• Title/Summary/Keyword: Utility Network

Search Result 431, Processing Time 0.023 seconds

Backhaul transmission scheme for UAV based on improved Nash equilibrium strategy

  • Liu, Lishan;Wu, Duanpo;Jin, Xinyu;Cen, Shuwei;Dong, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2666-2687
    • /
    • 2022
  • As a new alternative communication scheme in 5G, unmanned aerial vehicle (UAV) is used as a relay in the remote base station (BS) for assistant communication. In order to ameliorate the quality of the backhaul link, a UAV backhaul transmission scheme based on improved Nash equilibrium (NE) strategy is proposed. First, the capacity of air-to-ground (A2G) channel by the link preprocess is maximized. Then, the maximum utility function of each UAV is used as the basis of obtaining NE point according to the backhaul channel and the backhaul congestion. Finally, the improved NE strategy is applied in multiple iterations until maximum utility functions of all the UAVs are reached, and the UAVs which are rejected by air-to-air (A2A) link during the process would participate in the source recovery process to construct a multi-hop backhaul network. Simulation results show that average effective backhaul rate, minimum effective backhaul rate increases by 10%, 28.5% respectively in ideal A2G channel, and 11.8%, 42.3% respectively in fading channel, comparing to pure NE strategy. And the average number of iterations is decreased by 5%.

BandBlock: Bandwidth allocation in blockchain-empowered UAV-based heterogeneous networks

  • Kuna Venkateswarararao;Pratik Kumar;Akash Solanki;Pravati Swain
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.945-954
    • /
    • 2022
  • The 5G mobile network is promising to handle the dynamic traffic demands of user equipment (UE). Unmanned aerial vehicles (UAVs) equipped with wireless transceivers can act as flying base stations in heterogeneous networks to ensure the quality of service of UE. However, it is challenging to efficiently allocate limited bandwidth to UE due to dynamic traffic demands and low network coverage. In this study, a blockchain-enabled bandwidth allocation framework is proposed for secure bandwidth trading. Furthermore, the proposed framework is based on the Cournot oligopoly game theoretical model to provide the optimal solution; that is, bandwidth is allocated to different UE based on the available bandwidth at UAV-assisted-based stations (UBSs) with optimal profit. The Cournot oligopoly game is performed between UBSs and cellular base stations (CBSs). Utility functions for both UBSs and CBSs are introduced on the basis of the available bandwidth, total demand of CSBs, and cost of providing cellular services. The proposed framework prevents security attacks and maximizes the utility functions of UBSs and CBSs.

A Mechanism for Configurable Network Service Chaining and Its Implementation

  • Xiong, Gang;Hu, Yuxiang;Lan, Julong;Cheng, Guozhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3701-3727
    • /
    • 2016
  • Recently Service Function Chaining (SFC) is promising to innovate the network service mode in modern networks. However, a feasible implementation of SFC is still difficult due to the need to achieve functional equivalence with traditional modes without sacrificing performance or increasing network complexity. In this paper, we present a configurable network service chaining (CNSC) mechanism to provide services for network traffics in a flexible and optimal way. Firstly, we formulate the problem of network service chaining and design an effective service chain construction framework based on integrating software-defined networking (SDN) with network functions virtualization (NFV). Then, we model the service path computation problem as an integer liner optimization problem and propose an algorithm named SPCM to cooperatively combine service function instances with a network utility maximum policy. In the procedure of SPCM, we achieve the service node mapping by defining a service capacity matrix for substrate nodes, and work out the optimal link mapping policies with segment routing. Finally, the simulation results indicate that the average request acceptance ratio and resources utilization ratio can reach above 85% and 75% by our SPCM algorithm, respectively. Upon the prototype system, it is demonstrated that CNSC outperforms other approaches and can provide flexible and scalable network services.

Distributed Uplink Resource Allocation in Multi-Cell Wireless Data Networks

  • Ko, Soo-Min;Kwon, Ho-Joong;Lee, Byeong-Gi
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.449-458
    • /
    • 2010
  • In this paper, we present a distributed resource allocation algorithm for multi-cell uplink systems that increases the weighted sum of the average data rates over the entire network under the average transmit power constraint of each mobile station. For the distributed operation, we arrange each base station (BS) to allocate the resource such that its own utility gets maximized in a noncooperative way. We define the utility such that it incorporates both the weighted sum of the average rates in each cell and the induced interference to other cells, which helps to instigate implicit cooperation among the cells. Since the data rates of different cells are coupled through inter-cell interferences, the resource allocation taken by each BS evolves over iterations. We establish that the resource allocation converges to a unique fixed point under reasonable assumptions. We demonstrate through computer simulations that the proposed algorithm can improve the weighted sum of the average rates substantially without requiring any coordination among the base stations.

Biotechnological improvement of lignocellulosic feedstock for enhanced biofuel productivity and processing

  • Ko, Jae-Heung;Kim, Hyun-Tae;Han, Kyung-Hwan
    • Plant Biotechnology Reports
    • /
    • v.5 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • Secondary walls have recently drawn research interest as a primary source of sugars for liquid biofuel production. Secondary walls are composed of a complex mixture of the structural polymers cellulose, hemicellulose, and lignin. A matrix of hemicellulose and lignin surrounds the cellulose component of the plant's cell wall in order to protect the cell from enzymatic attacks. Such resistance, along with the variability seen in the proportions of the major components of the mixture, presents process design and operating challenges to the bioconversion of lignocellulosic biomass to fuel. Expanding bioenergy production to the commercial scale will require a significant improvement in the growth of feedstock as well as in its quality. Plant biotechnology offers an efficient means to create "targeted" changes in the chemical and physical properties of the resulting biomass through pathway-specific manipulation of metabolisms. The successful use of the genetic engineering approach largely depends on the development of two enabling tools: (1) the discovery of regulatory genes involved in key pathways that determine the quantity and quality of the biomass, and (2) utility promoters that can drive the expression of the introduced genes in a highly controlled manner spatially and/or temporally. In this review, we summarize the current understanding of the transcriptional regulatory network that controls secondary wall biosynthesis and discuss experimental approaches to developing-xylem-specific utility promoters.

A Study on the Simulation Model of PV Generation System for its Application to Real Power System (계통 연계형 태양광 발전 시스템의 실계통 적용을 위한 시뮬레이션 모델에 관한 연구)

  • Lee, Kye-Byung;Son, Kwang-Myung;Jeon, In-Soo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.6
    • /
    • pp.70-78
    • /
    • 2008
  • This paper deals with the simulation modeling of PV generation system for its application to utility distribution network PSCAD/EMIDC simulation model is developed for use in studying the effect of the PV generation to the distribution system. Simulation results show that the addition of the PV system improves the voltage profile of the area by decreasing the power flow from the utility substation. Case studies also show that power quality at the load side is also improved via voltage compensation at the load bus.

Multiple Path Based Vehicle Routing in Dynamic and Stochastic Transportation Networks

  • Park, Dong-joo
    • Proceedings of the KOR-KST Conference
    • /
    • 2000.02a
    • /
    • pp.25-47
    • /
    • 2000
  • In route guidance systems fastest-path routing has typically been adopted because of its simplicity. However, empirical studies on route choice behavior have shown that drivers use numerous criteria in choosing a route. The objective of this study is to develop computationally efficient algorithms for identifying a manageable subset of the nondominated (i.e. Pareto optimal) paths for real-time vehicle routing which reflect the drivers' preferences and route choice behaviors. We propose two pruning algorithms that reduce the search area based on a context-dependent linear utility function and thus reduce the computation time. The basic notion of the proposed approach is that ⅰ) enumerating all nondominated paths is computationally too expensive, ⅱ) obtaining a stable mathematical representation of the drivers' utility function is theoretically difficult and impractical, and ⅲ) obtaining optimal path given a nonlinear utility function is a NP-hard problem. Consequently, a heuristic two-stage strategy which identifies multiple routes and then select the near-optimal path may be effective and practical. As the first stage, we utilize the relaxation based pruning technique based on an entropy model to recognize and discard most of the nondominated paths that do not reflect the drivers' preference and/or the context-dependency of the preference. In addition, to make sure that paths identified are dissimilar in terms of links used, the number of shared links between routes is limited. We test the proposed algorithms in a large real-life traffic network and show that the algorithms reduce CPU time significantly compared with conventional multi-criteria shortest path algorithms while the attributes of the routes identified reflect drivers' preferences and generic route choice behaviors well.

  • PDF

Hierarchical Resource Management Framework and Multi-hop Task Scheduling Decision for Resource-Constrained VEC Networks

  • Hu, Xi;Zhao, Yicheng;Huang, Yang;Zhu, Chen;Yao, Jun;Fang, Nana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3638-3657
    • /
    • 2022
  • In urban vehicular edge computing (VEC) environments, one edge server always serves many task requests in its coverage which results in the resource-constrained problem. To resolve the problem and improve system utilization, we first design a general hierarchical resource management framework based on typical VEC network structures. Following the framework, a specific interacting protocol is also designed for our decision algorithm. Secondly, a greedy bidding-based multi-hop task scheduling decision algorithm is proposed to realize effective task scheduling in resource-constrained VEC environments. In this algorithm, the goal of maximizing system utility is modeled as an optimization problem with the constraints of task deadlines and available computing resources. Then, an auction mechanism named greedy bidding is used to match task requests to edge servers in the case of multiple hops to maximize the system utility. Simulation results show that our proposal can maximize the number of tasks served in resource constrained VEC networks and improve the system utility.

An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks

  • Jun Yan;Jiawang Chen;Yihui Zhou;Zhenqiang Wu;Laifeng Lu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.147-169
    • /
    • 2024
  • In pace with the development of network technology at lightning speed, social networks have been extensively applied in our lives. However, as social networks retain a large number of users' sensitive information, the openness of this information makes social networks vulnerable to attacks by malicious attackers. To preserve the link privacy of individuals in social networks, an uncertain graph method based on node random response is devised, which satisfies differential privacy while maintaining expected data utility. In this method, to achieve privacy preserving, the random response is applied on nodes to achieve edge modification on an original graph and node differential privacy is introduced to inject uncertainty on the edges. Simultaneously, to keep data utility, a divide and conquer strategy is adopted to decompose the original graph into many sub-graphs and each sub-graph is dealt with separately. In particular, only some larger sub-graphs selected by the exponent mechanism are modified, which further reduces the perturbation to the original graph. The presented method is proven to satisfy differential privacy. The performances of experiments demonstrate that this uncertain graph method can effectively provide a strict privacy guarantee and maintain data utility.

A Study on the ATM Switch Structure Using the GAMMA Network (GAMMA 네트워크를 이용한 ATM 스위치 구조에 관한 연구)

  • 김근배;황성호;송주빈;이종현;임해진;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.11
    • /
    • pp.1143-1153
    • /
    • 1991
  • In this paper, we proposed a new ATM switch structure which is based on the GAMMA network, proving multipath between an input and an output port. The size of the proposed new ATM switch will be smaller than the switches based on the BANYAN network, which includes the Sorting network to resolve the blocking in the switch fabric. Also, the validity and the utility of the proposed switch structure is verified through a simulation method.

  • PDF