Integer Formulation and Data Analysis of a Real-World Course Timetabling Problem
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 1
Abstract
Belonging to the class of hard combinatorial optimization problems, educational timetabling problems are considered to be challenging and attractive to operation research community in recent years. In this paper, we investigate a course timetabling problem in practice by introducing an integer formulation and data analysis of this problem. Fourteen data instances are taken from Faculty of Information Technology, University of Science in Vietnam. Thirteen measurements are used to analyze the hardness of these instances.
Authors and Affiliations
Khang T. T. M. Nguyen , Nuong T. H. Tran
Two Phase Data Reduction for Hough Transformation to Detect Skew
An important pre-processing task in an automated document image processing system is detection of skew in the image. Skew detection and correction is the first step in the document analysis and understanding processing s...
An Analysis of Particle Swarm Optimization with Data Clustering-Technique for Optimization in Data Mining
Data clustering is a popular approach for automatically finding classes, concepts, or groups of patterns. Clustering aims at representing large datasets by a fewer number of prototypes or clusters. It brings simplicity i...
A Modern Health Care System Using IoT and Android.
A modern healthcare IoT platform with an intelligent medicine box along with sensors for health monitoring and diagnosis is proposed here. Health care services based on Internet of Things have great potential in medical...
Comparison of Optimal Homotopy Asymptotic Method with Homotopy Perturbation Method of Twelfth Order Boundary Value Problems
In this work, we consider special problem consisting of twelfth order two-point boundary value by using the Optimal Homotopy Asymptotic Method and Homotopy Perturbation Method. Now, we discuss the comparison in between O...
Enhancement of Network Security Techniques using Quantum Cryptography
Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies comple...