• Title/Summary/Keyword: Allocation method

Search Result 1,515, Processing Time 0.021 seconds

Utility-based Resource Allocation with Bipartite Matching in OFDMA-based Wireless Systems

  • Zheng, Kan;Li, Wei;Liu, Fei;Xiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1913-1925
    • /
    • 2012
  • In order to efficiently utilize limited radio resources, resource allocation schemes in OFDMA-based wireless networks have gained intensive attention recently. Instead of improving the throughput performance, the utility is adopted as the metric for resource allocation, which provides reasonable methods to build up the relationship between user experience and various quality-of-service (QoS) metrics. After formulating the optimization problem by using a weighted bipartite graph, a modified bipartite matching method is proposed to find a suboptimal solution for the resource allocation problem in OFDMA-based wireless systems with feasible computational complexity. Finally, simulation results are presented to validate the effectiveness of the proposed method.

LS code pair setting and sequential allocation methods

  • Wook, Roh-Dong
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.221-224
    • /
    • 2001
  • A new code: LS code was proposed for IMT-2000 CDMA system. The code has special properties during a certain time of interval: 1) perfect autocorrelation 2) perfect crosscorrelation. The perfect autocorrelation means that the autocorrelation has nMaximum for zero time-offset and zero for other times during a certain time. Moreover the perfect crosscorrelation means that the crosscorrelation has zero during a time of interest. In the LAS-DMA system, the LS code is only used in the spreading of data bits in contrast to the conventional CDMA system. Therefore the LS code pair setting and allocation order should be dealt with carefully considering the special properties of LS code. This paper is intended as an investigation of the setting LS code pair and the sequential allocation method. Firstly, the optimum LS code pair set is proposed in order to minimize PAPR. Secondly, the sequential allocation method is studied to either minimize PAPR or expand IFW.

  • PDF

Simultaneous Optimization of Level of Repair and Spare Parts Allocation for MIME Systems under Availability Constraint with Simulation and a Meta-heuristic (가용도 제약하에 시뮬레이션과 메타 휴리스틱을 이용한 MIME 시스템의 수리수준 및 수리부속 할당 동시 최적화)

  • Chung, Il-Han;Yun, Won-Young;Kim, Ho-Gyun
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.209-223
    • /
    • 2009
  • In this paper, an analysis problem of repair levels and spare part allocation for MIME(Multi indenture multi echelon) systems is studied using simulation and meta-heuristics. We suggest a method to determine simultaneously repair levels and spare parts allocation to minimize the life cycle cost of MIME system under availability constraint. A simulated annealing method is used to analyze the repair levels and genetic algorithm is used to obtain the optimal allocation of spare parts. We also develop a simulation system to calculate the life cycle cost and system availability. Some numerical examples are also studied.

A Block Adaptive Bit Allocation for Progressive Transmission of Mean Difference Pyramid Image (Mean difference pyramid 영상의 점진적 전송을 위한 블록 적응 비트 배정)

  • 김종훈;신재범;심영석
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.4
    • /
    • pp.130-137
    • /
    • 1993
  • In this paper, A progressive coding of mean difference pyramid by Hadamard transform of the difference between two successive pyramid levels has been studied. A block adaptive bit allocation method based on ac energy of each sub-block has been proposed, which efficiently reduces the final distortion in the progressive transmission of image parameters. In our scheme, the dc energy equals the sum of the quantization errors of the Hadamard transform coefficients at previous level. Therefore proposed allocation method includes the estimation of dc energy at each pyramid level. Computer simulation results show some improvements in terms of MSE and picture quality over the conventional fixed allocation scheme.

  • PDF

Efficient Slice Allocation Method using Cluster Technology in Fifth-Generation Core Networks

  • Park, Sang-Myeon;Mun, Young-Song
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.3
    • /
    • pp.185-190
    • /
    • 2019
  • The explosive growth of data traffic and services has created cost challenges for networks. Studies have attempted to effectively apply network slicing in fifth generation networks to provide high speed, low latency, and various compatible services. However, in network slicing using mixed-integer linear programming, the operation count increases exponentially with the number of physical servers and virtual network functions (VNFs) to be allocated. Therefore, we propose an efficient slice allocation method based on cluster technology, comprising the following three steps: i) clustering physical servers; ii) selecting an appropriate cluster to allocate a VNF; iii) selecting an appropriate physical server for VNF allocation. Solver runtimes of the existing and proposed methods are compared, under similar settings, with respect to intra-slice isolation. The results show that solver runtime decreases, by approximately 30% on average, with an increase in the number of physical servers within the cluster in the presence of intra-slice isolation.

Bidirectional Link Resource Allocation Strategy in GFDM-based Multiuser SWIPT Systems

  • Xu, Xiaorong;Sun, Minghang;Zhu, Wei-Ping;Feng, Wei;Yao, Yingbiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.319-333
    • /
    • 2022
  • In order to enhance system energy efficiency, bidirectional link resource allocation strategy in GFDM-based multiuser SWIPT systems is proposed. In the downlink channel, each SWIPT user applies power splitting (PS) receiver structure in information decoding (ID) and non-linear energy harvesting (EH). In the uplink channel, information transmission power is originated from the harvested energy. An optimization problem is constructed to maximize weighted sum ID achievable rates in the downlink and uplink channels via bidirectional link power allocation as well as subcarriers and subsymbols scheduling. To solve this non-convex optimization problem, Lagrange duality method, sub-gradient-based method and greedy algorithm are adopted respectively. Simulation results show that the proposed strategy is superior to the fixed subcarrier scheme regardless of the weighting coefficients. It is superior to the heuristic algorithm in larger weighting coefficients scenario.

Computation Offloading with Resource Allocation Based on DDPG in MEC

  • Sungwon Moon;Yujin Lim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.226-238
    • /
    • 2024
  • Recently, multi-access edge computing (MEC) has emerged as a promising technology to alleviate the computing burden of vehicular terminals and efficiently facilitate vehicular applications. The vehicle can improve the quality of experience of applications by offloading their tasks to MEC servers. However, channel conditions are time-varying due to channel interference among vehicles, and path loss is time-varying due to the mobility of vehicles. The task arrival of vehicles is also stochastic. Therefore, it is difficult to determine an optimal offloading with resource allocation decision in the dynamic MEC system because offloading is affected by wireless data transmission. In this paper, we study computation offloading with resource allocation in the dynamic MEC system. The objective is to minimize power consumption and maximize throughput while meeting the delay constraints of tasks. Therefore, it allocates resources for local execution and transmission power for offloading. We define the problem as a Markov decision process, and propose an offloading method using deep reinforcement learning named deep deterministic policy gradient. Simulation shows that, compared with existing methods, the proposed method outperforms in terms of throughput and satisfaction of delay constraints.

Ship Collision Risk of Suspension Bridge and Design Vessel Load (현수교의 선박충돌 위험 및 설계박하중)

  • Lee, Seong Lo;Bae, Yong Gwi
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1A
    • /
    • pp.11-19
    • /
    • 2006
  • In this study ship collision risk analysis is performed to determine the design vessel for collision impact analysis of suspension bridge. Method II in AASHTO LRFD bridge design specifications which is a more complicated probability based analysis procedure is used to select the design vessel for collision impact. From the assessment of ship collision risk for each bridge pier exposed to ship collision, the design impact lateral strength of bridge pier is determined. The analysis procedure is an iterative process in which a trial impact resistance is selected for a bridge component and a computed annual frequency of collapse(AF) is compared to the acceptance criterion, and revisions to the analysis variables are made as necessary to achieve compliance. The acceptance criterion is allocated to each pier using allocation weights based on the previous predictions. This AF allocation method is compared to the pylon concentration allocation method to obtain safety and economy in results. This method seems to be more reasonable than the pylon concentration allocation method because AF allocation by weights takes the design parameter characteristics quantitatively into consideration although the pylon concentration allocation method brings more economical results when the overestimated design collision strength of piers compared to the strength of pylon is moderately modified. The design vessel for each pier corresponding with the design impact lateral strength obtained from the ship collision risk assessment is then selected. The design impact lateral strength can vary greatly among the components of the same bridge, depending upon the waterway geometry, available water depth, bridge geometry, and vessel traffic characteristics. Therefore more researches on the allocation model of AF and the selection of design vessel are required.

Estimation of CTD and Peak-to-Peak CDV Allocation to Nodes in Domestic Region (국내영역에서 셀전달지연 추정 및 peak-to-peak CDV 노드별 할당)

  • Park, Chun-Kwan;Han, Jong-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.2
    • /
    • pp.6-12
    • /
    • 2001
  • When CBR source traffics are loaded to ATM switch and broadband network termination, CTD values of ATM switch and broadband network termination are measured and then the values of CTD in the domestic region arc estimated. The estimation values of CTD satisfy the objective of CTD in the domestic region allocated by allocation rules of 1.356. The peak-to-peak CDV allocation method based On Chernoff accumulation method is proposed and applied to the nodes of national portion. From the result of numerical analysis, the proposed method is more accurate than the equal allocation method for peak -to-peak CDV in case that the CDVs at each node and the number of ATM nodes on the path increase.

  • PDF

Lock-free unique identifier allocation for parallel macro expansion

  • Son, Bum-Jun;Ahn, Ki Yung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • In this paper, we propose a more effective unique identifier allocation method for macro expansion in a single-process multicore parallel computing environment that does not require locks. Our key idea for such an allocation method is to remove sequential dependencies using the remainder operation. We confirmed that our lock-free method is suitable for improving the performance of parallel macro expansion through the following benchmark: we patched an existing library, which is based on a sequential unique identifier allocation, with our proposed method, and compared the performances of the same program but using two different versions of the library, before and after the patch.