In this paper, Harmony Search is applied to the blocking job shop problem with makespan minimization. According to the characteristics of the considered problem, a decoding method is introduced to generate feasible so...
详细信息
In this paper, Harmony Search is applied to the blocking job shop problem with makespan minimization. According to the characteristics of the considered problem, a decoding method is introduced to generate feasible solutions. A rule is proposed to improvise new harmonies. Some approaches are developed to determine the harmony search considering rate, the pitch adjusting rate, the dynamic harmony memory. A local search is investigated to further improve quality of the solutions. Results of numerical experiments on classical benchmark instances show that the proposed algorithm can improve makespan 16.50% on average.
The RCMPSPTT (resource-constrained multi-project scheduling problem with resource transfer time) problem usually exists in distributed collaborative manufacturing systems, in which scarce resources are shared by diffe...
详细信息
The RCMPSPTT (resource-constrained multi-project scheduling problem with resource transfer time) problem usually exists in distributed collaborative manufacturing systems, in which scarce resources are shared by different projects dispersed in distributed physical places. Resources are needed to be transferred among different projects with non-neglectable time. In this paper, a hybrid genetic algorithm is proposed for the considered problem. Besides standard operators, EPS (Elite population based dual Population Structure) and VNS (Variable Neighborhood Search) operators are introduced for both diversification and intensification consideration to improve effectiveness. The EPS keeps the elite solutions found during the search and they are updated using a similarity strategy. The VNS generates new solutions by a proposed local search strategy. Experiments show that 26.1% has been improved on solutions by DGAVNS compared with an existing priority rule based heuristic algorithm.
There exist a range of hierarchical text classification approaches that classify text documents into a pre-constructed hierarchy of categories. In these approaches, feature selections are often based on terms (words o...
详细信息
Opportunistic routing with network coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multihop networks. By combining the multi-user diversity advantage of the broadcast links and the...
详细信息
Opportunistic routing with network coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multihop networks. By combining the multi-user diversity advantage of the broadcast links and the erasure-codes property of random network coding, it raises an interesting question on the broadcast channel access control algorithm, since the reliability is guaranteed by upper-layer coding and thus it is not necessary to wait for all the receivers to be ready. In this paper, we formalize it as the opportunistic broadcast channel access control problem. By appealing to the theory of optimal stopping, we develop a strategy which can balance between the access delay and instantaneous delivery ability of the broadcast link. This strategy turns out to be a threshold-based policy, which allowing fully distributed implementation. Simulation results show that the proposed strategy outperforms existing schemes significantly in terms of end to end throughput under various traffic loads.
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ...
详细信息
ISBN:
(纸本)9781467307215
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path divided by the monitor node. This method can estimate the packet loss ration of each segment and infer loss ratios based on IP headers identification field, TCP headers sequence number and packets interval. The segment estimation packet loss method can be useful to evaluate the performance of core network or internet work if the monitor is put in the border of a network. The algorithm is evaluated to use a test bed simulation measurement, and is analyzed reordering ratios and loss ratios based on the traces collected from the CERNET backbone links.
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespam minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-p...
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespam minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-problem and a timetabling one. A partial delay timetabling method is constructed by combining the "as early as possible" strategy with the "as late as possible" rule. By integratiiig the variable neighborhood structure, a new Local Search method CLMVN (Complete Local Search with Memory and Variable Neighborhood structure) is presented for the sequencing problem. Experimental results show that CLMVN outperforms CLLM (the best algorithm for the considered problem so far) on average with less computation time.
A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling networ...
详细信息
A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling network traffic function. The number of original flow is an important metrics to many network applications such as congestion control and network security. In this paper, we present a EUF algorithm that can accurately infer the number of original flow from the sampled packet traffic. Using the EUF algorithm, the number of unsampled flows can be estimated by an iteration method based on random sampling, and then the number of original flows can be precisely estimated according to both the number of the sampled flows and the unsampled flow. The EUF algorithm is also compared with the EM algorithm using multiple traffic traces collected from a Tier-1 ISP backbone networks. The result shows that the EUF algorithm is superior to EM and can provide highly accurate estimation on the number of the original flow.
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To f...
详细信息
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To fulfill this requirement,some kind of information selection mechanism is needed. In this paper, a filter-based information selection mechanism is proposed, which is compliant with OMG DDS specification. Then it is implemented in a publish/subscribe middleware prototype *** the mechanism, a publish/subscribe middleware can use the compiler generated by Flex&Bison to compile the filtering rules of the users,which are conform to SQL-like syntax,and generate the filtering syntax *** the subscriber side, when receiving a sample, the middleware substitute the values of the sample into the corresponding positions in the filtering syntax tree. By traversing the tree, the middleware makes the filtering decision. Experiment results reveal that the proposed mechanism is effective.
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation...
详细信息
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation, integration and reuse of data among different web applications such as clouding computing. However, Semantic web applications pose some new requirements for security mechanisms especially in the access control models. In this paper, we analyse existing access control methods and present a semantic based access control model which considers semantic relations among different entities in cloud computing environment. We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. This work demonstrates how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems as well.
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *...
详细信息
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *** the behavior of flow and congestion control based on infinitely repeated game models is addressed;the repeated and infinitely repeated flow and congestion control game model is presented; the existence and optimization of the Nash equilibrium point are proved;the discount factor in repeated game is discussed;the punishment and threat strategy to users'misbehavior is studied in N-users infinitely flow control game;the punishment restrictive method of users'behavior is designed in infinitely and finitely games;finally,a flow control algorithm based on repeated game,FCAR,is provided based on the conclusions of repeated game *** results of experiment and simulation show that FCAR algorithm could regularize and restrict users' misbehavior *** algorithm can also make non-cooperative Internet users achieve cooperation in order to optimize the utility of the whole flow and congestion control system.
暂无评论