-
161
Throughput Capacity of Opportunistic Routing in Wireless Sensor Networks
Published 2010-06-01“…Then we introduce the concept of concurrent schedulable set to represent the constraints imposed by the transmission conflicts of OR, and formulate the optimal aggregate throughput problem as a maximum concurrent flow linear programming problem. Simulation results demonstrate that the OR design derived from our analysis model often yields noticeably better throughput than traditional unicast routing protocols and the OR design derived from existing analysis model under a range of scenarios.…”
Get full text
Article -
162
Guaranteed Cost Finite-Time Control for Positive Switched Linear Systems with Time-Varying Delays
Published 2017-01-01“…Such conditions can be easily solved by linear programming. Finally, an example is given to illustrate the effectiveness of the proposed method.…”
Get full text
Article -
163
Planning approach of survivable fiber-wireless broadband access network
Published 2016-05-01“…The emerging fiber-wireless(FiWi)broadband access network provides not only the new technological references for flexible broadband access anywhere and anytime,but also the research opportunities for the cost-efficient design of survivable broadband access network.The study of survivable FiWi access network planning was focused on,and an approach of survivable network planning based on wireless-rerouting protection was proposed.When any fiber link cuts,the failed optical network unit(ONU)can transfer its traffic into other normal ONUs.Solving the joint optimization problem of wireless routers placement,backup radios configuration and ONU capacity allocation was put more importance on,aiming to fully protect all traffic with the minimum deployment cost.The method of integer linear programming was employed to obtain the optimal solution for small-scale network planning.The heuristic algorithm was also proposed for the large-scale network planning.Simulation results demonstrate the effectiveness of the proposed approach in reducing network deployment cost.…”
Get full text
Article -
164
Generation of Length Distribution, Length Diagram, Fibrogram, and Statistical Characteristics by Weight of Cotton Blends
Published 2007-01-01“…Finally, the selection of the optimal blends using the linear programming method, based on the hypothesis that the cotton blend parameters vary linearly in function of the components rations, is proved insufficient.…”
Get full text
Article -
165
Reachability Analysis of Low-Order Discrete State Reaction Networks Obeying Conservation Laws
Published 2019-01-01“…Using this result, the reachability problem is reformulated as an Integer Linear Programming (ILP) feasibility problem. Therefore, the number of feasible trajectories satisfying the reachability relation can be counted in polynomial time in the number of species and in the distance of initial and target states, assuming fixed number of reactions in the system.…”
Get full text
Article -
166
An Energy-Efficient Multisite Offloading Algorithm for Mobile Devices
Published 2013-03-01“…This paper proposes an Energy-Efficient Multisite Offloading (EMSO) algorithm, which formulates the multiway partitioning problem as the 0-1 Integer Linear Programming (ILP) problem. Moreover, our proposed EMSO algorithm adopts the multi-way graph partitioning based algorithm to solve it. …”
Get full text
Article -
167
An Online Relay Selection Scheme in Power Controllable Wireless Sensor Networks
Published 2012-06-01“…Our study shows that the proposed scheme achieves a network lifetime close to the scheme based on linear programming techniques and global information or centralized processing.…”
Get full text
Article -
168
Finding projection in the two-stage supply chain in DEA-R with random data using (CRA) model
Published 2021-09-01“…Centralized Allocation Resource (CRA) with a two-stage linear programming model captures the projection of DMUs on the efficient frontier. …”
Get full text
Article -
169
Robust Bearing-Only Localization Using Total Least Absolute Residuals Optimization
Published 2020-01-01“…Resistance to isolated gross errors refers to the conventional least absolute residual (LAR) method, and its estimate can be determined by linear programming when pseudolinear equations are set. …”
Get full text
Article -
170
Improved grey wolf optimization algorithm based service function chain mapping algorithm
Published 2022-11-01“…With the rise of new Internet applications such as the industrial Internet, the Internet of vehicles, and the metaverse, the network’s requirements for low latency, reliability, security, and certainty are facing severe challenges.In the process of virtual network deployment, when using network function virtualization technology, there were problems such as low service function chain mapping efficiency and high deployment resource overhead.The node activation cost and instantiation cost was jointly considered, an integer linear programming model with the optimization goal of minimizing the average deployment network cost was established, and an improved grey wolf optimization service function chain mapping (IMGWO-SFCM) algorithm was proposed.Three strategies: mapping scheme search based on acyclic KSP algorithm, mapping scheme coding and improvement based on reverse learning and nonlinear convergence were added to the standard grey wolf optimization algorithm to form this algorithm.The global search and local search capabilities were well balanced and the service function chain mapping scheme was quickly determined by IMGWO-SFCM.Compared with the comparison algorithm, IMGWO-SFCM reduces the average deployment network cost by 11.86% while ensuring a higher service function chain request acceptance rate.…”
Get full text
Article -
171
AEUR: authenticated encryption algorithm design based on uBlock round function
Published 2023-08-01“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function, with resistance to internal collision attacks as the security objective, a mixed integer linear programming approach was used to search for generic iterative component R(t,s) to meet the security objective.Secondly, the authenticated encryption algorithm AEUR was designed by using this component.AEUR consisted of two parts: authenticated encryption and decrypted verification, both of which performed the same process without the need to design additional operational sessions, reducing the algorithm’s resource consumption.In addition, the correctness of the algorithm was verified by comparing the corresponding round state values, and the security of the algorithm was analyzed using various analysis methods such as linear attacks and sliding attacks.Finally, the algorithm was implemented in C language to prove the AEUR has good performance.The results show that the proposed algorithm has a better overall performance in terms of software runtime, with efficiency improvements of 3% and 46% compared to AEGIS and ALE, and 74% and 92% compared to AES-GCM and ACORN, respectively.…”
Get full text
Article -
172
Modern Technology's role in accounting cost calculation of industrial enterprises: Informatization as a key strategy to improve management efficiency
Published 2025-01-01“…Firstly, the model employs mixed integer linear programming (MILP) to optimize production processes through mathematical modeling. …”
Get full text
Article -
173
Group Decision-Making Approach Based on Generalized Grey Linguistic 2-Tuple Aggregation Operators
Published 2018-01-01“…On that basis, a flexible group decision-making approach with fuzzy and grey information is designed and applied to an evaluation problem, in which grey relationship analysis (GRA) method and a linear programming model are combined to extract attribute weights from partially known attribute information. …”
Get full text
Article -
174
A Fuzzy Inference System for the Conjunctive Use of Surface and Subsurface Water
Published 2013-01-01“…Subsequently, water allocations in the surface water system are simulated by using linear programming techniques, and the responses of subsurface water system with respect to pumping are forecasted by using artificial neural networks. …”
Get full text
Article -
175
Confusion Analysis and Detection for Workflow Nets
Published 2014-01-01“…Second, a detection approach based on the characteristics of confusion subnets and the integer linear programming (ILP) is developed, which is not required to compute the reachability graph of a WF-net. …”
Get full text
Article -
176
Cutting Force Predication Based on Integration of Symmetric Fuzzy Number and Finite Element Method
Published 2014-01-01“…The method used symmetric fuzzy number to establish fuzzy function between cutting force and three factors and obtained the uncertain interval of cutting force by linear programming. At the same time, the change curve of cutting force with time was directly simulated by using thermal-mechanical coupling FEM; also the nonuniform stress field and temperature distribution of workpiece, tool, and chip under the action of thermal-mechanical coupling were simulated. …”
Get full text
Article -
177
A Multiroute Signal Control Model considering Coordination Rate of Green Bandwidth
Published 2021-01-01“…Moreover, with the analysis of the mapping characteristics of the phase coordination rate, the concept of the coordination rate of green wave bandwidth was proposed, with which as the objective function, a multiroute signal coordination control model was established, and this model is a mixed integer linear programming problem with the overall optimal coordination rate of inbound, outbound, and turning movement as the objective. …”
Get full text
Article -
178
PENERAPAN PROGRAM LINIER UNTUK PEMANFAATAN LAHAN DI KAWASAN PESISIR KOTA CIREBON
Published 2021-10-01“…Metode analisis yang digunakan dalam penelitian ini adalah metode analisis data kualitatif dan metode analisis data kuantitatif dengan menggunakan alat analisa Linear Programming. Dari hasil analisis yang telah dilakukan maka rekomendasi yang dapat diberikan adalah memaksimalkan pemanfaatan lahan pelabuhan dan perdagangan jasa sebagai alternatif kombinasi pemanfaatan lahan yang mampu meningkatkan pertumbuhan perekonomian dikawasan pesisir Kota Cirebon. …”
Get full text
Article -
179
An improved dual-sink architecture with a modified media access control protocol, energy-aware, and quality-of-service guaranteed routing algorithms for wireless body area network
Published 2022-10-01“…In addition, in our proposed model, linear programming which is based on mathematical models was used to model the network lifetime maximization and continuous data transmission minimization. …”
Get full text
Article -
180
Discovering PDEs Corrections from Data Within a Hybrid Modeling Framework
Published 2024-12-01“…It is then employed, first, in a full operator representation regularized optimization problem, where sparsity is promoted, leading to a linear programming problem, and then in a tensor decomposition of the operator’s identification procedure. …”
Get full text
Article