6,418 research outputs found

    QoS multicast tree construction in IP/DWDM optical internet by bio-inspired algorithms

    Get PDF
    Copyright @ Elsevier Ltd. All rights reserved.In this paper, two bio-inspired Quality of Service (QoS) multicast algorithms are proposed in IP over dense wavelength division multiplexing (DWDM) optical Internet. Given a QoS multicast request and the delay interval required by the application, both algorithms are able to find a flexible QoS-based cost suboptimal routing tree. They first construct the multicast trees based on ant colony optimization and artificial immune algorithm, respectively. Then a dedicated wavelength assignment algorithm is proposed to assign wavelengths to the trees aiming to minimize the delay of the wavelength conversion. In both algorithms, multicast routing and wavelength assignment are integrated into a single process. Therefore, they can find the multicast trees on which the least wavelength conversion delay is achieved. Load balance is also considered in both algorithms. Simulation results show that these two bio-inspired algorithms can construct high performance QoS routing trees for multicast applications in IP/DWDM optical Internet.This work was supported in part ny the Program for New Century Excellent Talents in University, the Engineering and Physical Sciences Research Council (EPSRC) of UK under Grant EP/E060722/1, the National Natural Science Foundation of China under Grant no. 60673159 and 70671020, the National High-Tech Reasearch and Development Plan of China under Grant no. 2007AA041201, and the Specialized Research Fund for the Doctoral Program of Higher Education under Grant no. 20070145017

    Measuring diversity of socio-cognitively inspired ACO search

    Get PDF
    In our recent research, we implemented an enhancement of Ant Colony Optimization incorporating the socio-cognitive dimension of perspective taking. Our initial results suggested that increasing the diversity of ant population - introducing different pheromones, different species and dedicated inter-species relations - yielded better results. In this paper, we explore the diversity issue by introducing novel diversity measurement strategies for ACO. Based on these strategies we compare both classic ACO and its socio-cognitive variation

    Socio-cognitively inspired ant colony optimization

    Get PDF
    Recently we proposed an application of ant colony optimization (ACO) to simulate socio-cognitive features of a population, incorporating perspective-taking ability to generate differently acting ant colonies. Although our main goal was simulation, we took advantage of the fact that the quality of the constructed system was evaluated based on selected traveling salesman problem instances, and the resulting computing system became a metaheuristic, which turned out to be a promising method for solving discrete problems. In this paper, we extend the initial sets of populations driven by different perspective-taking inspirations, seeking both optimal configuration for solving a number of TSP benchmarks, at the same time constituting a tool for analyzing socio-cognitive features of the individuals involved. The proposed algorithms are compared against classic ACO, and are found to prevail in most of the benchmark functions tested

    Developing Innovative Payment Approaches: Finding the Path to High Performance

    Get PDF
    Discusses issues in facilitating, under the 2010 health reform law, initiatives to identify, develop, implement, and monitor payment and delivery system reforms to improve quality and control costs while supporting the fiscal integrity of public programs

    A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols

    Get PDF
    Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore susceptible to a variety of assaults. Routing technologies such as AODV and dynamic source routing are quite common. Both however are susceptible to a variety of network layer attacks, including black holes, wormholes, rushing, byzantine, information disclosure. The mobility of the nodes and the open architecture in which the nodes are free to join or leave the network keep changing the topology of the network. The routing in such scenarios becomes a challenging task since it has to take into account the constraints of resources of mobile devices. In this  an analysis of these protocols indicates that, though proactive routing protocols maintain a route to every destination and have low latency, they suffer from high routing overheads and inability to keep up with the dynamic topology in a large sized network. The reactive routing protocols in contrast have low routing overheads, better throughput and higher packet delivery ratio. AODVACO-PSO-DHKE Methodology boosts throughput by 10% while reducing routing overhead by 7%, latency by 8% and energy consumption by 5%. To avoid nodes always being on, a duty cycle procedure that's also paired with the hybrid method is used ACO-FDR PSO is applied to a 100-node network and NS-3 is used to measure various metrics such as throughput, latency, overhead, energy consumption and packet delivery ratio

    A Novel Method of Enhancing Security Solutions and Energy Efficiency of IoT Protocols

    Get PDF
    Mobile Ad-hoc Networks (MANET’s) are wireless networks that are capable of operating without any fixed infrastructure. MANET routing protocols must adhere to strict secrecy, integrity, availability and non-repudiation criteria. In MANETs, attacks are roughly categorised into two types: active and passive. An active attack attempts to modify or remove data being transferred across a network. On the other hand, passive attack does not modify or erase the data being sent over the network. The majority of routing protocols for MANETs were built with little regard for security and are therefore susceptible to a variety of assaults. Routing technologies such as AODV and dynamic source routing are quite common. Both however are susceptible to a variety of network layer attacks, including black holes, wormholes, rushing, byzantine, information disclosure. The mobility of the nodes and the open architecture in which the nodes are free to join or leave the network keep changing the topology of the network. The routing in such scenarios becomes a challenging task since it has to take into account the constraints of resources of mobile devices. In this an analysis of these protocols indicates that, though proactive routing protocols maintain a route to every destination and have low latency, they suffer from high routing overheads and inability to keep up with the dynamic topology in a large sized network. The reactive routing protocols in contrast have low routing overheads, better throughput and higher packet delivery ratio. AODVACO-PSO-DHKE Methodology boosts throughput by 10% while reducing routing overhead by 7%, latency by 8% and energy consumption by 5%. To avoid nodes always being on, a duty cycle procedure that's also paired with the hybrid method is used ACO-FDR PSO is applied to a 100-node network and NS-3 is used to measure various metrics such as throughput, latency, overhead, energy consumption and packet delivery ratio

    Energy efficient engine sector combustor rig test program

    Get PDF
    Under the NASA-sponsored Energy Efficient Engine program, Pratt & Whitney Aircraft has successfully completed a comprehensive combustor rig test using a 90-degree sector of an advanced two-stage combustor with a segmented liner. Initial testing utilized a combustor with a conventional louvered liner and demonstrated that the Energy Efficient Engine two-stage combustor configuration is a viable system for controlling exhaust emissions, with the capability to meet all aerothermal performance goals. Goals for both carbon monoxide and unburned hydrocarbons were surpassed and the goal for oxides of nitrogen was closely approached. In another series of tests, an advanced segmented liner configuration with a unique counter-parallel FINWALL cooling system was evaluated at engine sea level takeoff pressure and temperature levels. These tests verified the structural integrity of this liner design. Overall, the results from the program have provided a high level of confidence to proceed with the scheduled Combustor Component Rig Test Program
    corecore