Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
vrpinstances
Advanced tools
#VRP Instances This module parses .vrp instances in .json format and returns a custom format with distance matrix. Only euclidian distance is available. The module also has a list of CVRP Instances: Set A and B from Augerat et al..
You can use vrptojson to parse .vrp files.
const vrp = require("vrpInstances");
const instance = vrp.parse(vrpFileInJs);
Example output for the test instance file in vrptojson
{ best: 100,
n: 5,
distances:
{ '1':
{ '1': 0,
'2': 14.142135623730951,
'3': 14.142135623730951,
'4': 14.142135623730951,
'5': 14.142135623730951 },
'2':
{ '1': 14.142135623730951,
'2': 0,
'3': 28.284271247461902,
'4': 20,
'5': 20 },
'3':
{ '1': 14.142135623730951,
'2': 28.284271247461902,
'3': 0,
'4': 20,
'5': 20 },
'4':
{ '1': 14.142135623730951,
'2': 20,
'3': 20,
'4': 0,
'5': 28.284271247461902 },
'5':
{ '1': 14.142135623730951,
'2': 20,
'3': 20,
'4': 28.284271247461902,
'5': 0 } },
demand: { '1': 0, '2': 10, '3': 10, '4': 10, '5': 10 },
coords: ...,
c: 100,
depot: 1 }
You can also get instances of the Augerat et al. A and B set directly with
const instance = vrp.get('A-n32-k5');
You can use vrp.listInstances()
to see a list of all available instances.
FAQs
enriches json vrp instances and offers benchmark instances
The npm package vrpinstances receives a total of 0 weekly downloads. As such, vrpinstances popularity was classified as not popular.
We found that vrpinstances demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.