23] A. Ghoniem, F. Farhadi, M. Reihaneh, An accelerated branch-and-price algorithm for multiple-runway aircraft sequencing problems, Eur. J. Oper. Res., 246 (2015), 34-43.
    [24] A. Ghoniem, F. Farhadi, A column generation approach for aircraft sequencing problems: A computational study, J. Oper. Res. Soc., 66 (2015), 1717-1729.
    [25] H. Balakrishnan, B. Chandran, Algorithms for scheduling runway operations under constrained position shifting, Oper. Res., 58 (2010), 1650-1665.
    [26] D. Harikiopoulo, N. Neogi, Polynomial-time feasibility condition for multiclass aircraft sequencing on a single-runway airport, IEEE Trans. Intell. Transp. Syst., 12 (2011), 2-14.
    [27] A. Lieder. R. Stolletz, Scheduling aircraft take-offs and landings on interdependent and heterogeneous runways, Transport. Res. E-Log., 88 (2016), 67-188.
    [28] M. Samà, A. D'Ariano, F. Corman, D. Pacciarelli, Coordination of scheduling decisions in the management of airport airspace and taxiway operations. Transport. Res. Pro., 23 (2017), 246- 262.
    [29] J. Jemai M. Zekri K. Mellouli, An NSGA-II algorithm for the green vehicle routing problem, Evo. Comput. Com. Opt., 2012 (2012), 37-48.
    [30] M. Wei, T. Liu, B. Sun, B. B. Jing, Optimal integrated model for feeder transit route design and frequency-setting problem with stop selection, J. Adv. Transport., 2020 (20200.
    [31] A. Slowik, H. Kwasnicka, Nature inspired methods and their industry Applications-Swarm intelligence algorithms, IEEE T. Ind. Inform., 14 (2018), 1004-1015.
    [32] M. A. Dulebenets, A comprehensive evaluation of weak and strong mutation mechanisms in evolutionary algorithms for truck scheduling at cross-docking terminals, IEEE Access, 6 (2018).
    [33] X. Zhao, C. Wang, J. Su, J. Wang, Research and application based on the swarm intelligence algorithm and artificial intelligence for wind farm decision system, Renew. Energ., 134 (2019), 681-697.
    [34] L. Brezonik, I. Fister, V. Podgorelec, Swarm intelligence algorithms for feature selection: A review, Appl. Sci., 8 (2018), 1521.
    [35] M. A. Dulebenets, A delayed start parallel evolutionary algorithm for just-in-time truck scheduling at a cross-docking facility, Int. J. Prod. Econ., 212 (2019), 236-258.
    [36] H. Anandakumar, K. Umamaheswari, A bio-inspired swarm intelligence technique for social aware cognitive radio handovers, Comput. Electr. Eng., 71 (2018), 925-937.
    [37] T. Li, G. Kou, Y. Peng, Y. Shi, Classifying with adaptive hyper-spheres: An incremental classifier based on competitive learning, IEEE Trans. Syst. Man Cybern. Syst., 50 (2020), 1218-1229.
    [38] G. Kou, C. S. Lin, A cosine maximization method for the priority vector derivation in AHP, Eur. J. Oper. Res., 235 (2014), 225-232.
  • This article has been cited by:

    1. Shalini Jangra, Durga Toshniwal, VIDPSO: Victim item deletion based PSO inspired sensitive pattern hiding algorithm for dense datasets, 2020, 57, 03064573, 102255, 10.1016/j.ipm.2020.102255
    2. Malik Jahan Khan, Cynthia Khan, Performance evaluation of fuzzy clustered case-based reasoning, 2021, 33, 0952-813X, 313, 10.1080/0952813X.2020.1744194
    3. Madhulika Yarlagadda, K. Gangadhara Rao, A. Srikrishna, Frequent itemset-based feature selection and Rider Moth Search Algorithm for document clustering, 2019, 13191578, 10.1016/j.jksuci.2019.09.002
    4. Jimmy Ming-Tai Wu, Gautam Srivastava, Alireza Jolfaei, Philippe Fournier-Viger, Jerry Chun-Wei Lin, Hiding sensitive information in eHealth datasets, 2021, 117, 0167739X, 169, 10.1016/j.future.2020.11.026
    5. Jerry Chun-Wei Lin, Gautam Srivastava, Yuyu Zhang, Youcef Djenouri, Moayad Aloqaily, Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments, 2021, 8, 2327-4662, 5340, 10.1109/JIOT.2020.3032896
    6. Tsu-Yang Wu, Chien-Ming Chen, King-Hang Wang, Jimmy Ming-Tai Wu, Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments, 2019, 7, 2169-3536, 49232, 10.1109/ACCESS.2019.2909040
    7. Hao Wang, Guangmin Sun, Kun Zheng, Hui Li, Jie Liu, Yu Bai, Privacy protection generalization with adversarial fusion, 2022, 19, 1551-0018, 7314, 10.3934/mbe.2022345
    8. Chance Desmet, Diane J. Cook, Recent Developments in Privacy-preserving Mining of Clinical Data, 2021, 2, 2691-1922, 1, 10.1145/3447774
    9. Ali Muhammad, Noor Ul Amin, Insaf Ullah, Ahmed Alsanad, Saddam Hussain, Suheer Al-Hadhrami, M. Irfan Uddin, Hizbullah Khattak, Muhammad Asghar Khan, Dilbag Singh, An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature, 2021, 2021, 1563-5147, 1, 10.1155/2021/9960264
    10. Ruijia Li, Zhiling Cai, A clustering algorithm based on density decreased chain for data with arbitrary shapes and densities, 2023, 53, 0924-669X, 2098, 10.1007/s10489-022-03583-4
    11. Mira Lefkir, Farid Nouioua, Philippe Fournier-Viger, Hiding sensitive frequent itemsets by item removal via two-level multi-objective optimization, 2023, 53, 0924-669X, 10027, 10.1007/s10489-022-03808-6
    12. Ryosuke Sonoda, Fair oversampling technique using heterogeneous clusters, 2023, 640, 00200255, 119059, 10.1016/j.ins.2023.119059
    13. Bo Xiong, Hongmei Chen, Tianrui Li, Xiaoling Yang, Robust multi-view clustering in latent low-rank space with discrepancy induction, 2023, 53, 0924-669X, 23655, 10.1007/s10489-023-04699-x
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5623) PDF downloads(270) Cited by(13)

Figures and Tables

Figures(6)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog