The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article aims to the problems that the particle swarm optimization (PSO) algorithm has slow convergence and easy to fall into local optimum, provides an improved adaptive particle swarm optimization algorithm based on Levy flight mechanism (LFAPSO). The long jumps of Levy flight will step out of the local optimum in the local search. The convergence speed and accuracy of the LFAPSO algorithm are...
An arbitrary m×n Boolean matrix M can be decomposed exactly as M = U○V, where U (resp. V) is an m×k (resp. k ×n) Boolean matrix and ○ denotes the Boolean matrix multiplication operator. We first prove an exact formula for the Boolean matrix J such that M = M○JT holds, where J is maximal in the sense that if any 0 element in J is changed to a 1 then this equality no longer holds. Since minimizing k...
A wave-channel balanced dynamic RWA algorithm presented in this paper based on the business for electric power optical transport network. This algorithm is designed to solve the routing and wavelength assignment problems of multibusiness request in the complex power optical transport network. This algorithm made the classification of business requests and set the priority of each request according...
The large amount of data collected in the Internet of Things (IoT) need to be transmitted to servers for processing in order to provide various services. Due to the limited amount of resources in IoT, including network bandwidth, node processing abilities, and server capacities, congestion control in IoT plays a crucial role for meeting service performance requirements. In this paper, we propose a...
In order to ease congestion phenomenon in the case of limited resources of nodes, this paper presents an adaptive congestion control algorithm based on the node's priority. The proposed algorithm confirms prioritization according to the degree of congestion situation, and then adaptively chooses its probability of accessing channel in order to quickly relieve the congestion in this region. Experimental...
Multi-privileged group communications have been widely used in the Internet, like live sports, video conferencing, etc., because of its high efficiency in transporting information flows. However, security has been challenged seriously, which limits the development of correlative network service applications. In this paper, to make up for the shortages of former studies, we proposed a multi-privileged...
Given a matrix of weights, the linear order problem (LOP) consists of finding a permutation of the columns and rows in order to maximize the sum of the weights in the upper triangle. This paper introduces a modified discrete particle swarm optimization (PSO) which deals with LOP. It doesn't use exchange, crossover, mutation, insertion and deletion operators. But the positions of elements in solution...
In ad hoc networks, reducing energy consumption and improving throughput are both important for high network performance. This paper presents a joint power and rate control adaptive algorithm to optimize the trade-off between power consumption and throughput in ad hoc networks. Each node chooses its own transmission power and rate based on limited environment information in order to achieve optimal...
Light weighted programming, same as light weighted modeling, is meaningful for suitable transmission of large scale WebVR scenes on Internet and easy implementation on browsers. This paper extends classical 2D Cohen-Sutherland coding, presents a new 3D or higher Cohen-Sutherland coding scheme, and applies it to light weighted VRML interaction programming. Our practical implementation shows that the...
In the IEEE 802.16e OFDMA systems, the data mapping algorithm maps the data to the appropriate rectangular regions in the two-dimensional matrix of time and frequency domain. Each region is described by an Information Element (IE) which is used for signaling and occupies a slot. The IEs as well as vacant slots in the allocated rectangular region result in a substantial amount of overhead. In order...
DEVS is a formalism intended to model both discrete and continuous systems. The use of discrete events, rather than time steps, as the basis for simulation has been shown to reduce the computation time in many applications. Parallel DEVS is an extension to standard DEVS, which provides means to handle simultaneous scheduling. In this paper, we present an implementation of the parallel DEVS simulation...
We divide the predictive FMIPV6 handover procedure into 5 phases. Among these phases, the link layer prediction, the predictive tunneling and sender preparation phases are mainly concerned, the latencies and the reasons for the latencies in the 3 phases are analyzed in an IEEE 802.11 test-bed. Based on the analysis, a cross-layer fast handover management mechanism is proposed and proved to be efficient...
A hybrid particle swarm optimization (PSO) approach is proposed here to solve the distribution network reconfiguration (DNR) problem. This approach is a combination of the binary PSO algorithm and the discrete PSO algorithm. In the problem-solving process, the distribution network is simplified through grouping the branches, and then each group of branches is represented by one dimensional coding...
In this paper, we propose a cross-layer optimization approach that exploits retransmission diversity in wireless CDMA communications. Conventionally, data packets that are not correctly detected are usually dropped. These dropped packets can be used to help data packet detection. By exploiting all the retransmitted packets, data packets can be correctly detected with higher probability. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.