Spelling suggestions: "subject:"allocation"" "subject:"collocation""
141 |
Distributed task allocation optimisation techniques in multi-agent systemsTurner, Joanna January 2018 (has links)
A multi-agent system consists of a number of agents, which may include software agents, robots, or even humans, in some application environment. Multi-robot systems are increasingly being employed to complete jobs and missions in various fields including search and rescue, space and underwater exploration, support in healthcare facilities, surveillance and target tracking, product manufacturing, pick-up and delivery, and logistics. Multi-agent task allocation is a complex problem compounded by various constraints such as deadlines, agent capabilities, and communication delays. In high-stake real-time environments, such as rescue missions, it is difficult to predict in advance what the requirements of the mission will be, what resources will be available, and how to optimally employ such resources. Yet, a fast response and speedy execution are critical to the outcome. This thesis proposes distributed optimisation techniques to tackle the following questions: how to maximise the number of assigned tasks in time restricted environments with limited resources; how to reach consensus on an execution plan across many agents, within a reasonable time-frame; and how to maintain robustness and optimality when factors change, e.g. the number of agents changes. Three novel approaches are proposed to address each of these questions. A novel algorithm is proposed to reassign tasks and free resources that allow the completion of more tasks. The introduction of a rank-based system for conflict resolution is shown to reduce the time for the agents to reach consensus while maintaining equal number of allocations. Finally, this thesis proposes an adaptive data-driven algorithm to learn optimal strategies from experience in different scenarios, and to enable individual agents to adapt their strategy during execution. A simulated rescue scenario is used to demonstrate the performance of the proposed methods compared with existing baseline methods.
|
142 |
Strategies for minority game and resource allocation.January 2009 (has links)
She, Yingni. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2009. / Includes bibliographical references (leaves 74-78). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Scope --- p.2 / Chapter 1.2 --- Motivation --- p.5 / Chapter 1.3 --- Structure of the Thesis --- p.6 / Chapter 2 --- Literature Review --- p.7 / Chapter 2.1 --- Intelligent Agents and Multiagent Systems --- p.8 / Chapter 2.1.1 --- Intelligent Agents --- p.8 / Chapter 2.1.2 --- Multiagent Systems --- p.10 / Chapter 2.2 --- Minority Game --- p.13 / Chapter 2.2.1 --- Minority Game --- p.13 / Chapter 2.2.2 --- Characteristics of Minority Game --- p.14 / Chapter 2.2.3 --- Strategies for Agents in Minority Game --- p.18 / Chapter 2.3 --- Resource Allocation --- p.22 / Chapter 2.3.1 --- Strategies for Agents in Multiagent Resource Allocation --- p.23 / Chapter 3 --- Individual Agent´ةs Wealth in Minority Game --- p.26 / Chapter 3.1 --- The Model --- p.26 / Chapter 3.2 --- Motivation --- p.27 / Chapter 3.3 --- Inefficiency Information --- p.28 / Chapter 3.4 --- An Intelligent Strategy --- p.31 / Chapter 3.5 --- Experiment Analysis --- p.32 / Chapter 3.6 --- Discussions and Analysis --- p.35 / Chapter 3.6.1 --- Equivalence to the Experience method --- p.36 / Chapter 3.6.2 --- Impact of M' and S' --- p.38 / Chapter 3.6.3 --- Impact of M and S --- p.41 / Chapter 3.6.4 --- Impact of Larger Number of Privileged Agents --- p.48 / Chapter 3.6.5 --- Comparisons with Related Work --- p.48 / Chapter 4 --- An Adaptive Strategy for Resource Allocation --- p.53 / Chapter 4.1 --- Problem Specification --- p.53 / Chapter 4.2 --- An Adaptive Strategy --- p.55 / Chapter 4.3 --- Remarks of the Adaptive Strategy --- p.57 / Chapter 4.4 --- Experiment Analysis --- p.58 / Chapter 4.4.1 --- Simulations --- p.58 / Chapter 4.4.2 --- Comparisons with Related Work --- p.62 / Chapter 5 --- Conclusions and Future Work --- p.69 / Chapter 5.1 --- Conclusions --- p.69 / Chapter 5.2 --- Future Work --- p.71 / A List of Publications --- p.73 / Bibliography --- p.74
|
143 |
Session reliability and capacity allocation in dynamic spectrum access networks.January 2008 (has links)
Li, Kin Fai. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 95-99). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction / Motivation --- p.1 / Chapter 2 --- Literature Review --- p.7 / Chapter 2.1 --- Introduction --- p.7 / Chapter 2.2 --- Dynamic Spectrum Access Networks --- p.8 / Chapter 2.3 --- Reliability --- p.10 / Chapter 2.3.1 --- Reliability in Wireless Networks --- p.10 / Chapter 2.3.2 --- Reliability in Wireline Networks --- p.11 / Chapter 2.4 --- Capacity Planning in Wireless Mesh Networks --- p.14 / Chapter 2.4.1 --- Interference Model --- p.14 / Chapter 2.4.2 --- Link Capacity Constraint --- p.15 / Chapter 2.4.3 --- Feasible Path --- p.16 / Chapter 2.4.4 --- Optimal Capacity Allocation in DSA Net- works and Wireless Mesh Networks --- p.16 / Chapter 2.5 --- Chapter Summary --- p.18 / Chapter 3 --- Lifetime Aware Routing without Backup --- p.19 / Chapter 3.1 --- Introduction --- p.19 / Chapter 3.2 --- System Model --- p.20 / Chapter 3.3 --- Lifetime Distribution of a Path without Backup Protection --- p.22 / Chapter 3.3.1 --- Exact Lifetime Distribution --- p.23 / Chapter 3.3.2 --- The Chain Approximation --- p.24 / Chapter 3.4 --- Route Selection without Backup Protection --- p.26 / Chapter 3.4.1 --- NP-Hardness of Finding Maximum Lifetime Path --- p.26 / Chapter 3.4.2 --- The Minimum Weight Algorithm --- p.28 / Chapter 3.4.3 --- Greedy Algorithm --- p.28 / Chapter 3.4.4 --- GACA - The Greedy Algorithm using the Chain Approximation --- p.32 / Chapter 3.5 --- Simulation Results --- p.33 / Chapter 3.5.1 --- Tightness of the Chain Approximation Bound for Vulnerable Area --- p.33 / Chapter 3.5.2 --- Comparison between Greedy and GACA using Guaranteed Lifetime --- p.36 / Chapter 3.5.3 --- Factors impacting the performance of GACA --- p.37 / Chapter 3.6 --- Chapter Summary --- p.43 / Chapter 4 --- Prolonging Path Lifetime with Backup Channel --- p.44 / Chapter 4.1 --- Introduction --- p.44 / Chapter 4.2 --- Non-Shared Backup Protection --- p.45 / Chapter 4.2.1 --- Lifetime of a Path with Non-Shared Backup --- p.45 / Chapter 4.2.2 --- Route Selection for paths with Non-Shared Backup --- p.46 / Chapter 4.3 --- Shared Backup Protection --- p.47 / Chapter 4.3.1 --- Sharing of Backup Capacity --- p.48 / Chapter 4.3.2 --- Lifetime of a Path with Shared Backup --- p.48 / Chapter 4.3.3 --- Route Selection for paths with Shared Backup --- p.50 / Chapter 4.4 --- Simulation Results --- p.50 / Chapter 4.4.1 --- Tightness of Failure Probability Upper Bound for Backup Protection --- p.51 / Chapter 4.4.2 --- Comparison between the Shared Backup and Non Shared Backup schemes --- p.53 / Chapter 4.5 --- Chapter Summary --- p.54 / Chapter 5 --- Finding Capacity-Feasible Routes --- p.55 / Chapter 5.1 --- Introduction --- p.55 / Chapter 5.2 --- Constructing an Edge graph --- p.56 / Chapter 5.3 --- Checking Capacity Feasibility under each Protec- tion Scheme --- p.58 / Chapter 5.3.1 --- No Backup Protection --- p.59 / Chapter 5.3.2 --- Non-Shared Backup Protection --- p.59 / Chapter 5.3.3 --- Shared Backup Protection --- p.60 / Chapter 5.4 --- Chapter Summary --- p.62 / Chapter 6 --- Performance Evaluations and Adaptive Protec- tion --- p.63 / Chapter 6.1 --- Introduction --- p.63 / Chapter 6.2 --- Tradeoffs between Route Selection Algorithms --- p.64 / Chapter 6.3 --- Adaptive Protection --- p.66 / Chapter 6.3.1 --- Route Selection for Adaptive Protection --- p.67 / Chapter 6.3.2 --- Finding a Capacity-Feasible Path for Adaptive Protection --- p.68 / Chapter 6.4 --- Comparison between No Protection and Adaptive Protection --- p.69 / Chapter 6.5 --- Chapter Summary --- p.71 / Chapter 7 --- Restoration Capacity Planning and Channel Assignment --- p.72 / Chapter 7.1 --- Introduction --- p.72 / Chapter 7.2 --- System Model --- p.74 / Chapter 7.2.1 --- Channel Assignment Model --- p.74 / Chapter 7.2.2 --- Presence of Primary Users --- p.75 / Chapter 7.2.3 --- Link Flow Rates --- p.76 / Chapter 7.2.4 --- Problem Formulation --- p.77 / Chapter 7.3 --- Simulation Results --- p.79 / Chapter 7.3.1 --- "Comparison between ""Shared Backup"" and “No Restore Plan"" using Guarantee Percentage and Reduced Capacity" --- p.80 / Chapter 7.3.2 --- Comparison using Traffic Demand Scaling Factor g and Guarantee Fraction p --- p.81 / Chapter 7.3.3 --- Comparison between Optimal Channel Assignment and Random Channel Assignment --- p.84 / Chapter 7.4 --- Chapter Summary --- p.86 / Chapter 8 --- Conclusion and Future Works --- p.87 / Chapter A --- Proof of Theorem (3.1) in Chapter3 --- p.90 / Chapter B --- Proof of Theorem (4.1) in Chapter4 --- p.92 / Bibliography --- p.95
|
144 |
A study of resource allocation and utilization in school education in Hong KongLam, Wai-man, January 2007 (has links)
Thesis (M. P. A.)--University of Hong Kong, 2007. / Title proper from title frame. Also available in printed format.
|
145 |
Dynamic Resource Allocation in Wireless NetworksEriksson, Kristoffer January 2010 (has links)
<p>In this thesis we investigate different algorithms for dynamic resource allocation in wireless networks. We introduce a general framework for modeling systems whichis applicable to many scenarios. We also analyze a specific scenario with adaptivebeamforming and show how it fits into the proposed framework. We then studytwo different resource allocation problems: Quality-of-Service (QoS) constraineduser scheduling and sum-rate maximization. For user scheduling, we select some“good” set of users that is allowed to use a specific resource. We investigatedifferent algorithms with varying complexities. For the sum-rate maximizationwe find the global optimum through an algorithm that takes advantage of thestructure of the problem by reformulating it as a D.C. program, i.e., a minimizationover a difference of convex functions. We validate this approach by showing that itis more efficient than an exhaustive search at exploring the space of solutions. Thealgorithm provides a good benchmark for more suboptimal algorithms to comparewith. The framework in which we construct the algorithm, apart from being verygeneral, is also very flexible and can be used to implement other low complexitybut suboptimal algorithms.</p>
|
146 |
Joint bandwidth and power allocation in wireless communication networksGong, Xiaowen 11 1900 (has links)
This thesis consists of two studies on joint bandwidth and power allocation strategy for wireless communication
networks. In the first study, joint bandwidth and power allocation strategy is proposed for wireless multi-user networks without relaying and with decode-and-forward relaying. It is shown that the formulated resource allocation problems are convex and, thus, can be solved efficiently. Admission control problem based on the joint bandwidth and power allocation strategy is further considered, and a greedy search algorithm is developed for solving it efficiently. In the second study, joint bandwidth
and power allocation strategy is presented for maximizing the sum ergodic capacity of secondary users under fading channels in cognitive radio networks. Optimal bandwidth allocation is derived in closed-form for any given power allocation. Then the structures of optimal power allocations are derived. Using these structures, efficient algorithms are developed for finding the optimal power allocations. / Communications
|
147 |
Essays on multichannel marketingKushwaha, Tarun Lalbahadur 15 May 2009 (has links)
Multichannel marketing is the practice of simultaneously offering information, goods, services, and support to customers through two or more synchronized channels. In this dissertation, I develop an integrated framework of multichannel marketing and develop models to assist managers in their marketing resource allocation decisions. In the first essay of the dissertation, I investigate the factors that drive customers multichannel shopping behavior and identify its consequences for retailers. In the second essay, I build on this work and develop a model that enables firms to optimize their allocation of marketing resources across different customer-channel segments. In the first essay, I develop a framework comprising the factors that drive consumers’ channel choice, the consequences of channel choice, and their implications for managing channel equity. The results show that customer-channel choice is driven in a nonlinear fashion by a customer demographic variable such as age and is also influenced by consumer shopping traits such as number of categories bought and the duration of relationship with a retailer. I show that by controlling for the moderating effects of channel-category associations, the influence of customers’ demographics and shopping traits on their channel choices can vary significantly across product categories. Importantly, the results show that multichannel shoppers buy more often, buy more items, and spend considerably more than single channel shoppers. The channel equity of multichannel customers is nearly twice that of the closest single channel customers (online or offline). In the second essay, I propose a model for optimal allocation of marketing efforts across multiple customer-channel segments. I first develop a set of models for consumer response to marketing efforts for each channel-customer segment. This set comprises four models, the first for purchase frequency, the second for purchase quantity, the third for product return behavior, and the fourth for contribution margin of purchase. The results show that customers’ responses to firm marketing efforts vary significantly across the customer-channel segments. They also suggest that marketing efforts influence purchase frequency, purchase quantity and monetary value in different ways. The resource allocation results show that profits can be substantially improved by reallocating marketing efforts across the different customer-channel segments.
|
148 |
Bus Topology Exploration and Memory Allocation for Heterogeneous SystemsWu, Jhih-Yong 02 August 2007 (has links)
Since semiconductor process is constantly being improved, the complexity of system-on-chip is rising daily and we can place more and more elements on the same chip area. The system designers have been searching new methodology that can handle the complex systems and the environment which can quickly simulate the system-on-chip. It is brought forward that is raising the level of abstraction, as the design methodology of Electronic-System-Level (ESL). But system designers still need to decide the system architecture (the bus and PE connection status), and judge if the system could meet the performance and cost constraints by simulation results. For the very complex system, system designers will cost more and more time owning to the growth of design space to get the best system architecture.
In this thesis, we propose a synthesis method to support automatic ESL design and help system designers to decide system architecture from large design space in short time. The method uses fast estimation method to estimate bus topology and memory allocation that affect the processing-elements¡¦ communication. By this method, we can find better system architecture which meets all constraints with the same amount of processing-elements.
|
149 |
Hybrid Access Control Mechanism in Two-Tier Femtocell NetworksMantravadi, Sirisha 1987- 14 March 2013 (has links)
The cellular industry is undergoing a major paradigm shift from voice-centric, structured homogeneous networks to a more data-driven, distributed and heterogeneous architecture. One of the more promising trends emerging from this cellular revolution is femtocells. Femtocells are primarily viewed as a cost-effective way to improve both capacity and indoor coverage, and they enable offloading data-traffic from macrocell network. However, efficient interference management in co-channel deployment of femtocells remains a challenge. Decentralized strategies such as femtocell access control have been identified as an effective means to mitigate cross-tier interference in two-tier networks. Femtocells can be configured to be either open access or closed access. Prior work on access control schemes show that, in the absence of any coordination between the two tiers in terms of power control and user scheduling, closed access is the preferred approach at high user densities. Present methods suggest that in the case of orthogonal multiple access schemes like TDMA/OFDMA, femtocell access control should be adaptive according to the estimated cellular user density.
The approach we follow, in this work, is to adopt an open access policy at the femtocell access points with a cap on the maximum number of users allowed on a femtocell. This ensures the femto owner retains a significant portion of the femtocell resources. We design an iterative algorithm for hybrid access control for femtocells that integrates the problems of uplink power control and base station assignment. This algorithm implicitly adapts the femtocell access method to the current user density. The distributed power control algorithm, which is based on Yates' work on standard interference functions, enables users to overcome the interference in the system and satisfy their minimum QoS requirements. The optimal allocation of femtocell resources is incorporated into the access control algorithm through a constrained sum-rate maximization to protect the femto owner from starvation at high user densities. The performance of a two-tier OFDMA femtocell network is then evaluated under the proposed access scheme from a home owner viewpoint, and network operator perspective. System-level simulations show that the proposed access control method can provide a rate gain of nearly 52% for cellular users, compared to closed access, at high user densities and under moderate-to-dense deployment of femtocells. At the same time, the femto owner is prevented from going into outage and only experiences a negligible rate loss. The results obtained establish the quantitative performance advantage of using hybrid access at femtocells with power control at high user densities. The convergence properties of the proposed iterative hybrid access control algorithm are also investigated by varying the user density and the mean number of femto access points in the network. It is shown that for a given system model, the algorithm converges quickly within thirty iterations, provided a feasible solution exists.
|
150 |
Resource Allocation in OFDMA Wireless NetworksMehrjoo, Mehri January 2008 (has links)
Orthogonal frequency division multiple access (OFDMA) is becoming a widely deployed mechanism in broadband wireless networks due to its capability to combat the channel impairments and support high data rate. Besides, dealing with small units of spectrum, named sub-carriers, instead of whole spectrum, results in enhanced flexibility and efficiency of the resource allocation for OFDMA networks.
Resource allocation and scheduling in the downlink of OFDMA networks supporting heterogeneous traffic will be considered in this thesis. The purpose of resource allocation is to allocate sub-carriers and power to users to meet their service requirements while maintaining fairness among users and maximizes resource utilization. To achieve these objectives, utility-based resource allocation schemes along with some state-of-the-art resource allocation paradigms such as power control, adaptive modulation and coding, sub-carrier assignment, and scheduling are adopted. On one hand, a utility-based resource allocation scheme improves resource utilization by allocating enough resources based on users' quality of service (QoS) satisfaction. On the other hand, resource allocation based on utilities is not trivial when users demand different traffic types with convex and nonconvex utilities.
The first contribution of the thesis is the proposing of a framework, based on joint physical (PHY) and medium access (MAC) layer optimization, for utility-based resource allocation in OFDMA networks with heterogeneous traffic types. The framework considers the network resources limitations while attempting to improve resources utilization and heterogeneous users' satisfaction of service. The resource allocation problem is formulated by continuous optimization techniques, and an algorithm based on interior point and penalty methods is suggested to solve the problem. The numerical results show that the framework is very efficient in treating the nonconvexity problem and the allocation is accurate comparing with the ones obtained by a genetic search algorithm.
The second contribution of the thesis is the proposing of an opportunistic fair scheduling scheme for OFDMA networks. The contribution is twofold. First, a vector of fair weights is proposed, which can be used in any scheduling scheme for OFDMA networks to maintain fairness. Second, the fair weights are deployed in an opportunistic scheduling scheme to compensate the unfairness of the scheduling. The proposed scheme efficiently schedules users by exploiting multiuser diversity gain, OFDMA resource allocation flexibility, and utility fair service discipline.
It is expected that the research in the thesis contributes to developing practical schemes with low complexity for the MAC layer of OFDMA networks.
|
Page generated in 0.0772 seconds