The emergence of smart cars has led to a significant increase in mobile data traffic on the backhaul links as a vast amount of contents is generated and consumed in the Internet of Vehicles (IoV). To cope with this si...
详细信息
The emergence of smart cars has led to a significant increase in mobile data traffic on the backhaul links as a vast amount of contents is generated and consumed in the Internet of Vehicles (IoV). To cope with this situation, the precaching research of content-centric networks (CCNs) has been applied as a promising solution for reducing traffic consumption. However, most precaching schemes in CCN-IoV only focus on delay-sensitive content (DSC) and do not have proper content storage management (CSM), limiting their ability to minimize delays. To address these issues, we thus propose a novel CSM and precaching (CSMP) scheme consisting of three methods. To prevent the erases of precached or popular content, we have designed a CSM method based on our caching priority algorithm. Additionally, we have designed a DSC precaching method to improve mobility prediction and reduce delays using the recalculation time based on the Gaussian distribution with skewness. Finally, we have designed a delay-tolerant content (DTC) precaching method to minimize backhaul link traffic consumption by using an integer linear programming approach. The proposed CSMP scheme improved the evaluation value considering the success ratio and the backhaul link traffic by 23.21% compared with the existing schemes in our NS3-based simulations.
Improving road safety and easing congestion require effective real-time traffic data analysis and management. A crucial part of intelligent transportation systems, vehicular ad hoc networks (VANETs) deal with issues l...
详细信息
Improving road safety and easing congestion require effective real-time traffic data analysis and management. A crucial part of intelligent transportation systems, vehicular ad hoc networks (VANETs) deal with issues like inconsistent data from erratic vehicle movements and frequent topology changes. In order to develop a responsive and adaptable network management architecture for VANETs, this study makes use of Software-Defined Networking (SDN). SDN optimizes traffic flow, boosts routing efficiency, and improves Quality of Service (QoS) by separating the control and data planes. Traffic analysis and network performance are greatly improved when SDN is combined with priority algorithms and the Zigbee protocol. The effectiveness of this strategy in a controlled setting is shown by simulations conducted with COOJA software. Web digitization tools are also used to guarantee the accuracy of the data. Improved QoS, better traffic flow management, and scalable solutions for dynamic vehicular networks are some of the main results.
This paper aims at the detailed scheduling of branched multiproduct pipeline networks with multiple sources and an output terminal. Nevertheless, the complexity of the pipeline structure, coupling of hydraulic and sch...
详细信息
This paper aims at the detailed scheduling of branched multiproduct pipeline networks with multiple sources and an output terminal. Nevertheless, the complexity of the pipeline structure, coupling of hydraulic and scheduling factors, impacts of physical properties of products, and simultaneous injections at different sources make it challenging to draw out the injection operations at each source. Based on a continuous-volume and discrete-time representation, this paper develops a MINLP model to find the optimal injection operations of all sources at minimum total operational cost, rigorously tracking batch migration and power consumption at each pipeline segment. A priority algorithm is presented to obtain a high quality solution of this large-scale and nonlinear scheduling problem. Finally, experimental results on two virtual pipeline networks and a real-world pipeline network in China are given to validate the proposed approach. (C) 2018 Institution of Chemical Engineers. Published by Elsevier B.V. All rights reserved.
We study simple algorithms for the balanced MAX 2SAT problem, where we are given weighted clauses of length one and two with the property that for each variable x the total weight of clauses that x appears in equals t...
详细信息
We study simple algorithms for the balanced MAX 2SAT problem, where we are given weighted clauses of length one and two with the property that for each variable x the total weight of clauses that x appears in equals the total weight of clauses for . We show that such instances have a simple structural property in that any optimal solution can satisfy at most the total weight of the clauses minus half the total weight of the unit clauses. Using this property and a novel analysis of the computation tree, we are able to show that a large class of greedy algorithms, including Johnson's algorithm, gives a -approximation algorithm for balanced MAX 2SAT;a similar statement is false for general MAX 2SAT instances. We further give a spectral 0.81-approximation algorithm for balanced MAX E2SAT instances (in which each clause has exactly 2 literals) by a reduction to a spectral algorithm of Trevisan for the maximum colored cut problem. We provide experimental results showing that this spectral algorithm performs well and is slightly better than Johnson's algorithm and the Goemans-Williamson semidefinite programming algorithm on balanced MAX E2SAT instances.
We study simple algorithms for the balanced MAX 2SAT problem, where we are given weighted clauses of length one and two with the property that for each variable x the total weight of clauses that x appears in equals t...
详细信息
ISBN:
(纸本)9783662495285
We study simple algorithms for the balanced MAX 2SAT problem, where we are given weighted clauses of length one and two with the property that for each variable x the total weight of clauses that x appears in equals the total weight of clauses for . We show that such instances have a simple structural property in that any optimal solution can satisfy at most the total weight of the clauses minus half the total weight of the unit clauses. Using this property and a novel analysis of the computation tree, we are able to show that a large class of greedy algorithms, including Johnson's algorithm, gives a -approximation algorithm for balanced MAX 2SAT;a similar statement is false for general MAX 2SAT instances. We further give a spectral 0.81-approximation algorithm for balanced MAX E2SAT instances (in which each clause has exactly 2 literals) by a reduction to a spectral algorithm of Trevisan for the maximum colored cut problem. We provide experimental results showing that this spectral algorithm performs well and is slightly better than Johnson's algorithm and the Goemans-Williamson semidefinite programming algorithm on balanced MAX E2SAT instances.
Large scale and complexity in structure are two major trends in current cloud environments. Bringing cloud computing to its full potential requires a paradigm shift toward cloud resiliency. A major challenge in design...
详细信息
ISBN:
(纸本)9781509026197
Large scale and complexity in structure are two major trends in current cloud environments. Bringing cloud computing to its full potential requires a paradigm shift toward cloud resiliency. A major challenge in designing resilient clouds is to avoid single point of failures in cloud management systems. The state-of-the-art cloud management systems are mostly designed by relying on centralized managing systems with complicated master nodes, which are prone to single point of failures. In this paper, we propose a novel resilient hybrid cloud management system to ensure offering consistent cloud services to users, which consists of two tiers: a peer-to-peer (P2P) tier and a centralized tier. In the centralized tier, each local cloud has a centralized management system, while these local clouds form a P2P cloud in the P2P tier. Our hybrid cloud system benefits from auto scaling across the entire system while it easily manages each local cloud. We propose an innovative user request scheduling mechanism, dedicated to our system, considering multi-objectives: minimizing user requests average makespan, while ensuring load balancing. Finally, we conduct extensive experiments to evaluate the performance of our proposed hybrid cloud management system.
Networks of protected areas are one of the main strategies used to address the biodiversity crisis. These should encompass as many species and ecosystems as possible, particularly in territories with high biological d...
详细信息
Networks of protected areas are one of the main strategies used to address the biodiversity crisis. These should encompass as many species and ecosystems as possible, particularly in territories with high biological diversity, such as the Spanish arid zones. We produce a priority ranking of the arid zones of south-east Spain according to the rarity and richness of their characteristic flora and the level of endangerment. The resulting hierarchy shows that optimal zones for the preservation of the flora are located outside the network of protected areas. In particular, it is important to extend the network and encourage the creation of microreserves in the depression of the River Guadiana Menor (Granada), where there is least protection. This river valley is a particularly important arid site because of its unique flora and fauna, and palaeontological and archaeological findings.
An access control engine with dynamic priority resource allocation (ACE-DPRA) is proposed for unlicensed users to utilize free spectrum of wireless communication systems. A cognitive radio (CR) network with sensing an...
详细信息
An access control engine with dynamic priority resource allocation (ACE-DPRA) is proposed for unlicensed users to utilize free spectrum of wireless communication systems. A cognitive radio (CR) network with sensing and learning abilities is essential for unlicensed users to achieve ACE-DPRA. Three algorithms are included in ACE-DPRA to improve the spectral efficiency. While requesting to set up connection, unlicensed CR users generate excessive interferences to licensed users. The proposed ACE-DPRA with an admission control scheme allows the connection of unlicensed CR users without degrading the communication quality of licensed users. The priority algorithm for utilizing the unused spectrum is designed according to the location information of unlicensed users. A transmitted power control method is achieved by a fuzzy-learning mechanism. The spectral efficiency of wireless communication systems can be increased after adopting the proposed ACE-DPRA algorithm. Simulation results show that licensed users keep the advantages of high transmission data rate, low interference power, and low average outage probability after the connection of unlicensed CR users.
The Betic ranges are recognised as one of the hot spots of biodiversity in the Mediterranean region. The greater part of this territory is in Andalusia and is very rich in vascular plants, some of them endemic. The te...
详细信息
The Betic ranges are recognised as one of the hot spots of biodiversity in the Mediterranean region. The greater part of this territory is in Andalusia and is very rich in vascular plants, some of them endemic. The territory exhibits enormous orographical and geological complexity. This is, in short, a mosaic, fragmented landscape with extremely high beta-diversity. This scenario is ideal for monitoring the efficiency of reserve areas. The main aim of this research is to see whether the Network of Natural Protected Areas of Andalusia, extended with the SCIs, is sufficient to safeguard the plant biodiversity, represented in this case by the threatened vascular flora. The analysis includes also the areas corresponding to the priority habitats as defined in the Directive 92/43/EEC. Considering that the presence of priority habitats was a guideline in the drafting of the SCIs, this last inclusion is logical. The results reveal that SCIs are the most efficient strategy for the preservation of the flora, although almost 30% of the flora occur outside these sites. By contrast, the areas with priority habitats failed to cover over 70% of the threatened flora.
Greedy algorithms are simple, but their relative power is not well understood. The priority framework (Borodin et al. in algorithmica 37:295-326, 2003) captures a key notion of "greediness" in the sense that...
详细信息
Greedy algorithms are simple, but their relative power is not well understood. The priority framework (Borodin et al. in algorithmica 37:295-326, 2003) captures a key notion of "greediness" in the sense that it processes (in some locally optimal manner) one data item at a time, depending on and only on the current knowledge of the input. This algorithmic model provides a tool to assess the computational power and limitations of greedy algorithms, especially in terms of their approximability. In this paper, we study priority algorithm approximation ratios for the Subset-Sum Problem, focusing on the power of revocable decisions, for which the accepted data items can be later rejected to maintain the feasibility of the solution. We first provide a tight bound of alpha approximate to 0.657 for irrevocable priority algorithms. We then show that the approximation ratio of fixed order revocable priority algorithms is between beta approximate to 0.780 and gamma approximate to 0.852, and the ratio of adaptive order revocable priority algorithms is between 0.8 and delta approximate to 0.893.
暂无评论