Study of Resource Allocation Method of Communication Network in Dense Crowded Area

Article Preview

Abstract:

In the dense crowded area, the communication resource allocation method has a very broad application space in the communication research field. Therefore, an improved communication resource distribution method in the dense crowded area is proposed based on pheromone search algorithm. In the dense crowded area, the regional communication network is constructed, and the pheromone of each resource node is taken with initialization processing. The collection of communication resource allocation task is obtained, the execution time of task is calculated, and the communication channel is selected. According to the pheromone concentration, all the pheromones are updated. The optimal channel of optimized communication resource allocation is searched, and the algorithm is improved. The simulation results show that the improved algorithm is applied in the regional allocation of communication resources in crowded area, the communication time can be effectively reduced, and the utilization of communication resources is improved, it will have a prospect application value in practice.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1115-1118

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] V. Puig, J. Saludes, and J. Quevedo. Worst-case simulation of discrete linear time-invariant dynamic systems[J]. Reliab. Comput. Apr. 2003. 251–290.

Google Scholar

[2] Rao Yutai, Yang fan. Network Intrusion Stir the Network Instability Control Methods ofthe Research[J]. BULLETIN OF SCIENCE AND TECHNOLOGY, 2014, 30(1): 185-188.

Google Scholar

[3] Lu C, Stankovica J A, Tao G, and Son S H. Feedback control real-time scheduling: framework, modeling, and algorithms[J]. Real-Time Systems Journal, Special Issue on Control-Theoretical Approaches to Real-Time Computing, 2001(1): 58-66.

DOI: 10.1109/emrts.1999.777445

Google Scholar

[4] Akyildiz I F, Pompili D, Melodia T. Under-water acoustic sensor networks: research ch-allenges [J]. Ad Hoc Networks (S1570-8705), 2005, 3(3): 257-279.

DOI: 10.1016/j.adhoc.2005.01.004

Google Scholar

[5] LI Feng, WU Chun- ming. Research on Prevention Fluctuation Control method of Network Intrusion Based on Energy Management[J]. Computer simulation, 2013, 30(12): 45-48, 335.

Google Scholar

[6] Bongkyo Moon and Hamid Aghvami. Diffserv Extensions for QoS Provisioning in IP Mobility Environments [J]. IEEE Wireless Communications. 2003, 10(5): 38-44.

DOI: 10.1109/mwc.2003.1241096

Google Scholar