• Title/Summary/Keyword: GREEDY

Search Result 428, Processing Time 0.024 seconds

A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure

  • Nia, Nahid Hamzehee;Adabi, Sepideh;Nategh, Majid Nikougoftar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2346-2361
    • /
    • 2017
  • A major challenge in cloud infrastructure is the efficient allocation of virtual network elements on top of substrate network elements. Path algebra is a mathematical framework which allows the validation and convergence analysis of the mono-constraint or multi-constraint routing problems independently of the network topology or size. The present study proposes a new heuristic approach based on mathematical framework "paths algebra" to map virtual nodes and links to substrate nodes and paths in cloud. In this approach, we define a measure criterion to rank the substrate nodes, and map the virtual nodes to substrate nodes according to their ranks by using a greedy algorithm. In addition, considering multi-constraint routing in virtual link mapping stage, the used paths algebra framework allows a more flexible and extendable embedding. Obtained results of simulations show appropriate improvement in acceptance ratio of virtual networks and cost incurred by the infrastructure networks.

An unwanted facility location problem with negative influence cost and transportation cost (기피비용과 수송비용을 고려한 기피시설 입지문제)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.1
    • /
    • pp.77-85
    • /
    • 2013
  • In the location science, environmental effect becomes a new main consideration for site selection. For the unwanted facility location selection, decision makers should consider the cost of resolving the environmental conflict. We introduced the negative influence cost for the facility which was inversely proportional to distance between the facility and residents. An unwanted facility location problem was suggested to minimize the sum of the negative influence cost and the transportation cost. The objective cost function was analyzed as nonlinear type and was neither convex nor concave. Three GRASP (Greedy Randomized adaptive Search Procedure) methods as like Random_GRASP, Epsilon_GRASP and GRID_GRASP were developed to solve the unwanted facility location problem. The Newton's method for nonlinear optimization problem was used for local search in GRASP. Experimental results showed that quality of solution of the GRID_GRASP was better than those of Random_GRASP and Epsilon_GRASP. The calculation time of Random_GRASP and Epsilon_GRASP were faster than that of Grid_GRASP.

An Efficient Reduction Scheme of Virtual Machine Resource in Cloud Computing Environment (클라우드 컴퓨팅 환경에서 가상머신의 효율적인 자원 감축 기법)

  • Kim, Chang-Hyeon;Lee, Won-Joo;Jeon, Chang-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.5-6
    • /
    • 2012
  • 본 논문에서는 가상머신에서 수행되는 어플리케이션의 서비스 품질을 보장하고, 클라우드 클러스터의 운영비용을 절감시킬 수 있는 자원 할당 감축기법을 제안한다. 이 기법은 가상머신의 자원 사용량 변화 추세를 분석하고 이를 토대로 확률적인 접근을 사용하여 새로운 자원 할당 감축량을 결정한다. 가상머신의 자원 사용량이 할당량을 초과하면 가상머신의 이주가 필요하다. 이때 발생하는 다운타임동안 가상머신의 어플리케이션은 서비스를 수행할 수 없기 때문에 클라우드 시스템의 성능이 저하된다. 따라서 성능평가에서는 가상머신의 자원 사용량이 할당량을 초과하는 횟수를 측정하여 Greedy 기법과 비교 평가함으로써 제안한 기법이 자원 할당 감축에 우수함을 검증한다.

  • PDF

A review of tree-based Bayesian methods

  • Linero, Antonio R.
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.543-559
    • /
    • 2017
  • Tree-based regression and classification ensembles form a standard part of the data-science toolkit. Many commonly used methods take an algorithmic view, proposing greedy methods for constructing decision trees; examples include the classification and regression trees algorithm, boosted decision trees, and random forests. Recent history has seen a surge of interest in Bayesian techniques for constructing decision tree ensembles, with these methods frequently outperforming their algorithmic counterparts. The goal of this article is to survey the landscape surrounding Bayesian decision tree methods, and to discuss recent modeling and computational developments. We provide connections between Bayesian tree-based methods and existing machine learning techniques, and outline several recent theoretical developments establishing frequentist consistency and rates of convergence for the posterior distribution. The methodology we present is applicable for a wide variety of statistical tasks including regression, classification, modeling of count data, and many others. We illustrate the methodology on both simulated and real datasets.

A Scheduling and Synchronization Technique for RAPIEnet Switches Using Edge-Coloring of Conflict Multigraphs

  • Abbas, Syed Hayder;Hong, Seung Ho
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.321-328
    • /
    • 2013
  • In this paper, we present a technique for obtaining conflict-free schedules for real-time automation protocol for industrial Ethernet (RAPIEnet) switches. Mathematical model of the switch is obtained using graph theory. Initially network traffic entry and exit parts in a single RAPIEnet switch are identified, so that a bipartite conflict graph can be constructed. The obtained conflict graph is transformed to three kinds of matrices to be used as inputs for our simulation model, and selection of any of the matrix forms is application-specific. A greedy edge-coloring algorithm is used to schedule the network traffic and to solve the minimum coloring problem. After scheduling, empty slots are identified for forwarding the non real-time traffic of asynchronous devices. Finally, an algorithm for synchronizing the schedules of adjacent switches is proposed using edge-contraction and minors. All simulations were carried out using Matlab.

Scheduling on the Pre-assembly Stage of Multiple Fabrication Machines (다중기계로 구성되는 조립전단계에서의 부품생산 일정계획)

  • 윤상흠
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.4
    • /
    • pp.63-71
    • /
    • 2003
  • This paper analyses a deterministic scheduling problem concerned with manufacturing multiple types of components at a pre-assembly stage composed of parallel fabrication machines. Each component part is machined on a fabrication machine specified in advance. The manufactured components are subsequently assembled into products. The completion time of a job(product) is measured by the latest completion time of its all components at the pre-assembly stage. The problem has the objective measure of minimizing the total weighted completion time of a finite number of jobs. Two lower bounds are derived and tested in a branch-and-bound scheme. Also, three constructive heuristic algorithms are developed based on the machine aggregation and greedy strategies. Some empirical evaluation of the performance of the proposed branch-and-bound and heuristic algorithms are also performed.

Implementation of Video Transfer with TCP-friendly Rate Control Protocol

  • Miyabayashi, Masaki;Wakamiya, Naoki;Murata, Masayuki;Miyahara, Hideo
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.117-120
    • /
    • 2000
  • As the use of real-time multimedia applications increases, a considerable amount of “greedy” UDP traffic would easily dominate network bandwidth and packet loss. As a result, bandwidth available to TCP connections is oppressed and their performance extremely deteriorates. In or-der that both TCP and UDP sessions fairly co-exist in the Internet, it is vital that we consider the fairness among both protocols. In this work, we implement a “TCP-friendly” rate control mechanism suitable to video applications and con-sider its applicability to a real system through observation of the video quality at the receiver and the connection state. It is shown that we can achieve high-quality and stable video transfer fairly sharing the network bandwidth with TCP by applying our rate control at a control interval of 32 times as long as RTT.

  • PDF

Reconfiguration method for array structures using spare element lines (여분소자 라인을 이용한 배열구조의 재구성 방법)

  • 김형석;최상방
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.2
    • /
    • pp.50-60
    • /
    • 1997
  • Reconfiguration of a memory array using spare rows and columns has been known to be a useful technique to improve the yield. When the numbers of spare rows and scolumns are limited, respectively, the repair problem is known to be NP-complete. In this paper, we propose the reconfiguration algorithm for an array of memory cells using faulty cel clustering, which removes rows and columns algrithm is the simplest reconfiguration method with the time complexity of $O(n^2)$, where n is the number of faulty cells, however the repair rate is very low. Whereas the exhaustive search algorithm has a high repair rate, but the time complexity is $O(2^n)$. The proposed algorithm provides the same repair rate as the exhaustive search algorithm for almost all cases and runs as fast as the greedy method. It has the time complexity of $O(n^3)$ in the worst case. We show that the propsed algorithm provides more efficient solutions than other algorithms using simulations.

  • PDF

A Study on Life History of Intermarried Korean Men's Family Dissolution (국제 결혼한 한국남성의 결혼해체에 관한 연구)

  • Kim, Min-Kyeong
    • Journal of Families and Better Life
    • /
    • v.29 no.4
    • /
    • pp.1-15
    • /
    • 2011
  • This study explored the life histories of intermarried Korean men for more than one year before and after their family dissolution. Researcher had in-depth interviews with participants who were selected by purposive sampling from the intermarried Korean men with dissoluted family conditions. Researcher employed the holistic-content approach to analyze the interviewed materials. Mandelbaum(1973)'s conceptual framework-dimensions, turnings, and adaptions-has been taken to present the analyzed contents. The dimensions of men consisted of 'request of continuous money', 'limitation of comprehensible communucation', 'premise terminated marriage: leaving home', 'inassurance of marriage maintenance'. Turnings involved 'abandoned person', 'parents' excessive protection', 'community among themselves', and 'greedy mediator'. Adaptions were observed by 'various feeling card', 'worrying about men's child', 'expecting the future', and 'stopping on foreigner as a partner'. Discussion and suggestion were presented on the basis of these findings: examination of marriage genuineness, Korean men's preparation of marriage, intervention and service for their mental health, supports for their children and strengthen of multicultural family center's function for dissolved family.

A Weapon Assignment Algorithm Using the Munkres Optimal Assignment Method (Munkres 최적할당 기법을 적용한 무기할당 알고리즘)

  • Kim, Ji-Eun;Shin, Jin-Hwa;Cho, Kil-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • This paper presents global and optimal solution for weapon assignment problems using the Munkres assignment algorithm. We propose a new modeling method of weapon assignment problems concerning some constraints of weapon systems. In this paper, we compares the Munkres weapon assignment algorithm with two other algorithms employing a search tree model in terms of computational complexity and performance. One is an optimal algorithm using exhausted search and the other is a greedy algorithm which selects the first search result as a solution. The experiment results show that the Munkres weapon assignment algorithm has better performance and less computational complexity in comparison with the two other algorithms.