首页 > 最新文献

2013 Ninth International Conference on Computational Intelligence and Security最新文献

英文 中文
GA with Special Encoded Chromosome for FJSP with Machine Disruptions 基于特殊编码染色体的遗传算法求解机器干扰FJSP
H. Yin
Flexible job shop scheduling problem(s) (FJSP) were study and discussed in large amount. However, it is still far from a real-world manufacturing environment, in which disruptions such as machine failure must be taken into account. The goal of this paper is to create a genetic algorithm (GA) with very special chromosome encoding to handle FJSP that can adapt to disruption to reflect more closely the real-world manufacturing environment. We hope that by using just-in-time machine assignment and adapting scheduling rules, we can achieve the robustness and flexibility we desire. After detailed algorithm design and description, experiments were carried out. In the experiments, we compared our novel approach to two benchmark algorithms: a right-shifting reschedule and a prescheduled. A right-shifting reschedule repairs schedules by delaying affected operations until the disruption is over. A prescheduled works on each disruption scenario separately, treating disruptions like prescheduled downtime. Experiments showed that our approach was able to adapt to disruptions in a manner that minimized lost time than compared benchmark algorithms.
对柔性作业车间调度问题进行了大量的研究和讨论。然而,它与现实世界的制造环境仍然相去甚远,在现实世界中,必须考虑到机器故障等中断。本文的目标是创建一个具有非常特殊的染色体编码的遗传算法(GA)来处理FJSP,该算法可以适应中断,以更紧密地反映现实世界的制造环境。我们希望通过使用即时机器分配和自适应调度规则来实现我们所期望的鲁棒性和灵活性。经过详细的算法设计和描述,进行了实验。在实验中,我们将我们的新方法与两种基准算法进行了比较:右移重新调度和预先调度。右移重新安排通过延迟受影响的操作来修复计划,直到中断结束。预先安排的工作分别针对每个中断场景,将中断视为预先安排的停机时间。实验表明,与基准算法相比,我们的方法能够以最小化损失时间的方式适应中断。
{"title":"GA with Special Encoded Chromosome for FJSP with Machine Disruptions","authors":"H. Yin","doi":"10.1109/CIS.2013.70","DOIUrl":"https://doi.org/10.1109/CIS.2013.70","url":null,"abstract":"Flexible job shop scheduling problem(s) (FJSP) were study and discussed in large amount. However, it is still far from a real-world manufacturing environment, in which disruptions such as machine failure must be taken into account. The goal of this paper is to create a genetic algorithm (GA) with very special chromosome encoding to handle FJSP that can adapt to disruption to reflect more closely the real-world manufacturing environment. We hope that by using just-in-time machine assignment and adapting scheduling rules, we can achieve the robustness and flexibility we desire. After detailed algorithm design and description, experiments were carried out. In the experiments, we compared our novel approach to two benchmark algorithms: a right-shifting reschedule and a prescheduled. A right-shifting reschedule repairs schedules by delaying affected operations until the disruption is over. A prescheduled works on each disruption scenario separately, treating disruptions like prescheduled downtime. Experiments showed that our approach was able to adapt to disruptions in a manner that minimized lost time than compared benchmark algorithms.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121267890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image Restoration Combining Tikhonov with Different Order Nonconvex Nonsmooth Regularizations 结合Tikhonov与不同阶非凸非光滑正则化的图像恢复
X. Liu, Xingbao Gao, Qiufang Xue
For piecewise-smooth images with neat boundaries, Tikhonov regularization usually makes images overly smooth, and first order nonconvex nonsmooth regularizations could cause staircase artifacts. Moreover, the image boundaries may be blurred by only utilizing the second difference to reduce staircase artifacts. To overcome above drawbacks, in this paper, piecewise-smooth images with neat boundaries are restored by the GNC method based on combining Tikhonov with different order nonconvex nonsmooth regularizations. This method could both restore the smooth parts and protect the neat boundaries more efficiently. The numerical results are used to show the restored performance of the proposed method.
对于具有整齐边界的分段光滑图像,Tikhonov正则化通常使图像过于光滑,而一阶非凸非光滑正则化可能导致阶梯伪像。此外,图像边界可以通过仅利用第二个差异来模糊,以减少楼梯伪影。为了克服上述缺点,本文采用基于Tikhonov与不同阶非凸非光滑正则化相结合的GNC方法对边界整齐的分段光滑图像进行恢复。该方法既能较好地恢复光滑部分,又能较好地保护整齐的边界。数值结果表明了该方法的恢复性能。
{"title":"Image Restoration Combining Tikhonov with Different Order Nonconvex Nonsmooth Regularizations","authors":"X. Liu, Xingbao Gao, Qiufang Xue","doi":"10.1109/CIS.2013.59","DOIUrl":"https://doi.org/10.1109/CIS.2013.59","url":null,"abstract":"For piecewise-smooth images with neat boundaries, Tikhonov regularization usually makes images overly smooth, and first order nonconvex nonsmooth regularizations could cause staircase artifacts. Moreover, the image boundaries may be blurred by only utilizing the second difference to reduce staircase artifacts. To overcome above drawbacks, in this paper, piecewise-smooth images with neat boundaries are restored by the GNC method based on combining Tikhonov with different order nonconvex nonsmooth regularizations. This method could both restore the smooth parts and protect the neat boundaries more efficiently. The numerical results are used to show the restored performance of the proposed method.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Power Analysis on SMS4 Using the Chosen Plaintext Method 使用选择明文方法对SMS4进行功率分析
Shutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang, Sigang Bao
SMS4 is the first official released commercial cryptographic algorithm. It provides unified standards for designing and using local area wireless network product. The general DPA attack is not suitable for SMS4 owing to the ample random diffusion of the round output. This article proposed a new power analysis method for SMS4 to reduce the diffusion by chosen plaintext. Two means - Hamming distance model and bit model - are used to build the power model. Simulation results show that this method is effective and can be used in actual cryptographic circuit such as smart cards.
SMS4是第一个正式发布的商用加密算法。它为局域网无线产品的设计和使用提供了统一的标准。由于弹药输出的随机扩散较大,一般的DPA攻击不适合用于SMS4。本文提出了一种新的SMS4功率分析方法,通过选择明文来减少扩散。采用汉明距离模型和位模型两种方法建立功率模型。仿真结果表明,该方法是有效的,可以应用于智能卡等实际的密码电路中。
{"title":"A Power Analysis on SMS4 Using the Chosen Plaintext Method","authors":"Shutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang, Sigang Bao","doi":"10.1109/CIS.2013.163","DOIUrl":"https://doi.org/10.1109/CIS.2013.163","url":null,"abstract":"SMS4 is the first official released commercial cryptographic algorithm. It provides unified standards for designing and using local area wireless network product. The general DPA attack is not suitable for SMS4 owing to the ample random diffusion of the round output. This article proposed a new power analysis method for SMS4 to reduce the diffusion by chosen plaintext. Two means - Hamming distance model and bit model - are used to build the power model. Simulation results show that this method is effective and can be used in actual cryptographic circuit such as smart cards.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117030808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Artificial Bee Colony Algorithm with Two-Stage Eagle Strategy 两阶段鹰策略的人工蜂群算法
Rui-min Jia, Deng-xu He
Pointing at that Artificial Bee Colony Algorithm (ABC) has the defect of slow search speed and low precision, the article proposed an Improved Artificial Bee Colony Algorithm with Two-Eagle Strategy (ETABC) through using a kind of optimization method-Eagle Strategy, and proved the convergence of ETABC. The simulation results show that ETABC is more effective in solving optimization problems.
针对人工蜂群算法(Artificial Bee Colony Algorithm, ABC)存在搜索速度慢、精度低的缺陷,采用一种优化方法——鹰策略,提出了一种改进的双鹰策略人工蜂群算法(Two-Eagle Strategy, ETABC),并证明了ETABC的收敛性。仿真结果表明,ETABC算法在求解优化问题时更为有效。
{"title":"Artificial Bee Colony Algorithm with Two-Stage Eagle Strategy","authors":"Rui-min Jia, Deng-xu He","doi":"10.1109/CIS.2013.11","DOIUrl":"https://doi.org/10.1109/CIS.2013.11","url":null,"abstract":"Pointing at that Artificial Bee Colony Algorithm (ABC) has the defect of slow search speed and low precision, the article proposed an Improved Artificial Bee Colony Algorithm with Two-Eagle Strategy (ETABC) through using a kind of optimization method-Eagle Strategy, and proved the convergence of ETABC. The simulation results show that ETABC is more effective in solving optimization problems.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analytical Model of Customer Churn Based on Bayesian Network 基于贝叶斯网络的客户流失分析模型
Peng Sun, Xin Guo, Yunpeng Zhang, Zi-yan Wu
A customer churn analytical model based Bayesian network is built for prediction of customer churn. We propose Bayesian Network approaches to predict churn motivation, mining the result in churn characters in order to help decision-making manager formulate corresponding detainment strategy. Experimental results show that classification performance of both methods is resultful.
建立了基于贝叶斯网络的客户流失分析模型,用于客户流失预测。我们提出了贝叶斯网络方法来预测流失动机,挖掘流失特征的结果,以帮助决策管理者制定相应的留住策略。实验结果表明,两种方法的分类效果良好。
{"title":"Analytical Model of Customer Churn Based on Bayesian Network","authors":"Peng Sun, Xin Guo, Yunpeng Zhang, Zi-yan Wu","doi":"10.1109/CIS.2013.63","DOIUrl":"https://doi.org/10.1109/CIS.2013.63","url":null,"abstract":"A customer churn analytical model based Bayesian network is built for prediction of customer churn. We propose Bayesian Network approaches to predict churn motivation, mining the result in churn characters in order to help decision-making manager formulate corresponding detainment strategy. Experimental results show that classification performance of both methods is resultful.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Approach to IoT Security Based on Immunology 基于免疫学的物联网安全新方法
Caiming Liu, Yan Zhang, Hua Zhang
The security situation of the Internet of Things (IoT) is serious. IoT encounters security problems more than traditional computer networks does. The attributes of dispersity and mass of IoT require that approaches to IoT security should be dynamic. Inspired by immunology, a novel approach to IoT security is proposed in this paper. Traditional network security models are used for reference and special requests of IoT security are taken into account. A dynamic defense frame for IoT security is formed in the proposed approach. The links in the frame are correlated with relative data of IoT security. Performance in biological immunology is applied into some links to make the proposed approach be adaptive to IoT environment. The immunity-based antigen, self and detector in the real IoT environment are simulated. They are adopted to imitate the mechanisms which are used to recognize pathogens in biological immune systems. Simulation experiment results show that the proposed approach may provide a novel effective method to ensure IoT security.
物联网(IoT)的安全形势十分严峻。物联网比传统计算机网络更容易遇到安全问题。物联网的分散性和质量属性要求物联网安全方法应该是动态的。受免疫学的启发,本文提出了一种新的物联网安全方法。借鉴传统网络安全模型,考虑物联网安全的特殊要求。该方法形成了物联网安全的动态防御框架。框架中的链接与物联网安全相关数据相关联。将生物免疫学的性能应用于某些环节,使所提出的方法能够适应物联网环境。模拟物联网真实环境中基于免疫的抗原、自身和检测器。它们被用来模仿生物免疫系统中用于识别病原体的机制。仿真实验结果表明,该方法为保证物联网安全提供了一种新颖有效的方法。
{"title":"A Novel Approach to IoT Security Based on Immunology","authors":"Caiming Liu, Yan Zhang, Hua Zhang","doi":"10.1109/CIS.2013.168","DOIUrl":"https://doi.org/10.1109/CIS.2013.168","url":null,"abstract":"The security situation of the Internet of Things (IoT) is serious. IoT encounters security problems more than traditional computer networks does. The attributes of dispersity and mass of IoT require that approaches to IoT security should be dynamic. Inspired by immunology, a novel approach to IoT security is proposed in this paper. Traditional network security models are used for reference and special requests of IoT security are taken into account. A dynamic defense frame for IoT security is formed in the proposed approach. The links in the frame are correlated with relative data of IoT security. Performance in biological immunology is applied into some links to make the proposed approach be adaptive to IoT environment. The immunity-based antigen, self and detector in the real IoT environment are simulated. They are adopted to imitate the mechanisms which are used to recognize pathogens in biological immune systems. Simulation experiment results show that the proposed approach may provide a novel effective method to ensure IoT security.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
The Design of Output Feedback Controller for a Class of Nonlinear Systems with Time-Delay 一类非线性时滞系统的输出反馈控制器设计
Ruliang Wang, Shanshang Zhang, Wen Huang
This paper is concerned with the output feedback control problem for a class of nonlinear system with time delay. First, a state feedback controller is design and a sufficient condition with exponential stability is obtained. Second, we study the observer design problem. And we proved that the observer designed in this paper ensure the observation error exponential converge to zero. Furthermore, output feedback controller using state feedback control and observer design is studied.
研究了一类非线性时滞系统的输出反馈控制问题。首先,设计了状态反馈控制器,得到了该控制器具有指数稳定性的充分条件。其次,我们研究了观测器设计问题。并证明了所设计的观测器能保证观测误差指数收敛于零。进一步研究了采用状态反馈控制和观测器设计的输出反馈控制器。
{"title":"The Design of Output Feedback Controller for a Class of Nonlinear Systems with Time-Delay","authors":"Ruliang Wang, Shanshang Zhang, Wen Huang","doi":"10.1109/CIS.2013.111","DOIUrl":"https://doi.org/10.1109/CIS.2013.111","url":null,"abstract":"This paper is concerned with the output feedback control problem for a class of nonlinear system with time delay. First, a state feedback controller is design and a sufficient condition with exponential stability is obtained. Second, we study the observer design problem. And we proved that the observer designed in this paper ensure the observation error exponential converge to zero. Furthermore, output feedback controller using state feedback control and observer design is studied.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Application Cost of Server Virtualisation 服务器虚拟化的应用成本研究
Jing Nie
Server Virtualisation (SV) can improve the application efficiency of network sever resources, reduce the investment of hardware and less the cost of maintenance. This paper analyses that five key factors that are hardware cost, energy cost, software cost, maintenance cost and outage (or downtime) recovery cost in the Server Virtualisation. There a sample case is an university or a company what its application cost of the Server Virtualisation is examined and evaluated by contextual analysis. In addition, it will associate with the result of the case study to set out some critical suggestion in the concluding section.
服务器虚拟化(Server virtualization, SV)可以提高网络服务器资源的应用效率,减少硬件投资,降低维护成本。本文分析了服务器虚拟化中的硬件成本、能源成本、软件成本、维护成本和中断(或停机)恢复成本五个关键因素。有一个例子是一所大学或一家公司,它的服务器虚拟化的应用成本是通过上下文分析来检查和评估的。此外,还将结合案例研究的结果,在结论部分提出一些关键性的建议。
{"title":"A Study on the Application Cost of Server Virtualisation","authors":"Jing Nie","doi":"10.1109/CIS.2013.176","DOIUrl":"https://doi.org/10.1109/CIS.2013.176","url":null,"abstract":"Server Virtualisation (SV) can improve the application efficiency of network sever resources, reduce the investment of hardware and less the cost of maintenance. This paper analyses that five key factors that are hardware cost, energy cost, software cost, maintenance cost and outage (or downtime) recovery cost in the Server Virtualisation. There a sample case is an university or a company what its application cost of the Server Virtualisation is examined and evaluated by contextual analysis. In addition, it will associate with the result of the case study to set out some critical suggestion in the concluding section.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132390699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
L1/2 Regularization Based Low-Rank Image Segmentation Model 基于L1/2正则化的低秩图像分割模型
Xiujun Zhang, Chen Xu
In the spectral-type subspace segmentation models, the rank minimization problem was relaxed as Nuclear Norm Minimization(NNM) problem. However, to guarantee the success of NNM, one needs some strict conditions, and NNM may yield the matrix with much higher rank than the real one. In this paper, the L1/2 regularization is introduced into the low-rank spectral-type subspace segmentation model, combining Augmented Lagrange Multiplier(ALM) method and half-threshold operator, a discrete algorithm to solve the proposed model is given. A large number of experiments in section IV demonstrate the effectiveness of our model in data clustering and image segmentation.
在谱型子空间分割模型中,将秩最小化问题简化为核范数最小化(NNM)问题。然而,为了保证NNM的成功,需要一些严格的条件,NNM可能会得到比真实矩阵高得多的秩。本文将L1/2正则化引入到低秩谱型子空间分割模型中,结合增广拉格朗日乘子(ALM)方法和半阈值算子,给出了求解该模型的离散算法。第四节的大量实验证明了我们的模型在数据聚类和图像分割方面的有效性。
{"title":"L1/2 Regularization Based Low-Rank Image Segmentation Model","authors":"Xiujun Zhang, Chen Xu","doi":"10.1109/CIS.2013.87","DOIUrl":"https://doi.org/10.1109/CIS.2013.87","url":null,"abstract":"In the spectral-type subspace segmentation models, the rank minimization problem was relaxed as Nuclear Norm Minimization(NNM) problem. However, to guarantee the success of NNM, one needs some strict conditions, and NNM may yield the matrix with much higher rank than the real one. In this paper, the L1/2 regularization is introduced into the low-rank spectral-type subspace segmentation model, combining Augmented Lagrange Multiplier(ALM) method and half-threshold operator, a discrete algorithm to solve the proposed model is given. A large number of experiments in section IV demonstrate the effectiveness of our model in data clustering and image segmentation.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131735767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-objective Evolutionary Algorithm for 4G Base Station Planning 4G基站规划的多目标进化算法
W. Mai, Hai-Lin Liu, Lei Chen, Jiongcheng Li, Henghui Xiao
Planning of base stations (BS) is one of the fundamental problems in the fourth generation (4G) wireless network design. A new mathematical model for the 4G BS planning is proposed in this paper. The co-channel interference, orthogonal frequency division multiplexing (OFDM), the cell edge rate, the reference signal received power (RSRP) and the base station density are considered in detail in this model. The objectives of the model are to minimum construction cost, maximum coverage and capacity at the same time. It's a multiobjective optimization problem with constraints. So a multiobjective algorithm with a local search operator is designed to solve this model. Simulation results show that the according algorithm with local search operator can give a set of solutions with relatively lower cost, larger coverage, larger capacity and faster speed than the algorithm without local search operator. The effective and efficient of the proposed model can also be identified by the comparison of the solutions.
基站规划是第四代(4G)无线网络设计的基本问题之一。本文提出了一种新的4G BS规划数学模型。该模型详细考虑了同信道干扰、正交频分复用(OFDM)、小区边缘速率、参考信号接收功率(RSRP)和基站密度等因素。该模型的目标是同时实现最低的建设成本,最大的覆盖范围和容量。这是一个有约束的多目标优化问题。为此,设计了一种带有局部搜索算子的多目标算法来求解该模型。仿真结果表明,与不带局部搜索算子的算法相比,带局部搜索算子的算法能够给出一组成本相对较低、覆盖范围较大、容量较大、速度较快的解。通过解的比较也可以看出所提模型的有效性和高效性。
{"title":"Multi-objective Evolutionary Algorithm for 4G Base Station Planning","authors":"W. Mai, Hai-Lin Liu, Lei Chen, Jiongcheng Li, Henghui Xiao","doi":"10.1109/CIS.2013.25","DOIUrl":"https://doi.org/10.1109/CIS.2013.25","url":null,"abstract":"Planning of base stations (BS) is one of the fundamental problems in the fourth generation (4G) wireless network design. A new mathematical model for the 4G BS planning is proposed in this paper. The co-channel interference, orthogonal frequency division multiplexing (OFDM), the cell edge rate, the reference signal received power (RSRP) and the base station density are considered in detail in this model. The objectives of the model are to minimum construction cost, maximum coverage and capacity at the same time. It's a multiobjective optimization problem with constraints. So a multiobjective algorithm with a local search operator is designed to solve this model. Simulation results show that the according algorithm with local search operator can give a set of solutions with relatively lower cost, larger coverage, larger capacity and faster speed than the algorithm without local search operator. The effective and efficient of the proposed model can also be identified by the comparison of the solutions.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2013 Ninth International Conference on Computational Intelligence and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1