• Title/Summary/Keyword: Shortest path algorithm

Search Result 438, Processing Time 0.03 seconds

The Optimization path searching Method Development for Destination (목적지를 고려한 최적 경로탐색 기법 개발)

  • Ham Young-Kug;Kim Tae-Eun
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.55-62
    • /
    • 2005
  • In this paper, we propose the new technique to compute the optimal route by considering the direction of distribution vehicles and the location for delivery, developing the algorithm of the shortest route to approach the location as applying the gemetic algorithm. This approach makes it possible for us to find the best route even under itineraries which include many destinations. Lively studies are currently in progress on the development of vehicle navigation software, combining PDA GPS, and electronic maps. Many web-sites are providing a varier of services which use electronic maps. Popular among these services is one that computes the optimal route between two positions that a user inputs. This service of computing the optimal route plays an important role in distribution industries such as home-delivery. For the distribution system. the construction of a vehicle regulation system enables us to calculate and manipulate the optimal route for distribution vehicles, to enhance the efficiency in making use of vehicles and labor, and to reduce costs.

  • PDF

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

Optimal Route Discovery System for Emergency Escape from Disaster Situations (재난 상황 시 탈출을 위한 최적 경로 탐색 시스템)

  • Kang, Moo-Bin;Joo, Yang-Ick
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.448-449
    • /
    • 2016
  • Enlargement and complexification of current structures increase the expected casualty in case of accident in those e.g., fire. In that case, there only have been basic instructions such as announcement of that situation, alarm bell, exit signs, etc. but any guidance to lead to proper escape route was not been provided so far. To tackle the problem, several schemes have been proposed. However, various risk factors were not considered and route discovery performance must be improved to be applied to structures. Therefore, this paper proposes an optimal route discovery system for emergency escape from disaster situations which takes into account various possible risk factors and enhances the searching efficiency by using the $A^{\ast}$ algorithm. Performance evaluation by computer simulation shows that the proposed scheme effectively leads to safe escape route.

  • PDF

Route Selection in the Network of Public Transportation using the GA and the GIS (유전자 알고리즘과 GIS를 이용한 대중교통 경로선택에 관한 연구)

  • 전철민
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.21 no.4
    • /
    • pp.323-330
    • /
    • 2003
  • GIS-based applications for route guidance are increasingly developed recently, but most of them are for self$.$driven cars. Although some of them are intended for public transportation, they show limitations in dealing with time constraints problems taken place in transfer areas. Developing a public transportation guidance system requires the fallowing aspects: (i) people may change transportation means not only within the same type but also among different modes such as between buses and subways, and (ii) the system should take into account the time taken in transfer from one mode to the other. This study suggests the framework for developing a public transportation guidance system that generates optimized paths in the transportation network of mixed means including buses, subways and other modes. For this study, the Genetic Algorithms are used to find the best routes that take into account transfer time and other service-time constraints. The method for constructing the data structure in the GIS was also suggested.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

A Problem of Locating Electric Vehicle Charging Stations for Load Balancing (로드밸런싱을 위한 전기차 충전소 입지선정 문제)

  • Kwon, Oh-Seong;Yang, Woosuk;Kim, Hwa-Joong;Son, Dong-Hoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2018
  • In South Korea, Jeju Island has a role as a test bed for electric vehicles (EVs). All conventional cars on the island are supposed to be replaced with EVs by 2030. Accordingly, how to effectively set up EV charging stations (EVCSs) that can charge EVs is an urgent research issue. In this paper, we present a case study on planning the locations of EVCS for Jeju Island, South Korea. The objective is to determine where EVCSs to be installed so as to balance the load of EVCSs while satisfying demands. For a public service with EVCSs by some government or non-profit organization, load balancing between EVCS locations may be one of major measures to evaluate or publicize the associated service network. Nevertheless, this measure has not been receiving much attention in the related literature. Thus, we consider the measure as a constraint and an objective in a mixed integer programming model. The model also considers the maximum allowed distance that drivers would detour to recharge their EV instead of using the shortest path to their destination. To solve the problem effectively, we develop a heuristic algorithm. With the proposed heuristic algorithm, a variety of numerical analysis is conducted to identify effects of the maximum allowed detour distance and the tightness of budget for installing EVCSs. From the analysis, we discuss the effects and draw practical implications.

An Analysis of the Secret Routing Algorithm for Secure Communications (안전한 통신을 위한 비밀 경로 알고리즘의 분석)

  • Yongkeun Bae;Ilyong Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.105-116
    • /
    • 1997
  • Routing security is related to the confidentiality of the route taken by the data transmitted over the network. If the route is detected by the adversary, the probability is higher that the data are lost or the data can be intercepted by the adversary. Therefore, the route must be protected. To accomplish this, we select an intermediate node secretly and transmit the data using this intermediate node, instead of sending the data to the destination node using the shortest path. Furthermore, if we use a number of secret routes from the starting node to the destination node, data security is much stronger since we can transmit partial data rather than the entire data along a secret route. In this paper, the routing algorithm for multiple secret paths on MRNS(Mixed Radix Number System) Network, which requires O(1) for the time complexity where is the number of links on a node, is presented employing the HCLS(Hamiltonian Circuit Latin Square) and is analyzed in terms of entropy.

Development of a Vehicle Relocation Algorithm for the Promotion of One-way Car Sharing Service (공유차량의 효율적 단방향 서비스를 위한 차량 재배치 알고리즘)

  • Kim, Seung Hyun;Jung, Hee Jin;Bea, Sang Hoon
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.3
    • /
    • pp.239-247
    • /
    • 2014
  • In modern society, the transportation sector is having difficulties with mobility, safety, energy and environment issues so that solutions should be prepared progressively. Recently developed countries are paying greater attention to car-sharing systems as alternatives for relieving problems caused by increasing number of vehicles. Car-sharing systems are believed to keep the number of personal vehicles down and traffic congestion due to the fact that this system induces efficiency of vehicle operation. In this study, authors focused on solving the imbalance problem of car-sharing systems dynamically, to specifically improve one-way car sharing service. Therefore vehicle relocation algorithm was designed for maximizing profit of car sharing operators. For the application of the vehicle relocation algorithm among rental offices, we selected Haeundae-gu, Busan as the area of study. Rental offices have been designated to the zone centroid and we calculated the shortest path between rental offices by using TransCAD. In the study, we adapted MATLAB for the application of vehicle relocation algorithm. As the results, the total vehicle relocation time was estimated as 59.9 minutes. In addition, vehicle relocation algorithm was verified successfully by using Decision Tree method.

Developing algorithms for providing evacuation and detour route guidance under emergency conditions (재난.재해 시 대피 및 우회차량 경로 제공 알고리즘 개발)

  • Yang, Choong-Heon;Son, Young-Tae;Yang, In-Chul;Kim, Hyun-Myoung
    • International Journal of Highway Engineering
    • /
    • v.11 no.3
    • /
    • pp.129-139
    • /
    • 2009
  • The transportation network is a critical infrastructure in the event of natural and human caused disasters such as rainfall, snowfall, and terror and so on. Particularly, the transportation network in an urban area where a large number of population live is subject to be negatively affected from such events. Therefore, efficient traffic operation plans are required to assist rapid evacuation and effective detour of vehicles on the network as soon as possible. Recently, ubiquitous communication and sensor network technology is very useful to improve data collection and connection related emergency information. In this study, we develop a specific algorithm to provide evacuation route and detour information only for vehicles under emergency situations. Our algorithm is based on shortest path search technique and dynamic traffic assignment. We perform the case study to evaluate model performance applying hypothetical scenarios involved terror. Results show that the model successfully describe effective path for each vehicle under emergency situation.

  • PDF

A QoS-based Inter-Domain Routing Scheme for Distributed Multimedia Applications in a High Wide Area Network (분산 멀티미디어 응용을 위한 대규모 고속 통신망에서의 QoS-근거 계층적 도메인간 라우팅 방식)

  • 김승훈;김치하
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1239-1251
    • /
    • 1999
  • In this paper a scalable QoS-based hierarchical inter-domain routing scheme for distributed multimedia applications in a high speed wide area network. The problem of QoS-based routing is formulated as a multicriteria shortest path problem, known as NP-complete[21,30]. Our routing scheme consists of two phases. In Phase 1, two graph construction algorithms are performed to model the network under consideration as a graph. The graph contains a part of the network topology which is completely neglected or partially considered by existing routing schemes, thus maintaining more accurate topology information. In Phase 2, a heuristic call-by-call algorithm is performed for selecting a feasible path efficiently in depth first search-like manner on the graph and tailoring to each application's QoS requirements, beginning at a vertex that represents the source node. In this paper, a simple rule is also produced, by which the visiting order of outgoing edges at each vertex on the graph is determined. The rule is based on each edge's the minimum normalized slackness to the QoS requested. The proposed routing scheme extends the PNNI-type hierarchical routing framework. Note that our routing scheme is one of a few QoS-based hierarchical routing schemes that address explicitly the issue of selecting a path with multiple metrics.

  • PDF