首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper we introduce a method to compute non-dominated bicriteria shortest pairs, each including two disjoint simple paths. The method is based on an algorithm for ranking pairs of disjoint simple paths by non-decreasing order of cost, that is an adaptation of a path ranking algorithm applied to a network obtained from the original one after a suitable modification of the topology. Each path in this new network corresponds to a pair of paths in the former one. Computational results are presented and analysed for randomly generated networks.  相似文献   

2.
虚拟网映射是实现网络虚拟化的关键环节,其任务是在满足虚拟网构建约束的前提下,把虚拟网的虚拟节点和虚拟链路分别映射到底层物理网的节点和路径上。文中根据虚拟节点映射是否已知、物理网是否支持路径分割、物理节点是否支持重复映射等特征,对虚拟网映射问题进行分类,并针对一般网络拓扑模型和某些特殊网络拓扑模型完成各类虚拟网映射可行问题和优化问题的计算复杂性分析。  相似文献   

3.
In some application areas in telecommunication and transportation networks, there are problems requiring the determination of pairs of paths, aiming at minimizing the number of links, or link groups that they share, and their total cost. In this paper, a new bicriteria algorithm is proposed to deal with this problem. The algorithm is based on ranking pairs of paths by order of the total cost, using an adaptation of a path‐ranking algorithm, after a suitable modification of the network topology. Nondominated solutions are then filtered by means of a dominance test. First, computational experiments are reported in order to assess the efficiency of the algorithm to calculate the whole set of nondominated pairs of paths. Second, we present computational results focused on the nondominated solutions close to the maximal disjoint pair (i.e., quasi‐disjoint pairs only, for a predefined admissible relaxation value) because in some application problems, such as shared risk link group pairs of paths, only those solutions have practical relevance.  相似文献   

4.
Recent advances in bidirectional path tracing (BPT) reveal that the use of multiple light sub-paths and the resampling of a small number of these can improve the efficiency of BPT. By increasing the number of pre-sampled light sub-paths, the possibility of generating light paths that provide large contributions can be better explored and this can alleviate the correlation of light paths due to the reuse of pre-sampled light sub-paths by all eye sub-paths. The increased number of pre-sampled light subpaths, however, also incurs a high computational cost. In this paper, we propose a two-stage resampling method for BPT to efficiently handle a large number of pre-sampled light sub-paths. We also derive a weighting function that can treat the changes in path probability due to the two-stage resampling. Our method can handle a two orders of magnitude larger number of presampled light sub-paths than previous methods in equal-time rendering, resulting in stable and better noise reduction than state-of-the-art methods.  相似文献   

5.
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual networks to the substrate network with efficient utilization of infrastructure resources. The problem can be divided into two phases: node mapping phase and link mapping phase. In the node mapping phase, the existing algorithms usually map those virtual nodes with a complete greedy strategy, without considering the topology among these virtual nodes, resulting in too long substrate paths (with multiple hops). Addressing this problem, we propose a topology awareness mapping algorithm, which considers the topology among these virtual nodes. In the link mapping phase, the new algorithm adopts the k-shortest path algorithm. Simulation results show that the new algorithm greatly increases the long-term average revenue, the acceptance ratio, and the long-term revenue-to-cost ratio (R/C).  相似文献   

6.
从Web日志中挖掘用户兴趣路径算法改进   总被引:3,自引:1,他引:2       下载免费PDF全文
引入一种挖掘用户兴趣路径的算法,并对其进行有意义的改进。算法的主要思想是:首先利用Web日志建立以引用网页URL为行、浏览网页URL为列的两个网站访问矩阵,分别采用访问次数和平均到网页中字符数的访问时间为元素值。然后,通过对矩阵进行路径兴趣度计算得到兴趣子路径,最后进行合并生成用户兴趣路径集。  相似文献   

7.
在通信的源和目的间寻找两条(主用和备用)链路分离的QoS路径是提供可靠QoS路由的重要途径.现有求解多约束链路分离路径对(multi-constrained link-disjoint path pair,简称MCLPP)的算法难以保证求得存在于任意网络中的可行解和最优解.为解决这一问题,分析了MCLPP问题最优解的性质,提出了精确算法的设计原则,在此基础上给出了求解MCLPP问题的精确算法(link-disjoint optimal multi-constrained paths algorithm,简称LIDOMPA算法),可对任意网络求解客观存在的多约束最短链路分离路径对.为了降低算法的复杂性,引入了候选最优解、紧缩的约束向量和结构化的路径支配3种关键方法,在保障算法精确性的同时,有效地降低了LIDOMPA的搜索空间.大量的实验结果表明,LIDOMPA的求解能力优于现有算法,同时可以实现较低的算法执行时间开销.  相似文献   

8.
多约束最短链路分离路径精确算法   总被引:2,自引:0,他引:2  
在通信的源和目的间寻找两条(主用和备用)链路分离的QoS路径是提供可靠QoS路由的重要途径.现有求解多约束链路分离路径对(multi-constrained link-disjoint path pair,简称MCLPP)的算法难以保证求得存在于任意网络中的可行解和最优解.为解决这一问题,分析了MCLPP问题最优解的性质,提出了精确算法的设计原则,在此基础上给出了求解MCLPP问题的精确算法(link-disjoint optimal multi-constrained paths algorithm,简称LIDOMPA算法),可对任意网络求解客观存在的多约束最短链路分离路径对.为了降低算法的复杂性,引入了候选最优解、紧缩的约束向量和结构化的路径支配3种关键方法,在保障算法精确性的同时,有效地降低了LIDOMPA的搜索空间.大量的实验结果表明,LIDOMPA的求解能力优于现有算法,同时可以实现较低的算法执行时间开销.  相似文献   

9.
通过分析物流企业车辆路径选择难的问题,对现有的蚁群算法进行分析和改进,提出了多径向蚁群算法。算法中设置多径向因子、路网拓扑结构、拓扑矩阵改进蚂蚁路径选择。实验结果表明算法具有合理性、可行性和有效性,可应用于求大规模路网中的多条路径问题。  相似文献   

10.
从Web日志中挖掘用户浏览偏爱路径   总被引:55,自引:0,他引:55  
邢东山  沈钧毅  宋擒豹 《计算机学报》2003,26(11):1518-1523
Web日志中包含了大量的用户浏览信息,如何有效地从其中挖掘出用户浏览兴趣模式是一个重要的研究课题.作者在分析目前用户浏览模式挖掘算法存在的问题的基础上,利用提出的支持一偏爱度的概念,设计了网站访问矩阵,并基于这个矩阵提出了用户浏览偏爱路径挖掘算法:先利用Web日志建立以引用网页URL为行、浏览网页URL为列、路径访问频度为元素值的网站访问矩阵.该矩阵为稀疏矩阵,将该矩阵用三元组法来进行表示.然后,通过对该矩阵进行支持一偏爱度计算得到偏爱子路径.最后进行合并生成浏览偏爱路径.实验表明该算法能准确地反映用户浏览兴趣,而且系统可扩展性较好.这可以应用于电子商务网站的站点优化和个性化服务等.  相似文献   

11.
自适应窗口的时间规整立体匹配算法   总被引:10,自引:3,他引:7  
针对立体视觉中图像对应点的误匹配问题,以时间规整算法(DTW)为基础,提出了自适应窗口的立体匹配算法.根据外极线的约束,在自适应窗口内采用灰度相关技术得到长度不相等的两个灰度段作为相容的匹配序列;利用动态规划法及连续性约束寻找一条最佳的匹配路径.根据回溯得到的匹配路径及其坐标值得到高密度视差图.实验结果表明,该算法具有较高的运行效率和良好的匹配效果.  相似文献   

12.
MANET中基于簇的多路径动态源路由(CMDSR)   总被引:6,自引:0,他引:6  
大量研究表明移动自组网(mobile ad hoc networks,MANET)的特性使得提高无线网络路由协议的可扩展性成为一个挑战性的工作.根据网络动态特性,提出了一个基于簇的多路径动态源路由机制(CMDSR),该机制利用分簇的层次结构来有效搜索多路径,利用多路径并行传输流量.协议的主要思想是在分簇算法中将网络分成单元簇(1-cell cluster)和中心簇(2-server cluster)两级层次结构,将路由发现程序放在2-server层来防止类似DSR路由发现过程的泛洪,实现路由开销最小化,提高网络的可扩展性,能够有效地处理节点数量增大和节点密度增大的问题.此外,CMDSR通过选择可靠的路径和发送端-端的可靠性软保证的方法解决了可靠性问题,因而具有良好的性能.在OPNET环境中实现了这个协议,结果表明,CMDSR能够平衡网络负载,有效地处理网络拓扑的易变性,从而有效地提高网络的可靠性和鲁棒性.  相似文献   

13.
Traditionally the routing in optical parallel interconnect is based on an embedded virtual topology. However, one important fact that has been neglected in the past is that the wavelength assignment to transceivers actually creates additional (logical) links not present in the virtual topology. Such a side-effect can be utilized to significantly reduce the number of hops between a pair of processors. This observation leads to the concept of super topology. This paper considers the hypercube as the embedded virtual topology. The ideas contained here are easily applicable to optical parallel interconnects employing other virtual topologies as well. We present a general framework for embedding a regular topology, the structure of the super topology, the optimal routing algorithm, the distance between any pair of processors and the diameter in the super topology.  相似文献   

14.
基于Web数据挖掘的用户浏览兴趣路径研究   总被引:1,自引:0,他引:1  
使用Web日志与用户浏览行为相结合的方式对用户浏览兴趣模式进行挖掘。分别建立以访问次数、平均到网页中字符数的访问时间和拉动滑动条次数为元素值的矩阵,通过对矩阵进行路径兴趣度的计算得到兴趣子路径,进行合并生成用户兴趣路径集。实例分析表明该算法是可行和有效的,对于电子商务网站的优化和实施个性化服务具有意义。  相似文献   

15.
A critical component of any parallel processing system is the interconnection network that provides communications among the system's processors and memories. The data manipulator (gamma) network family is an important class of multistage interconnection networks that is being studied by various researchers. One interesting property of the data manipulator network family is the existence of multiple paths through the network for most source/ destination pairs. The condition that must be present to have disjoint paths through the network for a given source/ destination pair is shown, where disjoint paths are multiple paths with no links in common. It is derived that the maximum number of disjoint paths for any source/destination pair is two and a method for finding the routing tags that specify these paths is given. For source/destination pairs that have disjoint paths, a single fault cannot prevent communication between that source/ destination pair. The effect of a fault in a given stage of the network on the number of source/destination pairs that can be connected is also discussed. All results are proven mathematically.  相似文献   

16.
This paper studies the problem of designing a packet-switched communication network with tradeoffs between link costs and response time to users. It consists of assigning capacities to links in the network and determining the routes used by messages for all communicating node pairs in order to minimize total link fixed and variable costs. A tradeoff between link costs and response time to users is achieved by including a constraint that sets an upper limit on the average link queueing delay in the network. The topology of the network and the end-to-end traffic requirements are given. The problem is formulated as a nonlinear integer programming model. Unlike most of previous models, where the best route for a communicating node pair is restricted to a set of prespecified candidate routes, our model considers all possible routes for every communicating node pair. An efficient heuristic based on a Lagrangean relaxation of the problem is developed to generate feasible solutions. The results of extensive computational experiments across a variety of previously used networks are reported. These results indicate that the solution procedure is effective for a wide range of traffic loads and cost structures.  相似文献   

17.
《Computer Networks》2008,52(7):1492-1505
With the development of real-time applications, the traffic recovery time, which is defined as the duration between the failure occurrence on the working path and the interruptive traffic has been successfully switched to the backup path, has become the basic Quality-of-Service (QoS) requirement in survivable WDM networks. In this paper, we address the problem of shared sub-path protection with considering the constraint of traffic recovery time and propose a new heuristic algorithm called Traffic recovery time Constrained Shared Sub-Path Protection (TC_SSPP) to compute the working path and the Shared-Risk-Link-Group (SRLG)-disjoint backup sub-paths. The main target of our work is to improve the resource utilization ratio and reduce the blocking probability for dynamic network environment. By properly setting the delay parameter for each link and running the Delay Constrained Shortest Path Algorithm (DCSPA) to compute the backup sub-paths, TC_SSPP can effectively guarantee the traffic recovery time. Simulation results show that the proposed TC_SSPP can outperform the traditional algorithms.  相似文献   

18.
李宁  刘江  郭艳  郭莉 《计算机工程》2008,34(2):144-146
讨论了在定向天线的传输模式下,当信道带宽和端到端时延同时受限时,Ad Hoc网络容量的估计问题,提出了一种基于矩阵运算的网络容量快速估计算法,该算法能够跟踪网络拓扑的变化,为快速估计网络容量提供了一种较为有效的解决方案,并给出了网络时延的估计算法。  相似文献   

19.
This paper considers the problem of bandwidth allocation on communication networks with multiple classes of traffic, where bandwidth is determined under the budget constraint. Due to the limited budget, there is a risk that the network service providers can not assert a 100% guaranteed availability for the stochastic traffic demand at all times. We derive the blocking probabilities of connections as a function of bandwidth, traffic demand and the available number of virtual paths based on the Erlang loss formula for all service classes. A revenue/profit function is studied through the monotonicity and convexity of the blocking probability and expected path occupancy. We present the optimality conditions and develop a solution algorithm for optimal bandwidth of revenue management schemes. The sensitivity analysis and three economic elasticity notions are also proposed to investigate the marginal revenue for a given traffic class by changing bandwidth, traffic demand and the number of virtual paths, respectively. By analysis of those monotone and convex properties, it significantly facilitates the operational process in the efficient design and provision of a core network under the budget constraint.  相似文献   

20.
孔姗姗  刘林峰  陈行 《计算机科学》2016,43(2):144-147, 168
基于数据紧迫采集应用场景(如地震、火灾预警),分析了其拓扑控制的目标和需求,建立了网络模型并且进行了形式化描述和数学分析,提出了一种基于送达率约束的低时延拓扑控制算法(LDBDC)。该算法可以根据给定的送达率约束计算给定区域的近似最优平均跳数,从而得到虚拟网格的边长。仿真实验表明,LDBDC能够获得近似最优的拓扑结构,在满足送达率约束的前提下使得网络的平均时延最小。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号