{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:58:12Z","timestamp":1725868692417},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_79","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"825-833","source":"Crossref","is-referenced-by-count":0,"title":["Integrated Algorithms for Network Optimization of Dangerous Goods Transportation"],"prefix":"10.1007","author":[{"given":"Haixing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Guiping","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Hai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"79_CR1","doi-asserted-by":"crossref","unstructured":"Lucio Bianco, Massimiliano Caramia, Stefano Giordani. A bilevel flow model for hazmat transportation network design [J]. Transportation Research: Part C, 2009, 12(2): 175-196","DOI":"10.1016\/j.trc.2008.10.001"},{"key":"79_CR2","doi-asserted-by":"crossref","unstructured":"Erhan Erkut, Osman Alp. Designing a road network for dangerous goods shipments [J]. Computers & Operations Research, 2007, 34 (5): 1389-1405","DOI":"10.1016\/j.cor.2005.06.007"},{"key":"79_CR3","unstructured":"Liu Yu. The model of urban transport path selection for dangerous goods based on ArcGIS. The thesis of Jilin University master\u2019s degree thesis. 2007"},{"key":"79_CR4","unstructured":"Wang Yin Gao. Risk assessment of road dangerous goods transport. Thesis of Chang\u2019an University master\u2019s degree thesis. 2006"},{"key":"79_CR5","doi-asserted-by":"crossref","unstructured":"Rink K A, Rodin E Y, Pandian V Sundara. A Simplification of the Double-sweep Algorithm to Solve the K-shortest Path Problem [J], Applied Math. Lett.,2000,13(8): 77-83","DOI":"10.1016\/S0893-9659(00)00099-9"},{"key":"79_CR6","unstructured":"Sayarshad H R, Ghoseiri K, A Simulated Annealing Approach for the Multi-peoriodic Railcar. Fleet Sizing Problem [J], Computer & Operation Research, 1983, 220: 671--80."},{"key":"79_CR7","doi-asserted-by":"crossref","unstructured":"Qingni Shen; Yahui Yang; Zhonghai Wu; Dandan Wang; Min Long. Securing data services: a security architecture design for private storage cloud based on HDFS, International Journal of Grid and Utility Computing, 2013 Vol. 4 No. 4 P 242-254.","DOI":"10.1504\/IJGUC.2013.057118"},{"key":"79_CR8","doi-asserted-by":"crossref","unstructured":"Shu Guo; Haixia Xu. A secure delegation scheme of large polynomial computation in multiparty cloud, International Journal of Grid and Utility Computing, 2015 Vol. 6 No. 1 P 1-7.","DOI":"10.1504\/IJGUC.2015.066387"},{"key":"79_CR9","doi-asserted-by":"crossref","unstructured":"Shuaishuai Zhu; Xiaoyuan Yang. Protecting data in cloud environment with attribute-based encryption, International Journal of Grid and Utility Computing, 2015 Vol. 6 No. 2 P 91-97.","DOI":"10.1504\/IJGUC.2015.068824"},{"key":"79_CR10","doi-asserted-by":"crossref","unstructured":"Madoka Yuriyama, Takayuki Kushida. Integrated cloud computing environment with IT resources and sensor devices, International Journal of Space-Based and Situated Computing, 2011 Vol. 1 No. 2\/3 P 163-173.","DOI":"10.1504\/IJSSC.2011.040342"},{"key":"79_CR11","doi-asserted-by":"crossref","unstructured":"Cristina Dutu; Elena Apostol; Catalin Leordeanu; Valentin Cristea. A solution for the management of multimedia sessions in hybrid clouds, International Journal of Space-Based and Situated Computing, 2014 Vol. 4 No. 2 P 77-87.","DOI":"10.1504\/IJSSC.2014.062468"},{"key":"79_CR12","unstructured":"Tao Hai, The Theory and Key Technology of Safety Control for Hazardous Materials\u2019 Tanker Transportation in Railway, Doctoral thesis of Beijing Jiaotong University , 2010."},{"key":"79_CR13","doi-asserted-by":"crossref","unstructured":"Qingni Shen; Yahui Yang; Zhonghai Wu; Dandan Wang; Min Long. Securing data services: a security architecture design for private storage cloud based on HDFS, International Journal of Grid and Utility Computing, 2013 Vol. 4 No. 4 P 242-254.","DOI":"10.1504\/IJGUC.2013.057118"},{"key":"79_CR14","doi-asserted-by":"crossref","unstructured":"Shu Guo; Haixia Xu. A secure delegation scheme of large polynomial computation in multiparty cloud, International Journal of Grid and Utility Computing, 2015 Vol. 6 No. 1 P 1-7.","DOI":"10.1504\/IJGUC.2015.066387"},{"key":"79_CR15","doi-asserted-by":"crossref","unstructured":"Shuaishuai Zhu; Xiaoyuan Yang. Protecting data in cloud environment with attribute-based encryption, International Journal of Grid and Utility Computing, 2015 Vol. 6 No. 2 P 91-97.","DOI":"10.1504\/IJGUC.2015.068824"},{"key":"79_CR16","doi-asserted-by":"crossref","unstructured":"Madoka Yuriyama, Takayuki Kushida. Integrated cloud computing environment with IT resources and sensor devices, International Journal of Space-Based and Situated Computing, 2011 Vol. 1 No. 2\/3 P 163-173.","DOI":"10.1504\/IJSSC.2011.040342"},{"key":"79_CR17","doi-asserted-by":"crossref","unstructured":"Cristina Dutu; Elena Apostol; Catalin Leordeanu; Valentin Cristea. A solution for the management of multimedia sessions in hybrid clouds, International Journal of Space-Based and Situated Computing, 2014 Vol. 4 No. 2 P 77-87.","DOI":"10.1504\/IJSSC.2014.062468"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_79","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:02:08Z","timestamp":1568484128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_79","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}