No. 3 (2010)
ARTICLES FROM THIS ISSUE
-
An Algorithm for Enumerating SRLG Diverse Path Pairs
Abstract
Telecommunication networks are intrinsically multi-layered, a single failure at a lower level usually corresponds to a multi-failure scenario at an upper layer. In this context, the concept of shared risk link group (SRLG) allows an upper layer to select, for a given active path (AP), a backup path (BP), which avoids every SRLG that may involve the selected AP, in the event of a failure. That is a SRLG diverse path set maybe defined as a set of paths, between an origin and a destination, such that no pair of paths can be simultaneously affected by any given failure (or risk) in a single failure scenario. Firstly we present the formulation of the SRLG diverse path pair calculation problem in a directed network. An algorithm for enumerating SRLG diverse paths, by non decreasing cost of their total (additive) cost will be presented, which is based on an algorithm proposed for generating minimal cost node disjoint path pairs. The SRLG diverse path pairs may be node or arc disjoint, with or without length constraints. Computational results will be presented to show the efficiency of the proposed algorithm for obtaining node or arc disjoint SRLG diverse path pairs in undirected networks.
-
Performance Analysis of a Bi-Objective Model for Routing and Wavelength Assignment in WDM Networks
Abstract
Establishing end-to-end connections on wavelength division multiplexing (WDM) networks requires setting up lightpaths, defining the sequence of optical fibres and the wavelength in each fibre (the routing and wavelength assignmentproblem) for traffic flow. This paper reviews a bicriteria model for obtaining a topological path (unidirectional or symmetric bidirectional) for each lightpath request in a WDM network, developed by the authors, and presents a performance analysis of the model by considering important network performance measures. An extensive performance analysis of the two bicriteria model is presented, comparing the performance metrics obtained with the monocriterion models using the same objective functions, in five different reference networks commonly used in literature.
-
Performance Analysis of a Bi-Objective Model for Routing with Protection in WDM Networks
Abstract
The operation of wavelength division multiplexing (WDM) networks involves not only the establishment of lightpaths, defining the sequence of optical fibres and the wavelength in each fibre for traffic flow, but also a fault management scheme in order to avoid the huge loss of data that can result from a single link failure. Dedicated path protection, which establishes two end-to-end disjoint routes between the source–destination node pair, is an effective scheme to preserve customers’ connections. This paper reviews a bicriteria model for dedicated path protection, that obtains a topological path pair of node-disjoint routes for each lightpath request in a WDM network, developed by the authors. An extensive performance analysis of the bicriteria model is then presented, comparing the performance metrics obtained with the monocriterion models using the same objective functions, in four different reference networks commonly used in literature.
-
A Survey of Multi-Objective Deployment in Wireless Sensor Networks
Abstract
The major challenge in designing wireless sensor networks (WSNs) is to find tradeoff between the desired and contrary requirements for the lifetime, coverage or cost while coping with the computation, energy and communication constraints. This paper examines the optimal placement of nodes for a WSN. It is impossible to consider the deployment of the nodes separately from WSNs applications. We highlight the properties of WSNs applications that determine the placement problem. We identify and enumerate the various objectives that should be considered. The paper provides an overview and concentrates on multi-objective strategies, their assumptions, optimization problem formulation and results.
-
Personal Ontologies for Knowledge Acquisition and Sharing in Collaborative PrOnto Framework
Abstract
This paper summarizes our preliminary experiences with implementing some of the ideas lying behind the concept of creative environment. Research group at the National Institute of Telecommunications has developed a prototype framework for collaborative knowledge acquisition and sharing, called PrOnto. At the moment the artifacts we organize and share are typical sources of scientific knowledge, namely journal papers and web pages. In PrOnto we introduce two interrelated explicit levels of knowledge representation: keywords and ontological concepts. Each user of the framework maintains his own ontological profile, consisting of concepts and each concept is, in turn, by subjective user’s decision, related to a set of weighted keywords that define its meaning. Furthermore, dedicated indexing engine is responsible for objectively establishing correspondence between documents and keywords, or in other words, the measure of representativeness of the keyword to document’s content. Developing an appropriate knowledge model is a preliminary step to share it efficiently. We believe that higher level representation facilitates exploration of other people’s areas of interest. PrOnto gives an opportunity to browse knowledge artifacts from the conceptual point of view of any user registered in the system. The paper presents the ideas behind the PrOnto framework, gives an outline of its components and finalizes with a number of conclusions and proposals for futuren enhancements.
-
A Software Platform for Global Optimization
Abstract
This paper addresses issues associated with the global optimization algorithms, which are methods to find optimal solutions for given problems. It focuses on an integrated software environment – global optimization object-oriented library (GOOL), which provides the graphical user interface together with the library of solvers for convex and nonconvex, unconstrained and constrained problems. We describe the design, performance and possible applications of the GOOL system. The practical example – price management problem – is provided to illustrate the effectiveness and range of applications of our software tool.
-
Query Optimization in Teradata Warehouse
Abstract
The time necessary for data processing is becoming shorter and shorter nowadays. This thesis presents a definition of the active data warehousing (ADW) paradigm. One of the data warehouses which is consistent with this paradigm is teradata warehouse. Therefore, the basic elements of the teradata architecture are described, such as processors parsing engine (PE) and access module processor (AMP). Emphasis was put on the analysis of query optimization methods. There is presented the impact of a primary index on the time of query execution. Furthermore, this paper shows different methods of optimization of data selection, data joins and data aggregation. All these methods can help to minimize the time for data processing. This paper presents experiments which show the usage of different methods of query optimization. At the end some conclusions about different index usage are included.
-
Solving Support Vector Machine with Many Examples
Abstract
Various methods of dealing with linear support vector machine (SVM) problems with a large number of examples are presented and compared. The author believes that some interesting conclusions from this critical analysis applies to many new optimization problems and indicates in which direction the science of optimization will branch in the future. This direction is driven by the automatic collection of large data to be analyzed, and is most visible in telecommunications. A stream SVM approach is proposed, in which the data substantially exceeds the available fast random access memory (RAM) due to a large number of examples. Formally, the use of RAM is constant in the number of examples (though usually it depends on the dimensionality of the examples space). It builds an inexact polynomial model of the problem. Another author’s approach is exact. It also uses a constant amount of RAM but also auxiliary disk files, that can be long but are smartly accessed. This approach bases on the cutting plane method, similarly as Joachims’ method (which, however, relies on early finishing the optimization).
-
Planning System for Multi-Agent Based Reconfigurable Fixtures
Abstract
This paper describes a concept of the planning system for self adaptable, reconfigurable fixtures composed of mobile locators (robotic agents) that can freely move on a bench and reposition below the supported part, without removing the part from the fixture. The main role of the planner is to generate the admissible plan of relocation of the mobile agents. A constrained nonlinear optimization problem is formulated to find the optimal locations for supporting heads.
-
Performance Analysis of Hybrid Phase Shift Keying over Generalized Nakagami Fading Channels
Abstract
In addition to the benefits of hybrid phase shift keying (HPSK) modulation in reducing the peak to average power ratio of the transmitted signal to reduce the zero cross- ings and the 0◦-degree phase transmissions, HPSK enhances the bit error rate (BER) measure of the signal performance. The constellation of the HPSK is analyzed, and an expression for the conditional probability of HPSK modulation over additive white Gaussian noise (AWGN) is derived. This BER measure of HPSK is shown to outperform quadrature phase shift keying (QPSK) modulation. HPSK performance through Nakagami – m fading channel is also considered.