2022
DOI: 10.34257/gjcstdvol22is1pg49
|View full text |Cite
|
Sign up to set email alerts
|

Vehicle Routing Problem with Time Window Constrain using KMeans Clustering to Obtain the Closest Customer

Abstract: In this paper, the problem statement is solving the Vehicle Routing Problem with Time Window constraint using the Ant Colony Algorithm with K-Means Clustering. In this problem, the vehicles must start at a common depot, pickup from various warehouses, deliver to the respective nodes within the time window defined by the customer and return back to the depot.The objectives defined are to reduce number of vehicles employed, the total logistics cost and to reduce carbon emissions. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The results of this paper work is validated based on the parameters that are referring the security level and the rate of complexities that are can be measured from the proposed lightweight security model. The performance of the proposed work can be validated and compared with the existing models that are referred from [26][27][28][29]. According to that the proposed model of data security is developed in the PYTHON (3.8V) script.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The results of this paper work is validated based on the parameters that are referring the security level and the rate of complexities that are can be measured from the proposed lightweight security model. The performance of the proposed work can be validated and compared with the existing models that are referred from [26][27][28][29]. According to that the proposed model of data security is developed in the PYTHON (3.8V) script.…”
Section: Resultsmentioning
confidence: 99%
“…To validate the performance of key generation, the time complexity in seconds compare with the existing model of cryptographic technique QBCPDA referred from [29]. This can be represented in the bar plot as shown in figure 6.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The construction of a DNA-based encryption key relies on uncomplicated substitution techniques and transposition operations, thus lending itself well to the constrained computational environments of IoT devices [12]. Revanna and Al-Nakash (2022) [13] focused on the vehicle routing problem with time window constraints using KMeans clustering to optimize customer routes. The authors aimed to improve the efficiency of delivery services.…”
Section: Related Workmentioning
confidence: 99%
“…Use Geopointe to create, plan, and carry out your trip arrangements. all localizable info (Salesforce, Google, or any address) can be used to create routes [15]. Get Google directions, manage up to 100 stops per route, and even optimize travel.…”
Section: Vehicle Route Formulationmentioning
confidence: 99%