flow conservation
Recently Published Documents


TOTAL DOCUMENTS

50
(FIVE YEARS 15)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Vol 58 (6) ◽  
pp. 46-60
Author(s):  
O. Lemeshko ◽  
M. Yevdokymenko ◽  
O. Yeremenko ◽  
N. Kunicina ◽  
A. Ziravecka

Abstract In this paper, a tensor flow-based fast reroute model with multimedia quality protection is proposed. In the model, the conditions for implementing a multipath routing strategy and flow conservation are introduced taking into account possible packet loss at the network nodes and preventing overloading communication links both when using the primary and backup routes. At the same time, the novelty of the proposed solution is the formalization of the conditions of protection of the Quality of Experience level in terms of multimedia quality along the primary and backup routes. These conditions have been obtained during the tensor formalization of the network, which made it possible to calculate the quality of service indicators: packet loss probabilities, as well as the average end-to-end delay for audio and video flows transmitted in the multimedia session using the primary and backup routes, respectively. As a criterion for the optimality of the obtained solutions, a condition has been selected related to maximizing the overall performance of the infocommunication network. The results of the research of the proposed model confirm the adequacy of the numerical research results obtained for solving the problem of fast rerouting with link/node protection.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Wei Chen ◽  
Bo Zhou

In this paper, we adapt the fractional derivative approach to formulate the flow-conservation transportation networks, which consider the propagation dynamics and the users’ behaviors in terms of route choices. We then investigate the controllability of the fractional-order transportation networks by employing the Popov-Belevitch-Hautus rank condition and the QR decomposition algorithm. Furthermore, we provide the exact solutions for the full controllability pricing controller location problem, which includes where to locate the controllers and how many controllers are required at the location positions. Finally, we illustrate two numerical examples to validate the theoretical analysis.


Author(s):  
Theodoros P. Pantelidis ◽  
Li Li ◽  
Tai-Yu Ma ◽  
Joseph Y. J. Chow ◽  
Saif Eddin G. Jabari

Viability of electric car-sharing operations depends on rebalancing algorithms. Earlier methods in the literature suggest a trend toward nonmyopic algorithms using queueing principles. We propose a new rebalancing policy using cost function approximation. The cost function is modeled as a p-median relocation problem with minimum cost flow conservation and path-based charging station capacities on a static node-charge graph structure. The cost function is NP complete, so a heuristic is proposed that ensures feasible solutions that can be solved in an online system. The algorithm is validated in a case study of electric carshare in Brooklyn, New York, with demand data shared from BMW ReachNow operations in September 2017 (262 vehicle fleet, 231 pickups per day, and 303 traffic analysis zones) and charging station location data (18 charging stations with four-port capacities). The proposed nonmyopic rebalancing heuristic reduces the cost increase compared with myopic rebalancing by 38%. Other managerial insights are further discussed.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
José Genaro González-Hernández ◽  
Rubén Salas-Cabrera

For decades, maximum power coefficient limit, known as the Betz limit, has been accepted as a theoretical optimum value for wind turbine power extraction; nevertheless, some reports, exceeding this limit, have already been published. To explain this phenomenon and show a different point of view, a novel theoretical and ideal analysis based on flow conservation law and areas’ quotient is presented, supported by a review of works related to surpassing the power coefficient limit approached from different perspectives.


2021 ◽  
Author(s):  
narayanarao narayanarao ◽  
A. Rajasekhar Reddy

Abstract In WMN, at the time of network consignment and bandwidth registration, the active network consignment method did not take into consideration the intrusion, congestion load and bandwidth necessities as a whole. The significance centred bandwidth registration methods result in famishment of slightest significance congestion. Hence in this paper, we propose a Joint Channel Assignment and Bandwidth Reservation using Improved FireFly Algorithm (IFA) in WMN. Initially the priority of each node is determined based on the channel usage, future interference and link congestion probability metrics. The bandwidth is allocated straight, comparative to the nodule significance and entire quantity of congestion movements incomplete on the demanded nodule. For channel assignment and path selection, the improved FireFly Algorithm (IFA) is used. The objective function of IFA is determined in terms of link capacity, interference and flow conservation constraints. Then the channels and the path which minimize the objective function are selected by applying IFA. By simulation results we show that the proposed technique minimizes the traffic and enhances the channel efficiency.


Information ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 182
Author(s):  
Jiajie Yu ◽  
Yanjie Ji ◽  
Chenyu Yi ◽  
Chenchen Kuai ◽  
Dmitry Ivanovich Samal

In order to solve the oversupply and repositioning problems of bike-sharing, this paper proposes an optimization model to obtain a reasonable supply volume scheme for bike-sharing and infrastructure configuration planning. The optimization model is constrained by the demand for bike-sharing, urban traffic carrying capacity (road network and parking facilities carrying capacities), and the flow conservation of shared bikes in each traffic analysis zone. The model was formulated through mixed-integer programming with the aim of minimizing the total costs for users and bike-sharing enterprises (including the travel cost of users, production and maintenance costs of shared bikes, and repositioning costs). CPLEX was used to obtain the optimal solution for the model. Then, the optimization model was applied to 183 traffic analysis zones in Nanjing, China. The results showed that not only were user demands met, but the load ratios of the road network and parking facilities with respect to bike-sharing in each traffic zone were all decreased to lower than 1.0 after the optimization, which established the rationality and effectiveness of the optimization results.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6106
Author(s):  
Abdelouahid Derhab ◽  
Abdelghani Bouras ◽  
Mohamed Belaoued ◽  
Leandros Maglaras ◽  
Farrukh Aslam Khan

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness.


2020 ◽  
Vol 10 (1) ◽  
pp. 25-32
Author(s):  
Phanindra Prasad Bhandari ◽  
Shree Ram Khadka

The optimization model of the maximum flow evacuation planning problem efficiently sends a maximum number of evacuees along with the routes of their transshipment from the disastrous zone, the source, to the safe zone, the sink, over a given time horizon. The limitation of the problem with the flow conservation constraint at the intermediate nodes is that even one more evacuee cannot be sent out from the source, if the evacuee cannot reach the sink. However, evacuators must attempt to send out as many evacuees as possible to safer places despite the sink. There may be relatively safe places in between the source and the sink. The limitation is due to the flow conservation constraint. In this paper, we remodel the problem with non-conservation flow constraint and propose an efficient algorithm. With this approach one can send as many evacuees as in the flow conservation case from the source to the sink. Moreover, a maximum number of evacuees can also be sent to the relatively safe places in between the source and the sink. The routes of their transshipment can also be identified.


2020 ◽  
Vol 37 (9) ◽  
pp. 3269-3291
Author(s):  
Encarnación Martínez-Moreno ◽  
Gonzalo Garcia-Ros ◽  
Ivan Alhama

Purpose This study aims to present a new numerical model for the simulation of water flow through porous media of anisotropic character, based on the network simulation method and with the use of the free code Ngspice. Design/methodology/approach For its design, it starts directly from the flow conservation equation, which presents several advantages in relation to the numerical simulation of the governing equation in terms of the potential head. The model provides very precise solutions of streamlines and potential patterns in all cases, with relatively small meshes and acceptable calculation times, both essential characteristics when developing a computational tool for engineering purposes. The model has been successfully verified with analytical results for non-penetrating dams in isotropic media. Findings Applications of the model are presented for the construction of the flow nets, calculation of uplift pressures, infiltrated flow and average exit gradient in anisotropic scenarios with penetrating dams with and without sheet piles, being all this output information part of the decision process in ground engineering problems involving these retaining structures. Originality/value This study presents, for the first time, a numerical network model for seepage problems that is not obtained from the Laplace's governing equation, but from the water flow conservation continuity equation.


2019 ◽  
Vol 36 (1-2) ◽  
pp. 11-16
Author(s):  
Shree Ram Khadka ◽  
Phanindra Prasad Bhandari

Efficient evacuation plan with which a maximum evacuees can be sent as soon as possible from the disastrous place to the safe place is an important notion during the response phase of the disaster management. Such a plan in terms of optimization models has been extensively studied in a various scenarios, see [3]. The optimization models have been based on the flow conservation constraint which permits an evacuee to be taken out of the disastrous place only if it can be sent into the safe place. However, the evacuation plan model with no flow conservation can keep several evacuees in the relatively safe places besides the evacuees which could be sent into the safe place. In this paper, we describe an optimization model for the evacuation plan based on the non-conservation flow constraint with an efficient solution procedure which keeps a maximum evacuees on the prioritized intermediate places besides a maximum evacuees into the specified safe place.


Sign in / Sign up

Export Citation Format

Share Document