Essays about: "Source Routing"

Showing result 1 - 5 of 56 essays containing the words Source Routing.

  1. 1. Route Planning of Battery Electric Heavy-Duty Commercial Vehicles : Using Contraction Hierarchies and Mixed Integer Programming

    University essay from Uppsala universitet/Datalogi

    Author : Olle Delborg; Elias Insulander; [2023]
    Keywords : route planning; route optimization; contraction hierarchies; mixed integer programming; vehicle routing problem; electric trucks; electric vehicles; battery; openstreetmap; shortest path; Dijkstra;

    Abstract : This thesis addresses route planning of Battery Electric Heavy-Duty Commercial Vehicles to enhance the reliability of electric vehicle transport. Collaborating with Scania, a Swedish truck manufacturing company, the goal is to develop a pipeline that uses open source data from OpenStreetMap and performs a modified Contraction Hierarchy in order to create a graph that can be used as input to a modified Vehicle Routing Problem formulation using Mixed Integer Programming. READ MORE

  2. 2. Reproducibility and Applicability of a Fuzzy-based Routing Algorithm in Wireless Sensor Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Hannes Rönningen; Erik Olofsson; [2023]
    Keywords : End-to-end delay; Energy-efficiency; Fuzzy logic; Lifetime maximization; Multi-hop network; Multiobjective optimization; Reinforcement learning; Routing; Routing-protocol; Shortest path; Wireless sensor networks; WSN localization;

    Abstract : Wireless sensor networks is a broad subject with many applications and interesting research areas, such as optimization within connectivity and energy efficiency. One problem is that most published articles in this field use customized simulation environments and do not provide source code of their implementation. READ MORE

  3. 3. Energy Sustainable Reinforcement Learning-based Adaptive Duty-Cycling in Wireless Sensor Networks-based Internet of Things Networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Nadia Charef; [2023]
    Keywords : Reinforcement Learning; Q-learning; Dynamic Energy Management; Energy Sustainabiltiy; IEEE802.15.4 MAC Protocol; Adaptive Duty Cycling; Wireless Sensors Networks; Internet of Things;

    Abstract : The Internet of Things (IoT) is widely adopted across various fields due to its flexibility and low cost. Energy-harvesting Wireless Sensor Networks (WSNs) are becoming a building block of many IoT applications and provide a perpetual source of energy to power energy-constrained IoT devices. READ MORE

  4. 4. Longitudinal Characterization of the IP Allocation of the Major Cloud Providers and Other Popular Service Providers : An analysis of the Internet Plane projects collection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Hyab Girma Abera; Gasparas Grikainis; [2022]
    Keywords : IP address; IP-range; Autonomous systems; iPlane; Cloud service provider; Tranco list;

    Abstract : With the growth of the internet and exhaustion of IPv4 addresses, the allocation of IP addresses and routing between autonomous systems is an important factor on what paths are taken on the internet. Paths to different destinations are impacted by different neighbouring autonomous systems and their relations with eachother are important in order to find an optimal route from source to destination. READ MORE

  5. 5. Measuring The Adoption and The Effects of RPKI Route Validation and Filtering : Through active control plane and data plane measurements

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sergio Ricardo Hernández Torres; [2022]
    Keywords : BGP; IP; Routing; RPKI; Tier-1 ISP;

    Abstract : The BGP (Border Gateway Protocol) is responsible for establishing routing at the core of the Internet, yet it was not designed with security in mind. The Internet routing protocol is currently not secure — but its security can be enhanced. READ MORE