首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 15 毫秒
1.
归一化传输容量加权通信网端到端可靠性指标,非常适合评价现代高速宽带通信网络.然而计算全过程易于在计算机上编程实现的算法尚未见到.研究出一整套可靠性指标的计算方法.由于,从路由计算、不交化网络状态集及其对应容量的求取,到最后获得可靠性指标结果等各个环节,均实现了代数化或逻辑代数化运算,因此,整套算法易于编写计算机程序.详细介绍了算法各环节的计算规则与步骤,并对正确性与合理性进行了论证.通过举例详细说明算法的计算过程,并检验算法的正确性.  相似文献   

2.
对无线传感器网络(WSNs)路由优化问题进行研究,提出一种基于离散群居蜘蛛算法的WSNs分簇路由优化方案.首先定量分析节点覆盖冗余度期望值与网络覆盖率的关系,筛选出能够保证网络覆盖率要求的最少网络工作节点,其次研究分簇大小与网络节点密度的关系,动态地确定最佳的分簇个数.基于此,以簇间距离和簇首能量为评价指标构建簇间通信模型,重新定义蜘蛛个体编码方式和更新策略,采用离散群居蜘蛛算法对模型进行求解,最终实现WSNs分簇路由优化.仿真结果表明,方案能够满足网络覆盖要求,而且与其它路由优化算法相比,延长了网络生命周期,降低了网络能耗.  相似文献   

3.
移位交换网的最优路由算法   总被引:1,自引:1,他引:0  
移位交换网是重要的互联网络之一 ,在并行计算中有着广泛应用 .然而 ,它缺少任意点对间的最短路由算法 .已有的路由算法都不能保证其任意节点对间都是最短路由 .文中给出了一个最短路由算法 ,也是最优路由算法 ,它使得从源节点到目的节点的任何信息都是沿最短路由传输 .同时 ,我们还得到了任意节点对间的距离公式  相似文献   

4.
结合冰凌测报无线传感器网络中传感器节点能量受限、节点随着冰凌的产生与流动会出现在河道断面局部观测区域的冰凌测报无线传感器网络拓扑结构不断变化这一特性,提出了对贪婪周边无状态路由协议GPSR的改进策略GFSRI(GPSR-Improved),改进算法中采用图论模型,借助网络模拟器NS2(Network Simulator 2),对GPSR算法以及改进的路由策略GPSRI进行了模拟仿真实验,对路由算法中涉及到的关键参数的相关实验数据进行了处理分析.模拟仿真实验及评估结果表明,GPSRI在数据包转发的路由跳数、源和目的节点间端到端的传输时延方面与GPSR相比有较大的性能改进.  相似文献   

5.
移动自组网络(简称MANET)目前已经成为4G中的重要研究课题.本文在一个典型的随选型路由协议即动态源路由(DSR)协议的基础上,通过对信号强度进行分级来描述节点之间的相对距离,同时利用定向天线技术,建立了移动自组网络有空间重用的离散时间马氏链模型.通过计算平稳分布,进一步分析了节点相邻的概率和节点的平均邻居数两个基本的网络参数.并以定向天线发送信号的特性为基础,给出了一个具体实例,分析相应的参数.这对路由协议的评价和性能分析具有理论上的指导意义.  相似文献   

6.
本文采用理论分析与编程判断相结合的方法,获得了Sn的全部极大子群的生成元及子群的阶等结果. 并将结果用于Sn(n=2,3,4,5,6)进行验证,表明了程序判断的正确性,对计算结果进行归纳获得了Sn的递归定义及Sn可由二元生成等结果,可为进一步研究抽象群提供方便.  相似文献   

7.
渗流问题灰色数值模型的解法研究   总被引:5,自引:0,他引:5  
灰色数值模型的求解是研究灰色数值模型的一个重要问题 .本文根据灰集合、灰数及其灰色运算规则 ,在渗流系统的基本灰色数值模型的基础上 ,分析了求解这类模型的一整套灰色数值算法 ,并对灰色数值算法、普通算法和经典数值方法的计算结果进行了全面比较 ,论证了灰色数值算法对灰信息传递的正确性和对渗流系统描述的合理性 .  相似文献   

8.
基于网络拓扑的生物网络关键节点识别研究进展   总被引:1,自引:0,他引:1  
与生物实验方法相比,基于网络拓扑的生物信息学方法在关键节点识别上有独特优势.基于网络拓扑的关键节点识别主要依赖节点在生物网络中的拓扑特性,通过观察节点网络拓扑参数的大小、所处的路径或模块的结构及其动力特性,在一定程度上可以对其关键性进行推断.从节点的中心性测度、网络的拓扑参数及层次结构等几方面总结了生物网络及其节点的主要拓扑特征;比较了蛋白质网络、代谢网络及基因调控网络关键节点识别的主要方法;分析了节点拓扑参数计算、路径求解及模块的划分及识别算法;指出生物网络关键节点识别上存在识别率不高、不同研究结论的不一致甚至相互矛盾、现有算法对网络规模日益增长的不适应等问题,并提出解决问题的思路及进一步研究的方向.  相似文献   

9.
在求解鞍点问题的经典Uzawa算法收敛性的基础上,对预处理Uzawa算法收敛性做出进行进一步的研究,得到其收敛的充要条件及误差传播矩阵的谱半径;并将其应用到Mini元离散求解Stokes问题中,通过数值计算验证所得结论的正确性.  相似文献   

10.
在大中型建设项目施工进度控制网络计划中,有大量的节点和以节点构成的工作箭线,必须采用计算机编程进行时间参数、工期的计算,进而完成项目的优化与控制.以往的施工进度控制程序中,各种变量和时间参数一般皆用一维数组储存其信息,运算时以N阶一维数组变量来表达.系统则采用N×N阶二维矩阵来储存和运算上述全部信息,即各工作持续时间只采用一个[D_(i-j)]_(N×N)矩阵来储存和表达.算例结果表明,这样可大大减少程序篇幅,简化原始数据的输入.  相似文献   

11.
Aiming at constructing a delay and delay variation bounded Steiner tree in the real-time streaming media communication, in this paper, we discuss a multicast routing algorithm based on searching a directed graph (MRASDH). During the process of the construction of the multicast tree, some nodes and links in the network topology do not affect the outcome of the constructed tree. Therefore, based on the thought of shrinking the search space through deleting these non-relative nodes and edges to the utmost, the ant algorithm is utilized to generate a directed sub-graph of the network topology for each destination node, in which each node owns a bounded out-degree. And all these sub-graphs can be merged into a new directed graph that serves as the new search space. In the new space, the simulated annealing algorithm is applied to obtain a multicast tree that satisfies the condition for the optimization. The performance analysis and simulation results demonstrate that this algorithm can effectively construct a delay and delay variation bounded multicast tree. They also show that the algorithm have lower time complexity than the current ones, which means a much better result would be achieved when the system scale rises greatly.  相似文献   

12.
《Optimization》2012,61(6):1187-1201
ABSTRACT

Several optimization problems of modifying the weight of vertices in rooted trees, some of which are special cases of the inverse 1-median problem, are solved. Such problems arise in Very Large Scale Integration (VLSI) design of hardware security circuits, circuit synchronization, and analog-to-digital converters. These problems require assigning costly hardware (demands) to the leaves of rooted trees. One common property of these problems is that a resource allocated to an internal node can be shared by the entire sub-tree emanated at the node. Two types of problems are studied here. (1) A tree node employs an addition operation and the demands at the leaves are obtained by summing the resources allocated to nodes along the root-to-leaf paths. A linear-time bottom-up algorithm is shown to minimize the total resources allocated to tree nodes. (2) A tree’s node employs a multiplication operation and the demands at the leaves are obtained by multiplying the resources allocated to nodes along the root-to-leaf paths. A bottom-up dynamic programming algorithm is shown to minimize the total resources allocated to the tree’s nodes. While the above problems are usually solved by design engineers heuristically, this paper offers optimal solutions that can be easily programmed in CAD tools.  相似文献   

13.
In this paper, we address a variant of the vehicle routing problem called the vehicle routing problem with time windows and multiple routes. It considers that a given vehicle can be assigned to more than one route per planning period. We propose a new exact algorithm for this problem. Our algorithm is iterative and it relies on a pseudo-polynomial network flow model whose nodes represent time instants, and whose arcs represent feasible vehicle routes. This algorithm was tested on a set of benchmark instances from the literature. The computational results show that our method is able to solve more instances than the only other exact method described so far in the literature, and it clearly outperforms this method in terms of computing time.  相似文献   

14.
We first describe expected values of sojourn times for semi-stationary (or synchronous) networks. This includes sojourn times for units and sojourn times for the entire network. A typical sojourn time of a unit is the time it spends in a sector (set of nodes) while it travels through the network, and a typical network sojourn time is the busy period of a sector. Our results apply to a wide class of networks including Jackson networks with general service times, general Markov or regenerative networks, and networks with batch processing and concurrent movement of units. The results also shed more light on when Little's law for general systems, holds for expectations as well as for limiting averages. Next, we describe the expectation of a unit's travel time on a general route in a basic Markov network process (such as a Jackson process). Examples of travel times are the time it takes for a unit to travel from one sector to another, and the time between two successive entrances to a node by a unit. Finally, we characterize the distributions of the sojourn times at nodes on certain overtake-free routes and the travel times on such routes for Markov network processes.This research was supported in part by the Air Force Office of Scientific Research under contract 89-0407 and NSF grant DDM-9007532.  相似文献   

15.
作为轴辐式枢纽网络关键因素的节点,尤其是起到中转作用的枢纽节点是网络稳定运行的重要环节。当这些节点被中断时,将对整个网络产生严重的影响。最直接的表现方式即是网络运行成本的急剧上升。因此本文研究如何识别对网络成本具有决定性影响的关键节点。首先,提出枢纽功能性中断问题和模型,并通过禁忌搜索算法进行求解。最后通过中国航空实例验证模型和算法在实际应用中的有效性。结果显示模型和算法能够有效识别出中国航空网络较重要的关键城市以及相对影响较弱的城市。可以为资源有限情况下,中国航空网络中各城市防御设施的合理分级和部署,为重点保护城市的鉴别提供依据和帮助。  相似文献   

16.
In this paper we present a two-stage stochastic mixed 0–1 dynamic multicommodity model and algorithm for determining the enrouting protocol in the telecommunications network under uncertainty. Given the network connectivity, node processing and buffer and arc flow capacity, the aim is to determine the outgoing arc for the information flow reaching a given node for each destination terminal node (i.e., obtaining the route to be followed by the information flow from each origin terminal node to each destination terminal node). The origin–destination (O–D) flow matrix is given by the number of information packets to be sent from the origin terminal nodes to the destination terminal nodes along a given time horizon, i.e., a call scale. The uncertainty in the O–D flow matrix is treated via a scenario tree approach. The main goal is to minimize a composite function of the expected lost information, a penalization of the deviation from the FIFO strategy on the information flow entering the network, and the expected number of nodes visited by the information packets. A mixture of an enrouting arc generation scheme and a genetic algorithm for obtaining the enrouting protocols over the scenarios is presented. The tool presented in this paper could be used for simulating the enrouting protocols to analyze the saturation of the network, but it has a time constraint for real time operation. Faster algorithms are needed to define the routing tables during the operation stage. Computational experience is reported.  相似文献   

17.
The optimal path-finding algorithm which is an important module in developing route guidance systems and traffic control systems has to provide correct paths to consider U-turns, P-turns, and no-left-turns in urban transportation networks.Traditional methods which have been used to consider those regulations on urban transportation networks can be categorized into network representation and algorithmic methods like the vine-building algorithm. First, network representation methods use traditional optimal path-finding algorithms with modifications to the network structure: for example, just adding dummy nodes and links to the existing network allows constraint-search in the network. This method which creates large networks is hard to implement and introduces considerable difficulties in network coding. With the increased number of nodes and links, the memory requirement tremendously increases, which causes the processing speed to slow down. For these reasons, the method has not been widely accepted for incorporating turning regulations in optimal path-finding problems in transportation networks. Second, algorithmic methods, as they are mainly based on the vine-building algorithm, have been suggested for determining optimal path for networks with turn penalties and prohibitions. However, the algorithms, although they nicely reflect the characteristics of urban transportation networks, frequently provide infeasible or suboptimal solutions.The algorithm to be suggested in this research is a method which is basically based on Dijkstra's algorithm [1] and the tree-building algorithm used to construct optimal paths. Unlike the traditional node labeling algorithms which label each node with minimum estimated cost, this algorithm labels each link with minimum estimated cost.Comparison with the vine-building algorithm shows that the solution of the link-labeling algorithm is better than that of the vine-building algorithm which very frequently provides suboptimal solutions. As a result, the algorithm allows turning regulations, while providing an optimal solution within a reasonable time limit.  相似文献   

18.
In this paper, we consider a variant of the open vehicle routing problem in which vehicles depart from the depot, visit a set of customers, and end their routes at special nodes called driver nodes. A driver node can be the home of the driver or a parking lot where the vehicle will stay overnight. The resulting problem is referred to as the open vehicle routing problem with driver nodes (OVRP-d). We consider three classes of OVRP-d: with no time constraints, with a maximum route duration, and with both a maximum route duration as well as time deadlines for visiting customers. For the solution of these problems, which are not addressed previously in the literature, we develop a new tabu search heuristic. Computational results on randomly generated instances indicate that the new heuristic exhibits a good performance both in terms of the solution quality and computation time.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号