Genetic algorithm based iterative two-level algorithm for resource allocation problems and applications

  • Shin Yeu Lin*
  • , Che Yen Chang
  • *Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

1 Scopus citations

Abstract

This study concerns the resource allocation problem that involves complicating constraints and cannot be solved using correction operations of a genetic algorithm (GA). A GA-based iterative two-level algorithm is developed to solve this problem by decomposing it into master and slave problems, such that the complicating constraint function is treated as the objective function of the slave problem, which can be solved by GA, and the master problem, which includes the complicating constraint, is solved using a bisection method that is based on the optimal objective value determined in the slave problem. An example of the application of the proposed algorithm is the minimum time slot assignment problem (MTSAP) associated with a radio frequency identification (RFID) system. The GA that is utilized to solve the slave problem of the MTSAP has special features. The proposed algorithm is tested by applying it to the MTSAPs of four reader networks and many runs are performed for each MTSAP. The obtained solution to each MTSAP is optimal. The proposed algorithm is compared with a simulated annealing (SA) method. The comparison reveals that the proposed algorithm outperforms the SA method in terms of the optimality of the obtained solutions and computing speed.

Original languageEnglish
Pages (from-to)7157-7168
Number of pages12
JournalInternational Journal of Innovative Computing, Information and Control
Volume8
Issue number10 B
StatePublished - 10 2012

Keywords

  • Genetic algorithm
  • Iterative two-level algorithm
  • Minimum time slot assignment problem
  • RFID
  • Reader collision
  • Resource allocation

Fingerprint

Dive into the research topics of 'Genetic algorithm based iterative two-level algorithm for resource allocation problems and applications'. Together they form a unique fingerprint.

Cite this