We propose a new framework for ant-based routing algorithms which addresses the trade-off between effective and timely discovery of optimal routes, and the desire to keep data traffic flowing smoothly. The approach ut...
详细信息
ISBN:
(纸本)0780378040
We propose a new framework for ant-based routing algorithms which addresses the trade-off between effective and timely discovery of optimal routes, and the desire to keep data traffic flowing smoothly. The approach utilizes a database of stored delay estimates on routes to build separate routing tables for ants and data packets. This decoupling results in better control of responsiveness to load or topology fluctuations since the tables can evolve at different rates, according to different rules. The presented architecture also features guaranteed loop-free routes for data packets.
Denial-of-Service (DoS) attacks with fake source IP addresses have become a major threat to the Internet. Intrusion detection systems are often used to detect DoS attacks. However, DoS attack packets attempt to exhaus...
详细信息
ISBN:
(纸本)3540332375
Denial-of-Service (DoS) attacks with fake source IP addresses have become a major threat to the Internet. Intrusion detection systems are often used to detect DoS attacks. However, DoS attack packets attempt to exhaust resources, degrading network performance or, even worse, causing network breakdown. The proposed proactive approach is allocating the original attack host(s) issuing the attacks and stopping the malicious traffic, instead of wasting resources on the attack traffic. ant colony based traceback approach is presented in this study to identify the DoS attack original source IP address. Instead of creating a new function or processing a high volume of fine-grained data, the proposed IP address traceback approach uses flow level information to identify the origin of a DoS attack. The proposed method is evaluated through simulation on various network environments. The simulation results show that the proposed method can successfully and efficiently find the DoS attack path in various simulated network environments.
ant routing is a method for network routing in the agent technology. Although its effectiveness and efficiency have been demonstrated and reported in the literature, its properties have not yet been well studied. This...
详细信息
ant routing is a method for network routing in the agent technology. Although its effectiveness and efficiency have been demonstrated and reported in the literature, its properties have not yet been well studied. This paper presents some preliminary analysis on an ant algorithm in regard to its population growing property and jumping behavior. For synchronous networks, three main results are shown. First, the expected number of agents in a node is shown to be no more than (1 + max(i){\Omega(i)\})km, where \Omega(i)\ is the number of neighboring hosts of the ith host, k is the number of agents generated per request, and m is the average number of requests. Second, the expected number of jumps of an agent is shown to be no larger than (1 + max(i){\Omega(i)\}). Third, it is shown that for all p greater than or equal to (1 + max(i){\Omega(i)\})km, the probability of the number of agents in a node exceeding p is not greater than integral(p)(infinity) P(x)dx, where P(x) is a normal distribution function with mean and variance given by Mean = (1 + max(i){\Omega(i)\})km,Var. = 2km(1 + max(i){\Omega(i)\}) + (km(2)(1 + max(i){\Omega(i)\})(2) / (1+2 max(i){\Omega(i)\}). The first two results are also valid for the case when the network is operated in asynchronous mode. All these results conclude that as long as the value max(i){\Omega(i)\}) is known, the practitioner is able to design the algorithm parameters, such as the number of agents being created for each request, k, and the maximum allowable number of jumps of an agent, in order to meet the network constraint.
ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas...
详细信息
ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained.
A new problem of degree-constrained Euclidean Steiner minimal tree is discussed, which is quite useful in several fields. Although it is slightly different from the traditional degree-constrained minimal spanning tree...
详细信息
A new problem of degree-constrained Euclidean Steiner minimal tree is discussed, which is quite useful in several fields. Although it is slightly different from the traditional degree-constrained minimal spanning tree, it is also NP-hard. Two intelligent algorithms are proposed in an attempt to solve this difficult problem. Series of numerical examples are tested, which demonstrate that the algorithms also work well in practice.
In this paper we provide a protocol solving the problem of gathering of identical autonomous systems (aka ants) on a circle. In our biologically inspired model the autonomous systems are unable to communicate directly...
详细信息
In this paper we provide a protocol solving the problem of gathering of identical autonomous systems (aka ants) on a circle. In our biologically inspired model the autonomous systems are unable to communicate directly, instead they employ the mechanism of pheromone marking. The gathering on a circle is not always solvable, however our protocol will terminate in finite time if ants are in a general initial position. Since the gathering problem on a line is unsolvable for obvious reasons for any non-degenerate initial position, this implies that if the ants are in generic initial position they will be able to decide in finite time whether they are on a line or on a circle. We give asymptotic bounds for the time our protocol needs to terminate, and show that for fixed number of ants, the termination time of any protocol can be arbitrarily long. Finally, our protocol may be adopted to the case of asynchronous drop-downs and starting times of the autonomous systems.
Flexible and timely warehousing activities provide a strong foundation for logistic systems. However, increasing B2C e-commerce with a variety of small internet orders may have a tremendous impact on warehousing. Auto...
详细信息
Flexible and timely warehousing activities provide a strong foundation for logistic systems. However, increasing B2C e-commerce with a variety of small internet orders may have a tremendous impact on warehousing. Automated storage/retrieval systems (AS/RSs) are a valid alternative for warehousing. Typical AS/RSs design and control problems in a static environment and cannot effectively manage parcel, small, and irregular items. This study proposes a new AS/RS that is more efficient and flexible for handling B2C e-commerce logistics. An auto-access multilevel conveying device (IMCD) with three-dimensional movement is integrated into the AS/RS. The ant colony system algorithm locates near-optimal routes for the IMCD. Typical travel distance/time measures evaluate the performance of an S/R device running on a warehouse floor. However, the performance index in this study looks at the IMCD's travel time with three-dimensional movement in completing a batch order. To validate the new AS/RS, two simulation experiments were conducted to examine the effects of three-dimensional velocity and rack shape. Finally, this study compares a typical S/R system with the new AS/RS and makes recommendations for practical applications and further research.
With the widespread of the Internet, the on-line social network with big data is rapidly developing over time. Many enterprises attempt to develop their business by utilizing the power of on-line social networking pla...
详细信息
With the widespread of the Internet, the on-line social network with big data is rapidly developing over time. Many enterprises attempt to develop their business by utilizing the power of on-line social networking platforms. A considerable amount of work has focused on how to select a set of influential users to maximize a kind of positive influence in static social networks. However, networks evolve, and the topological structure changes over time. How to mine and adapt the influencers in a dynamic and large-scale environment becomes a challenging issue. In this paper, a collective intelligence model, i.e., stigmergy-based influencers miner, is proposed to investigate influential nodes in a fully dynamic environment. The proposed model is capable of analysing influential relationships in a social network in decentralized manners and identifying the influencers more efficiently than traditional seed selection algorithms. Moreover, it is capable of adapting the solutions in complex dynamic environments without any interruptions or recalculations. Experimental results show that the proposed model achieves better performance than other traditional models in both static and dynamic social networks by considering both efficiency and effectiveness.
Aiming at constructing a delay and delay variation bounded Steiner tree in the real-time streaming media communication, in this paper, we discuss a multicast routing algorithm based on searching a directed graph (MRAS...
详细信息
Aiming at constructing a delay and delay variation bounded Steiner tree in the real-time streaming media communication, in this paper, we discuss a multicast routing algorithm based on searching a directed graph (MRASDH). During the process of the construction of the multicast tree, some nodes and links in the network topology do not affect the outcome of the constructed tree. Therefore, based on the thought of shrinking the search space through deleting these non-relative nodes and edges to the utmost, the ant algorithm is utilized to generate a directed sub-graph of the network topology for each destination node, in which each node owns a bounded out-degree. And all these sub-graphs can be merged into a new directed graph that serves as the new search space. In the new space, the simulated annealing algorithm is applied to obtain a multicast tree that satisfies the condition for the optimization. The performance analysis and simulation results demonstrate that this algorithm can effectively construct a delay and delay variation bounded multicast tree. They also show that the algorithm have lower time complexity than the current ones, which means a much better result would be achieved when the system scale rises greatly. (C) 2011 Elsevier Inc. All rights reserved.
In the last few years researchers have shown how insect colonies can be seen as a natural model of collective problem solving. The analogy between the behaviour of ants looking for food and the well known travelling s...
详细信息
In the last few years researchers have shown how insect colonies can be seen as a natural model of collective problem solving. The analogy between the behaviour of ants looking for food and the well known travelling salesman problem has recently given rise to promising solution methods. We present in this paper an evolutionary search procedure for tackling assignment type problems. The algorithm repeatedly constructs feasible solutions of the problem under study by taking account of two complementary notions, namely the trace factor and the desirability factor. The use of such search principles will be illustrated for graph colouring problems. The results obtained have proven satisfactory when compared with those existing in the literature.
暂无评论