67 resultados para Constraint-based routing

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Routing in ad hoc networks faces significant challenges due to node mobility and dynamic network topology. In this work we propose the use of mobility prediction to reduce the search space required for route discovery. A method of mobility prediction making use of a sectorized cluster structure is described with the proposal of the Prediction based Location Aided routing (P-LAR) protocol. Simulation study and analytical results of the of P-LAR find it to offer considerable saving in the amount of routing traffic generated during the route discovery phase.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study contributes to work in baggage handling system (BHS) control, specifically dynamic bag routing. Although studies in BHS agent-based control have examined the need for intelligent control, but there has not been an effort to explore the dynamic routing problem. As such, this study provides additional insight into how agents can learn to route in a BHS. This study describes a BHS status-based routing algorithm that applies learning methods to select criteria based on routing decisions. Although numerous studies have identified the need for dynamic routing, little analytic attention has been paid to intelligent agents for learning routing tables rather than manual creation of routing rules. We address this issue by demonstrating the ability of agents to learn how to route based on bag status, a robust method that is able to function in a variety of different BHS designs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a method for converting unrestricted fiction text into a time-based graphical form. Key concepts extracted from the text are used to formulate constraints describing the interaction of entities in a scene. The solution of these constraints over their respective time intervals provides the trajectories for these entities in a graphical representation.

Three types of entity are extracted from fiction books to describe the scene, namely Avatars, Areas and Objects. We present a novel method for modeling the temporal aspect of a fiction story using multiple time-line representations after which the information extracted regarding entities and time-lines is used to formulate constraints. A constraint solving technique based on interval arithmetic is used to ensure that the behaviour of the entities satisfies the constraints over multiple universally quantified time intervals. This approach is demonstrated by finding solutions to multiple time-based constraints, and represents a new contribution to the field of Text-to-Scene conversion. An example of the automatically produced graphical output is provided in support of our constraint-based conversion scheme.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Human associated delay-tolerant network (HDTN) is a new delay-tolerant network where mobile devices are associated with humans. It can be viewed from both their geographic and social dimensions. The combination of these different dimensions can enable us to more accurately comprehend a delay-tolerant network and consequently use this multi-dimensional information to improve overall network efficiency. Alongside the geographic dimension of the network which is concerned with geographic topology of routing, social dimensions such as social hierarchy can be used to guide the routing message to improve not only the routing efficiency for individual nodes, but also efficiency for the entire network.

We propose a multi-dimensional routing protocol (M-Dimension) for the human associated delay-tolerant network which uses the local information derived from multiple dimensions to identify a mobile node more accurately. Each dimension has a weight factor and is organized by the Distance Function to select an intermediary and applies multi-cast routing. We compare M-Dimension to existing benchmark routing protocols using the MIT Reality Dataset, a well-known benchmark dataset based on a human associated mobile network trace file. The results of our simulations show that M-Dimension has a significant increase in the average success ratio and is very competitive when End-to-End Delay of packet delivery is used in comparison to other multi-cast DTN routing protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Location service provides location information of robots to sensors, to enable event reporting. Existing protocols apply partial flooding to trace robots, leading to poor scalability. We propose a novel scalable location service, which applies hierarchical rings to update robot location and guide routing toward it. Each mobile robot creates a set of hierarchical update rings of doubling radii. Whenever the robot leaves its k-th ring, it updates its new location to sensors along its newly defined k-th ring, and re-defines all smaller rings for future decisions. When a sensor needs to route to the mobile robot, it starts searching from its smallest ring and sends location query to the sensors along the ring. If the query fails, the search then extends to the next larger ring, until it intersects an existing update ring, from which the search can be directed towards reported center. The location of destination is updated whenever another more recent ring is intersected. Our scheme guarantees message delivery if robot remains connected to sensors during its move. The theoretical analysis and simulation results demonstrate better scalability than previous protocols for the similar goal. © 2014 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless mesh networks are widely applied in many fields such as industrial controlling, environmental monitoring, and military operations. Network coding is promising technology that can improve the performance of wireless mesh networks. In particular, network coding is suitable for wireless mesh networks as the fixed backbone of wireless mesh is usually unlimited energy. However, coding collision is a severe problem affecting network performance. To avoid this, routing should be effectively designed with an optimum combination of coding opportunity and coding validity. In this paper, we propose a Connected Dominating Set (CDS)-based and Flow-oriented Coding-aware Routing (CFCR) mechanism to actively increase potential coding opportunities. Our work provides two major contributions. First, it effectively deals with the coding collision problem of flows by introducing the information conformation process, which effectively decreases the failure rate of decoding. Secondly, our routing process considers the benefit of CDS and flow coding simultaneously. Through formalized analysis of the routing parameters, CFCR can choose optimized routing with reliable transmission and small cost. Our evaluation shows CFCR has a lower packet loss ratio and higher throughput than existing methods, such as Adaptive Control of Packet Overhead in XOR Network Coding (ACPO), or Distributed Coding-Aware Routing (DCAR).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper extends the conditions of the cluster-based routing protocols in terms of general algorithm complexity of data fusion, general compressing ratio of data fusion, and network area with long distance. Corresponding three general evaluation methods to evaluate the energy efficiency of the cluster-based routing protocols such as LEACH, PEGASIS, and BCDCP are provided. Moreover, three facts are found in them: (1) High-level software energy macro model is used to compute the energy dissipation of general data fusion software and make the constant value of energy dissipation of 1-bit data fusion an especial instance. (2) Multi-hop energy efficiency is related to the radio hardware parameters and the dynamic topology of network and the above protocols do not exploit the best use of the energy efficiency of multi-hop scheme. (3) High-energy dissipation non-cluster-head nodes, whose number changes with the density of the sensor nodes in clusters, worsen the death of nodes. The numerical results of experiments reprove these discoveries. Furthermore, they provide helpful guide for improving the above routing protocols to extent their application ranges.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper we examine the geometrically constrained optimization approach to localization with hybrid bearing (angle of arrival, AOA) and time difference of  arrival (TDOA) sensors. In particular, we formulate a constraint on the measurement errors which is then used along with constraint-based optimization tools in order to estimate the maximum likelihood values of the errors given an appropriate cost function. In particular we focus on deriving a localization algorithm for stationary target localization in the so-called adverse localization geometries where the relative positioning of the sensors and the target do not readily permit accurate or convergent localization using traditional approaches. We illustrate this point via simulation and we compare our approach to a number of different techniques that are discussed in the literature.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Constraint based tools for architectural design exploration need to satisfy aesthetic and functional criteria as well as combine discrete and continuous modes of exploration. In this paper, we examine the possibilities for stochastic processes in design space exploration.

Specifically, we address the application of a stochastic wind motion model to the subdivision of an external building envelope into smaller discrete components. Instead of deterministic subdivision constraints, we introduce explicit uncertainty into the system of subdivision. To address these aims, we develop a model of stochastic wind motion; create a subdivision scheme that is governed by the wind model and explore a design space of a facade subdivision problem. A discrete version of the facade, composed of light strips and panels, based on the bamboo elements deformed by continuous wind motion, is developed. The results of the experiments are presented in the paper.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Sensor nodes are closely tied with their geographic location and their connectivity. In recent years many routing protocols have been developed to provide efficient strategy. But most of them are either focus on the geographic proximity or on connectivity. However in sparse network, Geographic routing would fail at local dead ends where a node has no neighbour closer to destination. In contrast, connectivity-based routing may result in non-optimal path and overhead management. In this paper we designed a scalable and distributed routing protocol, GeoConnect, which considers geographic proximity and connectivity for choosing next hop. In GeoConnecl, we construct a new naming system that integrates geographic and connectivity information into a node identification. We use dissimilarity function to compute the dissimilarity and apply a distributed routing algorithm to route packets. The experimental results show that GeoConnect routing provides robust and better performance than sole geographic routing or connectivity routing.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Service-oriented wireless sensor networks (WSNs) are being paid more and more attention because service computing can hide complexity of WSNs and enables simple and transparent access to individual sensor nodes. Existing WSNs mainly use IEEE 802.15.4 as their communication specification, however, this protocol suite cannot support IP-based routing and service-oriented access because it only specifies a set of physical- and MAC-layer protocols. For inosculating WSNs with IP networks, IEEE proposed a 6LoWPAN (IPv6 over LoW Power wireless Area Networks) as the adaptation layer between IP and MAC layers. However, it is still a challenging task how to discover and manage sensor resources, guarantee the security of WSNs and route messages over resource-restricted sensor nodes. This paper is set to address such three key issues. Firstly, we propose a service-oriented WSN architectural model based on 6LoWPAN and design a lightweight service middleware SOWAM (service-oriented WSN architecture middleware), where each sensor node provides a collection of services and is managed by our SOWAM. Secondly, we develop a security mechanism for the authentication and secure connection among users and sensor nodes. Finally, we propose an energyaware mesh routing protocol (EAMR) for message transmission in a WSN with multiple mobile sinks, aiming at prolonging the lifetime of WSNs as long as possible. In our EAMR, sensor nodes with the residual energy lower than a threshold do not forward messages for other nodes until the threshold is leveled down. As a result, the energy consumption is evened over sensor nodes significantly. The experimental results demonstrate the feasibility of our service-oriented approach and lightweight middleware SOWAM, as well as the effectiveness of our routing algorithm EAMR.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Hundreds or thousands of wireless sensor nodes with limited energy resource are randomly scattered in the observation fields to extract the data messages for users. Because their energy resource cannot be recharged, energy efficiency becomes one of the most important problems. LEACH is an energy efficient protocol by grouping nodes into clusters and using cluster heads (CH) to fuse data before transmitting to the base station (BS). BCDCP improves LEACH by introducing a minimal spanning tree (MST) to connect CHs and adopting iterative cluster splitting algorithm to choose CHs or form clusters. This paper proposes another innovative cluster-based routing protocol named dynamic minimal spanning tree routing protocol (DMSTRP), which improves BCDCP by introducing MSTs instead of clubs to connect nodes in clusters. Simulation results show that DMSTRP excels LEACH and BCDCP in terms of both network lifetime and delay when the network size becomes large.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Compared to traditional wired video sensor networks to supervise a residential district, Wireless Video-based Sensor Networks (WVSN) can provide more detail and precise information while reduce the cost. However, state-of-the-art low cost wireless video-based sensors have very constrained resources such as low bandwidth, small storage, limited processing capability, and limited energy resource. Also, due to the special sensing range of video-based sensors, cluster-based routing is not as effective as it apply to traditional sensor networks. This paper provides a novel real-time change mining algorithm based on an extracted profile model of moving objects learnt from frog's eyes. Example analysis shows the extracted profile would not miss any important semantic images to send to the Base Station for further hazards detection, while efficiently reducing futile video stream data to the degree that nowadays wireless video sensor can realize. Thus it makes WVSN available to surveillance of residential districts.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Nagara tradition of temple building created a rich corpus of Latina (single-spired) temples spread across Northern India between the fifth and thirteenth centuries. Computing methods offer a distinct methodology for reconstructing the genesis and evolution of geometry in this tradition over time. This paper reports a hybrid technique, comprising three distinct computations for recovering and explaining the geometry of temples. The application of the technique enables scholars to bring together fragments of evidence, construe "best-fit" strategies and unearth implicit or hidden relationships. The advantage of this approach is that changes in assumptions and testing of geometric alternatives can be easily simulated from multiple sources of information, such as texts, sacred diagrams and individual temples.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background: Constraint-based modeling of reconstructed genome-scale metabolic networks has been successfully applied on several microorganisms. In constraint-based modeling, in order to characterize all allowable phenotypes, network-based pathways, such as extreme pathways and elementary flux modes, are defined. However, as the scale of metabolic network rises, the number of extreme pathways and elementary flux modes increases exponentially. Uniform random sampling solves this problem to some extent to study the contents of the available phenotypes. After uniform random sampling, correlated reaction sets can be identified by the dependencies between reactions derived from sample phenotypes. In this paper, we study the relationship between extreme pathways and correlated reaction sets.

Results: Correlated reaction sets are identified for E. coli core, red blood cell and Saccharomyces cerevisiae metabolic networks respectively. All extreme pathways are enumerated for the former two metabolic networks. As for Saccharomyces cerevisiae metabolic network, because of the large scale, we get a set of extreme pathways by sampling the whole extreme pathway space. In most cases, an extreme pathway covers a correlated reaction set in an 'all or none' manner, which means either all reactions in a correlated reaction set or none is used by some extreme pathway. In rare cases, besides the 'all or none' manner, a correlated reaction set may be fully covered by combination of a few extreme pathways with related function, which may bring redundancy and flexibility to improve the survivability of a cell. In a word, extreme pathways show strong complementary relationship on usage of reactions in the same correlated reaction set.

Conclusion: Both extreme pathways and correlated reaction sets are derived from the topology information of metabolic networks. The strong relationship between correlated reaction sets and extreme pathways suggests a possible mechanism: as a controllable unit, an extreme pathway is regulated by its corresponding correlated reaction sets, and a correlated reaction set is further regulated by the organism's regulatory network.