27 research outputs found

    Smart data packet ad hoc routing protocol

    Get PDF
    This paper introduces a smart data packet routing protocol (SMART) based on swarm technology for mobile ad hoc networks. The main challenge facing a routing protocol is to cope with the dynamic environment of mobile ad hoc networks. The problem of finding best route between communication end points in such networks is an NP problem. Swarm algorithm is one of the methods used solve such a problem. However, copping with the dynamic environment will demand the use of a lot of training iterations. We present a new infrastructure where data packets are smart enough to guide themselves through best available route in the network. This approach uses distributed swarm learning approach which will minimize convergence time by using smart data packets. This will decrease the number of control packets in the network as well as it provides continues learning which in turn provides better reaction to changes in the network environment. The learning information is distributed throughout the nodes of the network. This information can be used and updated by successive packets in order to maintain and find better routes. This protocol is a hybrid Ant Colony Optimization (ACO) and river formation dynamics (RFD) swarm algorithms protocol. ACO is used to set up multi-path routes to destination at the initialization, while RFD mainly used as a base algorithm for the routing protocol. RFD offers many advantages toward implementing this approach. The main two reasons of using RFD are the small amount of information that required to be added to the packets (12 bytes in our approach) and the main idea of the RFD algorithm which is based on one kind of agent called drop that moves from source to destination only. This will eliminate the need of feedback packets to update the network and offers a suitable solution to change data packet into smart packets. Simulation results shows improvement in the throughput and reduction in end to end delay and jitter compared to AODV and AntHocNet protocols. © 2013 Elsevier B.V. All rights reserved

    Optimization of p-cycle protection schemes in optical networks

    Full text link
    La survie des réseaux est un domaine d'étude technique très intéressant ainsi qu'une préoccupation critique dans la conception des réseaux. Compte tenu du fait que de plus en plus de données sont transportées à travers des réseaux de communication, une simple panne peut interrompre des millions d'utilisateurs et engendrer des millions de dollars de pertes de revenu. Les techniques de protection des réseaux consistent à fournir une capacité supplémentaire dans un réseau et à réacheminer les flux automatiquement autour de la panne en utilisant cette disponibilité de capacité. Cette thèse porte sur la conception de réseaux optiques intégrant des techniques de survie qui utilisent des schémas de protection basés sur les p-cycles. Plus précisément, les p-cycles de protection par chemin sont exploités dans le contexte de pannes sur les liens. Notre étude se concentre sur la mise en place de structures de protection par p-cycles, et ce, en supposant que les chemins d'opération pour l'ensemble des requêtes sont définis a priori. La majorité des travaux existants utilisent des heuristiques ou des méthodes de résolution ayant de la difficulté à résoudre des instances de grande taille. L'objectif de cette thèse est double. D'une part, nous proposons des modèles et des méthodes de résolution capables d'aborder des problèmes de plus grande taille que ceux déjà présentés dans la littérature. D'autre part, grâce aux nouveaux algorithmes, nous sommes en mesure de produire des solutions optimales ou quasi-optimales. Pour ce faire, nous nous appuyons sur la technique de génération de colonnes, celle-ci étant adéquate pour résoudre des problèmes de programmation linéaire de grande taille. Dans ce projet, la génération de colonnes est utilisée comme une façon intelligente d'énumérer implicitement des cycles prometteurs. Nous proposons d'abord des formulations pour le problème maître et le problème auxiliaire ainsi qu'un premier algorithme de génération de colonnes pour la conception de réseaux protegées par des p-cycles de la protection par chemin. L'algorithme obtient de meilleures solutions, dans un temps raisonnable, que celles obtenues par les méthodes existantes. Par la suite, une formulation plus compacte est proposée pour le problème auxiliaire. De plus, nous présentons une nouvelle méthode de décomposition hiérarchique qui apporte une grande amélioration de l'efficacité globale de l'algorithme. En ce qui concerne les solutions en nombres entiers, nous proposons deux méthodes heurisiques qui arrivent à trouver des bonnes solutions. Nous nous attardons aussi à une comparaison systématique entre les p-cycles et les schémas classiques de protection partagée. Nous effectuons donc une comparaison précise en utilisant des formulations unifiées et basées sur la génération de colonnes pour obtenir des résultats de bonne qualité. Par la suite, nous évaluons empiriquement les versions orientée et non-orientée des p-cycles pour la protection par lien ainsi que pour la protection par chemin, dans des scénarios de trafic asymétrique. Nous montrons quel est le coût de protection additionnel engendré lorsque des systèmes bidirectionnels sont employés dans de tels scénarios. Finalement, nous étudions une formulation de génération de colonnes pour la conception de réseaux avec des p-cycles en présence d'exigences de disponibilité et nous obtenons des premières bornes inférieures pour ce problème.Network survivability is a very interesting area of technical study and a critical concern in network design. As more and more data are carried over communication networks, a single outage can disrupt millions of users and result in millions of dollars of lost revenue. Survivability techniques involve providing some redundant capacity within the network and automatically rerouting traffic around the failure using this redundant capacity. This thesis concerns the design of survivable optical networks using p-cycle based schemes, more particularly, path-protecting p-cycles, in link failure scenarios. Our study focuses on the placement of p-cycle protection structures assuming that the working routes for the set of connection requests are defined a priori. Most existing work carried out on p-cycles concerns heuristic algorithms or methods suffering from critical lack of scalability. Thus, the objective of this thesis is twofold: on the one hand, to propose scalable models and solution methods enabling to approach larger problem instances and on the other hand, to produce optimal or near optimal solutions with mathematically proven optimality gaps. For this, we rely on the column generation technique which is suitable to solve large scale linear programming problems. Here, column generation is used as an intelligent way of implicitly enumerating promising cycles to be part of p-cycle designs. At first, we propose mathematical formulations for the master and the pricing problems as well as the first column generation algorithm for the design of survivable networks based on path-protecting p-cycles. The resulting algorithm obtains better solutions within reasonable running time in comparison with existing methods. Then, a much more compact formulation of the pricing problem is obtained. In addition, we also propose a new hierarchical decomposition method which greatly improves the efficiency of the whole algorithm and allows us to solve larger problem instances. As for integer solutions, two heuristic approaches are proposed to obtain good solutions. Next, we dedicate our attention to a systematic comparison of p-cycles and classical shared protection schemes. We perform an accurate comparison by using a unified column generation framework to find provably good results. Afterwards, our study concerns an empirical evaluation of directed and undirected link- and path-protecting p-cycles under asymmetric traffic scenarios. We show how much additional protection cost results from employing bidirectional systems in such scenarios. Finally, we investigate a column generation formulation for the design of p-cycle networks under availability requirements and obtain the first lower bounds for the problem

    Identity and Material Practice in the Chacoan World: Ornamentation and Utility Ware Pottery

    Get PDF
    The papers that comprise this dissertation all explore the intersection of material culture and social identity. The central theme of these studies is that social identity is actively created and maintained through the production, consumption, and discard of material objects. In the first paper, I examine the distribution of ornament styles and practices of adornment across the prehispanic Southwest in relation to traditionally defined regional and culture-historical boundaries. Jewelry items of similar forms are widely distributed across cultures/groups; however, specific practices in the use and deposition of ornaments are not random within particular sociohistorical contexts. In the second paper, I explore the relationship between identity and demographic reorganization through an examination of the extent to which Chacoan identity and practice, as demonstrated by the social values attributed to ornaments at Pueblo Bonito during the Chaco florescence, were maintained or transformed by the post-Chaco period inhabitants of Aztecs West Ruin. I argue that at Pueblo Bonito, ornaments were necessary in renewing the existing ritual-ceremonial order through the assembling of essential components of the natural and cultural worlds. It is proposed that these social values attributed to ornaments were directly cited at Aztec Ruin after the decline of Chaco Canyon as a central place in the San Juan Basin. The third study, published in The Pueblo Bonito Mounds of Chaco Canyon: Material Culture and Fauna, edited by Patricia L. Crown, focuses on practices of production, use, and discard of utilitarian gray ware ceramics from Pueblo Bonito. The attributes of the culinary ware pottery assemblage from the large middens at the site are consistent with household-level cooking activities. However, there is also evidence for suprahousehold feasting using large imported Chuska cooking vessels, which may have held special meaning through their associations with an important place on the landscape. This dissertation demonstrates that the materiality of social existence extends to all types of practice; people continually define their identities through activities and performances involving both commonplace and rare objects /materials.\u2

    Optimizing the Automotive Security Development Process in Early Process Design Phases

    Get PDF
    Security is a relatively new topic in the automotive industry. In the former days, the only security defense methods were the engine immobilizer and the anti-theft alarm system. The rising connection of vehicles to external networks made it necessary to extend the security effort by introducing security development processes. These processes include, amongothers, risk analysis and treatment steps. In parallel, the development of ISO/SAE 21434 and UN-ECE No. R155 started. The long development cycles in the automotive industry made it necessary to align the development processes' early designs with the standards' draft releases. This work aims to design a new consistent, complete and efficient security development process, aligned with the normative references. The resulting development process design aligns with the overall development methodology of the underlying, evaluated development process. Use cases serve as a basis for evaluating improvements and the method designs. This work concentrates on the left leg of the V-Model. Nevertheless, future work targets extensions for a holistic development approach for safety and security.:I. Foundation 1. Introduction 2. Automotive Development 3. Methodology II. Meta-Functional Aspects 4. Dependability as an Umbrella-Term 5. Security Taxonomy 6. Terms and Definitions III. Security Development Process Design 7. Security Relevance Evaluation 8. Function-oriented Security Risk Analysis 9. Security Risk Analysis on System Level 10. Risk Treatment IV. Use Cases and Evaluation 11. Evaluation Criteria 12. Use Case: Security Relevance Evaluation 13. Use Case: Function-oriented Security Risk Analysis 14. Use Case: System Security Risk Analysis 15. Use Case: Risk Treatment V. Closing 16. Discussion 17. Conclusion 18. Future Work Appendix A. Attacker Model Categories and Rating Appendix B. Basic Threat Classes for System SRA Appendix C. Categories of Defense Method Propertie

    Performance spec for a computer system

    Get PDF
    Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Architecture, 1986.MICROFICHE COPY AVAILABLE IN ARCHIVES AND ROTCHIncludes bibliographical references (leaves 70-73).Design is not considered as a professional activity that entails preliminary design, schematic design, and design development, but rather as a creative and conceptual activity that involves the graphic expression of ideas. By using computer graphics, the computer as a protean machine provides the means to develop an instrument for design that is more expressive than the pencil. Computer graphics systems for architects are built almost exclusively for drafting and working drawing production. Most are based on systems designed for mechanical engineering of machine parts. The drafting paradigm of the CAD system implies that the drawings done on computer represent schemes in an already designed form. The antithetical device is called a creatrix. The creatrix is analogous to three instruments. It expresses the architect's ideas like a musical instrument. It manages and manipulates building complexity like mathematical instruments. It quantifies and qualifies for the architect's evaluation like scientific instruments. Its three-fold mandate is: to assist the architect's process of visualization through his expression of ideas; to manage building complexity in a way that allows the architect to think about architecture; to re-present the architect's ideas in a way that helps the architect to critically and objectively evaluate his concepts. This thesis will present a specification for a system that will satisfy the mandates. The creatrix will be specified in the context of what is feasible technologically now at a reasonable cost.by Peter Harold Jurgensen.M.S

    Role of biases in neural network models

    Get PDF

    Methodologies for the Evaluation and Mitigation of Distribution Network Risk

    Get PDF
    Security of supply to customers is a major concern for electricity distribution network operators. This research concentrates in particular on the UK distribution system, and on sub-transmission and extra high voltage networks within that system. It seeks first to understand the principal causes of network risk and consequent loss of supply to customers as a result of faults at these voltage levels. It then develops a suite of methodologies to evaluate that risk, in terms of expected annual cost to the network operator, under a range of different scenarios and for both simple and complex network topologies. The scenarios considered include asset ageing, network automation and increasing utilisation as a consequence of electric vehicles and heat pumps. The methodologies also evaluate possible mitigation options, including active network management, and capital expenditure for both asset replacement and network reinforcement. A composite methodology is also developed, to consider combinations of scenarios and combinations of mitigation strategies. The thesis concludes by considering issues likely to affect the extent and possible increase of network risk over the period 2010-2030

    Science-based restoration monitoring of coastal habitats, Volume Two: Tools for monitoring coastal habitats

    Get PDF
    Healthy coastal habitats are not only important ecologically; they also support healthy coastal communities and improve the quality of people’s lives. Despite their many benefits and values, coastal habitats have been systematically modified, degraded, and destroyed throughout the United States and its protectorates beginning with European colonization in the 1600’s (Dahl 1990). As a result, many coastal habitats around the United States are in desperate need of restoration. The monitoring of restoration projects, the focus of this document, is necessary to ensure that restoration efforts are successful, to further the science, and to increase the efficiency of future restoration efforts
    corecore