Search results for "routing"

showing 10 items of 587 documents

Context-Aware RF-Energy Harvesting for IoT Networks

2021

Energy Harvesting plays a crucial role in improving the operational lifetime of IoT devices. The deployment of dedicated RF-transmitters helps in sufficient energy propagation to the sensor nodes of IoT networks. Also, energy harvesting using the deployment of such RF-transmitters is a challenging issue. In this work, two methods are proposed for the optimal placement of RF-transmitters for efficient energy harvesting in wireless sensor networks. The proposed context-aware RF-energy harvesting considers different network performance parameters such as energy-hole information, and data routing information. RF-transmitter deployment is achieved using network connectivity information in the fi…

Computer scienceSoftware deploymentDistributed computingNode (networking)Computer Science::Networking and Internet ArchitectureNetwork performanceContext (language use)Routing (electronic design automation)Energy harvestingWireless sensor networkComputer Science::Information TheoryEfficient energy use2021 IEEE 7th World Forum on Internet of Things (WF-IoT)
researchProduct

NoC Reconfiguration for CMP Virtualization

2011

At NoC level, the traffic interferences can be drastically reduced by using virtualization mechanisms. An effective strategy to virtualize a NoC consists in dividing the network in different partitions, each one serving different applications and traffic flows. In this paper, we propose a NoC reconfiguration mechanism to support NoC virtualization under real scenarios. Dynamic reassignment of network resources to different partitions is allowed in order to NoC dynamically adapts to application needs. Evaluation results show a good behavior of CMP virtualization.

Computer sciencebusiness.industryControl reconfigurationDynamic priority schedulingComputerSystemsOrganization_PROCESSORARCHITECTURESVirtualizationcomputer.software_genreNetwork on a chipSystem on a chipResource managementRouting (electronic design automation)businesscomputerComputer network2011 IEEE 10th International Symposium on Network Computing and Applications
researchProduct

Advances in vehicle routing and logistics optimization

2019

nessuno

Computer sciencebusiness.industryModeling and SimulationVehicle routing problemIn vehicleTransportationManagement Science and Operations ResearchRouting (electronic design automation)businessvehicle routingComputer networkEURO Journal on Transportation and Logistics
researchProduct

Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks

2016

Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…

Computer sciencecomputer.internet_protocolTime division multiple accessWireless Routing Protocol02 engineering and technologyPacket lossWireless sensor networks and applications0202 electrical engineering electronic engineering information engineeringWirelessSuperframeNetwork architecture and designProtocol (object-oriented programming)Communication protocols.General Environmental ScienceEmulationbusiness.industry020206 networking & telecommunicationsKey distribution in wireless sensor networksEmbedded systemInternetwork protocolGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingCommunications protocolbusinesscomputerReverse Address Resolution ProtocolEfficient energy useProcedia Computer Science
researchProduct

Fast Implementation of Double-coupled Nonnegative Canonical Polyadic Decomposition

2019

Real-world data exhibiting high order/dimensionality and various couplings are linked to each other since they share some common characteristics. Coupled tensor decomposition has become a popular technique for group analysis in recent years, especially for simultaneous analysis of multi-block tensor data with common information. To address the multiblock tensor data, we propose a fast double-coupled nonnegative Canonical Polyadic Decomposition (FDC-NCPD) algorithm in this study, based on the linked CP tensor decomposition (LCPTD) model and fast Hierarchical Alternating Least Squares (Fast-HALS) algorithm. The proposed FDCNCPD algorithm enables simultaneous extraction of common components, i…

Computer sciencelinked CP tensor decomposition (LCPTD)02 engineering and technologySignal-to-noise ratiotensor decompositionConvergence (routing)0202 electrical engineering electronic engineering information engineeringDecomposition (computer science)TensorHigh orderta113konvergenssiconvergencesignal to noise ratio020206 networking & telecommunicationsbrain modelinghierarchical alternating least squares (HALS)Alternating least squaresCore (graph theory)coupled tensor decomposition020201 artificial intelligence & image processingAlgorithmsignal processing algorithmselectroencephalographymathematical modelCurse of dimensionality
researchProduct

A well-scalable metaheuristic for the fleet size and mix vehicle routing problem with time windows

2009

This paper presents an efficient and well-scalable metaheuristic for fleet size and mix vehicle routing with time windows. The suggested solution method combines the strengths of well-known threshold accepting and guided local search metaheuristics to guide a set of four local search heuristics. The computational tests were done using the benchmarks of [Liu, F.-H., & Shen, S.-Y. (1999). The fleet size and mix vehicle routing problem with time windows. Journal of the Operational Research Society, 50(7), 721-732] and 600 new benchmark problems suggested in this paper. The results indicate that the suggested method is competitive and scales almost linearly up to instances with 1000 custome…

Computer. AutomationMathematical optimizationbusiness.industryComputer scienceGeneral EngineeringMetaheuristicsVehicle routingComputer Science ApplicationsSet (abstract data type)Artificial IntelligenceScalabilityVehicle routing problemBenchmark (computing)Local search (optimization)Guided Local SearchHeuristicsbusinessMetaheuristicHeterogeneous vehicles
researchProduct

An optimization approach for communal home meal delivery service

2009

Abstract: This paper is the first to discuss the communal home meal delivery problem. The problem can be modelled as a multiple travelling salesman problem with time windows, that is closely related to the well-studied vehicle routing problem with time windows. Experimental results are reported for a real-life case study from Central Finland over several alternative scenarios using the SPIDER commercial solver. The comparison with current practice reveals that a significant savings potential can be obtained using off-the-shelf optimization tools. As such, the potential for supporting real-life communal routing problems can be considered to be important for VRP practitioners.

Computer. AutomationService (systems architecture)Operations researchApplied MathematicsComputerApplications_COMPUTERSINOTHERSYSTEMSTransportationSolver/dk/atira/pure/sustainabledevelopmentgoals/responsible_consumption_and_productionTravelling salesman problemVehicle routingComputational MathematicsCurrent practiceTime windowsVehicle routing problemHome deliveryHeuristicsRouting (electronic design automation)SDG 12 - Responsible Consumption and ProductionMathematicsMathematicsJournal of computational and applied mathematics
researchProduct

Discrete-Time Adaptive Hysteresis Filter for Parallel Computing and Recursive Identification of Preisach Model

2018

High-precision motion control systems, for instance deployed for micro- and nano-positioning, often use the smart-material based actuators such as piezoelectric and magnetostrictive stages. Those exhibit inherent hysteresis nonlinearities which are challenging to compensate without precise hysteresis modeling. Even if a suitable hysteresis modeling approach is available, its parameter identification, correspondingly adaptation, at normal operating conditions constitute an essential task for the overall control design. This paper uses the direct recursive identification method for the Preisach hysteresis model and describes the fast parallel-computing discrete-time algorithm for an adaptive …

Condensed Matter::Materials ScienceHysteresisNoiseDiscrete time and continuous timeNoise measurementControl theoryFilter (video)Computer scienceConvergence (routing)Motion controlActuator2018 IEEE Conference on Control Technology and Applications (CCTA)
researchProduct

Some remarks on unconditionally convergent multipliers

2017

We present some results concerning the representation of unconditionally convergent multipliers, including a reformulation of a conjecture of Balazs and Stoeva.

Conjecture010102 general mathematicsHilbert spaceData_CODINGANDINFORMATIONTHEORY01 natural sciencesElectronic mail010101 applied mathematicssymbols.namesakeConvergence (routing)symbolsCalculusApplied mathematicsHardware_ARITHMETICANDLOGICSTRUCTURES0101 mathematicsRepresentation (mathematics)Mathematics2017 International Conference on Sampling Theory and Applications (SampTA)
researchProduct

On the Robust Synthesis of Logical Consensus Algorithms for Distributed Intrusion Detection

2013

We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on the value of a shared logical vector function depending on binary input events. Based on results on the convergence of finite--state iteration systems, we provide a technique to design logical consensus systems that minimize the number of messages to be exchanged and the number of steps before consensus is reached, and that can tolerate a bounded number of failed or malicious agents. We provide sufficient joint conditions on the input visibility and the communication topology for the method's applicability. We describe the application of our method to two distributed network intrusion detecti…

Consensus algorithmTheoretical computer scienceComputer scienceDistributed computingVisibility (geometry)Binary numberValue (computer science)Topology (electrical circuits)Computer Science::Multiagent SystemsSettore ING-INF/04 - AutomaticaControl and Systems EngineeringConsensus distributed algorithms intrusion detection security.Bounded functionConvergence (routing)Electrical and Electronic EngineeringVector-valued function
researchProduct