Full Text Available

Note: Clicking the button above will open the full text document at the original institutional repository in a new window.

Two-stage scheduling optimization model for taxiways on the basis of time slot derivation

Saved in:
Bibliographic Details
Published in:PLOS ONE
Format: Online Article RSS Article
Published: 2026
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864030191672623106
collection WordPress RSS
FRELIP Feed Integration
container_title PLOS ONE
description
discipline_display Engineering & Technology
discipline_facet Engineering & Technology
format Online Article
RSS Article
genre Journal Article
id rss_article:10415
institution FRELIP
journal_source_facet PLOS ONE
publishDate 2026
publishDateSort 2026
record_format rss_article
spellingShingle Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
Cybersecurity, Cryptography and Privacy
Computer Science & IT
Engineering & Technology
sub_discipline_display Computer Science & IT
sub_discipline_facet Computer Science & IT
subject_display Cybersecurity, Cryptography and Privacy
Computer Science & IT
Engineering & Technology
Cybersecurity, Cryptography and Privacy
Computer Science & IT
Engineering & Technology
subject_facet Cybersecurity, Cryptography and Privacy
Computer Science & IT
Engineering & Technology
title Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
title_auth Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
title_full Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
title_fullStr Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
title_full_unstemmed Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
title_short Two-stage scheduling optimization model for taxiways on the basis of time slot derivation
title_sort two-stage scheduling optimization model for taxiways on the basis of time slot derivation
topic Cybersecurity, Cryptography and Privacy
Computer Science & IT
Engineering & Technology
url https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0345176