• Title/Summary/Keyword: dual problem

Search Result 710, Processing Time 0.029 seconds

Energy-Efficient Power Allocation for Cognitive Radio Networks with Joint Overlay and Underlay Spectrum Access Mechanism

  • Zuo, Jiakuo;Zhao, Li;Bao, Yongqiang;Zou, Cairong
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.471-479
    • /
    • 2015
  • Traditional designs of cognitive radio (CR) focus on maximizing system throughput. In this paper, we study the joint overlay and underlay power allocation problem for orthogonal frequency-division multiple access-based CR. Instead of maximizing system throughput, we aim to maximize system energy efficiency (EE), measured by a "bit per Joule" metric, while maintaining the minimal rate requirement of a given CR system, under the total power constraint of a secondary user and interference constraints of primary users. The formulated energy-efficient power allocation (EEPA) problem is nonconvex; to make it solvable, we first transform the original problem into a convex optimization problem via fractional programming, and then the Lagrange dual decomposition method is used to solve the equivalent convex optimization problem. Finally, an optimal EEPA allocation scheme is proposed. Numerical results show that the proposed method can achieve better EE performance.

A Heuristic for Dual Mode Routing with Vehicle and Drone

  • Min, Yun-Hong;Chung, Yerim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.79-84
    • /
    • 2016
  • In this paper we consider the problem of finding the triplet (S,${\pi}$,f), where $S{\subseteq}V$, ${\pi}$ is a sequence of nodes in S and $f:V{\backslash}S{\rightarrow}S$ for a given complete graph G=(V,E). In particular, there exist two costs, $c^V_{uv}$ and $c^D_{uv}$ for $(u,v){\in}E$, and the cost of triplet (S,${\pi}$,f) is defined as $\sum_{i=1}^{{\mid}S{\mid}}c^V_{{\pi}(i){\pi}(i+1)}+2$ ${\sum_{u{\in}V{\backslash}S}c^D_{uf(u)}$. This problem is motivated by the integrated routing of the vehicle and drone for urban delivery services. Since a well-known NP-complete TSP (Traveling Salesman Problem) is a special case of our problem, we cannot expect to have any polynomial-time algorithm unless P=NP. Furthermore, for practical purposes, we may not rely on time-exhaustive enumeration method such as branch-and-bound and branch-and-cut. This paper suggests the simple heuristic which is motivated by the MST (minimum spanning tree)-based approximation algorithm and neighborhood search heuristic for TSP.

Nationality Deprivation of Double Nationals in France and Securitization (프랑스 이중국적자의 국적박탈 논쟁과 안보화 (securitization))

  • Park, Sunhee
    • Journal of International Area Studies (JIAS)
    • /
    • v.22 no.1
    • /
    • pp.67-90
    • /
    • 2018
  • France has allowed a deprivation of nationality for terrorism since 1996 Law. After then, a series of law revision (1998, 2006 law and 2010, 2015-2015 reform tries) have not only linked an act of terror with nationality deprivation but also put the dual national and their deprivation at the centre of dispute. Both 2010 Immigration Law by Sarkozy and 2015-2016 constitutional amendment by Hollande had been not adopted but have combined immigrants and security issue together by firmly solidifying the relationship between dual national and terrorist. Especially in 2015-2016, the constitutional amendment that failed to be adopted has extended a state of emergency and left the nationality deprivation of dual national as controversial issue. After over 4 months of discussion, the amendment that contains a clause of a state of emergency and extension plan for nationality deprivation was abolished but the dual national issues which had been non-politicized has now become politicized, defined as security issues and finally securitized. It shows very two-stage process of securitization argued by Copenhagen school including Buzan. The importance of securitization notion by Copenhagen school lies on the fact that it scrutinizes the constructive elements of the process of securitization. The concept of securitization allows us to see the problem of the process that defines a non-politicized issue as security one by making it political matter. Applying this process of securitization into the controversy of nationality deprivation of dual nationals in France, we can find out the development of non-controversial and non-politicized dual national issues into social agenda by politicization through speech-act or announcement effect.

Efficiency Test in Possibilistic Multiobjective Linear Programming

  • Ida, Masaaki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.506-511
    • /
    • 1998
  • In this paper we consider multiobjective linear programming problems with coefficients of the objective functions specified by possibility distributions. Possibly and necessarily efficient solution sets are defined as funny solution sets whose membership grades represent possibility and necessity degrees to which a feasible solution is efficient. Considering efficiency condition and its dual condition in ordinary multiobjective linear programming problem, we propose efficiency test methods based on an extreme ray generation method. Since the proposed methods can be put in the part of a bi-section method, we can develop calculation and methods of the degree of possible and necessary efficiency for feasible solutions.

  • PDF

SECOND ORDER DUALITY IN VECTOR OPTIMIZATION OVER CONES

  • Suneja, S.K.;Sharma, Sunila;Vani, Vani
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.1_2
    • /
    • pp.251-261
    • /
    • 2008
  • In this paper second order cone convex, second order cone pseudoconvex, second order strongly cone pseudoconvex and second order cone quasiconvex functions are introduced and their interrelations are discussed. Further a MondWeir Type second order dual is associated with the Vector Minimization Problem and the weak and strong duality theorems are established under these new generalized convexity assumptions.

  • PDF

An Optimal Design of Automated Storage/Retrieval System

  • Lee, Seong-Beak;Hwang, Hark
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.13 no.2
    • /
    • pp.34-46
    • /
    • 1988
  • This paper deals with design problem of unit load automated storage/retrieval systems (AS/RS). We propose an optimal design model in which the investment and maintenance costs of AS/RS, operating under dual command model is minimized over a time horizon satisfying the warehouse dimensional constraints. The model is formulated as an integer nonlinear program and an algorithm is proposed to find an optimum solution. The valididty of the solution algorithm is illustrated through an example.

  • PDF

On the Implementation of an Optimal Basis Identification Procedure for Interior Point Method (내부점 선형계획법에서의 최적기저 추출방법의 구현)

  • 임성묵;박순달
    • Korean Management Science Review
    • /
    • v.17 no.2
    • /
    • pp.1-12
    • /
    • 2000
  • In this study, we deals with the implementation of an optimal basis identification procedure for interior point methods. Our implementation is based on Megiddo’s strongly polynomial algorithm applied to Andersen and Ye’s approximate LP construction. Several techniques are explained such as the use of effective indicator for obtaining optimal partition when constructing the approximate LP, the efficient implementation of the problem reduction technique proposed by Andersen, the crashing procedure needed for fast dual phase of Megiddo’s algorithm and the construction of the stable initial basis. By experimental comparison, we show that our implementation is superior to the crossover scheme implementation.

  • PDF

L-SHAPED ALGORITHM FOR TWO STAGE PROBLEMS OF STOCHASTIC CONVEX PROGRAMMING

  • Tang, Hengyong;Zhao, Yufang
    • Journal of applied mathematics & informatics
    • /
    • v.13 no.1_2
    • /
    • pp.261-275
    • /
    • 2003
  • In this paper we study two stage problems of stochastic convex programming. Solving the problems is very hard. A L-shaped method for it is given. The implement of the algorithm is simple, so less computation work is needed. The result of computation shows that the algorithm is effective.

Token Allocation Algorithm for Fault Tolerant in Hard Real-Time Multiprocessor Systems (경성 실시간 멀티프로세서 환경에서 고장허용을 위한 토큰할당 알고리즘)

  • 최장홍;이승룡
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.430-433
    • /
    • 1999
  • Woo[8]proposed dual-token based fault-tolerant scheduling algorithm in multiprocessor environment for resolving the problem of old systems that have a central dispatcher processor. However, this algorithm does not present token allocation algorithm in detail when central dispatcher processor has failed. In this paper, we propose a fault detection algorithm and processor selection algorithm for token allocation when central dispatcher processor has failed.

  • PDF

A Design on Novel Architecture Programmable Frequency divider for Integer-N Frequency Synthesizer (Integer-N 주파수 합성기를 위한 새로운 구조의 프로그램어블 주파수 분주기 설계)

  • 김태엽;경영자;이광희;손상희
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.279-282
    • /
    • 1999
  • Frequency divider selects the channel of the frequency synthesizer. General programmable divider has many flip-flops to realize all integer division value and stability problem by using dual modules prescaler. In this paper, a new architecture of programmable divider is proposed and designed to improve these problems. The proposed programmable divider has only thirteen flip-flops. The programmable divider is designed by 0.65${\mu}{\textrm}{m}$ CMOS technology and HSPICE. Operating frequency of the programmable divider is 200MHz with a 3V supply voltage.

  • PDF