A dist ributed optimal local double loop (DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definition...A dist ributed optimal local double loop (DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter d and average hop distance a for this class of networks are [3N- 2]≤d≤[3N ] and (5N/9 (N-1))-(3N -1.8)<a<(5N/9(N-1)) (3N -0.9),respectively (N is the number of nodes in the network ). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed and analyzed. The correctness of the algorithm has also been verified by simulating.展开更多
A distibuted optimal local double loop(DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions a...A distibuted optimal local double loop(DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter (d) and average hop distance (a) for this class of networks are [square-root 3N -2] less-than-or-equal-to d less-than-or-equal-to [square-root 3N+1] and (5N/9(N-1)) (square-root 3N-1.8) < a < (5N/9 (N-1)). (square-root 3N - 0.23), respectively (N is the number of nodes in the network. (3 less-than-or-equal-to N less-than-or-equal-to 10(4)). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed. The correctness of the algorithm has been also verified by simulating.展开更多
Presents a new algorithm for diameter of double loop network(DLN) by which two new classes of infinite families of tight DLN of the known twelve infinie families of tight DLNs, under 3.3 in [1] including eleven are co...Presents a new algorithm for diameter of double loop network(DLN) by which two new classes of infinite families of tight DLN of the known twelve infinie families of tight DLNs, under 3.3 in [1] including eleven are constructed.展开更多
Based on their "Theorem 2", an O(δ)-time algorithm of searching for the shortest path between each pair of nodes in a double loop network was proposed by K.Mukhopadyaya, et al.(1995). While, unfortunately, ...Based on their "Theorem 2", an O(δ)-time algorithm of searching for the shortest path between each pair of nodes in a double loop network was proposed by K.Mukhopadyaya, et al.(1995). While, unfortunately, it will be proved that both "Theorem 2" and its proof are in error. A new and more faster O(△)-time, △≤δ, algorithm will be presented in this paper.展开更多
The double loop network(DLN)is a circulant digraph with n nodes and outdegree 2.It is an important topological structure of computer interconnection networks and has been widely used in the designing of local area net...The double loop network(DLN)is a circulant digraph with n nodes and outdegree 2.It is an important topological structure of computer interconnection networks and has been widely used in the designing of local area networks and distributed systems.Given the number n of nodes,how to construct a DLN which has minimum diameter?This problem has attracted great attention.A related and longtime unsolved problem is:for any given non-negative integer k,is there an infinite family of k-tight optimal DLN?In this paper,two main results are obtained:(1)for any k≥0,the infinite families of k-tight optimal DLN can be constructed,where the number n(k,e,c)of their nodes is a polynomial of degree 2 in e with integral coefficients containing a parameter c.(2)for any k≥0,an infinite family of singular k-tight optimal DLN can be constructed.展开更多
This paper divides the vertex set into several disjoined subsets and provides an optimal fault-tolerance routing algorithm based on the vertex set partition. This algorithm is efficient and convergent, in polynomial t...This paper divides the vertex set into several disjoined subsets and provides an optimal fault-tolerance routing algorithm based on the vertex set partition. This algorithm is efficient and convergent, in polynomial time, we can get the output if the vertex is given.展开更多
The double loop network G(N; r, s) has N vertices and 2N directed edges. A natural question is how to choose r and s such that G(N; r, s) has diameter as short as possible for a given N. In 1993, Li, Xu and Zhang prop...The double loop network G(N; r, s) has N vertices and 2N directed edges. A natural question is how to choose r and s such that G(N; r, s) has diameter as short as possible for a given N. In 1993, Li, Xu and Zhang proposed a method of constructing double loop networks with the minimum diameter for the case of r=1.The method is developed to construct such networks that none of their minimum diameters can be reached at r=1.As a by-product, a flaw in an assertation by Esqu et al. is pointed out.展开更多
The double loop network (DLN) is a circulant digraph with n nodes and outdegree 2. DLN has been widely used in the designing of local area networks and distributed systems. In this paper, a new method for constructing...The double loop network (DLN) is a circulant digraph with n nodes and outdegree 2. DLN has been widely used in the designing of local area networks and distributed systems. In this paper, a new method for constructing infinite families of k-tight optimal DLN is presented. For k = 0,1,…,40, the infinite families of k-tight optimal DLN can be constructed by the new method, where the number nk(t,a) of their nodes is a polynomial of degree 2 in t and contains a parameter a. And a conjecture is proposed.展开更多
The productivity of an organization is very much affected by non-value adding activity like logistics, which moves the resources from suppliers to factory, raw materials/semi-finished items within the factory and fini...The productivity of an organization is very much affected by non-value adding activity like logistics, which moves the resources from suppliers to factory, raw materials/semi-finished items within the factory and finished goods from factory to customers via a designated distribution channel called as forward logistics. In some cases, parts of the products such as automobiles, computers, cameras, mobile phones, washing machines, refrigerators, garments, footwear and empty glass bottles of beverages, etc. will be brought back to the factories as a product recovery strategy through reverse logistics network which is integrated in a sustainable closed loop supply chain network. So, it is highly essential to optimize the movement of the items in the reverse logistics network. This paper gives a comprehensive review of literature of the design of networks for the reverse logistics as well as for the reverse logistics coupled with forward logistics. The contributions of the researchers are classified into nine categories based on the methods used to design the logistics network.展开更多
A routing algorithm for distributed optimal double loop computer networks is proposed and analyzed. In this paper, the routing algorithm rule is described, and the procedures realizing the algorithm are given. The pr...A routing algorithm for distributed optimal double loop computer networks is proposed and analyzed. In this paper, the routing algorithm rule is described, and the procedures realizing the algorithm are given. The proposed algorithm is shown to be optimal and robust for optimal double loop. In the absence of failures,the algorithm can send a packet along the shortest path to destination; when there are failures,the packet can bypasss failed nodes and links.展开更多
The matrix D describing relations of the loops to the nodes in the graph and also the setsof branches based on the independent loops and their matrix Q are defined.The theorem in whichthe product of the loop-node matr...The matrix D describing relations of the loops to the nodes in the graph and also the setsof branches based on the independent loops and their matrix Q are defined.The theorem in whichthe product of the loop-node matrix D multiplied by the incidence matrix A<sub>a</sub> is equal to matrix Qis put forward and proved.The admittance matrix Y<sub>lc</sub> of the sets of the branches is defined and it isassumed that the vector V<sub>lc</sub> of voltage of the sets of branches to be a calculative quantity.The equa-tion of the sets of branches is derived and the analysis method of the sets of branches based on theindependent loops in the electric network is presented.展开更多
Electricity being a basic national infrastructure for a country, its security, reliability and quality are the most important parameters for the network managers. Several methods are generally used to improve the volt...Electricity being a basic national infrastructure for a country, its security, reliability and quality are the most important parameters for the network managers. Several methods are generally used to improve the voltage quality more and more. However, most of the means implemented depend on external factors independent of the network managers or require huge regular financial resources. The method used in this paper is the loopback, applied to the Southern Interconnected Grid (SIG) of Cameroon, which is the largest net</span><span style="font-family:Verdana;">work in the country. The procedure used takes into account nodes experiencing huge voltage drops and network constraints. The chosen loopback</span><span style="font-family:Verdana;"> scenario results in a clear improvement of the voltage plan in this network, and also a discharge of the transformers, a considerable decongestion of the lines, a reduction of the power losses and a significant reduction of the thermal placement used for improvement of the voltage profile.展开更多
For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and ...For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and QualNet network simulator, two kinds of simulation frameworks for MANET multicast emergency communication network are proposed. By running simulation under this configuration and doing experiments with on-demand multicast routing protocol (ODMRP), unicast and multicast functions of this protocol are tested. Research results indicate that HILS method can effectively reduce the difficulty of system modeling and improve precision of simulation, and can further accelerate transition from design to system deployment.展开更多
To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits an...To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits and shortages were compared.Combing system-in-the-loop(SITL) simulation principle with high level architecture(HLA),an HITL simulation model of asynchronous transfer mode(ATM) network was constructed.The throughput and end-to-end delay of all-digital simulation and HITL simulation was analyzed,which showed that HITL simulation was more reliable and effectively improved the simulation credibility of communication network.Meanwhile,HLA-SITL method was fast and easy to achieve and low-cost during design lifecycle.Thus,it was a feasible way to research and analyze the large-scale network.展开更多
The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing...The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing trends in business and social environments, growing environmental consciousness in the society and government legislations to protect the environment as well as the business. In this context, this paper considers a multi-echelon closed loop supply chain network design with forward and reverse logistics components. An attempt has been made to develop a mixed integer non-linear programming model for this problem with different costs so that the sum of the total cost is minimized subject to different constraints pertaining to capacities of the entities of the system, demands of first customers and second customers. A generalized model is presented and then its application is illustrated using an example problem by solving the model using LINGO14. This model forms as a tool to compare future meta-heuristics to check the closeness of their solutions with corresponding optimal solutions.展开更多
A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive col...A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive collectors as well as a binding price ceiling of the commodities.By utilizing the credibility measure of fuzzy event,variational inequality and Lagrange dual theory,the optimum behaviors of manufactures,retailers,collectors and consumers are described.Therefore,the supply chain network equilibrium model is established.Numerical examples were given to illustrate the impact of production capacity constraints and price ceiling on the network equilibrium pattern.The results show that the shortage of commodities in consumer market will be more serious,the wholesale price of product and purchase price of waste products rise,the profits of retailers decrease,the profits of manufacturers and collectors increase as the government gradually reduce the binding price ceiling on competitive markets,and the trend will be more obvious in the existence of production capacity constraints at same time.展开更多
Study of network dynamics is very active area in biological and social sciences. However, the relationship between the network structure and the attractors of the dynamics has not been fully understood yet. In this st...Study of network dynamics is very active area in biological and social sciences. However, the relationship between the network structure and the attractors of the dynamics has not been fully understood yet. In this study, we numerically investigated the role of degenerate self-loops on the attractors and its basin size using the budding yeast cell-cycle network model. In the network, all self-loops negatively suppress the node (self-inhibition loops) and the attractors are only fixed points, i.e. point attractors. It is found that there is a simple division rule of the state space by removing the self-loops when the attractors consist only of point attractors. The point attractor with largest basin size is robust against the change of the self-inhibition loop. Furthermore, some limit cycles of period 2 appear as new attractor when a self-activation loop is added to the original network. It is also shown that even in that case, the point attractor with largest basin size is robust.展开更多
This paper presents four different hybrid genetic algorithms for network design problem in closed loop supply chain. They are compared using a complete factorial experiment with two factors, viz. problem size and algo...This paper presents four different hybrid genetic algorithms for network design problem in closed loop supply chain. They are compared using a complete factorial experiment with two factors, viz. problem size and algorithm. Based on the significance of the factor “algorithm”, the best algorithm is identified using Duncan’s multiple range test. Then it is compared with a mathematical model in terms of total cost. It is found that the best hybrid genetic algorithm identified gives results on par with the mathematical model in statistical terms. So, the best algorithm out of four algorithm proposed in this paper is proved to be superior to all other algorithms for all sizes of problems and its performance is equal to that of the mathematical model for small size and medium size problems.展开更多
文摘A dist ributed optimal local double loop (DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter d and average hop distance a for this class of networks are [3N- 2]≤d≤[3N ] and (5N/9 (N-1))-(3N -1.8)<a<(5N/9(N-1)) (3N -0.9),respectively (N is the number of nodes in the network ). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed and analyzed. The correctness of the algorithm has also been verified by simulating.
文摘A distibuted optimal local double loop(DOLDL) network is presented. Emphasis is laid on the topology and distributed routing algorithms for the DOLDL. On the basis of building an abstract model, a set of definitions and theorems are described and proved. An algorithm which can optimize the double loop networks is presented. The optimal values of the topologic parameters for the DOLDL have been obtained by the algorithm, and these numerical results are analyzed. The study shows that the bounds of the optimal diameter (d) and average hop distance (a) for this class of networks are [square-root 3N -2] less-than-or-equal-to d less-than-or-equal-to [square-root 3N+1] and (5N/9(N-1)) (square-root 3N-1.8) < a < (5N/9 (N-1)). (square-root 3N - 0.23), respectively (N is the number of nodes in the network. (3 less-than-or-equal-to N less-than-or-equal-to 10(4)). A class of the distributed routing algorithms for the DOLDL and the implementation procedure of an adaptive fault-tolerant algorithm are proposed. The correctness of the algorithm has been also verified by simulating.
文摘Presents a new algorithm for diameter of double loop network(DLN) by which two new classes of infinite families of tight DLN of the known twelve infinie families of tight DLNs, under 3.3 in [1] including eleven are constructed.
基金Supported by the National Natural Science Foundation of China(No.69772035)
文摘Based on their "Theorem 2", an O(δ)-time algorithm of searching for the shortest path between each pair of nodes in a double loop network was proposed by K.Mukhopadyaya, et al.(1995). While, unfortunately, it will be proved that both "Theorem 2" and its proof are in error. A new and more faster O(△)-time, △≤δ, algorithm will be presented in this paper.
基金This work was supported by the Natural Science Foundation of Fujian Province(Grant No.A0510021)Science and Technology Three Projects Foundation of Fujian Province(Grant No.2006F5068)
文摘The double loop network(DLN)is a circulant digraph with n nodes and outdegree 2.It is an important topological structure of computer interconnection networks and has been widely used in the designing of local area networks and distributed systems.Given the number n of nodes,how to construct a DLN which has minimum diameter?This problem has attracted great attention.A related and longtime unsolved problem is:for any given non-negative integer k,is there an infinite family of k-tight optimal DLN?In this paper,two main results are obtained:(1)for any k≥0,the infinite families of k-tight optimal DLN can be constructed,where the number n(k,e,c)of their nodes is a polynomial of degree 2 in e with integral coefficients containing a parameter c.(2)for any k≥0,an infinite family of singular k-tight optimal DLN can be constructed.
基金This project is supported by National Natural Science Foundation of Chins (10371049) and Science Foundation of Three Gorges University
文摘This paper divides the vertex set into several disjoined subsets and provides an optimal fault-tolerance routing algorithm based on the vertex set partition. This algorithm is efficient and convergent, in polynomial time, we can get the output if the vertex is given.
基金Project supported partially by the National Natural Science Foundation of China (Grant No. 19671057).
文摘The double loop network G(N; r, s) has N vertices and 2N directed edges. A natural question is how to choose r and s such that G(N; r, s) has diameter as short as possible for a given N. In 1993, Li, Xu and Zhang proposed a method of constructing double loop networks with the minimum diameter for the case of r=1.The method is developed to construct such networks that none of their minimum diameters can be reached at r=1.As a by-product, a flaw in an assertation by Esqu et al. is pointed out.
基金supported by the Natural Science Foundation of Fujian Province of China(Grant No.A0510021)the National Natural Science Foundation of China(Grant No.10271114).
文摘The double loop network (DLN) is a circulant digraph with n nodes and outdegree 2. DLN has been widely used in the designing of local area networks and distributed systems. In this paper, a new method for constructing infinite families of k-tight optimal DLN is presented. For k = 0,1,…,40, the infinite families of k-tight optimal DLN can be constructed by the new method, where the number nk(t,a) of their nodes is a polynomial of degree 2 in t and contains a parameter a. And a conjecture is proposed.
文摘The productivity of an organization is very much affected by non-value adding activity like logistics, which moves the resources from suppliers to factory, raw materials/semi-finished items within the factory and finished goods from factory to customers via a designated distribution channel called as forward logistics. In some cases, parts of the products such as automobiles, computers, cameras, mobile phones, washing machines, refrigerators, garments, footwear and empty glass bottles of beverages, etc. will be brought back to the factories as a product recovery strategy through reverse logistics network which is integrated in a sustainable closed loop supply chain network. So, it is highly essential to optimize the movement of the items in the reverse logistics network. This paper gives a comprehensive review of literature of the design of networks for the reverse logistics as well as for the reverse logistics coupled with forward logistics. The contributions of the researchers are classified into nine categories based on the methods used to design the logistics network.
文摘A routing algorithm for distributed optimal double loop computer networks is proposed and analyzed. In this paper, the routing algorithm rule is described, and the procedures realizing the algorithm are given. The proposed algorithm is shown to be optimal and robust for optimal double loop. In the absence of failures,the algorithm can send a packet along the shortest path to destination; when there are failures,the packet can bypasss failed nodes and links.
文摘The matrix D describing relations of the loops to the nodes in the graph and also the setsof branches based on the independent loops and their matrix Q are defined.The theorem in whichthe product of the loop-node matrix D multiplied by the incidence matrix A<sub>a</sub> is equal to matrix Qis put forward and proved.The admittance matrix Y<sub>lc</sub> of the sets of the branches is defined and it isassumed that the vector V<sub>lc</sub> of voltage of the sets of branches to be a calculative quantity.The equa-tion of the sets of branches is derived and the analysis method of the sets of branches based on theindependent loops in the electric network is presented.
文摘Electricity being a basic national infrastructure for a country, its security, reliability and quality are the most important parameters for the network managers. Several methods are generally used to improve the voltage quality more and more. However, most of the means implemented depend on external factors independent of the network managers or require huge regular financial resources. The method used in this paper is the loopback, applied to the Southern Interconnected Grid (SIG) of Cameroon, which is the largest net</span><span style="font-family:Verdana;">work in the country. The procedure used takes into account nodes experiencing huge voltage drops and network constraints. The chosen loopback</span><span style="font-family:Verdana;"> scenario results in a clear improvement of the voltage plan in this network, and also a discharge of the transformers, a considerable decongestion of the lines, a reduction of the power losses and a significant reduction of the thermal placement used for improvement of the voltage profile.
文摘For the research of mobile Ad hoc network (MANET), hardware in the loop simulation (HILS) is introduced to improve simulation fidelity. The architectures and frameworks of HILS system are discussed. Based on HILS and QualNet network simulator, two kinds of simulation frameworks for MANET multicast emergency communication network are proposed. By running simulation under this configuration and doing experiments with on-demand multicast routing protocol (ODMRP), unicast and multicast functions of this protocol are tested. Research results indicate that HILS method can effectively reduce the difficulty of system modeling and improve precision of simulation, and can further accelerate transition from design to system deployment.
基金Supported by the National Natural Science Foundation of China (61101129)Specialized Research Fund for the Doctoral Program of Higher Education(20091101110019)
文摘To enhance the fidelity and accuracy of the simulation of communication networks,hardware-in-the-loop(HITL) simulation was employed.HITL simulation methods was classified into three categories,of which the merits and shortages were compared.Combing system-in-the-loop(SITL) simulation principle with high level architecture(HLA),an HITL simulation model of asynchronous transfer mode(ATM) network was constructed.The throughput and end-to-end delay of all-digital simulation and HITL simulation was analyzed,which showed that HITL simulation was more reliable and effectively improved the simulation credibility of communication network.Meanwhile,HLA-SITL method was fast and easy to achieve and low-cost during design lifecycle.Thus,it was a feasible way to research and analyze the large-scale network.
文摘The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing trends in business and social environments, growing environmental consciousness in the society and government legislations to protect the environment as well as the business. In this context, this paper considers a multi-echelon closed loop supply chain network design with forward and reverse logistics components. An attempt has been made to develop a mixed integer non-linear programming model for this problem with different costs so that the sum of the total cost is minimized subject to different constraints pertaining to capacities of the entities of the system, demands of first customers and second customers. A generalized model is presented and then its application is illustrated using an example problem by solving the model using LINGO14. This model forms as a tool to compare future meta-heuristics to check the closeness of their solutions with corresponding optimal solutions.
基金study by the National Natural Science Foundation of China,Shandong province by the National Science Foundation Project,Project number:71202142,ZR2012GM002
文摘A closed-loop supply chain network equilibrium problem is examined,which consists of mutual competitive manufacturers with production capacity constraints and retailers with fuzzy market demands,mutual competitive collectors as well as a binding price ceiling of the commodities.By utilizing the credibility measure of fuzzy event,variational inequality and Lagrange dual theory,the optimum behaviors of manufactures,retailers,collectors and consumers are described.Therefore,the supply chain network equilibrium model is established.Numerical examples were given to illustrate the impact of production capacity constraints and price ceiling on the network equilibrium pattern.The results show that the shortage of commodities in consumer market will be more serious,the wholesale price of product and purchase price of waste products rise,the profits of retailers decrease,the profits of manufacturers and collectors increase as the government gradually reduce the binding price ceiling on competitive markets,and the trend will be more obvious in the existence of production capacity constraints at same time.
文摘Study of network dynamics is very active area in biological and social sciences. However, the relationship between the network structure and the attractors of the dynamics has not been fully understood yet. In this study, we numerically investigated the role of degenerate self-loops on the attractors and its basin size using the budding yeast cell-cycle network model. In the network, all self-loops negatively suppress the node (self-inhibition loops) and the attractors are only fixed points, i.e. point attractors. It is found that there is a simple division rule of the state space by removing the self-loops when the attractors consist only of point attractors. The point attractor with largest basin size is robust against the change of the self-inhibition loop. Furthermore, some limit cycles of period 2 appear as new attractor when a self-activation loop is added to the original network. It is also shown that even in that case, the point attractor with largest basin size is robust.
文摘This paper presents four different hybrid genetic algorithms for network design problem in closed loop supply chain. They are compared using a complete factorial experiment with two factors, viz. problem size and algorithm. Based on the significance of the factor “algorithm”, the best algorithm is identified using Duncan’s multiple range test. Then it is compared with a mathematical model in terms of total cost. It is found that the best hybrid genetic algorithm identified gives results on par with the mathematical model in statistical terms. So, the best algorithm out of four algorithm proposed in this paper is proved to be superior to all other algorithms for all sizes of problems and its performance is equal to that of the mathematical model for small size and medium size problems.