Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 866
Filtrar
1.
PeerJ Comput Sci ; 10: e2231, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39145209

RESUMO

In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network's performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks' resilience in different scenarios.

2.
Annu Rev Neurosci ; 47(1): 211-234, 2024 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-39115926

RESUMO

The cerebral cortex performs computations via numerous six-layer modules. The operational dynamics of these modules were studied primarily in early sensory cortices using bottom-up computation for response selectivity as a model, which has been recently revolutionized by genetic approaches in mice. However, cognitive processes such as recall and imagery require top-down generative computation. The question of whether the layered module operates similarly in top-down generative processing as in bottom-up sensory processing has become testable by advances in the layer identification of recorded neurons in behaving monkeys. This review examines recent advances in laminar signaling in these two computations, using predictive coding computation as a common reference, and shows that each of these computations recruits distinct laminar circuits, particularly in layer 5, depending on the cognitive demands. These findings highlight many open questions, including how different interareal feedback pathways, originating from and terminating at different layers, convey distinct functional signals.


Assuntos
Córtex Cerebral , Cognição , Animais , Cognição/fisiologia , Córtex Cerebral/fisiologia , Humanos , Neurônios/fisiologia , Modelos Neurológicos , Vias Neurais/fisiologia , Rede Nervosa/fisiologia , Transdução de Sinais/fisiologia
3.
Sci Rep ; 14(1): 18595, 2024 Aug 10.
Artigo em Inglês | MEDLINE | ID: mdl-39127847

RESUMO

Clustering and routing protocols play a pivotal role in reducing energy consumption and extending the lifespan of wireless sensor networks. However, optimizing energy efficiency to maximize network longevity remains a primary challenge for these protocols. This paper introduces QPSOFL, a clustering and routing protocol that integrates quantum particle swarm optimization and a fuzzy logic system to enhance energy efficiency and prolong network lifespan. QPSOFL employs an enhanced quantum particle swarm optimization algorithm to select optimal cluster heads, utilizing Sobol sequences for population diversification during initialization. Additionally, it incorporates Lévy flight and Gaussian perturbation-based position updates to prevent trapping in local optima. Benchmark experiments validate QPSOFL's efficacy compared to Harris Hawks Optimization (HHO), Grey Wolf Optimization (GWO), Particle Swarm Optimization (PSO), and Quantum Particle Swarm Optimization (QPSO), focusing on accuracy, search capability, and convergence speed. Within QPSOFL, a fuzzy logic system determines the best next-hop cluster head based on descriptors such as residual energy, energy deviation, and relay distance. Extensive simulations compare QPSOFL's performance in terms of network lifetime, throughput, energy consumption, and scalability against existing protocols E-FUCA, IHHO-F, F-GWO, and FLPSOC, demonstrating its superior performance over these counterparts.

4.
Sensors (Basel) ; 24(15)2024 Jul 25.
Artigo em Inglês | MEDLINE | ID: mdl-39123865

RESUMO

Efficient and reliable data routing is critical in Advanced Metering Infrastructure (AMI) within Smart Grids, dictating the overall network performance and resilience. This paper introduces Q-RPL, a novel Q-learning-based Routing Protocol designed to enhance routing decisions in AMI deployments based on wireless mesh technologies. Q-RPL leverages the principles of Reinforcement Learning (RL) to dynamically select optimal next-hop forwarding candidates, adapting to changing network conditions. The protocol operates on top of the standard IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), integrating it with intelligent decision-making capabilities. Through extensive simulations carried out in real map scenarios, Q-RPL demonstrates a significant improvement in key performance metrics such as packet delivery ratio, end-to-end delay, and compliant factor compared to the standard RPL implementation and other benchmark algorithms found in the literature. The adaptability and robustness of Q-RPL mark a significant advancement in the evolution of routing protocols for Smart Grid AMI, promising enhanced efficiency and reliability for future intelligent energy systems. The findings of this study also underscore the potential of Reinforcement Learning to improve networking protocols.

5.
Sensors (Basel) ; 24(15)2024 Jul 27.
Artigo em Inglês | MEDLINE | ID: mdl-39123927

RESUMO

The transmission environment of underwater wireless sensor networks is open, and important transmission data can be easily intercepted, interfered with, and tampered with by malicious nodes. Malicious nodes can be mixed in the network and are difficult to distinguish, especially in time-varying underwater environments. To address this issue, this article proposes a GAN-based trusted routing algorithm (GTR). GTR defines the trust feature attributes and trust evaluation matrix of underwater network nodes, constructs the trust evaluation model based on a generative adversarial network (GAN), and achieves malicious node detection by establishing a trust feature profile of a trusted node, which improves the detection performance for malicious nodes in underwater networks under unlabeled and imbalanced training data conditions. GTR combines the trust evaluation algorithm with the adaptive routing algorithm based on Q-Learning to provide an optimal trusted data forwarding route for underwater network applications, improving the security, reliability, and efficiency of data forwarding in underwater networks. GTR relies on the trust feature profile of trusted nodes to distinguish malicious nodes and can adaptively select the forwarding route based on the status of trusted candidate next-hop nodes, which enables GTR to better cope with the changing underwater transmission environment and more accurately detect malicious nodes, especially unknown malicious node intrusions, compared to baseline algorithms. Simulation experiments showed that, compared to baseline algorithms, GTR can provide a better malicious node detection performance and data forwarding performance. Under the condition of 15% malicious nodes and 10% unknown malicious nodes mixed in, the detection rate of malicious nodes by the underwater network configured with GTR increased by 5.4%, the error detection rate decreased by 36.4%, the packet delivery rate increased by 11.0%, the energy tax decreased by 11.4%, and the network throughput increased by 20.4%.

6.
Sensors (Basel) ; 24(15)2024 Jul 31.
Artigo em Inglês | MEDLINE | ID: mdl-39124024

RESUMO

This paper introduces a novel stability metric specifically developed for IQRF wireless mesh sensor networks, emphasizing flooding routing and data collection methodologies, particularly IQRF's Fast Response Command (FRC) technique. A key feature of this metric is its ability to ensure network resilience against disruptions by effectively utilizing redundant paths in the network. This makes the metric an indispensable tool for field engineers in both the design and deployment of wireless sensor networks. Our findings provide valuable insights, demonstrating the metric's efficacy in achieving robust and reliable network operations, especially in data collection tasks. The inclusion of redundant paths as a factor in the stability metric significantly enhances its practicality and relevance. Furthermore, this research offers practical ideas for enhancing the design and management of wireless mesh sensor networks. The stability metric uniquely assesses the resilience of data collection activities within these networks, with a focus on the benefits of redundant paths, underscoring the significance of stability in network evaluation.

7.
Front Neurol ; 15: 1428106, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39108653

RESUMO

Objectives: Single-sided deafness (SSD) is often accompanied by tinnitus, resulting in a decreased quality of life. Currently, there is a lack of high level of evidence studies comparing different treatment options for SSD regarding tinnitus reduction. This randomized controlled trial (RCT) evaluated the effect of a cochlear implant (CI), bone conduction device (BCD), contralateral routing of sound (CROS), and no treatment on tinnitus outcomes in SSD patients, with follow-up extending to 24 months. Methods: A total of 120 adult SSD patients were randomized to three groups: CI, a trial period with first a BCD on a headband, then a CROS, or vice versa. After the trial periods, patients opted for a BCD, CROS, or no treatment. At the start of follow-up, 28 patients were implanted with a CI, 25 patients with a BCD, 34 patients had a CROS, and 26 patients chose no treatment. The Tinnitus Handicap Inventory (THI), Tinnitus Questionnaire (TQ), the Visual Analog Scale (VAS), and the Hospital Anxiety and Depression Scale (HADS) were completed at baseline and at 3, 6, 12, and 24 months of follow-up. Results: The CI and BCD groups showed significantly decreased tinnitus impact scores. The CI group showed the largest decrease, which was already observed at 3 months of follow-up. Compared to the baseline, the median THI score decreased by 23 points, the TQ score by 17 points, and the VAS score by 60 points at 24 months. In the BCD group, the TQ score decreased by 9 points, and the VAS decreased by 25 points at 24 months. The HADS anxiety and depression subscale showed no indication for anxiety or depression at baseline, nor at 24 months, for all groups. Conclusion: In this RCT, SSD patients treated with a CI or BCD showed an overall decrease in tinnitus impact scores up to 24 months compared to baseline. The CI group reported a stable and the largest reduction. Cochlear implants appear to be superior to BCD and CROS, and no treatment for achieving partial or complete resolution of tinnitus in patients with SSD. Clinical trial registration: Netherlands Trial Register, www.onderzoekmetmensen.nl/nl/trial/26952, NTR4457, CINGLE trial.

8.
Nanotechnology ; 2024 Aug 20.
Artigo em Inglês | MEDLINE | ID: mdl-39163870

RESUMO

We study infrared routing and switching with tunable spectral bandwidth using in-plane scattering of light by flat Au nanoantenna arrays. The base dimensions of these nanoantennas are approximately 250 by 850 nm, while their heights vary from 20 to 150 nm. Our results show that, with the increase in height, the arrays become more efficient scatterers while their spectra broaden within the 1-1.6 $\mu$m range. Our findings demonstrate that such processes strongly depend on the incident light polarization. For a given polarization, the incident light is efficiently scattered in only two opposite directions along the plane of the arrays, with insignificant transmission. Switching such a polarization by 90$^\circ$, however, suppresses this process, allowing the light to mostly pass through the arrays with minimal scattering. These unique characteristics suggest a tunable beam splitter application in the 1-1.6 $\mu$m range and even longer wavelengths.

9.
Sci Rep ; 14(1): 17305, 2024 Jul 27.
Artigo em Inglês | MEDLINE | ID: mdl-39068209

RESUMO

To effectively solve the reverse logistics distribution problem caused by the increasing number of scrapped parts in the automotive market, this study constructs a multi-trip green vehicle routing problem model with time windows by comprehensively considering the coordination between carbon dioxide emissions and cost efficiency. A hybrid adaptive genetic algorithm is proposed to solve this problem, featuring innovative improvements in the nearest neighbor rule based on minimum cost, adaptive strategies, bin packing algorithm based on the transfer-of-state equation, and large-scale neighborhood search. Additionally, to efficiently obtain location data for supplier factory sites in the distribution network, a coordinate extraction method based on image recognition technology is proposed. Finally, the scientific validity of this study is verified based on the actual case data, and the robust optimization ability of the algorithm is verified by numerical calculations of different examples. This research not only enriches the study of green vehicle routing problems but also provides valuable insights for the industry to achieve cost reduction, efficiency enhancement, and sustainable development in reverse logistics.

10.
Adv Sci (Weinh) ; : e2404839, 2024 Jul 31.
Artigo em Inglês | MEDLINE | ID: mdl-39083318

RESUMO

Topological phononic cavities, such as ring resonators with topological whispering gallery modes (TWGMs), offer a flexible platform for the realization of robust phononic circuits. However, the chiral mechanism governing TWGMs and their selective routing in integrated phononic circuits remain unclear. This work reveals, both experimentally and theoretically, that at a phononic topological interface, the elastic spin texture is intricately linked to, and can be explained through a knowledge of, the phonon eigenmodes inside each unit cell. Furthermore, for paired, counterpropagating TWGMs based on such interfaces in a waveguide resonator, this study demonstrates that the elastic spin exhibits locking at discrete frequencies. Backed up by theory, experiments on kHz TWGMs in thin honeycomb-lattice aluminum plates bored with clover-leaf shaped holes show that together with this spin-texture related angular-momentum locking mechanism at a single topological interface, there are triplicate parity-frequency-space selective wave routing mechanisms. In the future, these mechanisms can be harnessed for the versatile manipulation of elastic-spin based routing in phononic topological insulators.

11.
Sci Rep ; 14(1): 16728, 2024 Jul 20.
Artigo em Inglês | MEDLINE | ID: mdl-39030237

RESUMO

The agriculture Internet of Things (IoT) has been widely applied in assisting pear farmers with pest and disease prediction, as well as precise crop management, by providing real-time monitoring and alerting capabilities. To enhance the effectiveness of agriculture IoT monitoring applications, clustering protocols are utilized in the data transmission of agricultural wireless sensor networks (AWSNs). However, the selection of cluster heads is a NP-hard problem, which cannot be solved effectively by conventional algorithms. Based on this, This paper proposes a novel AWSNs clustering model that comprehensively considers multiple factors, including node energy, node degree, average distance and delay. Furthermore, a novel high-performance cluster protocol based on Gaussian mutation and sine cosine firefly algorithm (GSHFA-HCP) is proposed to meet the practical requirements of different scenarios. The innovative Gaussian mutation strategy and sine-cosine hybrid strategy are introduced to optimize the clustering scheme effectively. Additionally, an efficient inter-cluster data transmission mechanism is designed based on distance between nodes, residual energy, and load. The experimental results show that compared with other four popular schemes, the proposed GSHFA-HCP protocol has significant performance improvement in reducing network energy consumption, extending network life and reducing transmission delay. In comparison with other protocols, GSHFA-HCP achieves optimization rates of 63.69%, 17.2%, 19.56%, and 35.78% for network lifespan, throughput, transmission delay, and packet loss rate, respectively.

12.
Sensors (Basel) ; 24(13)2024 Jun 24.
Artigo em Inglês | MEDLINE | ID: mdl-39000884

RESUMO

The main limitation of wireless sensor networks (WSNs) lies in their reliance on battery power. Therefore, the primary focus of the current research is to determine how to transmit data in a rational and efficient way while simultaneously extending the network's lifespan. In this paper, a hybrid of a fuzzy logic system and a quantum annealing algorithm-based clustering and routing protocol (FQA) is proposed to improve the stability of the network and minimize energy consumption. The protocol uses a fuzzy inference system (FIS) to select appropriate cluster heads (CHs). In the routing phase, we used the quantum annealing algorithm to select the optimal route from the CHs and the base station (BS). Furthermore, we defined an energy threshold to filter candidate CHs in order to save computation time. Unlike with periodic clustering, we adopted an on-demand re-clustering mechanism to perform global maintenance of the network, thereby effectively reducing the computation and overhead. The FQA was compared with FRNSEER, BOA-ACO, OAFS-IMFO, and FC-RBAT in different scenarios from the perspective of energy consumption, alive nodes, network lifetime, and throughput. According to the simulation results, the FQA outperformed all the other methods in all scenarios.

13.
Sensors (Basel) ; 24(13)2024 Jun 29.
Artigo em Inglês | MEDLINE | ID: mdl-39001028

RESUMO

Underwater wireless sensor networks are gaining popularity since supporting a broad range of applications, both military and civilian. Wireless acoustics is the most widespread technology adopted in underwater networks, the realization of which must face several challenges induced by channel propagation like signal attenuation, multipath and latency. In order to address such issues, the attention of researchers has recently focused on the concept of cooperative communication and networking, borrowed from terrestrial systems and to be conveniently recast in the underwater scenario. In this paper, we present a comprehensive literature review about cooperative underwater wireless sensor networks, investigating how nodes cooperation can be exploited at the different levels of the network protocol stack. Specifically, we review the diversity techniques employable at the physical layer, error and medium access control link layer protocols, and routing strategies defined at the network layer. We also provide numerical results and performance comparisons among the most widespread approaches. Finally, we present the current and future trends in cooperative underwater networks, considering the use of machine learning algorithms to efficiently manage the different aspects of nodes cooperation.

14.
Sensors (Basel) ; 24(13)2024 Jul 07.
Artigo em Inglês | MEDLINE | ID: mdl-39001183

RESUMO

As an alternative to flat architectures, clustering architectures are designed to minimize the total energy consumption of sensor networks. Nonetheless, sensor nodes experience increased energy consumption during data transmission, leading to a rapid depletion of energy levels as data are routed towards the base station. Although numerous strategies have been developed to address these challenges and enhance the energy efficiency of networks, the formulation of a clustering-based routing algorithm that achieves both high energy efficiency and increased packet transmission rate for large-scale sensor networks remains an NP-hard problem. Accordingly, the proposed work formulated an energy-efficient clustering mechanism using a chaotic genetic algorithm, and subsequently developed an energy-saving routing system using a bio-inspired grey wolf optimizer algorithm. The proposed chaotic genetic algorithm-grey wolf optimization (CGA-GWO) method is designed to minimize overall energy consumption by selecting energy-aware cluster heads and creating an optimal routing path to reach the base station. The simulation results demonstrate the enhanced functionality of the proposed system when associated with three more relevant systems, considering metrics such as the number of live nodes, average remaining energy level, packet delivery ratio, and overhead associated with cluster formation and routing.

15.
Sci Rep ; 14(1): 16640, 2024 07 18.
Artigo em Inglês | MEDLINE | ID: mdl-39025873

RESUMO

The Internet of Things (IoT) is an extensive system of interrelated devices equipped with sensors to monitor and track real world objects, spanning several verticals, covering many different industries. The IoT's promise is capturing interest as its value in healthcare continues to grow, as it can overlay on top of challenges dealing with the rising burden of chronic disease management and an aging population. To address difficulties associated with IoT-enabled healthcare, we propose a secure routing protocol that combines a fuzzy logic system and the Whale Optimization Algorithm (WOA) hierarchically. The suggested method consists of two primary approaches: the fuzzy trust strategy and the WOA-inspired clustering methodology. The first methodology plays a critical role in determining the trustworthiness of connected IoT equipment. Furthermore, a WOA-based clustering framework is implemented. A fitness function assesses the likelihood of IoT devices acting as cluster heads. This formula considers factors such as centrality, range of communication, hop count, remaining energy, and trustworthiness. Compared with other algorithms, the proposed method outperformed them in terms of network lifespan, energy usage, and packet delivery ratio by 47%, 58%, and 17.7%, respectively.


Assuntos
Algoritmos , Lógica Fuzzy , Internet das Coisas , Atenção à Saúde , Humanos , Análise por Conglomerados , Redes de Comunicação de Computadores
16.
Sci Rep ; 14(1): 17733, 2024 Jul 31.
Artigo em Inglês | MEDLINE | ID: mdl-39085383

RESUMO

Flying ad hoc network (FANET) is a new technology, which creates a self-organized wireless network containing unmanned aerial vehicles (UAVs). In FANET, routing protocols deal with important challenges due to limited energy, frequent link failures, high mobility of UAVs, and limited communication range of UAVs. Thus, a suitable path is always essential to transmit data between UAVs. In this paper, a local filtering-based energy-aware routing scheme (LFEAR) is proposed for FANETs. LFEAR improves the template of the route request (RREQ) packet by adding three fields, namely the energy, reliable distance, and movement similarity of the relevant route to create stable and energy-efficient paths. In the routing process, LFEAR presents a local filtering construction technique to avoid the broadcasting storm issue. This filter limits the broadcasting range of RREQs in the network. Accordingly, only UAVs inside this local filtered area can rebroadcast RREQs and other UAVs must eliminate these packets. After ending the route discovery process, the destination begins the route selection phase and extracts information about each discovered route, including the number of hops, route energy, reliable distance, and movement similarity. Then, the destination node calculates a score for each path based on the extracted information, selects the route with the highest score, and sends a route reply (RREP) packet to the source node through this route. Finally, the simulation process of LFEAR is performed using the NS2 simulator, and two simulation scenarios, namely change in network density and change in the speed of UAVs, are defined to evaluate network performance. In the first scenario, LFEAR improves energy consumption, packet delivery rate, network lifespan, and delay by 1.33%, 1.77%, 6.74%, and 1.71%, while its routing overhead is about 16.51% more than EARVRT. In the second scenario, LFEAR optimizes energy consumption and network lifetime by 5.55% and 5.67%, respectively. However, its performance in terms of routing overhead, packet delivery rate, and delay is 23%, 2.29%, and 6.67% weaker than EARVRT, respectively.

17.
Heliyon ; 10(11): e32074, 2024 Jun 15.
Artigo em Inglês | MEDLINE | ID: mdl-38868007

RESUMO

Smart Grids are the control and transmission networks of the future; they allow suppliers and customers to interact in real time to optimize and intelligently manage resources. Although wireless mesh network technology can facilitate these smart functionalities, it is important to address the vulnerabilities and cyber-attack risks that are inherent to it. Smart Grid's reliance on the Internet amplifies security concerns. A number of methods have been proposed to address this issue; while some have made promises, they all need substantial amounts of computational resources. With this technology, channels based on trust can be set up. The security of the system is built utilizing a family relationship-based method, which makes use of measures that may be used to gauge a node's originality. Additionally, the power consumption and signal strength of the node are taken into account. The complexity and extent of the network need the development of new types of smart grid communication. Finding a way to detect and thwart major assaults on routing protocols is another design challenge. Smart grids rely on these protocols in its data system for efficient interchange of renewable energy. A unique secure energy routing mechanism is developed in this proposed model for secure data communication. In the proposed model, a new method for Neighbor Nodes Trust Tagging Model for Optimized Route Detection (NNTT-ORD) is proposed for establishing secure route for data communication in smart grids. The proposed model is compared with the existing model and the results represent that the proposed model route provides a secure environment for data transmission.

18.
Sensors (Basel) ; 24(11)2024 May 21.
Artigo em Inglês | MEDLINE | ID: mdl-38894056

RESUMO

Energy efficiency and data reliability are important indicators to measure network performance in wireless sensor networks. In existing research schemes of routing protocols, the impact of node coverage on the network is often ignored, and the possibility that multiple sensor nodes may sense the same spatial point is not taken into account, which results in a waste of network resources, especially in large-scale networks. Apart from that, the blindness of geographic routing in data transmission has been troubling researchers, which means that the nodes are unable to determine the validity of data transmission. In order to solve the above problems, this paper innovatively combines the routing protocol with the coverage control technique and proposes the node collaborative scheduling algorithm, which fully considers the correlation characteristics between sensor nodes to reduce the number of active working nodes and the number of packets generated, to further reduce energy consumption and network delay and improve packet delivery rate. In order to solve the problem of unreliability of geographic routing, a highly reliable link detection and repair scheme is proposed to check the communication link status and repair the invalid link, which can greatly improve the packet delivery rate and throughput of the network, and has good robustness. A large number of experiments demonstrate the effectiveness and superiority of our proposed scheme and algorithm.

19.
Biomimetics (Basel) ; 9(6)2024 May 30.
Artigo em Inglês | MEDLINE | ID: mdl-38921210

RESUMO

In humanitarian aid scenarios, the model of cumulative capacitated vehicle routing problem can be used in vehicle scheduling, aiming at delivering materials to recipients as quickly as possible, thus minimizing their wait time. Traditional approaches focus on this metric, but practical implementations must also consider factors such as driver labor intensity and the capacity for on-site decision-making. To evaluate driver workload, the operation times of relief vehicles are typically used, and multi-objective modeling is employed to facilitate on-site decision-making. This paper introduces a multi-objective cumulative capacitated vehicle routing problem considering operation time (MO-CCVRP-OT). Our model is bi-objective, aiming to minimize both the cumulative wait time of disaster-affected areas and the extra expenditures incurred by the excess operation time of rescue vehicles. Based on the traditional grey wolf optimizer algorithm, this paper proposes a dynamic grey wolf optimizer algorithm with floating 2-opt (DGWO-F2OPT), which combines real number encoding with an equal-division random key and ROV rules for decoding; in addition, a dynamic non-dominated solution set update strategy is introduced. To solve MO-CCVRP-OT efficiently and increase the algorithm's convergence speed, a multi-objective improved floating 2-opt (F2OPT) local search strategy is proposed. The utopia optimum solution of DGWO-F2OPT has an average value of two fitness values that is 6.22% lower than that of DGWO-2OPT. DGWO-F2OPT's average fitness value in the algorithm comparison trials is 16.49% less than that of NS-2OPT. In the model comparison studies, MO-CCVRP-OT is 18.72% closer to the utopian point in Euclidean distance than CVRP-OT.

20.
Sensors (Basel) ; 24(12)2024 Jun 19.
Artigo em Inglês | MEDLINE | ID: mdl-38931749

RESUMO

In this paper, we investigate a scenario in which protected and unprotected services coexist in an elastic optical network under dynamic traffic. In the investigated scenario, unprotected services can reuse the reserved idle bandwidth to provide protection to the protected services. Under this scenario, we propose a new heuristic algorithm that enables such reuse as well as define and introduce a new assignment problem in elastic optical networks, named a Transmission Spectrum Assignment (T-SA) problem. In this paper, we consider a scenario in which services may be routed using the multipath routing approach. Additionally, protection using bandwidth squeezing is also considered. We assess our proposal through simulations on three different network topologies and compare our proposal against the classical protection approach, in which bandwidth reuse is not allowed. For the simulated range of network loads, the maximum (minimum) blocking probability reduction obtained by our proposal is approximately 48% (10%) in the European topology, 46% (7%) in the NSFNET topology, and 32% (6%) in the German topology.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA