• Title/Summary/Keyword: GREEDY

Search Result 428, Processing Time 0.02 seconds

Delay Tolerant Packet Forwarding Algorithm Based on Location Estimation for Micro Aerial Vehicle Networks

  • Li, Shiji;Hu, Guyu;Ding, Youwei;Zhou, Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1377-1399
    • /
    • 2020
  • In search and rescue mission, micro aerial vehicles (MAVs) are typically used to capture image and video from an aerial perspective and transfer the data to the ground station. Because of the power limitation, a cluster of MAVs are required for a large search area, hence an ad-hoc wireless network must be maintained to transfer data more conveniently and fast. However, the unstable link and the intermittent connectivity between the MAVs caused by MAVs' movement may challenge the packet forwarding. This paper proposes a delay tolerant packet forwarding algorithm based on location estimation for MAV networks, called DTNest algorithm. In the algorithm, ferrying MAVs are used to transmit data between MAVs and the ground station, and the locations of both searching MAVs and ferrying MAVs are estimated to compute the distances between the MAVs and destination. The MAV that is closest to the destination is selected greedy to forward packet. If a MAV cannot find the next hop MAV using the greedy strategy, the packets will be stored and re-forwarded once again in the next time slot. The experiment results show that the proposed DTNest algorithm outperforms the typical DTNgeo algorithm in terms of packet delivery ratio and average routing hops.

Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing

  • Zhang, Can;Wu, Dan;Ao, Liang;Wang, Meng;Cai, Yueming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1065-1085
    • /
    • 2020
  • With rapid growth of content demands, device-to-device (D2D) content sharing is exploited to effectively improve the service quality of users. Considering the limited storage space and various content demands of users, caching schemes are significant. However, most of them ignore the influence of the asynchronous content reuse and the selfishness of users. In this work, the user preferences are defined by exploiting the user-oriented content popularity and the current caching situation, and further, we propose the social-aware rate, which comprehensively reflects the achievable contents download rate affected by the social ties, the caching indicators, and the user preferences. Guided by this, we model the collaborative caching problem by making a trade-off between the redundancy of caching contents and the cache hit ratio, with the goal of maximizing the sum of social-aware rate over the constraint of limited storage space. Due to its intractability, it is computationally reduced to the maximization of a monotone submodular function, subject to a matroid constraint. Subsequently, two social-aware collaborative caching algorithms are designed by leveraging the standard and continuous greedy algorithms respectively, which are proved to achieve different approximation ratios in unequal polynomial-time. We present the simulation results to illustrate the performance of our schemes.

A novel Adaptive Re-Marking Strategy for TCP Fairness of DiffServ Assured Services (DiffServ Assured Service에서 TCP 공평성 보장을 위한 적응적인 패킷 Re-Marking 방안)

  • Hur, Kyeong
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.2
    • /
    • pp.99-106
    • /
    • 2008
  • In this paper, we have proposed a novel re-marking strategy at tbe ingressive edge router to improve TCP fairness of DiffServ Assured Services. Our re-marking strategy introduces a configuration method of the Temporary Permitted Rate (TPR). By using this new configuration method of TPR, IN packets of greedy TCP flows are re-marked to OUT packets pertinently and constantly whenever the network traffic changes. Simulation Results show that this novel re-marking strategy can regulate the packet transmission rate of each TCP flow to the contract rate without a decrease in the link utilization.

  • PDF

Ant Colony Optimization for Feature Selection in Pattern Recognition (패턴 인식에서 특징 선택을 위한 개미 군락 최적화)

  • Oh, Il-Seok;Lee, Jin-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.1-9
    • /
    • 2010
  • This paper propose a novel scheme called selective evaluation to improve convergence of ACO (ant colony optimization) for feature selection. The scheme cutdown the computational load by excluding the evaluation of unnecessary or less promising candidate solutions. The scheme is realizable in ACO due to the valuable information, pheromone trail which helps identify those solutions. With the aim of checking applicability of algorithms according to problem size, we analyze the timing requirements of three popular feature selection algorithms, greedy algorithm, genetic algorithm, and ant colony optimization. For a rigorous timing analysis, we adopt the concept of atomic operation. Experimental results showed that the ACO with selective evaluation was promising both in timing requirement and recognition performance.

Dominant Source Based Tree for Dynamic Multicasting (동적 멀티캐스트를 위한 주 송신원 기탄 트리)

  • 남홍순;김대영;이규욱
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.633-642
    • /
    • 2000
  • This paper proposes a dominant source-based tree (DSBT) that constructs a localized multicast routing tree for dynamic multicasting without rerouting. To constrain end-to-end delays a multicast tree needs to be reconstructed when a new node joins the group due to additive tree constraint. In DSBT, a multicast group G is expressed by a (DS, NCM) pair, where DS is a dominant source address and NCM is a normalized cost margin. A node wishing to participate in a group selects a path that complies with NCM toward DS such that the end-to-end cost is constrained without any rerouting. Simulation results show that the proposed method performed better in terms of the overall tree cost compared with the Nave algorithm and in terms of the end-to-end delays between any two members compared with the Greedy algorithm.

  • PDF

Boolean Extraction Technique Using Two-cube Divisors and Complements (2-큐브 제수와 보수에 의한 공통 논리식 산출)

  • Kwon, Oh-Hyeong;Oh, Im-Geol
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.9-16
    • /
    • 2008
  • This paper presents a new Boolean extraction technique for logic synthesis. This method extracts two-cube Boolean subexpression pairs from each logic expression. It begins by creating two-cube array, which is extended and compressed with complements of two-cube Boolean subexpressions. Next, the compressed two-cube array is analyzed to extract common subexpressions for several logic expressions. The method is greedy and extracts the best common subexpression. Experimental results show the improvements in the literal counts over well-known logic synthesis tools for some benchmark circuits.

Plagiarism Detection among Source Codes using Adaptive Methods

  • Lee, Yun-Jung;Lim, Jin-Su;Ji, Jeong-Hoon;Cho, Hwaun-Gue;Woo, Gyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1627-1648
    • /
    • 2012
  • We propose an adaptive method for detecting plagiarized pairs from a large set of source code. This method is adaptive in that it uses an adaptive algorithm and it provides an adaptive threshold for determining plagiarism. Conventional algorithms are based on greedy string tiling or on local alignments of two code strings. However, most of them are not adaptive; they do not consider the characteristics of the program set, thereby causing a problem for a program set in which all the programs are inherently similar. We propose adaptive local alignment-a variant of local alignment that uses an adaptive similarity matrix. Each entry of this matrix is the logarithm of the probabilities of the keywords based on their frequency in a given program set. We also propose an adaptive threshold based on the local outlier factor (LOF), which represents the likelihood of an entity being an outlier. Experimental results indicate that our method is more sensitive than JPlag, which uses greedy string tiling for detecting plagiarism-suspected code pairs. Further, the adaptive threshold based on the LOF is shown to be effective, and the detection performance shows high sensitivity with negligible loss of specificity, compared with that using a fixed threshold.

Two-Dimensional POMDP-Based Opportunistic Spectrum Access in Time-Varying Environment with Fading Channels

  • Wang, Yumeng;Xu, Yuhua;Shen, Liang;Xu, Chenglong;Cheng, Yunpeng
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.217-226
    • /
    • 2014
  • In this research, we study the problem of opportunistic spectrum access (OSA) in a time-varying environment with fading channels, where the channel state is characterized by both channel quality and the occupancy of primary users (PUs). First, a finite-state Markov channel model is introduced to represent a fading channel. Second, by probing channel quality and exploring the activities of PUs jointly, a two-dimensional partially observable Markov decision process framework is proposed for OSA. In addition, a greedy strategy is designed, where a secondary user selects a channel that has the best-expected data transmission rate to maximize the instantaneous reward in the current slot. Compared with the optimal strategy that considers future reward, the greedy strategy brings low complexity and relatively ideal performance. Meanwhile, the spectrum sensing error that causes the collision between a PU and a secondary user (SU) is also discussed. Furthermore, we analyze the multiuser situation in which the proposed single-user strategy is adopted by every SU compared with the previous one. By observing the simulation results, the proposed strategy attains a larger throughput than the previous works under various parameter configurations.

Generalized Orthogonal Matching Pursuit (일반화된 직교 매칭 퍼슛 알고리듬)

  • Kwon, Seok-Beop;Shim, Byong-Hyo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.2
    • /
    • pp.122-129
    • /
    • 2012
  • As a greedy algorithm reconstructing the sparse signal from underdetermined system, orthogonal matching pursuit (OMP) algorithm has received much attention in recent years. In this paper, we present an extension of OMP for pursuing efficiency of the index selection. Our approach, referred to as generalized OMP (gOMP), is literally a generalization of the OMP in the sense that multiple (N) columns are identified per step. Using the restricted isometry property (RIP), we derive the condition for gOMP to recover the sparse signal exactly. The gOMP guarantees to reconstruct sparse signal when the sensing matrix satisfies the RIP constant ${\delta}_{NK}$ < $\frac{\sqrt{N}}{\sqrt{K}+2\sqrt{N}}$. In addition, we show recovery performance and the reduced number of iteration required to recover the sparse signal.

Optimal Packet Scheduling for Energy Harvesting Sources on Time Varying Wireless Channels

  • Kashef, Mohamed;Ephremides, Anthony
    • Journal of Communications and Networks
    • /
    • v.14 no.2
    • /
    • pp.121-129
    • /
    • 2012
  • In this paper, we consider a source node that operates over a time varying channel with energy harvesting capability. The goal of the source is to maximize the average number of successfully delivered packets per time slot. The source is able to choose whether to transmit a packet or defer the transmission in each time slot. The decision which is chosen by the source depends on the channel information available and the length of the energy queue. We formulate the problem of finding the optimal policy as a Markovian decision problem. We show some properties of the value function that represents the discounted number of successfully delivered packets per time slot. We prove that the optimal policy is a threshold type policy depending on the state of the channel and the length of the energy queue. We also derive an upper bound for the average number of packets per time slots successfully received by the destination. We show using numerical results that this bound is a tight bound on the performance of the optimal policy. And we consider the case of time varying channel but without channel state information (CSI). Then, we study the impact of channel time varying nature and the availability of CSI. In this case, we show that the optimal policy is a greedy policy. The performance of this greedy policy is also calculated.