首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Timely imaging examinations are critical for stroke patients due to the potential life threat. We have proposed a contract-based Magnetic Resonance Imaging (MRI) reservation process [1] in order to reduce their waiting time for MRI examinations. Contracted time slots (CTS) are especially reserved for Neural Vascular Department (NVD) treating stroke patients. Patients either wait in a CTS queue for such time slots or are directed to Regular Time Slot (RTS) reservation. This strategy creates “unlucky” patients having to wait for lengthy RTS reservation. This paper proposes and analyzes other contract implementation strategies called RTS reservation strategies. These strategies reserve RTS for NVD but do not direct patients to regular reservations. Patients all wait in the same queue and are served by either CTS or RTS on a FIFO (First In First Out) basis. We prove that RTS reservation strategies are able to reduce the unused time slots and patient waiting time. Extensive numerical results are presented to show the benefits of RTS reservation and to compare various RTS reservation strategies.  相似文献   

2.
Directional antenna offers a variety of benefits for wireless networks, one of which is the increased spatial reuse ratio. This feature gives rise to the improved throughput in resource limited wireless ad hoc networks. In this paper, we formulate the maximum flow problem as an optimization problem in wireless ad hoc networks with switched beam directional antennas constrained by interference. We demonstrate how to solve this optimization problem. It turns out that the proposed method works for both single beam antenna and multi-beam antenna, with minor variation of the constraints.  相似文献   

3.
In this paper, we propose a simple theoretical model to compute the maximum spatial reuse feasible in a VANET. We focus on the ad hoc mode of the IEEE 802.11p standard. Our model offers simple and closed-form formulas on the maximum number of simultaneous transmitters, and on the distribution of the distance between them. It leads to an accurate upper bound on the maximum capacity. In order to validate our approach, results from the analytical models are compared to simulations performed with the network simulator NS-3. We take into account different traffic distributions (traffic of vehicles), and study the impact of this traffic on capacity. An application of this work is the parameterization of the CSMA/CA mechanism. Such an optimization is developed at the end of this paper.  相似文献   

4.
In this paper, the problem of finding optimal paths in mobile ad hoc networks is addressed. More specifically, a novel bicriteria optimization model, which allows the energy consumption and the link stability of mobile nodes to be taken into account simultaneously, is presented. In order to evaluate the validity of the proposed model, a greedy approach is devised. Some preliminary computational experiments have been carried out, in a simulation environment. The numerical results are very encouraging, showing the correctness of the proposed model. Indeed, the selection of a shorter route leads to a more stable route, but to a greater energy consumption. On the other hand, if longer routes are selected the route fragility is increased, but the average energy consumption is reduced.  相似文献   

5.
We study the flow of two immiscible fluids of different density and mobility in a porous medium. If the heavier phase lies above the lighter one, the interface is observed to be unstable. The two phases start to mix on a mesoscopic scale and the mixing zone grows in time—an example of evolution of microstructure. A simple set of assumptions on the physics of this two‐phase flow in a porous medium leads to a mathematically ill‐posed problem—when used to establish a continuum free boundary problem. We propose and motivate a relaxation of this “nonconvex” constraint of a phase distribution with a sharp interface on a macroscopic scale. We prove that this approach leads to a mathematically well‐posed problem that predicts shape and evolution of the mixing profile as a function of the density difference and mobility quotient. © 1999 John Wiley & Sons, Inc.  相似文献   

6.
In this paper we address the Min-Power Broadcast problem in wireless ad hoc networks. Given a network with an identified source node w, the Min-Power Broadcast (MPB) problem is to assign transmission range to each node such that communication from w to other nodes is possible and the total energy consumption is minimized.

As the problem is NP-Hard we first propose a simulated annealing algorithm for the MPB problem. Utilizing a special node selection mechanism in its neighborhood structure the algorithm is designed in a way enabling an efficient power consumption evaluation and search for neighboring solutions. We then combine the algorithm with a decomposition approach to enhance its performance. This is achieved by decomposing the master problem and performing metropolis chain of the simulated annealing only on the much smaller subproblems resulting from decomposition. Results from a comprehensive computational study indicate the efficiency and effectiveness of the proposed algorithms.  相似文献   


7.
With the increase in deployment of multi-hop wireless networks and the desire for seamless internet access through ubiquitous connectivity, the inter-working of heterogeneous multi-hop wireless networks will become prominent in the near future. To complement the quest for ubiquitous service access, multi-mode mobile terminals are now in existence. Inter-working heterogeneous multi-hop wireless networks can provide seamless connectivity for such multi-mode nodes but introduces a number of challenges due to its dynamic network topology. One of the challenges in ensuring seamless access to service through these terminals in an inter-working environment is the selection of reliable wireless point-to-point links by the multi-hop nodes. A wireless link is said to be reliable if its radio attribute satisfies the minimum requirements for successful communication. Successful communication is specified by metrics such as signal to interference and noise ratio (SINR), probability of bit error etc. However, the multi-hop wireless networks being inter-worked may operate with different link layer protocols. Therefore, how can the reliability of a wireless link be estimated irrespective of the link level technologies implemented in the networks being inter-worked so that optimal paths can be used for multi-hopping between nodes? In this paper, a generic framework which can estimate the reliability of a link in inter-working multi-hop wireless network is presented. The framework uses the relationship between inter-node interference, SINR and the probability of bit error to determine the reliability of a wireless link between two nodes. There is a threshold for the probability of bit error on a link for the link to be termed reliable. Using parameters such as the SINR threshold, nodes’ transmission power, link distance and interfering node density, the framework can evaluate the reliability of a link in an inter-working multi-hop network.  相似文献   

8.
Mobile ad hoc networks (MANETs) are dynamic networks formed on-the-fly as mobile nodes move in and out of each others' transmission ranges. In general, the mobile ad hoc networking model makes no assumption that nodes know their own locations. However, recent research shows that location-awareness can be beneficial to fundamental tasks such as routing and energy-conservation. On the other hand, the cost and limited energy resources associated with common, low-cost mobile nodes prohibits them from carrying relatively expensive and power-hungry location-sensing devices such as GPS. This paper proposes a mechanism that allows non-GPS-equipped nodes in the network to derive their approximated locations from a limited number of GPS-equipped nodes. In our method, all nodes periodically broadcast their estimated location, in terms of a compressed particle filter distribution. Non-GPS nodes estimate the distance to their neighbors by measuring the received signal strength of incoming messages. A particle filter is then used to estimate the approximated location, along with a measure of confidence, from the sequence of distance estimates. Simulation studies show that our solution is capable of producing good estimates equal or better than the existing localization methods such as APS-Euclidean for the more difficult scenario when the network connectivity is low.  相似文献   

9.
Critical resources are often shared among different classes of customers. Capacity reservation allows each class of customers to better manage priorities of its customers but might lead to unused capacity. Unused capacity can be avoided or reduced by advance cancelation. This paper addresses the service capacity reservation for a given class of customers. The reservation process is characterized by: contracted time slots (CTS) reserved for the class of customers, requests for lengthy regular time slots (RTS) and two advance cancelation modes to cancel CTS one-period or two-period before. The optimal control under a given contract is formulated as an average cost Markov Decision Process (MDP) in order to minimize customer waiting times, unused CTS and CTS cancelation. Structural properties of optimal control policies are established via the corresponding discounted cost MDP problem. Numerical results show that two-period advance CTS cancelation can significantly improve the contract-based solution.  相似文献   

10.
A wide range of applications for wireless ad hoc networks are time-critical and impose stringent requirement on the communication latency. One of the key communication operations is to broadcast a message from a source node. This paper studies the minimum latency broadcast scheduling problem in wireless ad hoc networks under collision-free transmission model. The previously best known algorithm for this NP-hard problem produces a broadcast schedule whose latency is at least 648(rmax/rmin)^2 times that of the optimal schedule, where rmax and rmin are the maximum and minimum transmission ranges of nodes in a network, respectively. We significantly improve this result by proposing a new scheduling algorithm whose approximation performance ratio is at most (1 + 2rmax/rmin)^2+32, Moreover, under the proposed scheduling each node just needs to forward a message at most once.  相似文献   

11.
We propose a new strategy for reducing the amount of latency and energy consumption in Blocking Expanding Ring Search (BERS) and enhanced Blocking Expanding Ring Search (BERS*) for mobile ad hoc networks (MANETs). BERS and BERS* are respectively energy and energy–time efficient route discovery protocols for MANETs as compared to conventional Expanding Ring Search (ERS). In this study, we identify unnecessary waiting time caused by a STOP/END instruction in BERS/BERS* and explore the potential of further improvement of their time efficiency. This leads to tBERS and tBERS*, the improved BERS and BERS* respectively. In tBERS/tBERS*, a route node may also issue the STOP/END instruction to terminate flooding. We implement this idea in algorithms, conduct analysis, and achieve further latency reduction in both tBERS and tBERS* as well as the energy saving in tBERS*.  相似文献   

12.
Standard analyses of wireless random access protocols that are available in the literature assume negligible propagation delay between any two nodes. This assumption holds good in reasonably short-range terrestrial RF (radio frequency) wireless networks. On the contrary, in wireless communications involving acoustic wave propagation, as in underwater wireless networks, even short distance propagation has appreciably large propagation delay. This observation has led to several recent simulation and experimental studies on underwater Aloha and slotted-Aloha (S-Aloha) protocols and also a few new proposals on random access protocols for underwater wireless ad hoc networks (UWN). To study the efficiency of more advanced multiaccess communication protocols for UWN, it is important to benchmark their performances with respect to the two basic random access protocols, Aloha and S-Aloha. This paper provides an analytic framework to capture the performance of Aloha and S-Aloha protocols in an underwater environment with high and random internodal signal propagation delay. The performance of underwater Aloha and S-Aloha are contrasted with those in short-range terrestrial RF wireless networks. The analysis shows that random internodal propagation delay has no effect on the underwater Aloha performance. It also sheds light on the throughput degradation of underwater S-Aloha with a slotting concept that achieves RF S-Aloha equivalent one-slot vulnerability. Additionally, a modified slotting concept is introduced where the slot size is judiciously reduced such that even by allowing some collisions the overall system throughput can be increased. Our calculations show that, with the modified slotting approach up to 17% throughput performance gain can be achieved over the naive (RF S-Aloha equivalent) slotting approach in UWN. Our analytic results are supported by discrete event simulations.  相似文献   

13.
Single-index models have found applications in econometrics and biometrics, where multidimensional regression models are often encountered. This article proposes a nonparametric estimation approach that combines wavelet methods for nonequispaced designs with Bayesian models. We consider a wavelet series expansion of the unknown regression function and set prior distributions for the wavelet coefficients and the other model parameters. To ensure model identifiability, the direction parameter is represented via its polar coordinates. We employ ad hoc hierarchical mixture priors that perform shrinkage on wavelet coefficients and use Markov chain Monte Carlo methods for a posteriori inference. We investigate an independence-type Metropolis-Hastings algorithm to produce samples for the direction parameter. Our method leads to simultaneous estimates of the link function and of the index parameters. We present results on both simulated and real data, where we look at comparisons with other methods.  相似文献   

14.
We analyze the performance of CSMA in multi-channel wireless networks, accounting for the random nature of traffic. Specifically, we assess the ability of CSMA to fully utilize the radio resources and in turn to stabilize the network in a dynamic setting with flow arrivals and departures. We prove that CSMA is optimal in the ad-hoc mode, when each flow goes through a unique dedicated wireless link from a transmitter to a receiver. It is generally suboptimal in infrastructure mode, when all data flows originate from or are destined to the same set of access points, due to the inherent bias of CSMA against downlink traffic. We propose a slight modification of CSMA that we refer to as flow-aware CSMA, which corrects this bias and makes the algorithm optimal in all cases. The analysis is based on some time-scale separation assumption which is proved valid in the limit of large flow sizes.  相似文献   

15.
针对车载自组网中存在的安全隐患,提出一种身份认证机制.将门限RSA签名技术应用到车载自组网中,从而保证了车载自组网中节点通信信息的保密性、真实性、完整性及不可否认性.实验结果表明,在成员数量和门限值不断变换下,分发时间和合成时间变换比较稳定,说明此模型是稳定性较好的模型,所以将门限RSA签名技术应用于保证车载自组网节点通信的信息安全性是正确可行的.  相似文献   

16.
We introduce a novel class of tandem queueing networks which arise in modeling the congestion behavior of wireless multi-hop networks with distributed medium access control. These models provide valuable insight in how the network performance in terms of throughput depends on the back-off mechanism that governs the competition among neighboring nodes for access to the medium. The models fall at the interface between classical queueing networks and interacting particle systems, and give rise to high-dimensional stochastic processes that challenge existing methodologies. We present various open problems and conjectures, which are supported by partial results for special cases and limit regimes as well as simulation experiments.  相似文献   

17.
The problem of finding minimum guard covers is NP-hard for simple polygons and open for simple orthogonal polygons. Alternative definitions of visibility have been considered for orthogonal polygons. In this paper we try to determine the complexity of finding guard covers in orthogonal polygons by considering periscope visibility. Under periscope visibility, two points in an orthogonal polygon are visible if there is an orthogonal path with at most one bend that connects them without intersecting the exterior of the polygon. We show that finding minimum periscope guard (as well as k-periscope and s-guard) covers is NP-hard for 3-d grids. We present an O(n3) algorithm for finding minimum periscope guard covers for simple grids and discuss how to extend the algorithm to obtain minimum k-periscope guard covers. We show that this algorithm can be applied to obtain minimum periscope guard covers for a class of simple orthogonal polygon in O(n3).  相似文献   

18.
Conclusions Equations were derived for calculating RTS in the gap part and the zone of bending the coils and bars of the stator winding; it was shown that in calculating the RTS in the bending zones, it is necessary to take into account the presence of residual stresses in the copper of the bar. The calculated and experimental results indicate the high concentration of the stresses X in the bending zones, These regions are most critical from the view-point of possible disruption of the monolithic nature and reduction in the electrical strength of the housing insulation.Paper presented at the Fifth All-Union Conference on the Mechanics of Polymer and Composite Materials (Riga, October, 1983).Translated from Mekhanika Kompozitnykh Materialov, No. 5, pp. 868–872, September–October, 1983.  相似文献   

19.
20.
A fundamental problem for wireless ad hoc networks is the assignment of suitable transmission powers to the wireless devices such that the resulting communication graph is connected. The goal is to minimize the total transmit power in order to maximize the life‐time of the network. Our aim is a probabilistic analysis of this power assignment problem. We prove complete convergence for arbitrary combinations of the dimension d and the distance‐power gradient p. Furthermore, we prove that the expected approximation ratio of the simple spanning tree heuristic is strictly less than its worst‐case ratio of 2. Our main technical novelties are two‐fold: First, we find a way to deal with the unbounded degree that the communication network induced by the optimal power assignment can have. Minimum spanning trees and traveling salesman tours, for which strong concentration results are known in Euclidean space, have bounded degree, which is heavily exploited in their analysis. Second, we apply a recent generalization of Azuma‐Hoeffding's inequality to prove complete convergence for the case for both power assignments and minimum spanning trees (MSTs). As far as we are aware, complete convergence for p > d has not been proved yet for any Euclidean functional. © 2017 The Authors Random Structures & Algorithms Published by Wiley Periodicals, Inc., 51, 483–505, 2017  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号