13 research outputs found

    SLDNFA-system

    Full text link
    The SLDNFA-system results from the LP+ project at the K.U.Leuven, which investigates logics and proof procedures for these logics for declarative knowledge representation. Within this project inductive definition logic (ID-logic) is used as representation logic. Different solvers are being developed for this logic and one of these is SLDNFA. A prototype of the system is available and used for investigating how to solve efficiently problems represented in ID-logic.Comment: 6 pages conference:NMR2000, special track on System descriptions and demonstratio

    The Position-Aware-Market: Optimizing Freight Delivery for Less-Than-Truckload Transportation

    Get PDF
    The increasing competition faced by logistics carriers requires them to ship at lower cost and higher efficiency. In reality, however, many trucks are running empty or with a partial load. Bridging such residual capacity with real time transportation demand enhances the efficiency of the carriers. We therefore introduce the Position-Aware-Market (PAM), where transportation requests are traded in real time to utilize transportation capacities optimally. In this paper we mainly focus on the decision support system for the truck driver, which solves a profit- maximizing Pickup and Delivery Problem with Time Windows (PM-PDPTW). We propose a novel Recursive Branch-and-Bound algorithm that solves the problem optimally, and apply it to a Tabu-Search heuristic for larger problem instances. Simulations show that problems with up to 50 requests can be solved optimally within seconds. Larger problems with 200 requests can be solved approximately by Tabu-Search in seconds, retaining 60% of the optimal profit

    FoodAuthent – Developing a System for Food Authenticity by Collecting, Analyzing and Utilizing Product Data

    Get PDF
    The research project FoodAuthent aims at providing the technical framework and incentives for the routine use of “fingerprinting” to secure and monitor food quality. The planned system captures, analyses and processes data on the chemical fingerprint of food and can prove its authenticity. For this purpose, cloud-based fingerprinting databases are combined with methods of data analysis and batch-specific product information. The project focuses on proof of origin and fraud detection of food as well as on analytical methods for the product categories cheese, oil and spirits

    The FoodAuthent Cloud: An Approach Towards A Comprehen-sive Authentication In Food Supply Chains Using Fingerprinting

    Get PDF
    The research project FoodAuthent aims at establishing framework conditions and incentives to use fingerprinting procedures routinely for food authenticity purposes. In particular, the FoodAuthent system intends to enable the collection, analysis and utilization of chemical "fingerprints" of food products to provide evidence of the authen-ticity of food. For this purpose, cooperatively usable cloud-based food fingerprinting repositories together with standardised data analysis methods are set up as open-source and linked to a discovery service and batch-specific product information

    Problem solving in ID-logic with aggregates: some experiments

    Full text link
    The goal of the LP+ project at the K.U.Leuven is to design an expressive logic, suitable for declarative knowledge representation, and to develop intelligent systems based on Logic Programming technology for solving computational problems using the declarative specifications. The ID-logic is an integration of typed classical logic and a definition logic. Different abductive solvers for this language are being developed. This paper is a report of the integration of high order aggregates into ID-logic and the consequences on the solver SLDNFA.Comment: 9 pages conference: NMR2000, special track on abductive reasonin

    Funkcjonowanie gieƂd elektronicznych w branĆŒy logistycznej

    Get PDF
    The functioning of electronic transport exchange was discussed in the paper. The essence and characteristics of electronic business with the options of Internet use in the operations of entities were presented. The meaning of electronic market in logistics and examples of transport exchange in Poland and on the territory of European Union were described

    Innovative Solution Approach for Controlling Access to Visibility Data in Open Food Supply Chains

    Get PDF
    Visibility data (providing details about supply chain activities in e.g. production, logistics, and quality processes) is of highly sensitive nature – not just in the food sector, but also beyond. Amongst other things, unauthorized data access can be (mis)used to uncover supply chain relationships, volumes, and other business context information. At the same time, it becomes increasingly important to share visibility data with trading partners, e.g. to meet customer requirements and legal obligations. So far, it is not a trivial matter to access or even discover that data, which is often stored in numerous distributed databases.A possible means to overcome this predicament is a Discovery Service (DS), which has knowledge of the parties owning information about specific objects (e.g. product batches) and can provide pointers to the actual data sources to authorized clients while leaving no opportunity to misuse accessible data. It is important to note that a DS itself does not contain actual visibility data, but only references to it. Yet, even the knowledge that party A, B and C have information about a specific product is still sensitive as the querying client would be able to reveal the flow of goods and may take advantage of that knowledge. For instance, he could identify his supplier’s upstream vendor and, for the sake of saving costs, try to procure products directly from that upstream vendor rather than from his previous supplier. Hence, a DS should provide the ability to prevent such scenarios if it strives to achieve a high level of acceptance.A key enabler for a DS is a trust-inspiring means to ascertain whether a querying party is actually part of a given chain of custody (CoC). In conjunction with a set of rules previously defined by the respective data owners, the DS is then able to decide which service addresses (if at all) can be provided in the message response to the query client. Afterwards, the querying party can gather detailed information about a specific object by querying the indicated data sources. In this context, our paper addresses the following research question: How can a DS ascertain if and to which extent a trading partner, whether known or not, is entitled to get pointers to visibility data stored in distributed repositories while ensuring privacy of the data owners?In pursuing this research question, we first provide the relevant background including the current state of the art. Second, we explain and discuss the solution approach and complete our paper by outlining the solution we are going to realize in the course of the research project ‘FoodAuthent’ (funded by the German Ministry of Food and Agriculture).

    The Ledger and Times, March 1, 1967

    Get PDF

    The Advocate - Oct. 26, 1961

    Get PDF
    Original title (1951-1987)--The Advocate: official publication of the Archdiocese of Newark (N.J.)

    Using event calculus for protocol specification: An experiment

    No full text
    edition: BENELOG 1995 Proceedings of the Seventh Benelux Workshop in Logioc Programmingstatus: publishe
    corecore