• Title/Summary/Keyword: Function Allocation

Search Result 375, Processing Time 0.025 seconds

An Adaptive Hot-Spot Operating Scheme for OFDMA Downlink Systems in Vertically Overlaid Cellular Architecture

  • Kim, Nak-Myeong;Choi, Hye-Sun;Chung, Hee-Jeong
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.282-290
    • /
    • 2006
  • In vertically overlaid cellular systems, a temporary traffic concentration can occur in a hot-spot area, and this adversely affects overall system capacity. In this paper, we develop an adaptive hot-spot operating scheme (AHOS) to mitigate the negative effects from the nonuniform distribution of user location and the variation in the mixture of QoS requirements in orthogonal frequency division multiple access downlink systems. Here, the base station in a macrocell can control the operation of picocells within the cell, and turns them on or off according to the system overload estimation function. In order to determine whether the set of picocells is turned on or off, we define an AHOS gain index that describes the number of subcarriers saved to the macrocell by turning a specific picocell on. For initiating the picocell OFF procedure, we utilize the changes in traffic concentration and co-channel interference to the neighboring cells. According to computer simulation, the AHOS has been proved to have maximize system throughput while maintaining a very low QoS outage probability under various system scenarios in both a single-cell and multi-cell environments.

  • PDF

Bandwidth Reservation scheme Using Mobile Tracking (이동체 추적을 이용한 대역폭 예약 기법)

  • 정혜명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10A
    • /
    • pp.1512-1520
    • /
    • 2000
  • The wireless communication network is evolving toward IMT-2000 for providing various multimedia services. In order to accomplish this ultimate goal the effective schemes are required which can dynamically utilize the limited wireless resources based on different traffic characteristics of various services. This paper proposes a novel bandwidth allocation and call admission control scheme to transmit multimedia traffic based on the bandwidth reservation procedure using direction estimation in the IMT-2000 This scheme estimates the position of mobiles based on the mliticriteria decision making in which uncertain parameters such as RSS(Received Signal Strength), the distance between mobile and base station the moving direction and the previous location are participated in the decision process using aggregation function in fuzzy set theory. Its effectiveness is investigated by simulation.

  • PDF

A Real-Time Expert System for the High Reliability of Railway Electronic Interlocking System (철도 전자연동장치의 고신뢰화를 위한 실시간 전문가 시스템)

  • Go, Yun-Seok;Choe, In-Seon;Gwon, Yong-Hun
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.11
    • /
    • pp.1457-1463
    • /
    • 1999
  • This paper develops an real-time expert system for the electronic interlocking system. it obtains the higher safety by determining the railway interlocking strategy in order to prevent trains from colliding, and derailing in the viewpoint of veteran expert, considering the situation of station in real-time. The expert system determines the real-time interlocking strategy by confirming the interlocking relationships among signal facilities based on the interlocking knowledge base from input information such as signal, points, and it is implemented as the rule-based system in order to represented accurately and effectively the interlocking relationships. Especially in case of emergency the function which determines the rational route coordinating with IIKBAG on the workstation is designed in order to minimize the spreading effect. It is implemented in C computer language for the purpose of the implementation of the inference engine using the dynamic memory allocation technique, the build and interface of the station structure database. And, the validity of the built expert system is proved by simulating the diversity cases which may occur in the real system for the typical station model.

  • PDF

Fuzzy Quantization and Rate Control for Very Low Bit­rate Video Coder (초저전송율 동영상 부호기를 위한 퍼지 양자화 및 율 제어에 관한 연구)

  • 양근호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1684-1690
    • /
    • 2003
  • In this paper, we proposed a fuzzy controller for the evaluation of the quantization Parameters in the H.263 coder to optimize the subjective quality of each coded frame, keeping the transmission rate constant. We adopted the Mamdani method for fuzzification and the centroid method for defuzzification. The energy and entropy are correlated to features of the HVS in spatial domain, while motion vectors are used to estimate the temporal characteristics of the signal. And then, the fuzzy inputs adapted the variance and the entropy in spatial domain, and the motion vector in temporal domain. We induced the fuzzy membership function and decided the fuzzy relevance to be compatible in visual characteristics. And then, we designed FAM banks. The fuzzy technology has been applied to a practical video compression. This results is obtained an effective rate control technique, an optimum bit allocation and a high subjective quality using fuzzy quantization.

GDSS for the Mobile Internet

  • Cho, Yoon-Ho;Choi, Sang-Hyun;Kim, Jae-Kyeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.283-291
    • /
    • 2005
  • The development of mobile applications is fast in recent years. However, nearly all applications are for messaging, financial, locating services based on simple interactions with mobile users because of the limited screen size, narrow network bandwidth, and low computing power. Processing an algorithm for supporting a group decision process on mobile devices becomes impossible. In this paper, we introduce the mobile-oriented simple interactive procedure for support a group decision making process. The interactive procedure is developed for multiple objective linear programming problems to help the group select a compromising solution in the mobile Internet environment. Our procedure lessens the burden of group decision makers, which is one of necessary conditions of the mobile environment. Only the partial weak order preferences of variables and objectives from group decision makers are enough for searching the best compromising solution. The methodology is designed to avoid any assumption about the shape or existence of the decision makers's utility function. For the purpose of the experimental study of the procedure, we developed a group decision support system in the mobile Internet environment, MOBIGSS and applied to an allocation problem of investor assets.

  • PDF

A Study on the Target Search Logic in the ASW Decision Support System (대잠전 의사결정지원 시스템에서 표적 탐색 논리 연구)

  • Cho, Sung-Jin;Choi, Bong-Wan;Jeon, Jae-Hyo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.824-830
    • /
    • 2010
  • It is not easy job to find a underwater target using sonar system in the ASW operations. Many researchers have tried to solve anti-submarine search problem aiming to maximize the probability of detection under limited searching conditions. The classical 'Search Theory' deals with search allocation problem and search path problem. In both problems, the main issue is to prioritize the searching cells in a searching area. The number of possible searching path that is combination of the consecutive searching cells increases rapidly by exponential function in the case that the number of searching cells or searchers increases. The more searching path we consider, the longer time we calculate. In this study, an effective algorithm that can maximize the probability of detection in shorter computation time is presented. We show the presented algorithm is quicker method than previous algorithms to solve search problem through the comparison of the CPU computation time.

Dynamic Allocation of ATIM Window Size using Kalman Filter in IEEE 802.11 DCF (IEEE 802.11 DCF 에서 칼만 필터를 통한 ATIM 창 크기의 동적 할당 기법)

  • Lee, Jangsu;Yoo, Seunghwan;Kim, Seungwook;Kim, Sungchun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.995-998
    • /
    • 2007
  • 무선 네트워크에서 사용되는 단말기는 이동성이라는 특징상 한정된 에너지를 사용하여 동작하게 된다. 따라서 무선 호스트에 의해 소모되는 에너지의 양을 감소시키기 위한 기술은 대단히 중요하다. 이러한 기술적 지원을 위해 IEEE 802.11 에서는 DCF (Distributed Coordination Function) 전력 절감 메카니즘을 제안하고 있다. 그런데, DCF 를 위한 IEEE 802.11 전력 절감 메카니즘에서는 ATIM 창 동안 노드들은 비콘 기간 동안 깨어 있는 상태로 있을 것인지를 결정하기 위해서 control packet 을 교환 하는데, 이러한 ATIM 창 크기는 각각의 노드들의 전력 절감에 상당한 영향을 미친다. 그래서 ATIM 창 크기를 효율적으로 할당하기 위해 DPSM 과 같은 기법들이 개발되었다. 본 논문은 ATIM 창 크기를 동적으로 증감시켜서 ATIM 창 시간동안 소모되는 에너지를 줄이도록 하였다. ATIM 창 크기를 동적으로 할당하기 위하여 통계적 예측 기법인 칼만 필터를 도입하여 예측시스템을 구축하였으며, 이 예측 시스템을 통해 다음 상태에서 적용할 ATIM 창 크기를 예측하여 동적으로 할당하도록 하였다. 실험 결과 네트워크 생존 시간을 28.6% 증가시켰고, ATIM 창 크기 예측값의 오차는 4.42%로 나타났다.

  • PDF

Signal Modulation Techniques and Performance Analysis for KPS Signal Design

  • Shin, Heon;Han, Kahee;Joo, Jung-Min;Won, Jong-Hoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.4
    • /
    • pp.293-304
    • /
    • 2020
  • In this paper, various modulation techniques, including the legacy Global Navigation Satellite System (GNSS) signal modulation techniques, are introduced and the spectral characteristics and correlation characteristics of signals with various modulation techniques are analyzed based on numerical simulation. With the development of various GNSS services, the limited frequency band has become increasingly saturated, and issues of interoperability and compatibility have emerged in the new GNSS design. Since the efficient allocation of frequency resources is closely related to spectrum design, modulation techniques are one of the important signal design parameters of new signal design. Signal modulation techniques are closely related to various figure of merits (FoMs) as well as spectrum characteristic, and in some cases there is a complicated trade-off between FoMs. Thus, the FoMs associated with modulation technology should be analyzed and the best signal candidates should be chosen carefully via the trade-off analysis for FoMs. In this paper, we define the modulation technique based on Phase Shift Keying (PSK), Binary Offset Carrier (BOC) and Continuous Phase Modulation (CPM) for the design of KPS signals, and the FoMs of signals in terms of spectrum and correlation function are evaluated. Signals with various modulation techniques are implemented through a numerical simulation, and the relevant FoMs are analyzed.

Modified Deep Reinforcement Learning Agent for Dynamic Resource Placement in IoT Network Slicing

  • Ros, Seyha;Tam, Prohim;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.17-23
    • /
    • 2022
  • Network slicing is a promising paradigm and significant evolution for adjusting the heterogeneous services based on different requirements by placing dynamic virtual network functions (VNF) forwarding graph (VNFFG) and orchestrating service function chaining (SFC) based on criticalities of Quality of Service (QoS) classes. In system architecture, software-defined networks (SDN), network functions virtualization (NFV), and edge computing are used to provide resourceful data view, configurable virtual resources, and control interfaces for developing the modified deep reinforcement learning agent (MDRL-A). In this paper, task requests, tolerable delays, and required resources are differentiated for input state observations to identify the non-critical/critical classes, since each user equipment can execute different QoS application services. We design intelligent slicing for handing the cross-domain resource with MDRL-A in solving network problems and eliminating resource usage. The agent interacts with controllers and orchestrators to manage the flow rule installation and physical resource allocation in NFV infrastructure (NFVI) with the proposed formulation of completion time and criticality criteria. Simulation is conducted in SDN/NFV environment and capturing the QoS performances between conventional and MDRL-A approaches.

Resource-constrained Scheduling at Different Project Sizes

  • Lazari, Vasiliki;Chassiakos, Athanasios;Karatzas, Stylianos
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.196-203
    • /
    • 2022
  • The resource constrained scheduling problem (RCSP) constitutes one of the most challenging problems in Project Management, as it combines multiple parameters, contradicting objectives (project completion within certain deadlines, resource allocation within resource availability margins and with reduced fluctuations), strict constraints (precedence constraints between activities), while its complexity grows with the increase in the number of activities being executed. Due to the large solution space size, this work investigates the application of Genetic Algorithms to approximate the optimal resource alolocation and obtain optimal trade-offs between different project goals. This analysis uses the cost of exceeding the daily resource availability, the cost from the day-by-day resource movement in and out of the site and the cost for using resources day-by-day, to form the objective cost function. The model is applied in different case studies: 1 project consisting of 10 activities, 4 repetitive projects consisting of 40 activities in total and 16 repetitive projects consisting of 160 activities in total, in order to evaluate the effectiveness of the algorithm in different-size solution spaces and under alternative optimization criteria by examining the quality of the solution and the required computational time. The case studies 2 & 3 have been developed by building upon the recurrence of the unit/sub-project (10 activities), meaning that the initial problem is multiplied four and sixteen times respectively. The evaluation results indicate that the proposed model can efficiently provide reliable solutions with respect to the individual goals assigned in every case study regardless of the project scale.

  • PDF