• Title/Summary/Keyword: Complete graph

Search Result 188, Processing Time 0.023 seconds

An Improvement of the Deadlock Avoidance Algorithm (Deadlock 회피책에 대한 개선방안 연구)

  • Kim, Tae-Yeong;Park, Dong-Won
    • The Journal of Engineering Research
    • /
    • v.1 no.1
    • /
    • pp.49-57
    • /
    • 1997
  • In this paper, the follow-up works of Habermann's deadlock avoidance algorithm is investigated from the view of correction, efficiency and concurrency. Habermann's deadlock avoidance algorithm is briefly surveyed and in-depth discussion of follow-up algorithms modified and improved is presented. Then, further improvement of Kameda's algorithm will be discussed. His algorithm for testing deadlock-freedom in computer system converts the Habermann's model into a labeled bipartite graph so that the deadlock detection problem can be equivalent to finding complete matching for Mormon marriage problem. His algorithm has a running time of O($mn^1.5$) because Dinic's algorithm is used. The speed of above algorithm can be enhanced by employing a faster algorithm for finding a maximal matching. The wave method by Kazanov is used for.

  • PDF

Ranking Artificial Bee Colony for Design of Wireless Sensor Network (랭킹인공벌군집을 적용한 무선센서네트워크 설계)

  • Kim, Sung-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.1
    • /
    • pp.87-94
    • /
    • 2019
  • A wireless sensor network is emerging technology and intelligent wireless communication paradigm that is dynamically aware of its surrounding environment. It is also able to respond to it in order to achieve reliable and efficient communication. The dynamical cognition capability and environmental adaptability rely on organizing dynamical networks effectively. However, optimally clustering the cognitive wireless sensor networks is an NP-complete problem. The objective of this paper is to develop an optimal sensor network design for maximizing the performance. This proposed Ranking Artificial Bee Colony (RABC) is developed based on Artificial Bee Colony (ABC) with ranking strategy. The ranking strategy can make the much better solutions by combining the best solutions so far and add these solutions in the solution population when applying ABC. RABC is designed to adapt to topological changes to any network graph in a time. We can minimize the total energy dissipation of sensors to prolong the lifetime of a network to balance the energy consumption of all nodes with robust optimal solution. Simulation results show that the performance of our proposed RABC is better than those of previous methods (LEACH, LEACH-C, and etc.) in wireless sensor networks. Our proposed method is the best for the 100 node-network example when the Sink node is centrally located.

Correlation Distance Based Greedy Perimeter Stateless Routing Algorithm for Wireless Sensor Networks

  • Mayasala, Parthasaradhi;Krishna, S Murali
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.139-148
    • /
    • 2022
  • Research into wireless sensor networks (WSNs) is a trendy issue with a wide range of applications. With hundreds to thousands of nodes, most wireless sensor networks interact with each other through radio waves. Limited computational power, storage, battery, and transmission bandwidth are some of the obstacles in designing WSNs. Clustering and routing procedures have been proposed to address these concerns. The wireless sensor network's most complex and vital duty is routing. With the Greedy Perimeter Stateless Routing method (GPSR), an efficient and responsive routing protocol is built. In packet forwarding, the nodes' locations are taken into account while making choices. In order to send a message, the GPSR always takes the shortest route between the source and destination nodes. Weighted directed graphs may be constructed utilising four distinct distance metrics, such as Euclidean, city block, cosine, and correlation distances, in this study. NS-2 has been used for a thorough simulation. Additionally, the GPSR's performance with various distance metrics is evaluated and verified. When compared to alternative distance measures, the proposed GPSR with correlation distance performs better in terms of packet delivery ratio, throughput, routing overhead and average stability time of the cluster head.

Routing optimization algorithm for logistics virtual monitoring based on VNF dynamic deployment

  • Qiao, Qiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1708-1734
    • /
    • 2022
  • In the development of logistics system, the breakthrough of important technologies such as technology platform for logistics information management and control is the key content of the study. Based on Javascript and JQuery, the logistics system realizes real-time monitoring, collection of historical status data, statistical analysis and display, intelligent recommendation and other functions. In order to strengthen the cooperation of warehouse storage, enhance the utilization rate of resources, and achieve the purpose of real-time and visual supervision of transportation equipment and cargo tracking, this paper studies the VNF dynamic deployment and SFC routing problem in the network load change scenario based on the logistics system. The BIP model is used to model the VNF dynamic deployment and routing problem. The optimization objective is to minimize the total cost overhead generated by each SFCR. Furthermore, the application of the SFC mapping algorithm in the routing topology solving problem is proposed. Based on the concept of relative cost and the idea of topology transformation, the SFC-map algorithm can efficiently complete the dynamic deployment of VNF and the routing calculation of SFC by using multi-layer graph. In the simulation platform based on the logistics system, the proposed algorithm is compared with VNF-DRA algorithm and Provision Traffic algorithm in the network receiving rate, throughput, path end-to-end delay, deployment number, running time and utilization rate. According to the test results, it is verified that the test results of the optimization algorithm in this paper are obviously improved compared with the comparison method, and it has higher practical application and promotion value.

Multi-Line Driving Technology on PM OLED using Graph theory and Correlation (그래프 이론과 상관성을 이용한 PM OLED 다중선 구동 기술)

  • Lee, Gil-Jae;Lee, Chang-Hoon;Jeong, Je-Chang
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.62-72
    • /
    • 2010
  • PM OLED is used in many applications as one of the display for the next generation. The most essential problems are the power dissipation and the short life time in applying PM OLED into a commercial application. Many efforts are made in developing the panel and in improving the circuit for expanding the current market wider. The life time in PM OLED is expanded by lessening the power dissipation of the circuit for the magnitude of the driving current is lowered. It is possible to minimize the power dissipation from improving the driving technology. The classical technology, Row-to-Row driving, is that row is selected one by one while applying the column current input individually. The multi-line driving is a new technology which is to select multiple rows simultaneously while applying the column current as a whole. However, the solution of the multi-line driving is NP-complete problem. The efficiency is dependant on the sort of picture and the driving condition. This paper presents the new efficient multi-line driving which is that the multiple lines are selected by applying column current together after grouping the simultaneous driving group applying the gnew efficient muthe coi-line dr coefficient. Bengrouping the several rows which has the higher coi-line dr coefficient, the more efficient driving is realized to present the high quality image and to lessen the power dissipation and to stretch the life time in the PM OLED.

A Study on the Correlation with the Degree of Compaction and the Penetration Depth Using the Portable Penetration Meter at Field Test (휴대용 다짐도 측정기의 현장실험을 통한 다짐도와 관입깊이 상관성 연구)

  • Park, Geoun Hyun
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.11
    • /
    • pp.5-14
    • /
    • 2018
  • Worldwide, soil compaction work is one of the most important activities that are carried out on civil engineering works sites. Compaction work, particularly in the area of road construction, is considered to be important, as poor compaction work is closely related with poor construction even after a construction is complete. Currently, the plate bearing test or the sand cone method relative to the unit weight of soil test are commonly used to measure the degree of compaction, but as these require a great deal of time, equipment and manpower, it is difficult to secure economic efficiency. The method that is used to measure the degree of compaction according to the penetration depth achieved by free fall objects through gravity is the Free-Fall Penetration Test (FFPT), which uses a so-called "portable compaction measuring meter (PCMM)." In this study, the degree of compaction was measured and a penetration depth graph was developed after the field test using the portable compaction measuring meter. The coefficient of determination was 0.963 at a drop height of 10 cm, showing the highest level of accuracy. Both horizontal axis and longitudinal axis were developed in a decimal form of graph, and the range of allowable error was ${\pm}1.28mm$ based on the penetration depth. The portable compaction measuring meter makes it possible to measure the degree of compaction simply, quickly and accurately in the field, which will ensure economic efficiency and facilitate the process management.

An Index Structure for Substructure Searching In Chemical Databases (화학 데이타베이스에서 부분구조 검색을 위한 인덱스 구조)

  • Lee Hwangu;Cha Jaehyuk
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.641-649
    • /
    • 2004
  • The relationship between chemical structures and biological activities is researched briskly in the area of 'Medicinal Chemistry' At the base of these structure-based drug design tries, medicinal chemists search the existing drugs of similar chemical structure to target drug for the development of a new drug. Therefore, it is such necessary that an automatic system selects drug files that have a set of chemical moieties matching a user-defined query moiety. Substructure searching is the process of identifying a set of chemical moieties that match a specific query moiety. Testing for substructure searching was developed in the late 1950s. In graph theoretical terms, this problem corresponds to determining which graphs in a set are subgraph isomorphic to a specified query moiety. Testing for subgraph isomorphism has been proved, in the general case, to be an NP- complete problem. For the purpose of overcoming this difficulty, there were computational approaches. On the 1990s, a US patent has been granted on an atom-centered indexing scheme, used by the RS3 system; this has the virtue that the indexes generated can be searched by direct text comparison. This system is commercially used(http://www.acelrys.com/rs3). We define the RS3 system's drawback and present a new indexing scheme. The RS3 system treats substructure searching with substring matching by means of expressing chemical structure aspredefined strings. However, it has insufficient 'rerall' and 'precision‘ because it is impossible to index structures uniquely for same atom and same bond. To resolve this problem, we make the minimum-cost- spanning tree for one centered atom and describe a structure with paths per levels. Expressing 2D chemical structure into 1D a string has limit. Therefore, we break 2D chemical structure into 1D structure fragments. We present in this paper a new index technique to improve recall and precision surprisingly.

A Dominating Set Algorithm (지배집합 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.121-129
    • /
    • 2013
  • This paper proposes a linear-time algorithm that has been designed to obtain an accurate solution for Dominating Set (DS) problem, which is known to be NP-complete due to the deficiency of polynomial-time algorithms that successfully derive an accurate solution to it. The proposed algorithm does so by repeatedly assigning vertex v with maximum degree ${\Delta}(G)$among vertices adjacent to the vertex v with minimum degree ${\delta}(G)$ to Minimum Independent DS (MIDS) as its element and removing all the incident edges until no edges remain in the graph. This algorithm finally transforms MIDS into Minimum DS (MDS) and again into Minimum Connected DS (MCDS) so as to obtain the accurate solution to all DS-related problems. When applied to ten different graphs, it has successfully obtained accurate solutions with linear time complexity O(n). It has therefore proven that Dominating Set problem is rather a P-problem.

A Heuristic Approach to Scheduling Multiple Cranes for Intra-Block Remarshalling (복수 크레인을 활용한 블록 내 컨테이너 이적 계획)

  • Oh, Myung-Seob;Kang, Jae-Ho;Ryu, Kwang-Ryel;Kim, Kap-Hwan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.413-421
    • /
    • 2005
  • Intra-block remarshalling is the task of rearranging into some target bays those containers which are scattered within around the block. If multiple transfer cranes installed in the block are all used together we may be able to complete the remarshalling task as early as possible. However, when multiple cranes are used simultaneously, there may occur significant delays if we do not carefully consider interferences between the cranes at the time of scheduling. Especially, delays caused by interferences occur more frequently in case of using non-crossing cranes. This paper presents an efficient heuristics method for assigning moves of containers to each crane and for determining an appropriate container moving order in a manner sensitive to the interferences. Simulation experiments have shown that the proposed method can effectively reduce delays in various environments.

  • PDF

Assessing the Vulnerability of Network Topologies under Large-Scale Regional Failures

  • Peng, Wei;Li, Zimu;Liu, Yujing;Su, Jinshu
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.451-460
    • /
    • 2012
  • Natural disasters often lead to regional failures that can cause network nodes and links co-located in a large geographical area to fail. Novel approaches are required to assess the network vulnerability under such regional failures. In this paper, we investigate the vulnerability of networks by considering the geometric properties of regional failures and network nodes. To evaluate the criticality of node locations and determine the critical areas in a network, we propose the concept of ${\alpha}$-critical-distance with a given failure impact ratio ${\alpha}$, and we formulate two optimization problems based on the concept. By analyzing the geometric properties of the problems, we show that although finding critical nodes or links in a pure graph is a NP-complete problem, the problem of finding critical areas has polynomial time complexity. We propose two algorithms to deal with these problems and analyze their time complexities. Using real city-level Internet topology data, we conducted experiments to compute the ${\alpha}$-critical-distances for different networks. The computational results demonstrate the differences in vulnerability of different networks. The results also indicate that the critical area of a network can be estimated by limiting failure centers on the locations of network nodes. Additionally, we find that with the same impact ratio ${\alpha}$, the topologies examined have larger ${\alpha}$-critical-distances when the network performance is measured using the giant component size instead of the other two metrics. Similar results are obtained when the network performance is measured using the average two terminal reliability and the network efficiency, although computation of the former entails less time complexity than that of the latter.