• Title/Summary/Keyword: Location & Allocation Problem

Search Result 83, Processing Time 0.029 seconds

A New Resource Allocation Technique to Mitigate Co-Channel Interference in Cellular OFDMA Systems (OFDMA 시스템에서 셀 외곽지역의 동일 채널간섭 최소화를 위한 자원할당 기법)

  • Kim Dai-Kwan;Kim Jong-Kyung;Seo Jong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6A
    • /
    • pp.603-610
    • /
    • 2006
  • This paper considers the problem of mitigating CCI(Co-channel Interference) in cellular OFDMA downlink systems. The users in the cell-edge area suffer from large CCIs, and their SINR requirements are hard to be maintained. To guarantee their QoS, we propose a new exclusive sub-carrier allocation and power control algorithm. The performance of the proposed two-step algorithm is simulated in SUI-A path-loss model, and it is compared with that of the conventional algorithm. The simulation results show that the data transmission rate in the cell-edge area was increased by 600Kbps within the same power constraint. The results indicate that with proposed algorithm, the data rate stability can be achieved independently of the user location in the cell.

Optimization Algorithm of Gantry Route Problem for Odd-type Surface Mount Device (이형 부품 표면실장기에 대한 겐트리 경로 문제의 최적 알고리즘)

  • Jeong, Jaewook;Tae, Hyunchul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.67-75
    • /
    • 2020
  • This paper proposes a methodology for gantry route optimization in order to maximize the productivity of a odd-type surface mount device (SMD). A odd-type SMD is a machine that uses a gantry to mount electronic components on the placement point of a printed circuit board (PCB). The gantry needs a nozzle to move its electronic components. There is a suitability between the nozzle and the electronic component, and the mounting speed varies depending on the suitability. When it is difficult for the nozzle to adsorb electronic components, nozzle exchange is performed, and nozzle exchange takes a certain amount of time. The gantry route optimization problem is divided into the mounting order on PCB and the allocation of nozzles and electronic components to the gantry. Nozzle and electronic component allocation minimized the time incurred by nozzle exchange and nozzle-to-electronic component compatibility by using an mixed integer programming method. Sequence of mounting points on PCB minimizes travel time by using the branch-and-price method. Experimental data was made by randomly picking the location of the mounting point on a PCB of 800mm in width and 800mm in length. The number of mounting points is divided into 25, 50, 75, and 100, and experiments are conducted according to the number of types of electronic components, number of nozzle types, and suitability between nozzles and electronic components, respectively. Because the experimental data are random, the calculation time is not constant, but it is confirmed that the gantry route is found within a reasonable time.

GSM User Authentication Protocol with Property of Strong Entity Authentication (강력한 개체인증 특성을 가지는 GSM 사용자 인증 프로토콜)

  • Park, Mi-Og;Kim, Sang-Geun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1314-1321
    • /
    • 2006
  • GSM(Global System for Mobile Communications) is a Pan-European digital cellular mobile system supporting widespread roaming and personal communication services in a worldwide wireless communication network. In suite of providing security capability, however, there are some problems like user authentication in GSM. In this paper, we propose the enhanced authentication mechanism to verify strongly each network entity to so]ye user authentication problem and support anonymity for user privacy.

  • PDF

Designing Refuse Collection Networks under Capacity and Maximum Allowable Distance Constraints

  • Kim, Ji-Su;Lee, Dong-Ho
    • Management Science and Financial Engineering
    • /
    • v.19 no.2
    • /
    • pp.19-29
    • /
    • 2013
  • Refuse collection network design, one of major decision problems in reverse logistics, is the problem of locating collection points and allocating refuses at demand points to the opened collection points. As an extension of the previous models, we consider capacity and maximum allowable distance constraints at each collection point. In particular, the maximum allowable distance constraint is additionally considered to avoid the impractical solutions in which collection points are located too closely. Also, the additional distance constraint represents the physical distance limit between collection and demand points. The objective is to minimize the sum of fixed costs to open collection points and variable costs to transport refuses from demand to collection points. After formulating the problem as an integer programming model, we suggest an optimal branch and bound algorithm that generates all feasible solutions by a simultaneous location and allocation method and curtails the dominated ones using the lower bounds developed using the relaxation technique. Also, due to the limited applications of the optimal algorithm, we suggest two heuristics. To test the performances of the algorithms, computational experiments were done on a number of test instances, and the results are reported.

Modification of User Authentication Protocol for Partial Anonymity in the GSM System (GSM 시스템에서 부분적 익명성을 위한 사용자인증 프로토콜의 변형)

  • Park Mi-Og;Kim Sang-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.645-650
    • /
    • 2006
  • GSM(Global System for Mobile communications) provides mobile users with portability and convenience as the most popular standard for mobile phones in the world. However, GSM system has the problem that can't normally authenticate a user by the exposure of IMSI(International Mobile Subscriber Identity) of Ms(Mobile station) during the user authentication procedure. In this paper, we propose secure user authentication by preventing the exposure if IMSI via transfer the encrypted IMSI from the HLR(Home Location Register) and making the only network entities verified from the HLR use the IMSI value, as the modified mechanism based on the original user authentication protocol to solve this authentication problem. Also the proposed mechanism provides fast user authentication without changing the architecture between new VLR and old VLR in the original GSM user authentication protocol as well as user's anonymity by using a temporary ID.

Analysis of Shelter Service Areas According to Walking Speed Using Network Analysis (네트워크 분석을 이용한 보행속도에 따른 대피소 서비스 영역 분석)

  • Park, Jae Kook;Kim, Dong Moon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.4
    • /
    • pp.37-44
    • /
    • 2012
  • There are approximately 25,724 shelters to which people can be quickly evacuated for safety in case of emergency across the nation, and Seoul has about 3,870 shelters. Those nationwide shelters are located at a point within a five-minute radius for quick evacuation. Seoul's shelter capacity can hold 285% of its population. The problem is, however, that there is no knowing how many shelters are reachable within five minutes when considering walking speed according to individual differences in age, height, health state, and physical condition. In addition, available service areas become different according to the spatial allocation and distribution of shelters with possible vulnerable points. This study thus defined the pedestrian walking speed at 1m/s, 1.3m/s, and 2m/s by reviewing previous studies and conducted network analysis of the Location Allocation Model with the designated shelters and road networks in Seoul. The results identified the shelter service and vulnerable areas in each administrative district of Seoul according to walking speeds. It was analyzed that the vulnerable areas in which the elderly could not reach a shelter were more than twice as big as those of adult men and women with a fast walking speed.

ATM Network Resource Mangement and Control via Virtual Path Reconfiguration (가상 경로 재구성을 통한 ATM망 자원 관리 및 제어)

  • 임재진;김종권
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.11
    • /
    • pp.2199-2214
    • /
    • 1994
  • In order to sufficiently utilize the potential effectiveness of ATM networks, systematic and effective network management and control systems must be employed. In addition to network design, planning, and call routing techniques used in traditional circuit-switched networks. ATM networks can provide logical VP(Virtual Path) reconfiguration capabilities which can adapt to changes in the network environment. With a proper application of the VP reconfiguration technique, ATM networks can reduce the overhead of frequent network redesign and the overhead of call routing processing. However, ATM VP reconfiguration is a very complex and difficult problem which consists of many facets of optimization subproblems such as VP routing. VP sizing, VP terminating point location and VC routing. Most previous research on the ATM logical network reconfiguration problem dealt with the subset of the problem. This paper mathematically formulates the ATM network reconfiguration problem completely considering all subproblems. Since it is very difficult to derive the optimal solution of the formulated problem, we develop a heuristic method based on a Max min bandwidth allocation principle. We show the feasibility of the proposed heuristic method with a simple example.

  • PDF

A Study on the Storage Allocation of Container in Automated Container Terminals (자동화 컨테이너터미널에서 컨테이너의 장치 위치 결정에 관한 연구)

  • Jung Bong Jin;Choi Hyung Rim;Park Nam Kyu;Kwon Rae Kyoung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.11a
    • /
    • pp.281-286
    • /
    • 2004
  • It's important to operate the yard for improving to the productivity in container terminal effectively. Because the automated container terminal(ACT) has storage yard of automation and horizon, it's character is different from conventional terminal. As the automation yard in ACT is operated by the automated equipments, it needs to an efficient storage plan which is connected the automated equipment, the external truck, the shipment etc.. Hut the traditional method of storage plan is the space assignment problem. The efficiency of yard decreases and it is brought about increase of shipment time, because real-time automated equipments and present yard status is not reflected in. In order to solve this problems, we propose the algorithm for real-time storage location of container considering shipment plan, yard status and the state of ATC.

  • PDF

Mobility Support Scheme Based on Machine Learning in Industrial Wireless Sensor Network (산업용 무선 센서 네트워크에서의 기계학습 기반 이동성 지원 방안)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Jung, Kwansoo;Oh, Seungmin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.256-264
    • /
    • 2020
  • Industrial Wireless Sensor Networks (IWSNs) is exploited to achieve various objectives such as improving productivity and reducing cost in the diversity of industrial application, and it has requirements such as low-delay and high reliability packet transmission. To accomplish the requirement, the network manager performs graph construction and resource allocation about network topology, and determines the transmission cycle and path of each node in advance. However, this network management scheme cannot treat mobile devices that cause continuous topology changes because graph reconstruction and resource reallocation should be performed as network topology changes. That is, despite the growing need of mobile devices in many industries, existing scheme cannot adequately respond to path failure caused by movement of mobile device and packet loss in the process of path recovery. To solve this problem, a network management scheme is required to prevent packet loss caused by mobile devices. Thus, we analyse the location and movement cycle of mobile devices over time using machine learning for predicting the mobility pattern. In the proposed scheme, the network manager could prevent the problems caused by mobile devices through performing graph construction and resource allocation for the predicted network topology based on the movement pattern. Performance evaluation results show a prediction rate of about 86% compared with actual movement pattern, and a higher packet delivery ratio and a lower resource share compared to existing scheme.

A Block-based Uniformly Distributed Random Node Arrangement Method Enabling to Wirelessly Link Neighbor Nodes within the Communication Range in Free 3-Dimensional Network Spaces (장애물이 없는 3차원 네트워크 공간에서 통신 범위 내에 무선 링크가 가능한 블록 기반의 균등 분포 무작위 노드 배치 방법)

  • Lim, DongHyun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1404-1415
    • /
    • 2022
  • The 2-dimensional arrangement method of nodes has been used in most of RF (Radio Frequency) based communication network simulations. However, this method is not useful for the an none-obstacle 3-dimensional space networks in which the propagation delay speed in communication is very slow and, moreover, the values of performance factors such as the communication speed and the error rate change on the depth of node. Such a typical example is an underwater communication network. The 2-dimensional arrangement method is also not useful for the RF based network like some WSNs (Wireless Sensor Networks), IBSs (Intelligent Building Systems), or smart homes, in which the distance between nodes is short or some of nodes can be arranged overlapping with their different heights in similar planar location. In such cases, the 2-dimensional network simulation results are highly inaccurate and unbelievable so that they lead to user's erroneous predictions and judgments. For these reasons, in this paper, we propose a method to place uniformly and randomly communication nodes in 3-dimensional network space, making the wireless link with neighbor node possible. In this method, based on the communication rage of the node, blocks are generated to construct the 3-dimensional network and a node per one block is generated and placed within a block area. In this paper, we also introduce an algorithm based on this method and we show the performance results and evaluations on the average time in a node generation and arrangement, and the arrangement time and scatter-plotted visualization time of all nodes according to the number of them. In addition, comparison with previous studies is conducted. As a result of evaluating the performance of the algorithm, it was found that the processing time of the algorithm was proportional to the number of nodes to be created, and the average generation time of one node was between 0.238 and 0.28 us. ultimately, There is no problem even if a simulation network with a large number of nodes is created, so it can be sufficiently introduced at the time of simulation.