Dissertations / Theses on the topic 'Network of problem'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network of problem.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Araújo, Ricardo Matsumura de. "Memetic networks : problem-solving with social network models." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2010. http://hdl.handle.net/10183/25515.
Full textSocial systems are increasingly relevant to computer science in general and artificial intelligence in particular. Such interest was first sparkled by agent-based systems where the social interaction of such agents can be relevant to the outcome produced. A more recent trend comes from the general area of Social Information Processing, Social Computing and other crowdsourced systems, which are characterized by computing systems composed of people and strong social interactions between them. The set of all social interactions and actors compose a social network, which may have strong influence on how effective the system can be. In this thesis, we explore the role of network structure in social systems aiming at solving problems, focusing on numerical and combinatorial optimization. We frame problem solving as a search for valid solutions in a state space and propose a model - the Memetic Network - that is able to perform search by using the exchange of information, named memes, between actors interacting in a social network. Such model is applied to a variety of scenarios and we show that the presence of a social network greatly improves the system capacity to find good solutions. In addition, we relate specific properties of many well-known networks to the behavior displayed by the proposed algorithms, resulting in a set of general rules that may improve the performance of such social systems. Finally, we show that the proposed algorithms can be competitive with traditional heuristic search algorithms in a number of scenarios.
Balakrishnan, Anantaram, Thomas L. Magnanti, and Prakash Mirchandani. "The Multi-Network Design Problem." Massachusetts Institute of Technology, Operations Research Center, 1991. http://hdl.handle.net/1721.1/5200.
Full textLeung, Cheuk Fun Bede. "Subnet generation problem : solutions to a new network routing problem." Thesis, Imperial College London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.444214.
Full textLivada, M. "Implicit network descriptions of RLC networks and the problem of re-engineering." Thesis, City, University of London, 2017. http://openaccess.city.ac.uk/17916/.
Full textHojati, Mehran. "Network synthesis problem : cost allocation and algorithms." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/27318.
Full textBusiness, Sauder School of
Graduate
Ramahi, Muhannad Hasan. "Resident Scheduling Problem." Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/37057.
Full textMaster of Science
鄭國榮 and Kwok-wing Philip Cheng. "Some results on the location problem." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31215051.
Full textCheng, Kwok-wing Philip. "Some results on the location problem /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19589074.
Full textMagnanti, Thomas L., Prakash Mirchandani, and Rita Vachani. "Modeling and Solving the Capacitated Network Loading Problem." Massachusetts Institute of Technology, Operations Research Center, 1991. http://hdl.handle.net/1721.1/5375.
Full textFréchette, Alexandre. "Hub routing for the robust network design problem." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114431.
Full textLe design de réseaux robustes (RND) est celui qui applique le concept de robustesse, issu de l'optimisation avec incertitude, au domaine de la conception de réseaux. Les principales motivations derrière cette application découlent de demandes provenant des réseaux de télécommunication. La prémisse principale est que les demandes à travers les réseaux sont variables ou imprévisibles. Toutefois, nous savons que ces demandes proviennent d'un ensemble prédéfini appelé univers de demandes. De plus, des contraintes pratiques du design de réseaux requiert que le routage des demandes soit inconscient, ou fixé d'avance, et qu'il ne dépende pas d'une instanciation particulière de l'univers de demandes. Des contraintes additionnelles, connues sous le nom de modèle de routage, s'appliquent souvent à la structure du routage. Les routages par chemins les plus courts (SP) et par moyeu unique (HUB) ont reçu une attention importante, tant au niveau théorique que pratique. Dans cette thèse, nous introduisons un nouveau modèle de routage appelé routage hiérarchique par moyeux (HH), qui est une généralisation de HUB. Nous étudions les propriétés théoriques de RND restreint à HH (RNDHH). Plus particulièrement, nous démontrons son caractère APX-difficile et fournissons un algorithme O(log n)-approché. Par la suite, nous montrons comment RNDHH devient facilement soluble lorsque restreint à un univers de demandes particulier, basé sur des demandes qui peuvent être routées sur un arbre donné. Nous comparons également le coût des solutions optimales lorsque RND utilise HH ainsi que d'autres modèles de routage inconscients importants. Finalement, nous exploitons HH dans une étude pratique sur un nouvel univers de demandes, appelé modèle par tuyaux restreints, qui est un mélange de deux univers de demandes largement utilisés soit le modèle par tuyaux et le modèle par conduits. Nous utilisons le modèle par tuyaux restreints pour caractériser quel univers de demandes favorise un routage similaire à SP contrairement à un routage HH. Pour ce faire, nous développons un algorithme heuristique pour RNDHH et évaluons notre approche par rapport à SP à l'aide de réseaux d'opérateur ainsi que plusieurs types de demandes du modèle par tuyaux restreints, ceux-ci ayant été paramétrés par leur similitude à un modèle par tuyaux ou un modèle par conduits. Cette étude révèle les conditions à travers lesquelles le routage par multiples moyeux, c'est-à-dire HH, surpasse celui par HUB et SP.
Djannaty, Farhad. "Network based heuristics for the set covering problem." Thesis, Brunel University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320547.
Full textAkgun, Ibrahim. "The K-group maximum-flow network-interdiction problem." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/32947.
Full textDahan, Mathieu. "Network security and min-cost max-flow problem." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104555.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 92-93).
Network optimization has widely been studied in the literature for a variety of design and operational problems. This has resulted in the development of computational algorithms for the study of classical operations research problems such as the maximum flow problem, the shortest path problem, and the network interdiction problem. However, in environments where network components are subject to adversarial failures, the network operator needs to strategically allocate at least some of her resources (e.g., link capacities, network flows, etc.) while accounting for the presence of a strategic adversary. This motivates the study of network security games. This thesis considers a class of network security games on flow networks, and focuses on utilizing well-known results in network optimization toward the characterization of Nash equilibria of this class of games. Specifically, we consider a 2-player strategic game for network routing under link disruptions. Player 1 (defender) routes flow through a network to maximize her value of effective flow while facing transportation costs. Player 2 (attacker) simultaneously disrupts one or more links to maximize her value of lost flow but also faces cost of disrupting links. Linear programming duality and the Max-Flow Min-Cut Theorem are applied to obtain properties that are satisfied in any Nash equilibrium. Using graph theoretic arguments, we give a characterization of the support of the equilibrium strategies. Finally, we study the conditions under which these results extend to a revised version of the game where both players face budget constraints. Thus, our contribution can be viewed as a generalization of the classical minimum cost maximum flow problem and the minimum cut problem to adversarial environments.
by Mathieu Dahan.
S.M.
Haiba, Mohamed Salem. "A study and implementation of the network flow problem and edge integrity of networks." Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834644.
Full textDepartment of Computer Science
Colajanni, Gabriella. "Constrained Optimization Problems in Network Models." Doctoral thesis, Università di Catania, 2019. http://hdl.handle.net/10761/4105.
Full textBouras, Ikram. "Fixed charge network design problem with user-optimal flows." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS136.
Full textThis thesis addresses a class of bi-level network design problems. We are interested in investigating applications from different domains and in developing exact algorithms to solve the corresponding bi-level network problem. In particular, we study a bi-level network design problem where the leader selects a part of the network to be activated, then, in the second level, the solution must be optimal for a network flow problem in the selected sub-network. In this thesis, three applications of this problem are studied: hazmats transportation, telecommunication, and social networks analysis. The second level problem in the first and the last applications is a shortest path problem while a minimum cost flow is required in the second application.The first studied problem is the fixed charge network design problem with shortest path constraints, which is modeled as a bi-level program and can be applied in hazardous transportation. For this problem, we propose two new binary integer programming (BILP) formulations inspired by path and cycle inequalities. We incorporate these formulations in a branch-and-cut algorithm and another cutting-plane based method. Numerical experiments are performed on real instances, and random data sets generated with different criteria to examine the difficulty of the instances. The results show that the proposed cutting plane algorithms can solve up to 19% more instances than the compact formulations.The second studied problem is the energy-aware traffic engineering while using multi-path routing to minimize link capacity utilization in ISP backbone networks. We propose a bi-level optimization model where the upper level represents the energy management function, and the lower one refers to the deployed multi-path routing protocol. Then, we reformulate it as a one-level MILP replacing the second level problem by different sets of flow optimality conditions. We further use these formulations to solve the problem with classical cutting plane and branch-and-cut algorithms. The computational experiments are performed on real instances to compare the proposed algorithms and to evaluate the efficiency of our model against existing single-path and multi-objective models.Finally, we study the problem of maximization influence in signed social networks. To the best of our knowledge, it is the first time that this problem is modeled as a bi-level programming problem. We reformulate the problem as one-level MILP models using three different optimality conditions of the shortest path problem appearing in the second level. These formulations are strengthened by adding a set of valid inequalities. Computational experiments are performed using random instances to compare the different proposed formulations. Finally, explicit solutions and bounds are proposed for particular cases of instances
Barnhart, Cynthia. "A network-based primal-dual solution methodology for the multi-commodity network flow problem." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14614.
Full textIncludes bibliographical references.
Work sponsored by North American Van Lines and the Center for Transportation Studies at M.I.T.
by Cynthia Barnhart.
Ph.D.
Rasmusson, Lars. "Network capacity sharing with QoS as a financial derivative pricing problem : algorithms and network." Doctoral thesis, SICS, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-22556.
Full textTjandra, Stevanus Adrianto. "Dynamic network optimization with application to the evacuation problem." [S.l.] : [s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967999448.
Full textBingol, Levent. "A Lagrangian Heuristic for solving a network interdiction problem." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401595.
Full textThesis Advisor(s): Wood, R. Kevin. "December 2001." Includes bibliographical references (p. 35-36). Also Available online.
Poetranto, Groß Dwi Retnani. "Network flow and location (FlowLoc) : the source location problem /." München : Verl. Dr. Hut, 2009. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017179775&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textWu, Yanghui. "Problem dependent metaheuristic performance in Bayesian network structure learning." Thesis, Robert Gordon University, 2012. http://hdl.handle.net/10059/790.
Full textBossert, John M. (John Meyer) 1973. "Modeling and solving variations of the Network Loading Problem." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29263.
Full textIncludes bibliographical references (p. 146-149).
We examine three variations of a class of network design problems known as Network Loading Problems (NLP). For'each variation we develop a tailored branch and bound solution approach equipped with heuristic procedures and problem specific cutting planes. The first variation formulates a logistics problem known as Pup Matching that involves matching semitrailers to cabs that are able to tow one or two of the trailers simultaneously. Theoretically, we show that four heuristics each yield a 2-approximation and we specify facet defining conditions for a cut family that we refer to as odd flow inequalities. Computationally, we solved to optimality 67 percent of test instances randomly generated from realistic data. The average minimum heuristic error among solved instances was 1.3 percent. Cutting planes reduced the average relative difference between upper and lower bounds prior to branching from 18.8 percent to 6.4 percent. The second problem variation concerns three NLP generalizations (segregated, nested, and general compartments) that we refer to collectively as Compartmentalized Network Loading (CNLP). We model these problems, extend to the case of segregated compartments convex hull results of Magnanti, Mirchandani, and Vachani on single arc and three node problems, and employ the routine of Atamtiirk and Rajan to efficiently separate certain (residual capacity) inequalities for all three CNLP models.
(cont.) On randomly generated instances, we conducted four series of tests designed to isolate the computational impact of problem parameters including graph density and model type. The third variation, Single Commodity Network Loading (SCNLP), requires loading discrete capacity units sufficient to satisfy the demand for standard network flow (multiple source, multiple destination problem). We cast the limiting case of large capacity within the constrained forest framework of Goemans and Williamson, characterize the optimal solution to the single cut special case, and describe cutset, residual capacity, and three partition inequalities for this variation. We solved five randomly generated 15 node SCNLP instances in an average of 19.1 CPU seconds, but only three of five similarly defined NLP instances.
by John M. Bossert.
Ph.D.
Moura, Leonardo Fernando dos Santos. "Branch & price for the virtual network embedding problem." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/115213.
Full textVirtualization allows one or more virtual networks to share physical infrastructures. The Virtual Network Embedding problem (VNEP) is one of the main challenges in the virtualization of physical networks. This problem consists in mapping a virtual network into a physical network while respecting capacity constraints. This work shows that finding a feasible solution for this problem is NP-Hard. However, many instances can be solved up to optimality in practice by exploiting the problem structure. We present a Branch & Price algorithm applied to instances of different topologies and sizes. The experimental results suggest that the proposed algorithm is superior to the Integer Linear Programming model solved by CPLEX.
Poetranto, Gross Dwi Retnani. "Network flow and location (FlowLoc) the source location problem." München Verl. Dr. Hut, 2008. http://d-nb.info/992662664/04.
Full textShim, Sangho. "Large scale group network optimization." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31737.
Full textCommittee Chair: Ellis L. Johnson; Committee Member: Brady Hunsaker; Committee Member: George Nemhauser; Committee Member: Jozef Siran; Committee Member: Shabbir Ahmed; Committee Member: William Cook. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Grigoleit, Mark Ted. "Optimisation of large scale network problems." Thesis, Curtin University, 2008. http://hdl.handle.net/20.500.11937/1405.
Full textGrigoleit, Mark Ted. "Optimisation of large scale network problems." Curtin University of Technology, Department of Mathematics and Statistics, 2008. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=115092.
Full textWe then use this information to constrain the network along a bisecting meridian. The combination of Lagrange Relaxation (LR) and a heuristic for filtering along the meridian provide an aggressive method for finding near-optimal solutions in a short time. Two network problems are studied in this work. The first is a Submarine Transit Path problem in which the transit field contains four sonar detectors at known locations, each with the same detection profile. The side constraint is the total transit time, with the submarine capable of 2 speeds. For the single-speed case, the initial LR duality gap may be as high as 30%. The first hybrid method uses a single centre meridian to constrain the network based on the unused time resource, and is able to produce solutions that are generally within 1% of optimal and always below 3%. Using the computation time for the initial Lagrange Relaxation as a baseline, the average computation time for the first hybrid method is about 30% to 50% higher, and the worst case CPU times are 2 to 4 times higher. The second problem is a random valued network from the literature. Edge costs, times, and lengths are uniform, randomly generated integers in a given range. Since the values given in the literature problems do not yield problems with a high duality gap, the values are varied and from a population of approximately 100,000 problems only the worst 200 from each set are chosen for study. These problems have an initial LR duality gap as high as 40%. A second hybrid method is developed, using values for the unused time resource and the lower bound values computed by Dijkstra’s algorithm as part of the LR method. The computed values are then used to position multiple constraining meridians in order to allow LR to find better solutions.
This second hybrid method is able to produce solutions that are generally within 0.1% of optimal, with computation times that are on average 2 times the initial Lagrange Relaxation time, and in the worst case only about 5 times higher. The best method for solving the Constrained Shortest Path Problem reported in the literature thus far is the LRE-A method of Carlyle et al. (2007), which uses Lagrange Relaxation for preprocessing followed by a bounded search using aggregate constraints. We replace Lagrange Relaxation with the second hybrid method and show that optimal solutions are produced for both network problems with computation times that are between one and two orders of magnitude faster than LRE-A. In addition, these hybrid methods combined with the bounded search are up to 2 orders of magnitude faster than the commercial CPlex package using a straightforward MILP formulation of the problem. Finally, the second hybrid method is used as a preprocessing step on both network problems, prior to running CPlex. This preprocessing reduces the network size sufficiently to allow CPlex to solve all cases to optimality up to 3 orders of magnitude faster than without this preprocessing, and up to an order of magnitude faster than using Lagrange Relaxation for preprocessing. Chapter 1 provides a review of the thesis and some terminology used. Chapter 2 reviews previous approaches to the CSPP, in particular the two current best methods. Chapter 3 applies Lagrange Relaxation to the Submarine Transit Path problem with 2 speeds, to provide a baseline for comparison. The problem is reduced to a single speed, which demonstrates the large duality gap problem possible with Lagrange Relaxation, and the first hybrid method is introduced.
Chapter 4 examines a grid network problem using randomly generated edge costs and weights, and introduces the second hybrid method. Chapter 5 then applies the second hybrid method to both network problems as a preprocessing step, using both CPlex and a bounded search method from the literature to solve to optimality. The conclusion of this thesis and directions for future work are discussed in Chapter 6.
Dai, Hong. "Network approach to impedance computerized tomography." Ohio : Ohio University, 1985. http://www.ohiolink.edu/etd/view.cgi?ohiou1183994407.
Full textLam, Yan-yan, and 林欣欣. "Algorithms for the minimum cost flow problem." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30246052.
Full textAbrar, Mirza Kashif, and Imran Pervaiz. "Reliability and Load Handling Problem in Internet Service Provider’s Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4228.
Full textThis thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network.
With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network.
The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks.
With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.
Wismath, Stephen Kenneth. "Bar-representable visibility graphs and a related network flow problem." Thesis, University of British Columbia, 1989. http://hdl.handle.net/2429/29320.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Ceylan, Halim. "A genetic algorithm approach to the equilibrium network design problem." Thesis, University of Newcastle Upon Tyne, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.391956.
Full textALOISE, DANIEL. "HEURISTICS FOR THE NETWORK DESIGN PROBLEM WITH DISCRETE COST FUNCTIONS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6665@1.
Full textProblemas de multifluxos surgem como modelos básicos no contexto de várias aplicações de fluxos em redes, tais como redes de telecomunicações, redes de transporte e logística. Em tais aplicações, os fluxos que atravessam a rede compartilham simultaneamente os mesmos recursos disponíveis e são definidos por suas próprias restrições. A cada uma das arestas ligando os pontos da rede está associado um custo, fixo ou proporcional à sua utilização. Este trabalho trata problemas de projeto de redes multifluxos, em que os custos estão associados às capacidades instaladas nas arestas. Particularmente, será estudado o caso em que a função de custo nas arestas possui o comportamento de uma função escada crescente e descontínua, para o qual métodos exatos de resolução são ineficientes. Métodos heurísticos são propostos para a resolução aproximada do problema e sintetizados em um algoritmo de multi-partida com memória adaptativa. Um mecanismo de intensificação, conhecido na literatura como construção de vocabulário, é também explorado e aplicado. Finalmente, experimentos computacionais são realizados e o método de resolução proposto é analisado quanto aos seus resultados e os resultados obtidos pelo método de resolução proposto são analisados. O método obtém as melhores soluções conhecidas para algumas instâncias da literatura.
Multicommodity flow problems arise widely as basic models in the context of network flows applications such as telecommunication networks, transportation problems, and logistic. In these applicatons, the flows that cross the networks share the same avaiable resources simultaneously and are defined by their own constraints. Each edge connecting two nodes in the network has an associated cost that is either fixed or proportional to its use. This work focuses on a network design problem in which the cost are associated with the capacities installed in the edges. Particularly, the network design problem studied has discrete and step increasing cost functions on the edges, for which exact methods are inefficient. Heuristics are proposed for the approximate memory algorithm. An intensification mechanism, known in the literature as vocabulary building, is also explored and applied. Finally, computational experiments are performed and the results obtained with the proposed solution method are evaluated. The method obtains the best known solutions for some instances in the literature.
Erken, Ozgur. "A branch-and-bound algorithm for the network diversion problem." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FErken.pdf.
Full textThesis advisor(s): R. Kevin Wood, Matthew Carlyle. Includes bibliographical references (p. 35). Also available online.
Sadoghi, Amirhossein [Verfasser]. "Essays on Financial Network and Optimal Liquidation Problem / Amirhossein Sadoghi." Frankfurt am Main : Frankfurt School of Finance & Management gGmbH, 2019. http://d-nb.info/1214331025/34.
Full textSENG, Kruy. "Cost-sensitive deep neural network ensemble for class imbalance problem." Digital Commons @ Lingnan University, 2018. https://commons.ln.edu.hk/otd/32.
Full textNahabedian, Aaron Joseph. "A Primal-Dual Approximation Algorithm for the Concurrent Flow Problem." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/474.
Full textAlkhelaiwi, Ali Mani Turki. "Network partitioning techniques based on network natural properties for power system application." Thesis, Brunel University, 2002. http://bura.brunel.ac.uk/handle/2438/5065.
Full textIqbal, Muhamad Syamsu. "Performance of IEEE 802.15.4 beaconless-enabled protocol for low data rate ad hoc wireless sensor networks." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/12852.
Full textTseng, Li-Ching, and 曾麗青. "Network Topology Display Problem." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/48736757097714084161.
Full text國立交通大學
資訊管理研究所
82
Since networks continue to grow at a rapid pace and with greater complexity, to have an efficient network management system becomes more important than ever. The network topology display service is one of the essential services that Configuration Management provides. For most existing network management systems, this service is supported by either an X-window based drawing tool or an automatic detection and drawing procedure. When the network grows larger and becomes more complicate, user must spend a great deal of time in adjusting network devices’ ICON, so as to get a good graphic layout. How to acquire a symmetric network topology display is called the Network Topology Display Problem (NTDP). Usually, NTDP is solved by a two-step procedure. In the first step, Intra-subnetwork algorithms are developed according to the types of the subnetwork. such as Ring、Bus etc.. In the second step, the inter-subnetworks algorithm is used to adjust the relative position between subnetworks. A Heuristic method had been proposed to handle the inter-subnetworks display problem. However, this method has difficulties in solving large size problems. The purpose of this paper is to find an efficient and effectiveness inter-subnetworks algorithm. Three methods, Modified Heuristic Method、Operations Research Method, and Neural Network Methods, are proposed Computational results obtained from these four methods are analyzed with respect to their effectiveness, running speed, and complexity. From the analysis, the following conclusions can be drawn. The Modified Heuristic Method performs best when the number of subnetworks is less than 50. However, once the number of subnetworks is over 50, the Operations Research Method has the best result in both running time and effectiveness.
Charkhgard, Parisa. "The network maintenance problem." Thesis, 2020. http://hdl.handle.net/1959.13/1416256.
Full textIn this thesis, we describe an optimisation problem motivated by the need to maintain infrastructure networks over time. We consider infrastructure networks in which a product is transported between distinct origin-destination pairs, and at the same time the infrastructure assets need to be maintained by resources moving in the network. In order to perform maintenance the assets have to be shut down from time to time which potentially reduces the system capacity in those time periods. The objective is to maximise the total throughput of product by aligning the maintenance activities appropriately. This problem combines flow maximisation with maintenance scheduling capturing some important aspects of the motivating practical problem: (1) the interaction between the utilisation of network assets such as nodes and arcs, and their maintenance demands; (2) the limited number of resources available to perform the maintenance; and (3) the time taken to move maintenance resources between different locations in the network. Depending on the application context, there are a number of natural ways to reflect these in a mathematical model, and this gives rise to a rich and challenging optimisation problem which we call the network maintenance problem. In this thesis, we formally introduce the problem, present a mixed integer linear programming formulation, and prove that even a simple variant of the problem with a single origin-destination pair and unrestricted resource movement is already NP-hard. Next, we study a number of variants of the problem in which the network has a special structure. More precisely, we focus almost completely on the case where the network is a path (with the exceptions of Sections 3.1 and 6.3. The problems that we study are of interest for the following reasons. Firstly, they generalise variants of well-studied problems in the literature such as the lot-sizing problem and the warehouse problem. Secondly, we believe that understanding these special cases will be useful in tackling more general variants of the network maintenance problem. In this thesis, we focus on designing efficient algorithms to solve these problem variants and identifying the ones whose optimal objective value can be computed in polynomial time. Furthermore, we study the polyhedral structure of some of these variants and present compact perfect extended formulations which can be solved in polynomial time.
"The multi-level network design problem." Sloan School of Management, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/2381.
Full textShu, Jia, Chung Piaw Teo, and Zuo-Jun Max Shen. "Stochastic Transportation-Inventory Network Design Problem." 2002. http://hdl.handle.net/1721.1/4018.
Full textSingapore-MIT Alliance (SMA)
Casadiego, Bastidas Jose Luis. "Network Dynamics as an Inverse Problem." Doctoral thesis, 2016. http://hdl.handle.net/11858/00-1735-0000-002B-7CE4-3.
Full textLI, HAN-MING, and 李漢銘. "Training neural networks with automatic network generating ability for the classification problem." Thesis, 1991. http://ndltd.ncl.edu.tw/handle/79680559920648678103.
Full textHsieh, Hui-Ching, and 謝惠菁. "The Agreement Problem in the Mobile Network." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/74016573124192508495.
Full text朝陽科技大學
資訊管理系碩士班
92
Due to the network technology that has advanced at an astounding speed, the topology of networks is trending wireless. It is imperative for us to develop mobile commerce or related applications in this wireless network. There are a lot of properties in the wireless network that play important roles. For example, the processors in wireless network have highly mobile capability. In other words, processors can immigrate into or move away from the network at any time. Although the mobile technology has brought greater convenience to us, it is comparatively more dangerous under such wireless environment. For instance, processors have mobility and the illegal processors can intrude the network more easily and do any illegitimate behaviors. In other words, it is not only difficult to ensure its security but it is also susceptible to security flaws such as attacks by the hackers. It will also decrease the allowable number of faulty components in the system. Basically speaking, there are plenty of applications that can be used in the wireless mobile network. For example, it is common to develop the mobile agents in the wireless network. However all problems mentioned will have the mobile agents in fault. It may affect the result of other mobile agents in the middle of carrying out some assignment. Fortunately enough, the Byzantine Agreement problem can help us to solve these problems. Basically, the protocols about Byzantine Agreement (BA) problem used in static wired networks, however, the previous protocols do not perform well in a dynamically changing mobile network. In addition, the problem of mobility and security is more difficult to solve. Hence, how to solve the BA problem in unsafe and unreliable environment is eager for us to solve. In order to increase the number of allowable faulty components and ensure the security of the network, the proposed protocols RAP, BAMN and GBAIM will help us to solve the BA problem when the faulty components are transmission media only, processors only and both transmission media and processors may in fault simultaneously. These protocols uses the minimum number of rounds of message exchange to achieve an agreement and can tolerate the maximum number of allowable faulty components and will also ensure the message security and increase the fault tolerant capability of the system. Furthermore, the receiver can always identify the dormant faults if the protocol appropriately encodes a transmitted message by either the Non-Return-to-Zero code or the Manchester code before transmission. In other words, the behavior of malicious faults might be unpredictable and unidentifiable. In this thesis, we also review the BA problem to enlarge the fault tolerant capability by allowing dormant faults and malicious faults (dual failure modes) to simultaneously exist in the wireless mobile network.
Chen, Szu-Jung, and 陳思蓉. "Approximating the Wireless Sensor Network Scheduling Problem." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/03284455701819190238.
Full text國立清華大學
工業工程與工程管理學系
102
A wireless sensor network (WSN) consists of one or more wireless data collectors and many autonomous sensors to monitor physical phenomena or collect environmental information. Each sensor usually uses a battery to enable its function, which limits its lifetime. In order to prolong the lifetime of WSNs, it is important to schedule the sensors to be activated in WSNs, which is called the wireless sensor network scheduling problem. The WSN scheduling problem is described as follows: Given a set of sensors, and a set of regions to be monitored, each region can be monitored by a subset of the sensors, and a sensor also can monitor more than one region. In order to prolong the lifetime of WSN, we decompose the sensors into disjoint subsets such that every subset of sensors needs to monitor all the regions, i.e. activating a subset of sensors to observe all the regions in each time slot, and the number of times slots (i.e. the number of subsets of sensors), that is, the lifetime of the WSN, is maximized. We investigate the WSN scheduling problem in two different models, and provide several polynomial time algorithms for approximating this problem. When the monitored range of each sensor is the same, i.e. the distance r, and the distance between any two regions is at least √3 r+ε, we present a 3/4 -ratio approximation algorithm to solve the WSN scheduling problem. In addition, when every monitored region is represented by a closed area, and each sensor can monitor at most three regions, we provide a 3/8 -ratio approximation algorithm to solve this model. Moreover, we also can identify critical sensors of WSNs; a sensor is called critical if the lifetime of WSNs must decrease when the sensor is broken. The identification of critical sensors can assist the reliability analysis of wireless sensor networks.
Yan, Hong Xu, and 顏宏旭. "A neural network approach for scheduling problem." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/51589834193749053356.
Full text莊舜方. "A neural network for solving nonlinear programming problem." Thesis, 1992. http://ndltd.ncl.edu.tw/handle/75669789102323753891.
Full text