{ | |
// See https://go.microsoft.com/fwlink/?LinkId=733558 | |
// for the documentation about the tasks.json format | |
"version": "2.0.0", | |
"tasks": [ | |
{ | |
"label": "serve", | |
"type": "npm", | |
"script": "start", | |
"presentation": { |
This implementation of the Ant System (a variation of Ant Colony Optimization) [1] aims to solve the Traveling Salesman Problem. The problem is to find the shortest tour distance given a list of cities represented by its x and y coordinates where each city is visited only once. This was tested using the berlin52
dataset found [here] (http://elib.zib.de/pub/mp-testdata/tsp/tsplib/tsp/berlin52.tsp).
- ant_colony.m
This is the main file for the algorithm implementation. This calls other functions (written in separate files) in order to achieve the optimization objective. - ant_tour_construction.m
For each ant in the colony, we make them traverse the whole map (tour
). They first start at a randomly generated starting area (start_places), and jump to each node. The jumps are controlled by the attractiveness of the node raised to beta, and the pheromone effect raised to alpha. - compute_cost.m
For each ant
#!/usr/bin/env node | |
console.log('yay gist') |
#!/bin/bash | |
# | |
# Initial script to create users when launching an Ubuntu server EC2 instance | |
# | |
declare -A USERKEY | |
# | |
# Create one entry for every user who needs access. Be sure to change the key to their |
#!/bin/sh | |
# Copyright (C) 2009-2017 Three Nine Consulting | |
# Always good practice to update packages. However ask user if they would like to do so | |
# For explanation on how this works and why check out https://garywoodfine.com/use-pbcopy-on-ubuntu/ | |
read -p "Do you want to update your package repositories before proceeding ? " -n 1 -r | |
echo #adding new line | |
if [[ $REPLY =~ ^[Yy]$ ]] | |
then | |
sudo apt update && sudo apt upgrade -y && sudo apt autoremove -y | |
fi |
# Create a new self signed HTTPS Certificate for IIS Express | |
# Crafted with all organic, GMO, gluten free ingreditations | |
# with an artisinal SAN to make Chrome 58 onwards happy. | |
# | |
# See https://bugs.chromium.org/p/chromium/issues/detail?id=308330 | |
# | |
# Run this at an administrative PowerShell prompt. | |
# | |
# You will be prompted to trust a new certificate via a windows dialog. | |
# Click yes otherwise Visual Studio will not be able to determine your |
if (!someString?.trim()) { | |
logger.lifecycle("the string is null or empty.") | |
} |
These commands generate and use private keys in unencrypted binary (not Base64 “PEM”) PKCS#8 format. The PKCS#8 format is used here because it is the most interoperable format when dealing with software that isn't based on OpenSSL.
OpenSSL has a variety of commands that can be used to operate on private
key files, some of which are specific to RSA (e.g. openssl rsa
and
openssl genrsa
) or which have other limitations. Here we always use