The Throughput Flow Constraint Theorem and its Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 3
Abstract
The paper states and proves an important result related to the theory of flow networks with disturbed flows:“the throughput flow constraint in any network is always equal to the throughput flow constraint in its dual network”. After the failure or congestion of several edges in the network, the throughput flow constraint theorem provides the basis of a very efficient algorithm for determining the edge flows which correspond to the optimal throughput flow from sources to destinations which is the throughput flow achieved with the smallest amount of generation shedding from the sources. In the case where a failure of an edge causes a loss of the entire flow through the edge, the throughput flow constraint theorem permits the calculation of the new maximum throughput flow to be done in time, where m is the number of edges in the network.In this case, the new maximum throughput flow is calculated by inspecting the network only locally, in the vicinity of the failed edge, without inspecting the rest of the network. The superior average running time of the presented algorithm, makes it particularly suitable for decongesting overloaded transmission links of telecommunication networks, in real time.In the paper, it is also shown that the deliberate choking of flows along overloaded edges, leading to a generation of momentary excess and deficit flow, provides a very efficient mechanism for decongesting overloaded branches.
Authors and Affiliations
Michael Todinov
Customer Satisfaction Measurement using Sentiment Analysis
Besides the traditional methods of targeting customers, social media presents its own set of opportunities. While companies look for a simple way with a large number of responses, social media platforms like Twitter can...
A Globally Convergent Algorithm of Variational Inequality
The algorithm of variational inequality is the important and valuable question in real life all the time. In this paper, a globally convergent algorithm of variational inequality is proposed. The method ensures tha...
A Hybrid Curvelet Transform and Genetic Algorithm for Image Steganography
In this paper, we present a new hybrid image steganography algorithm by combining two famous techniques which are curvelet transform and genetic algorithm GA. The proposed algorithm is called Hybrid Curvelet Transform an...
A Hybrid Data Mining Approach for Intrusion Detection on Imbalanced NSL-KDD Dataset
Intrusion detection systems aim to detect malicious viruses from computer and network traffic, which is not possible using common firewall. Most intrusion detection systems are developed based on machine learning techniq...
Assessing 3-D Uncertain System Stability by Using MATLAB Convex Hull Functions
This paper is dealing with the robust stability of an uncertain three dimensional (3-D) system using existence MATLAB convex hull functions. Hence, the uncertain model of plant will be simulated by INTLAB Toolbox; furthe...