• Title/Summary/Keyword: optimization scheme

Search Result 1,157, Processing Time 0.024 seconds

Mobile Tracking Based on Area Partitioning

  • Lee, Jongchan;Lee, Moonho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1709-1712
    • /
    • 2002
  • In the microcell- or picocell-based system the frequent movements of the mobile bring about excessive traffics into the networks. A mobile location estimation mechanism can facilitate both efficient resource allocation and better QoS provisioning through handoff optimization. Existing location estimation schemes consider only LOS model and have poor performance in presence of multi- path and shadowing. In this paper we study a novel scheme which can increase estimation accuracy by considering NLOS environment

  • PDF

Design Parameter Optimization of Rope Brake System far Elevator (엘리베이터용 로프 브레이크 시스템의 설계변수 최적화에 관한 연구)

  • 윤영환;최명진
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.10 no.6
    • /
    • pp.85-94
    • /
    • 2001
  • Hydraulic systems of rope brake for elevators are modelled to evaluate design parameters such as cylinder pressure, pis-ton displacement, accumulator capacity, and so on. To assure the results, experiments were performed. The analysis results agree well with the experimental results. The scheme in this study is expected to be utilized in the design of rope brake system for elevators to get design parameters and to improve the safety.

  • PDF

Understanding Channel-diversity Oriented Routing Metrics for Multicast in Wireless Mesh Networks

  • Gao, Hui;Nam, Ji-seung
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.418-420
    • /
    • 2013
  • Issues on design of routing scheme and routing metric for multicast in multi-channel multi-radio (MCMR) wireless mesh networks (WMNs) are discussed. Emphasis is placed on channel-diversity oriented routing metrics. From case study the conclusion to be drawn is that the key for design of channel-diversity oriented routing metrics is how to construct an optimization function to quantify interdependence between channel assignment and multicast routing throughput.

Intra Route Optimization Scheme in Multihoming NEMO (멀티호밍 이동네트워크 환경 내부 경로 최적화 기법)

  • Kim, KyungJoon;Song, JooSeok
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1311-1313
    • /
    • 2009
  • 이동성을 가지는 네트워크 환경이 발생하면서 이를 지원하기 위한 이동 네트워크(NEtwork MObility) 프로토콜이 설계되었다. 하지만 표준 이동 네트워크 기술은 라우팅시에 최적화된 경로를 통하여 패킷이 전달되지 못하는 문제점이 있다. 이를 해결하기 위한 이동 네트워크 경로 최적화 기법이 많이 연구되고 있는데 멀티호밍(multihoming) 환경을 고려하여 경로 최적화를 할 경우 더욱 좋은 성능을 향상을 기대할 수 있다. 이 논문에서는 멀티호밍 이동네트워크 환경에서 내부 경로 최적화를 통하여 성능을 향상시킬 수 있는 기법을 제시한다.

Object Boundary Detection Using An Optimal Data Association Scheme

  • Kim, Jung-Gu;Hong Jeong
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.27-32
    • /
    • 1996
  • In target tracking area, the data association plays an important role and has been studied extensively. In this paper, after defining the data association as a constrained optimization, we introduce a new energy function and thereby an efficient realization of neural networks. As an application, this algorithm is used to detect object boundaries in IR images. The problem is that the IR image noisy, the shape of the object is variable, and the positions of the end points are not predictable. The performance of this algorithm is discussed with the experimental results.

  • PDF

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

  • Chen, Yajun;Yi, Ming;Zhong, Zhou;Ma, Keming;Huang, Kaizhi;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4923-4939
    • /
    • 2019
  • In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

A Handover Scheme based on Partial Encrypton Method to Support Security and Rapidity of Mobile WiMAX (Mobile WiMAX에서 부분암호화 방식을 적용한 안전하고 신속한 핸드오버 기법)

  • Kim, Ki-Su;Kim, Yon-Cheol;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.67-73
    • /
    • 2011
  • Handover in high speed mobile communication service, in particulary mobile WiMAX is supported efficiency mobility to 120km/h speed. But, in order to accommodate number of user increment in a cell, wireless network is increment to microcell and picocell by allocate bandwidth and by decrease cell size. handover is occurrent and increment connection failure ratio In this result. IEEE 802.16 standard is support seamless connection through handover optimization scheme. But because authentication process is abbreviate, network weakness is exposure. In this paper, we propose handover scheme for support realtime service as VoIP, Picure communication, Streaming Data Service in order to support partially encryption method. In experiment, proposed scheme is proof which process time is increment 20% more than previous scheme.

  • PDF

Level Set Based Shape Optimization of Linear Structures using Topological Derivatives (위상민감도를 이용한 선형구조물의 레벨셋 기반 형상 최적설계)

  • Yoon, Minho;Ha, Seung-Hyun;Kim, Min-Geun;Cho, Seonho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.1
    • /
    • pp.9-16
    • /
    • 2014
  • Using a level set method and topological derivatives, a topological shape optimization method that is independent of an initial design is developed for linearly elastic structures. In the level set method, the initial domain is kept fixed and its boundary is represented by an implicit moving boundary embedded in the level set function, which facilitates to handle complicated topological shape changes. The "Hamilton-Jacobi(H-J)" equation and computationally robust numerical technique of "up-wind scheme" lead the initial implicit boundary to an optimal one according to the normal velocity field while minimizing the objective function of compliance and satisfying the constraint of allowable volume. Based on the asymptotic regularization concept, the topological derivative is considered as the limit of shape derivative as the radius of hole approaches to zero. The required velocity field to update the H-J equation is determined from the descent direction of Lagrangian derived from optimality conditions. It turns out that the initial holes are not required to get the optimal result since the developed method can create holes whenever and wherever necessary using indicators obtained from the topological derivatives. It is demonstrated that the proper choice of control parameters for nucleation is crucial for efficient optimization process.

Route Optimization Scheme using Routing Protocol in Nested Mobile Networks (중첩된 이동 네트워크환경에서 동적 라우팅 프로토콜을 이용한 경로 최적화 기법)

  • Kim, Eui-Kook;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1966-1975
    • /
    • 2008
  • NEMO Basic Support Protocol standardized in IETF provides the seamless communication environment to all nodes within the mobile network regardless of the network movement while the network is moving. According to the standard, when the mobile network moves outside of its home network the network can make use of the binding update message or dynamic routing protocol in order to register the mobility information into the Home Agent(HA). But because these two methods don't consider the route optimization, all packets destined to Mobile Network Nodes(MNNs) attached into the Mobile Router(MR) have to go through HAs of MRs so that they bring on the transmission delay and the waste of the bandwidth. This situation is to be worse and causes the packet fragmentation problem if MRs within the mobile network are nested. Even though there have been some researches about the route optimization to recover the problems, they have problems in the packet transmission performance side. In this paper, we propose a new scheme to improve the network performance by using a dynamic routing protocol and minimizing the number of HAs on the end-to-end path. Various performance evaluations show that the proposed mechanism gives better performance in view of the packet transmission compared to the existing schemes.

Slot-Time Optimization Scheme for Underwater Acoustic Sensor Networks (수중음향 센서네트워크를 위한 슬롯시간 최적화 기법)

  • Lee, Dongwon;Kim, Sunmyeng;Lee, Hae-Yeoun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.351-361
    • /
    • 2014
  • Compared to a terrestrial communication, the high BER(Bit Error Ratio) and low channel bandwidth are the major factor of throughput degradation due to characteristics of underwater channel. Therefore, a MAC protocol must be designed to solve this problem in UWASNs(Underwater Acoustic Sensor Networks). MAC protocols for UWASNs can be classified into two major types according to the contention scheme(Contention-free scheme and Contention-based scheme). In large scale of sensor networks, a Contention-based scheme is commonly used due to time-synchronize problem of Contention-free scheme. In the contention-based scheme, Each node contends with neighbor nodes to access network channel by using Back-off algorithm. But a Slot-Time of Back-off algorithm has long delay times which are cause of decrease network throughput. In this paper, we propose a new scheme to solve this problem. The proposed scheme uses variable Slot-Time instead of fixed Slot-Time. Each node measures propagation delay from neighbors which are used by Slot-time. Therefore, Slot-Times of each node are optimized by considering node deployment. Consequently, the wasted-time for Back-off is reduced and network throughput is improved. A new mac protocol performance in throughput and delay is assessed through NS3 and compared with existing MAC protocol(MACA-U). Finally, it was proved that the MAC protocol using the proposed scheme has better performance than existing MAC protocol as a result of comparison.