• Title/Summary/Keyword: Service scenarios

Search Result 529, Processing Time 0.025 seconds

Genetic Algorithm based Methodology for an Single-Hop Metro WDM Networks

  • Yang, Hyo-Sik;Kim, Sung-Il;Shin, Wee-Jae
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.306-309
    • /
    • 2005
  • We consider the multi-objective optimization of a multi-service arrayed-waveguide grating-based single-hop metro WDM network with the two conflicting objectives of maximizing throughput while minimizing delay. We develop and evaluate a genetic algorithm based methodology for finding the optimal throughput-delay tradeoff curve, the so-called Pareto-optimal frontier. Our methodology provides the network architecture and the Medium Access Control protocol parameters that achieve the Pareto-optima in a computationally efficient manner. The numerical results obtained with our methodology provide the Pareto-optimal network planning and operation solution for a wide range of traffic scenarios. The presented methodology is applicable to other networks with a similar throughput-delay tradeoff.

  • PDF

Scenario based optimization of a container vessel with respect to its projected operating conditions

  • Wagner, Jonas;Binkowski, Eva;Bronsart, Robert
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.6 no.2
    • /
    • pp.496-506
    • /
    • 2014
  • In this paper the scenario based optimization of the bulbous bow of the KRISO Container Ship (KCS) is presented. The optimization of the parametrically modeled vessel is based on a statistically developed operational profile generated from noon-to-noon reports of a comparable 3600 TEU container vessel and specific development functions representing the growth of global economy during the vessels service time. In order to consider uncertainties, statistical fluctuations are added. An analysis of these data lead to a number of most probable upcoming operating conditions (OC) the vessel will stay in the future. According to their respective likeliness an objective function for the evaluation of the optimal design variant of the vessel is derived and implemented within the parametrical optimization workbench FRIENDSHIP Framework. In the following this evaluation is done with respect to vessel's calculated effective power based on the usage of potential flow code. The evaluation shows, that the usage of scenarios within the optimization process has a strong influence on the hull form.

SDN-Based Hierarchical Agglomerative Clustering Algorithm for Interference Mitigation in Ultra-Dense Small Cell Networks

  • Yang, Guang;Cao, Yewen;Esmailpour, Amir;Wang, Deqiang
    • ETRI Journal
    • /
    • v.40 no.2
    • /
    • pp.227-236
    • /
    • 2018
  • Ultra-dense small cell networks (UD-SCNs) have been identified as a promising scheme for next-generation wireless networks capable of meeting the ever-increasing demand for higher transmission rates and better quality of service. However, UD-SCNs will inevitably suffer from severe interference among the small cell base stations, which will lower their spectral efficiency. In this paper, we propose a software-defined networking (SDN)-based hierarchical agglomerative clustering (SDN-HAC) framework, which leverages SDN to centrally control all sub-channels in the network, and decides on cluster merging using a similarity criterion based on a suitability function. We evaluate the proposed algorithm through simulation. The obtained results show that the proposed algorithm performs well and improves system payoff by 18.19% and 436.34% when compared with the traditional network architecture algorithms and non-cooperative scenarios, respectively.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

Implementation of TV-Anytime Compliant STB for Personalized TV Services

  • Lee Hee Kyung;Yang Seung Jun;Kim Jae Gon;Hong Jin Woo
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.576-580
    • /
    • 2004
  • In this paper, we present a design and implementation of a TV-Anytime compliant STB to provide personalized content consumption according to user preferences and various terminal/network conditions. This paper mainly details with a metadata engine which consists of meta data de-multiplexing, metadata decoding, and metadata-based content browsing. For personalized content consumption, the proposed metadata engine provides the following key functionalities: advanced EPG, non-linear segment navigation wirh Tables-of-Content and/or event-based summary, automatic recommendation of user-preferred programs, and etc. The implemented STB employing the metadata engine is successfully tested with a set of service scenarios in an end-to-end broadcasting test-bed.

  • PDF

Self-adaptive IoT Software Platform for Interoperable Standard-based IoT Systems (협업가능 표준기반 IoT 시스템을 위한 자가적응 IoT 소프트웨어 플랫폼 개발)

  • Sung, Nak-Myoung;Yun, Jaeseok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.369-375
    • /
    • 2017
  • In this paper, we present a self-adaptive software platform that enables an IoT gateway to perform autonomous operation considering IoT devices connected each other in resource-constrained environments. Based on the oneM2M device software platform publicly available, we have designed an additional part, called SAS (self-adaptive software) consisting of MAM (memory-aware module), NAM (network-aware module), BAM (battery-aware module), DAM (data-aware module), and DH (decision handler). A prototype system is implemented to show the feasibility of the proposed self-adaptive software architecture. Our proposed system demonstrates that it can adaptively adjust the operation of gateway and connected devices to their resource conditions under the desired service scenarios.

Trends in 5G Radio Access Network Technologies Based on mmWave (mmWave 기반 5G RAN 기술 동향)

  • Lee, N.S.;Park, M.H.;Choi, Y.S.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.5
    • /
    • pp.85-96
    • /
    • 2017
  • The research, design, and development of wireless access technologies using the new 6 to 100GHz band mmWave are actively underway in order to address the frequency shortage problem in the sub-6GHz band and accommodate the 5G technical requirements, such as the increased transmission capacity. Technical elements to efficiently overcome the problems caused by mmWave signal characteristics, support an effective interworking with a conventional communication service, and ensure smooth mobility between mmWave base stations and existing base stations are also being investigated. This paper discusses the technical solutions for an mmWave-based 5G RAN configuration and their considerations under various operational scenarios.

Analysis on Preference Values for Reward Services of FFPs by Intention of Mileage Accumulation (항공사 마일리지 적립의도에 따른 FFPs 보상서비스 선호가치 분석)

  • Park, Kwang-Sik;Yoon, Moon-Gil
    • Korean Management Science Review
    • /
    • v.27 no.3
    • /
    • pp.149-160
    • /
    • 2010
  • This paper focuses on frequent flyer programs (FFPs), which have long been used by most airlines as a powerful marketing tool. Since the preference for FFPs reward services and the customer perceived values of mileage points differ among FFPs members, airlines should design a customer-oriented reward service based on customer preference to motivate the use of mileage points. The intention for using mileage points is affected by various kinds of attributes such as reword items, consuming mileage points for rewards and time of usage. In this paper, we focus on evaluating customer perceived values of attributes of FFPs reward services. A conjoint analysis model is applied to get the preference value of each attribute. Some empirical experiments are conducted in relation to Korean customers. From the empirical survey, the preference values of attributes are evaluated for different scenarios with respect to the number of mileage points. With the preference values of attributes, we can find several implications for airlines regarding the development of various FFPs strategies.

Development of Probabilistic Risk Analysis Model on Railroad System - Its Application to Tunnel Fire Risk Analysis (철도시스템의 확률론적 위험평가 모델 개발 연구 - 터널화재 위험도 평가에의 적용)

  • Kwak Sang Log;Wang Jong Bae;Hong Seon Ho;Kim Sang Am
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.265-270
    • /
    • 2003
  • Though the probability of tunnel fire accident is very low, but critical fatalities are expected when it occurred. In this study the effect of critical safety parameters on tunnel fire accident are examined using probabilistic technique. Fire detection time, smoke spread velocity, passenger escape velocity, flash-over time, and emergency service arrival time are considered. In order to estimate the uncertainties of input parameters Monte Carlo simulation are used, and fatalities for each assumed accident scenarios are obtained as results. For the efficiency of iterative calculation PRA(Probabilistic Risk Analysis) code is developed in this study. As a result fire detection have large effect.

  • PDF

A Study on the Development of Simulation Model for Inchon Port (인천내항을 위한 시뮬레이션 모델 개발)

  • 김동희;김봉선;이창호
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2000.05a
    • /
    • pp.339-349
    • /
    • 2000
  • Inchon Port is the second largest import-export port of Korea, and has the point at issue such as the excessive logistics cost because of the limits of handling capacity and the chronic demurrage. There are few research activities on the analysis and improvement of the whole port operation, because Inchon Port not only has the dual dock system and various facilities but also handles a various kind of cargo. The purpose of this paper is to develop the simulation program as a long-term strategic support tool, considering the dual dock system and the TU(Terminal Operation Company) system executed since March, 1997 in Inchon Port. The basic input parameters such as arrival intervals, cargo tons, service rates are analyzed and the probability density functions for these parameters are estimated. The main mechanism of simulation model is the discrete event-driven simulation and the next-event time advancing. The program is executed based on the knowledge base and database. From the simulation model, it is possible to estimate the demurrage status through analyzing various scenarios and to establish the long-term port strategic plan.

  • PDF