2021
DOI: 10.1109/access.2021.3094417
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Algorithm Based on Adaptive Window–Model Predictive Control for Automatic Stacking in Warehouse Center

Abstract: In this article, three-dimensional (3D) stacking problem, as a mandatory task in the warehouse distribution centers, is smartly represented by a new mathematical formulation. A model predictive control (MPC) scheme is proposed to optimally solve the problem. The MPC cost function consists of several sequential criteria to suitably put the incoming packages on the dedicated cart and fully use up the cart capacity as much as possible. The practical and hard constraints are taken into consideration without confro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…Among the machine learning techniques suggested in [11] for identifying fake websites are (Lagrangian Support Vector Machine) LSVM, (Logistic regression) LR, Random Forest (RF), Naive Bayes (NB), and statistical techniques for finding Concept Drifts in websites. Only a few studies have produced practical results, according to the author in [12], intending to foster research on intelligent security techniques based on a cyclic process that begins with the discovery of new threats and ends with the analysis and development of prevention measures.…”
Section: Related Workmentioning
confidence: 99%
“…Among the machine learning techniques suggested in [11] for identifying fake websites are (Lagrangian Support Vector Machine) LSVM, (Logistic regression) LR, Random Forest (RF), Naive Bayes (NB), and statistical techniques for finding Concept Drifts in websites. Only a few studies have produced practical results, according to the author in [12], intending to foster research on intelligent security techniques based on a cyclic process that begins with the discovery of new threats and ends with the analysis and development of prevention measures.…”
Section: Related Workmentioning
confidence: 99%