首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22篇
  免费   0篇
综合类   3篇
数学   8篇
物理学   11篇
  2014年   2篇
  2013年   4篇
  2011年   1篇
  2009年   1篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2005年   1篇
  2003年   3篇
  2002年   1篇
排序方式: 共有22条查询结果,搜索用时 0 毫秒
1.
Fiber-Wireless (FiWi) access network is now becoming a promising architecture for access networks. Survivability is one of the key issues in the planning of FiWi access network because many high-rate traffic flows may be interrupted in case of a single fiber failure, which can cause a huge traffic loss. In addition, the users need ubiquitous broadband access that can be provided by FiWi access network. In this paper, we propose the protection approach called Maximum Covering Planning with Survivability (MCPS), including Integer Linear Programming (ILP) solution and heuristic solution, for the planning of survivable FiWi access network against single distribution fiber failure. The proposed approach aims at maximum coverage under the constraints of network connectivity. When a distribution fiber is broken, the interrupted Optical Network Unit (ONU) can transmit traffic to its backup ONU through the wireless paths between them. Simulation results show the network coverage of clients for different number of ONUs in different urban areas, and demonstrate the relationship between network coverage and the cost represented by the number of WiFi routers.  相似文献   
2.
Formalization for problems of multicriteria decision making under uncertainty is constructed in terms of guaranteed and weak estimates. A relevant definition of the vector maximinimax value is given. Parameterization and approximation of maximum, minimax, and maximinimax values based on the inverse logical convolution are suggested. An application for multicommodity networks is considered. Received: December 13, 2000 / Accepted: August 21, 2001?Published online May 8, 2002  相似文献   
3.
This paper considers the cycle covering of complete graphs motivated by the design of survivable WDM networks, where the requests are routed on INF‐networks which are protected independently from each other. The problem can be stated as follows: for a given graph G, find a cycle covering of the edge set of Kn, where V(Kn) = V(G), such that each cycle in the covering satisfies the disjoint routing constraint (DRC7rpar;, relatively to G, which can be stated as follows: to each edge of Kn we associate in G a path and all the paths associated to the edges of a cycle of the covering must be vertex disjoint. Here we consider the case where G = Cn, a ring of size n and we want to minimize the number of cycles in the covering. We give optimal solutions for the problem as well as for variations of the problem, namely, its directed version and the case when the cycle length is fixed to 4. © 2003 Wiley Periodicals, Inc. J Combin Designs 11: 100–112, 2003; Published online in Wiley InterScience ( www.interscience.wiley.com ). DOI 10.1002/jcd.10040  相似文献   
4.
We consider a generalized version of the rooted connected facility location problem which occurs in planning of telecommunication networks with both survivability and hop-length constraints. Given a set of client nodes, a set of potential facility nodes including one predetermined root facility, a set of optional Steiner nodes, and the set of the potential connections among these nodes, that task is to decide which facilities to open, how to assign the clients to the open facilities, and how to interconnect the open facilities in such a way, that the resulting network contains at least λ edge-disjoint paths, each containing at most H edges, between the root and each open facility and that the total cost for opening facilities and installing connections is minimal. We study two IP models for this problem and present a branch-and-cut algorithm based on Benders decomposition for finding its solution. Finally, we report computational results.  相似文献   
5.
This article compares the performance of WDM lightpath protection and IP LSP protection schemes for IP-over-WDM networks. A mathematical formulation of the maximum throughput problem is presented and analytical expressions for recovery time are derived for both schemes. The throughputs and recovery times are analyzed and compared. Results show that the IP LSP protection scheme presents higher throughputs then WDM lightpath protection. The IP LSP protection scheme, providing individual IP LSP protection has, however, scalability problems. This scheme presents high recovery times when a failure affects many lightpaths and many hops are allowed for the primary routes of IP LSPs.  相似文献   
6.
Abstract

A survivable wavelength division multiplexing passive optical network enabling both point-to-point service and broadcast service is presented and demonstrated. This architecture provides an automatic traffic recovery against feeder and distribution fiber link failure, respectively. In addition, it also simplifies the protection design for multiple services transmission in wavelength division multiplexing passive optical networks.  相似文献   
7.
基于SRLG约束和资源共享的交迭段保护机制研究   总被引:1,自引:0,他引:1  
孙翔  陆月明  纪越峰 《光子学报》2009,38(6):1386-1391
通过对共享风险链路组约束机制和交迭段保护机制的分析,将两者相结合并根据工作和保护路径分别采用动态链路权重调整,提出了一种基于共享风险链路组不相关的交迭段共享保护算法.交迭段共享保护算法在共享风险链路组不相关的约束条件下,为整个工作路由提供了多个交迭的保护段,并给出了一种能够合理有效选择这些交迭保护段的方法.对交迭段共享保护算法的分析和仿真结果表明,与以往保护算法相比,交迭段共享保护算法不但大大提高了网络连接的可靠性,而且还通过不同交迭保护段间资源的合理共享,有效地提高了网络资源的利用率.  相似文献   
8.
This paper considers the problem of augmenting a given graph by a cheapest possible set of additional edges in order to make the graph vertex-biconnected. A real-world instance of this problem is the enhancement of an already established computer network to become robust against single node failures. The presented memetic algorithm includes effective preprocessing of problem data and a fast local improvement strategy which is applied before a solution is included into the population. In this way, the memetic algorithm's population consists always of only feasible, locally optimal solution candidates. Empirical results on two sets of test instances indicate the superiority of the new approach over two previous heuristics and an earlier genetic algorithm.  相似文献   
9.
为使系统在遭受攻击或入侵时仍能保证关键服务的持续提供,从宏观策略角度提出一种网络可生存性的行为选择模型.首先分析模糊矩阵博弈原理和网络可生存性行为机理,并确定其拟合点,在此基础上建立了基于模糊矩阵博弈的网络可生存性策略选择模型框架及其动态的决策分析方法.实例分析和验证的结果表明,该方法可以有效地为网络系统的可生存性提供保证.  相似文献   
10.
主要利用图论、概率统计及优化理论对Ad-Hoc网络进行了数学建模.研究了等圆(不等圆)区域覆盖、带障碍区域的覆盖、确定性点覆盖、信道分配、抗毁度、节能性和通信质量等问题.定义了覆盖效率、抗毁性概率指标、覆盖系数、期望覆盖系数、网络寿命等一系列评价系数和衡量标准,提出了基于单位距离覆盖系数和期望覆盖系数的启发式寻优算法,并编程加以实现,得到较满意的近似解.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号