380 research outputs found

    A multiobjective Tabu framework for the optimization and evaluation of wireless systems

    Get PDF
    This chapter will focus on the multiobjective formulation of an optimization problem and highlight the assets of a multiobjective Tabu implementation for such problems. An illustration of a specific Multiobjective Tabu heuristic (referred to as MO Tabu in the following) will be given for 2 particular problems arising in wireless systems. The first problem addresses the planning of access points for a WLAN network with some Quality of Service requirements and the second one provides an evaluation mean to assess the performance evaluation of a wireless sensor network. The chapter will begin with an overview of multiobjective (MO) optimization featuring the definitions and concepts of the domain (e.g. Dominance, Pareto front,...) and the main MO search heuristics available so far. We will then emphasize on the definition of a problem as a multiobjective optimization problem and illustrate it by the two examples from the field of wireless networking. The next part will focus on MO Tabu, a Tabu-inspired multiobjective heuristic and describe its assets compared to other MO heuristics. The last part of the chapter will show the results obtained with this MO Tabu strategy on the 2 wireless networks related problems. Conclusion on the use of Tabu as a multiobjective heuristic will be drawn based on the results presented so far

    Innovative Wireless Localization Techniques and Applications

    Get PDF
    Innovative methodologies for the wireless localization of users and related applications are addressed in this thesis. In last years, the widespread diffusion of pervasive wireless communication (e.g., Wi-Fi) and global localization services (e.g., GPS) has boosted the interest and the research on location information and services. Location-aware applications are becoming fundamental to a growing number of consumers (e.g., navigation, advertising, seamless user interaction with smart places), private and public institutions in the fields of energy efficiency, security, safety, fleet management, emergency response. In this context, the position of the user - where is often more valuable for deploying services of interest than the identity of the user itself - who. In detail, opportunistic approaches based on the analysis of electromagnetic field indicators (i.e., received signal strength and channel state information) for the presence detection, the localization, the tracking and the posture recognition of cooperative and non-cooperative (device-free) users in indoor environments are proposed and validated in real world test sites. The methodologies are designed to exploit existing wireless infrastructures and commodity devices without any hardware modification. In outdoor environments, global positioning technologies are already available in commodity devices and vehicles, the research and knowledge transfer activities are actually focused on the design and validation of algorithms and systems devoted to support decision makers and operators for increasing efficiency, operations security, and management of large fleets as well as localized sensed information in order to gain situation awareness. In this field, a decision support system for emergency response and Civil Defense assets management (i.e., personnel and vehicles equipped with TETRA mobile radio) is described in terms of architecture and results of two-years of experimental validation

    Coverage Protocols for Wireless Sensor Networks: Review and Future Directions

    Full text link
    The coverage problem in wireless sensor networks (WSNs) can be generally defined as a measure of how effectively a network field is monitored by its sensor nodes. This problem has attracted a lot of interest over the years and as a result, many coverage protocols were proposed. In this survey, we first propose a taxonomy for classifying coverage protocols in WSNs. Then, we classify the coverage protocols into three categories (i.e. coverage aware deployment protocols, sleep scheduling protocols for flat networks, and cluster-based sleep scheduling protocols) based on the network stage where the coverage is optimized. For each category, relevant protocols are thoroughly reviewed and classified based on the adopted coverage techniques. Finally, we discuss open issues (and recommend future directions to resolve them) associated with the design of realistic coverage protocols. Issues such as realistic sensing models, realistic energy consumption models, realistic connectivity models and sensor localization are covered

    On the design of smart parking networks in the smart cities: an optimal sensor placement model

    Get PDF
    Smart parking is a typical IoT application that can benefit from advances in sensor, actuator and RFID technologies to provide many services to its users and parking owners of a smart city. This paper considers a smart parking infrastructure where sensors are laid down on the parking spots to detect car presence and RFID readers are embedded into parking gates to identify cars and help in the billing of the smart parking. Both types of devices are endowed with wired and wireless communication capabilities for reporting to a gateway where the situation recognition is performed. The sensor devices are tasked to play one of the three roles: (1) slave sensor nodes located on the parking spot to detect car presence/absence; (2) master nodes located at one of the edges of a parking lot to detect presence and collect the sensor readings from the slave nodes; and (3) repeater sensor nodes, also called ''anchor'' nodes, located strategically at specific locations in the parking lot to increase the coverage and connectivity of the wireless sensor network. While slave and master nodes are placed based on geographic constraints, the optimal placement of the relay/anchor sensor nodes in smart parking is an important parameter upon which the cost and e ciency of the parking system depends. We formulate the optimal placement of sensors in smart parking as an integer linear programming multi-objective problem optimizing the sensor network engineering e ciency in terms of coverage and lifetime maximization, as well as its economic gain in terms of the number of sensors deployed for a specific coverage and lifetime. We propose an exact solution to the node placement problem using single-step and two-step solutions implemented in the Mosel language based on the Xpress-MPsuite of libraries. Experimental results reveal the relative e ciency of the single-step compared to the two-step model on di erent performance parameters. These results are consolidated by simulation results, which reveal that our solution outperforms a random placement in terms of both energy consumption, delay and throughput achieved by a smart parking network

    Differential Evolution in Wireless Communications: A Review

    Get PDF
    Differential Evolution (DE) is an evolutionary computational method inspired by the biological processes of evolution and mutation. DE has been applied in numerous scientific fields. The paper presents a literature review of DE and its application in wireless communication. The detailed history, characteristics, strengths, variants and weaknesses of DE were presented. Seven broad areas were identified as different domains of application of DE in wireless communications. It was observed that coverage area maximisation and energy consumption minimisation are the two major areas where DE is applied. Others areas are quality of service, updating mechanism where candidate positions learn from a large diversified search region, security and related field applications. Problems in wireless communications are often modelled as multiobjective optimisation which can easily be tackled by the use of DE or hybrid of DE with other algorithms. Different research areas can be explored and DE will continue to be utilized in this contex

    A Novel Multiobjective Cell Switch-Off Framework for Cellular Networks

    Get PDF
    Cell Switch-Off (CSO) is recognized as a promising approach to reduce the energy consumption in next-generation cellular networks. However, CSO poses serious challenges not only from the resource allocation perspective but also from the implementation point of view. Indeed, CSO represents a difficult optimization problem due to its NP-complete nature. Moreover, there are a number of important practical limitations in the implementation of CSO schemes, such as the need for minimizing the real-time complexity and the number of on-off/off-on transitions and CSO-induced handovers. This article introduces a novel approach to CSO based on multiobjective optimization that makes use of the statistical description of the service demand (known by operators). In addition, downlink and uplink coverage criteria are included and a comparative analysis between different models to characterize intercell interference is also presented to shed light on their impact on CSO. The framework distinguishes itself from other proposals in two ways: 1) The number of on-off/off-on transitions as well as handovers are minimized, and 2) the computationally-heavy part of the algorithm is executed offline, which makes its implementation feasible. The results show that the proposed scheme achieves substantial energy savings in small cell deployments where service demand is not uniformly distributed, without compromising the Quality-of-Service (QoS) or requiring heavy real-time processing

    Intelligent evacuation management systems: A review

    Get PDF
    Crowd and evacuation management have been active areas of research and study in the recent past. Various developments continue to take place in the process of efficient evacuation of crowds in mass gatherings. This article is intended to provide a review of intelligent evacuation management systems covering the aspects of crowd monitoring, crowd disaster prediction, evacuation modelling, and evacuation path guidelines. Soft computing approaches play a vital role in the design and deployment of intelligent evacuation applications pertaining to crowd control management. While the review deals with video and nonvideo based aspects of crowd monitoring and crowd disaster prediction, evacuation techniques are reviewed via the theme of soft computing, along with a brief review on the evacuation navigation path. We believe that this review will assist researchers in developing reliable automated evacuation systems that will help in ensuring the safety of the evacuees especially during emergency evacuation scenarios

    Robust Hybrid Beamforming Design for Multi-RIS Assisted MIMO System with Imperfect CSI

    Get PDF
    Reconfigurable intelligent surface (RIS) has been developed as a promising approach to enhance the performance of fifth-generation (5G) systems through intelligently reconfiguring the reflection elements. However, RIS-assisted beamforming design highly depends on the channel state information (CSI) and RIS’s location, which could have a significant impact on system performance. In this paper, the robust beamforming design is investigated for a RIS-assisted multiuser millimeter wave system with imperfect CSI, where the weighted sum-rate maximization problem (WSM) is formulated to jointly optimize transmit beamforming of the BS, RIS placement and reflect beamforming of the RIS. The considered WSM maximization problem includes CSI error, phase shifts matrices, transmit beamforming as well as RIS placement variables, which results in a complicated nonconvex problem. To handle this problem, the original problem is divided into a series of subproblems, where the location of RIS, transmit/reflect beamforming and CSI error are optimized iteratively. Then, a multiobjective evolutionary algorithm is introduced to gradient projection-based alternating optimization, which can alleviate the performance loss caused by the effect of imperfect CSI. Simulation results reveal that the proposed scheme can potentially enhance the performance of existing wireless communication, especially considering a desirable trade-off among beamforming gain, user priority and error factor
    corecore