• Title/Summary/Keyword: dynamic routing

Search Result 494, Processing Time 0.02 seconds

Performance-aware Dynamic Thermal Management by Adaptive Vertical Throttling in 3D Network-on-Chip (3D NoC 구조에서 성능을 고려한 어댑티브 수직 스로틀링 기반 동적 열관리 기법)

  • Hwang, Junsun;Han, Tae Hee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.103-110
    • /
    • 2014
  • Recent TSV based 3D Integrated Circuit (IC) technology needs more powerful thermal management techniques. However, because cooling cost and form factor are restricted, thermal management are emphasis on software based techniques. But in case of throttling thermal management which one of the most candidate technique, increasing bus occupation induce total performance decrease. To solve communication bottleneck issue in TSV based 3D SoC, we proposed adaptive throttling technique Experimental results show that the proposed method can improve throughput by about 72% compare with minimal path routing.

Runoff Analysis of Urban Watershed using MIKE SWMM Model (MIKE SWMM 모형을 이용한 도시유역 유출분석에 관한 연구)

  • Kim, Jong-Suk;Ahn, Jae-Hyun;Oh, Tae-Suk;Moon, Young-Il
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.11
    • /
    • pp.907-916
    • /
    • 2005
  • For an urban watershed modeling, the ILLVDAS and SWMM model were the popular rainfall-runoff models using in Korea. However, combined sewerage systems in urban area produce some problems when a flood event happens because of the surcharged precipitation amounts which drain to streams directly. Also, rack of pipe line data and difficulties of modeling yield inappropriate modeling results in urban runoff analysis. In addition, rainfall-runoff models in an urban which using channel routing could be inaccurate and complicated processes. In this paper, the MIKE SWMM model has been applied for a stable urban area runoff analysis. Watershed and pipe line data were established by using past inundated records, DEM data and numerical pipe line data. For a runoff modeling, the Runoff block was adapted to a basin and the Extran block using dynamic equation was applied for sewerage system. After a comparisons against existing models yield that the MIKE SWMM model produce reliable and consistence results without distorting parameter of the model.

Two-phases Hybrid Approaches and Partitioning Strategy to Solve Dynamic Commercial Fleet Management Problem Using Real-time Information (실시간 정보기반 동적 화물차량 운용문제의 2단계 하이브리드 해법과 Partitioning Strategy)

  • Kim, Yong-Jin
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.2 s.73
    • /
    • pp.145-154
    • /
    • 2004
  • The growing demand for customer-responsive, made-to-order manufacturing is stimulating the need for improved dynamic decision-making processes in commercial fleet operations. Moreover, the rapid growth of electronic commerce through the internet is also requiring advanced and precise real-time operation of vehicle fleets. Accompanying these demand side developments/pressures, the growing availability of technologies such as AVL(Automatic Vehicle Location) systems and continuous two-way communication devices is driving developments on the supply side. These technologies enable the dispatcher to identify the current location of trucks and to communicate with drivers in real time affording the carrier fleet dispatcher the opportunity to dynamically respond to changes in demand, driver and vehicle availability, as well as traffic network conditions. This research investigates key aspects of real time dynamic routing and scheduling problems in fleet operation particularly in a truckload pickup-and-delivery problem under various settings, in which information of stochastic demands is revealed on a continuous basis, i.e., as the scheduled routes are executed. The most promising solution strategies for dealing with this real-time problem are analyzed and integrated. Furthermore, this research develops. analyzes, and implements hybrid algorithms for solving them, which combine fast local heuristic approach with an optimization-based approach. In addition, various partitioning algorithms being able to deal with large fleet of vehicles are developed based on 'divided & conquer' technique. Simulation experiments are developed and conducted to evaluate the performance of these algorithms.

Establishment of Navigational Risk Assessment Model Combining Dynamic Ship Domain and Collision Judgement Model (선박동적영역과 충돌위험평가식을 결합한 항해위험성평가모델 전개)

  • Kim, Won-Ouk;Kim, Chang-Je
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.1
    • /
    • pp.36-42
    • /
    • 2018
  • This paper considers the Marine Traffic Risk Assessment for fixed and moving targets, which threaten officers during a voyage. The Collision Risk Assessment Formula was calculated based on a dynamic ship domain considering the length, speed and maneuvering capability of a vessel. In particular, the Navigation Risk Assessment Model that is used to quantitatively index the effect of a ship's size, speed, etc. has been reviewed and improved using a hybrid combination of a vessel's dynamic area and the Collision Risk Assessment Formula. Accordingly, a new type of Marine Traffic Risk Assessment Model has been suggested giving consideration to the Speed Length Ratio, which was not sufficiently reflected in the existing Risk Assessment Model. The larger the Speed Length Ratio (dimensionless speed), the higher the CJ value. That is, the CJ value is presented well by the Speed Length Ratio. When the Speed Length Ratio is large, states ranging from [Caution], [Warning], [Dangerous] or [Very Dangerous] are presented from a greater distance than when the Speed Length Ratio is small. The results of this study, can be used for route and port development, including dangerous route avoidance, optimum route planning, breakwater width, bridge span, etc. as well as the development of costal navigation safety charts. This research is also applicable for the selection of optimum ship routing and the prevention of collisions for smart ships such as autonomous vessels.

Dynamic Multi-Rate Routing Sub-Layer for Mobile Ad hoc Networks (모바일 애드 혹 네트워크에서의 동적 다중전송속도 경로 배정 알고리즘)

  • Nam Yong-Sub;Choi Nak-Jung;Ryu Ji-Ho;Kwon Tae-Kyoung;Choi Yang-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.115-117
    • /
    • 2006
  • IEEE 802.11 표준은 채널 상태에 따라 다양한 전송 속도를 지원하며, 무선랜 환경에서 이러한 특성을 활용하는 연구들이 진행되어 왔다. 그러나, 모바일 애드 혹 네트워크 환경에서 다중전송속도를 활용하는 연구는 거의 이루어지지 않았다. 본 논문은 모바일 애드 혹 네트워크에서 동적으로 다중전송속도를 활용하여 채널 효율을 높이는 알고리즘을 제안한다. 제안 기법은 MAC 계층과 네트워크 계층 중간에 위치하며 각 계층에 독립적으로 동작한다. 라우팅 프로토콜에서 결정한 다음 홉에 더불어, 제안 기법은 더 빠른 전송 속도를 갖는 중계 경로를 탐색한다. 또한, 패킷의 크기에 따라 경쟁 부하를 고려하여 선택적으로 전송 경로를 변경한다. 모의 실험을 통한 성능 평가는 제안 기법의 우수한 성능을 입증한다.

  • PDF

A Study on Region-based Secure Multicast in Mobile Ad-hoc Network (Mobile Ad-hoc Network에서 영역기반 보안 멀티캐스트 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.75-85
    • /
    • 2016
  • MANET is a network composed only mobile network having limited resources and has dynamic topology characteristics. Therefore, every mobile node acts as a route and delivers data by using multi-hop method. In particular, group communication such as multicast is desperately needed because of characteristics such as battery life of limited wireless bandwidth and mobile nodes. However, the multicast technique can have different efficient of data transmission according to configuring method of a virtual topology by the movement of the nodes and the performance of a multicast can be significantly degraded. In this paper, the region based security multicast technique is proposed in order to increase the efficiency of data transmission by maintaining an optimal path and enhance the security features in data transmission. The group management node that manages the state information of the member nodes after the whole network is separated to area for efficient management of multicast member nodes is used. Member node encrypts using member key for secure data transmission and the security features are strengthened by sending the data after encrypted using group key in group management node. The superiority of the proposed technique in this paper was confirmed through experiments.

Automatic Parameter Tuning for Simulated Annealing based on Threading Technique and its Application to Traveling Salesman Problem

  • Fangyan Dong;Iyoda, Eduardo-Masato;Kewei Chen;Hajime Nobuhara;Kaoru Hirota
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.439-442
    • /
    • 2003
  • In order to solve the difficulties of parameter settings in SA algorithm, an improved practical SA algorithm is proposed by employing the threading techniques, appropriate software structures, and dynamic adjustments of temperature parameters. Threads provide a mechanism to realize a parallel processing under a disperse environment by controlling the flux of internal information of an application. Thread services divide a process by multiple processes leading to parallel processing of information to access common data. Therefore, efficient search is achieved by multiple search processes, different initial conditions, and automatic temperature adjustments. The proposed are methods are evaluated, for three types of Traveling Salesman Problem (TSP) (random-tour, fractal-tour, and TSPLIB test data)are used for the performance evaluation. The experimental results show that the computational time is 5% decreased comparing to conventional SA algorithm, furthermore there is no need for manual parameter settings. These results also demonstrate that the proposed method is applicable to real-world vehicle routing problems.

  • PDF

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

The QoS Guarantees of Multimedia Traffic using MIP-DUDN with RSVP in Mobile Computing Environments (이동 컴퓨팅 환경에서 RSVP가 적용된 MIP-DUDN을 이용한 멀티미디어 트래픽의 QoS 보장)

  • Han, Seung-Jin;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.667-676
    • /
    • 2001
  • We have solved a problem occurring in case that RSVP is applied to existing wired network in order to guarantee a QoS of multimedia traffic in mobile computing environment in this paper. If MN moves to another area when Mobile IP is applied to RSVP, HA makes new tunnel to FA because SESSION ID of MN is changed. However, we suggest MIP-DUDN method, which applied RSVP. Although MN moves to another area in this method, it does not make new tunnel because it eliminates the problem of existing Triangle Routing Problem. We design the new protocol of RMIP-DUDN and compare with the method of existing Mobile IP applied to RSVP.

  • PDF

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.