Evolutionary approach to optimize the assignment of cells to switches in personal communication...
-
Upload
independent -
Category
Documents
-
view
0 -
download
0
Transcript of Evolutionary approach to optimize the assignment of cells to switches in personal communication...
Evolutionary approach to optimize the assignment of cells to switches
in personal communication networks
Alejandro Quintero*, Samuel Pierre
Mobile Computing and Networking Research Laboratory (LARIM), Department of Computer Engineering, Ecole Polytechnique de Montreal,
C.P. 6079, succ. Centre-Ville, Montreal, Que., Canada H3C 3A7
Received 14 February 2002; revised 17 September 2002; accepted 10 October 2002
Abstract
This paper proposes an evolutionary approach to solve the problem of assigning cells to switches in the planning phase of mobile cellular
networks. Well-known in the literature as an NP-hard combinatorial optimization problem, this problem requires the recourse to heuristic
methods, which can practically lead to good feasible solutions, not necessarily optimal, the objective being rather to reduce the convergence
time toward these solutions. Computational results obtained from extensive tests confirm the effectiveness of this approach to provide good
solutions to problems of a certain size. This approach can be used to solve NP-hard problems, like designing and planning, in the next
generation networking systems.
q 2002 Elsevier Science B.V. All rights reserved.
Keywords: Cellular networks; Cell assignment; Memetic algorithms; Genetic algorithms; Tabu search; Simulated annealing; Migration; Multi-population
algorithm
1. Introduction
A Personal Communication Network (PCN) is a wireless
communication network, which integrates various services
such as voice, video, electronic mail, accessible from a
single mobile terminal and for which the subscriber obtains
a single invoicing. These various services are offered in an
area called cover zone, which is divided, into cells. The cell
is the basic unit of a cellular system (Fig. 1). In each cell is
installed a base station which manages all the communi-
cations within the cell. In the cover zone, cells are connected
to special units called switches, which are located in mobile
switching centers (MSC). When a user in communication
goes from a cell to another, the base station of the new cell
has the responsibility to relay this communication by
allotting a new radio channel to the user. Supporting the
transfer of the communication from a base station to another
is called handoff. This mechanism, which primarily involves
the switches, occurs when the level of signal received by the
user reaches a certain threshold. We distinguish two types of
handoffs. In the case of Fig. 1 for example, when a user
moves from cell B to cell A, it refers to soft handoff because
these two cells are connected to the same switch.The MSC,
which supervises the two cells, remains the same and the
induced cost is weak. On the other hand, when the user
moves from cell B to cell C, there is a complex handoff. The
induced cost is high because both switches 1 and 2 remain
active during the procedure of handoff and the database
containing information on subscribers must be updated.
The total operating cost of a cellular network includes
two components: the cost of the links between the cells
(base station) and the switches to which they are joined, and
the cost generated by the handoffs between cells. It appears
therefore intuitively more discriminating to join cells B and
C to the same switch if the frequency of the handoffs
between them is high. The problem of assigning cells to
switches essentially consists of finding the configuration that
minimizes the total operating cost of the network. Assigning
cells to switches in cellular mobile networks being an NP-
hard problem, enumerative search methods are practically
inappropriate to solve large-sized instances of this problem
[2,18]. Because they exhaustively examine the entire search
space in order to find the optimal solution, they are only
efficient for small search spaces corresponding to small-
sized instances of the problem. For example, for a network
0140-3664/03/$ - see front matter q 2002 Elsevier Science B.V. All rights reserved.
PII: S0 14 0 -3 66 4 (0 2) 00 2 38 -4
Computer Communications 26 (2003) 927–938
www.elsevier.com/locate/comcom
* Corresponding author. Address: Department of Computer Engineering,
Ecole Polytechnique de Montreal, HPO Box 6079, Station, Centre-Ville
Montreal, Canada H3T1J4. Tel.: þ514-340-4711x5077; fax: þ514-340-
3240.
E-mail address: [email protected] (A. Quintero).
with m switches and n cells, m n solutions should be
examined. With 200 cells and 5 switches, that means 5200
possible solutions to examine. Obviously, it is unrealistic to
adopt such a brute-force approach. Thus, heuristic
approaches, like Tabu search, simulated annealing and
genetic algorithms have been developed for this kind of
problem [1,18,32].
Memetic algorithms (MA) are population-based heuristic
search approaches for combinatorial optimization problems
based on cultural evolution [27,28]. MAs are inspired by
Dawkins’ notion of a meme defined as a unit of information
that reproduces itself while people exchange ideas. In
contrast to genes, the people who transmit them before they
are passed on to the next generation typically adapt memes.
While genetic algorithms have been inspired in trying to
emulate biological evolution. Memetic algorithms would try
to mimic cultural evolution. Memetic algorithm is a
marriage between a population based global search and
the heuristic local search made by each of the individuals
[27]. They are in some respects similar to genetic algorithms
(GA), which simulate the process of biological evolution.
While in nature genes are usually not modified during an
individual’s lifetime, memes are modified [23].
The general idea behind memetic algorithms is to
combine the advantages of evolutionary operators that
determine interesting regions of the search space with local
neighborhood search that quickly finds good solutions in a
small region of the search space. Memetic algorithms have
been applied with success to several other combinatorial
optimization problems [23–25].
The paper is organized as follows. Section 2 presents
background and related work. Section 3 first describes the
evolutionary approach, and then presents some adaptation
and implementations details. Section 4 presents and analyses
results. Finally, Section 5 summarizes the main results.
2. Background and related work
This assignment problem consists of determining a cell
assignment pattern, which minimizes a certain cost
function, while respecting certain constraints, especially
those related to limited switch’s capacity. An assignment
of cells can be carried out according to a single or a
double cell’s homing. A single homing of cells corre-
sponds to the situation where a cell can only be assigned
to a single switch. When a cell is related to two switches
that refers to a double homing. For a double homing, the
call and handoff patterns do not remain the same during
the day. We have, for example, two patterns for the
daytime: one for the morning and another for the
afternoon. The two problems, related to each part of
the day, are not separated and cannot be solved
independently. Optimization should not be performed
separately for each pattern but simultaneously for both
patterns, in a way that minimizes the total cost,
particularly the link cost. In this paper, only single
homing is considered.
Let n be the number of cells to be assigned to m switches.
The location of cells and switches is fixed and known. Let
Hij be the cost per unit of time for a simple handoff between
cells i and j involving only one switch, and H0ij the cost per
time unit for a complex handoff between cells i and j
(I; j ¼ 1; …,n with i – j) involving two different switches.
Hij and H0ij are proportional to the handoff frequency
between cells i and j. Let cik be the amortization cost of the
link between cell i and switch kði ¼ 1;…; n; k ¼ 1;…;mÞ:
Let consider
xik ¼1 if cell i is related to switch k
0 if not
(
The assignment of cells to switches is subject to a
number of constraints. Actually, each cell must be
assigned to only one switch, which can be expressed
by the following formula:
Xmk¼1
xik ¼ 1 for i ¼ 1;…; n: ð1Þ
Let zijk and yij be defined as:
zijk ¼ xikxjk for i; j ¼ 1;…; n and k ¼ 1;…; m; with i – j:
yij ¼Xmk¼1
zijk for i; j ¼ 1;…; n; and i – j:
zijk is equal to 1 if cells i and j, with i – j; are both
connected to the same switch k, otherwise zijk is equal to
0. Thus yij takes the value 1 if cells i and j are both
connected to the same switches and the value 0 if cells i
and j are connected to different switches.
The cost per time unit f of the assignment is expressed as
follows:
f ¼Xn
i¼1
Xmk¼1
cikxikþXn
i¼1
Xn
j¼1;j–i
H 0ijð12yijÞþ
Xn
i¼1
Xn
j¼1;j–1
Hijyij ð2Þ
The first term of the equation represents the link or
cabling cost. The second term takes into account
Fig. 1. Geographic division in a cellular network.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938928
the complex handoffs cost and the third, the cost of
simple handoffs. We should keep in mind that the cost
function is quadratic in xik, because yij is a quadratic
function of xik. Let us mention that an eventual
weighting could be taken into account directly in the
link and handoff costs definitions.
The capacity of a switch k is denoted Mk.If li denotes the
number of calls per unit of time destined to i, the limited
capacity of switches imposes the following constraint:Xn
i¼1
lixik # Mk for k ¼ 1;…;m ð3Þ
accordingtowhich the total loadofall cellswhichareassigned
to the switch k is less than the capacity Mk of the switch.
Finally, the constraints of the problem are completed by:
xik ¼ 0 or 1 for i ¼ 1;…; n and k ¼ 1;…;m: ð4Þ
zijk ¼ xijxik and i; j ¼ 1;…; n and k ¼ 1;…;m: ð5Þ
yij ¼Xmk¼1
zijk for i; j ¼ 1;…; n ð6Þ
Eqs. (1), (3) and (4) are constraints of transport problems. In
fact, each cell i could be assimilated to a factory which
produces a call volumeli. The switches are then considered as
warehouses of capacity Mk where the cells production could
be stored. Therefore, the problem is to minimize Eq. (2) under
Eq. (1), and Eqs. (3)–(6). When the problem is formulated in
this way, it could not be solved with a standard method such as
linear programming because constraint (5) is not linear.
Merchant and Sengupta [21,22] replaced it by the following
equivalent set of constraints:
zijk # xik ð7Þ
zijk # xjk ð8Þ
zijk $ xik þ xjk 2 1 ð9Þ
zijk $ 0 ð10Þ
Thus, the problem could be reformulated as follows:
minimizing Eq. (2) under constraints (1), (3) and (4) , and
Eqs. (6)–(10). We can further simplify the problem by
defining:
hij ¼ H 0ij 2 Hij:
hij refers to the reduced cost per time unit of a complex handoff
between cells i and j. Relation Eq. (2) is then re-written as
follows:
f ¼Xn
i¼1
Xmk¼1
cikxik þXn
i¼1
Xn
j¼1; j–1
hijð1 2 yijÞ þXn
i¼1
Xn
j¼1;j–1
Hij|fflfflfflffl{zfflfflfflffl}constant
The assignment problem takes then the following form:Minimize:
f ¼Xn
i¼1
Xmk¼1
cikxik þXn
i¼1
Xn
j¼1; j–1
hijð1 2 yijÞ ð11Þ
subject to: Eqs. (1), (3), (4) and (7)–(10). In this form, the
assignment problem could be solved by usual programming
methods.
The total cost includes two types of cost, namely cost of
handoff between two adjacent cells, and cost of cabling
between cells and switches. The design is to be optimized
subject to the constraint that the call volume of each switch
must not exceed its call handling capacity. This kind of
problem is NP-hard, so enumerative searches are practically
inappropriate for moderate- and large-sized cellular mobile
networks [18,21].
The geographical relationships between cells and
switches are considered in the value of the cost of cabling,
so that the base station of a cell is generally assigned to a
neighbouring switch and not to far switches [37]. In Ref.
[31], an engineering cost model has been proposed to
estimate the cost of providing personal communications
services in a new residential development. The cost model
estimated the costs of building and operating a new PCS
using existing infrastructure such the telephone, cable
television and cellular networks. In Ref. [11], economic
aspects of configuring cellular networks are presented.
Major components of costs and revenues and the major
stakeholders were identified and a model was developed to
determine the system configuration (e.g. cell size, number of
channels, etc.). For example, in a large cellular network, it is
impossible for a cell located in east America to be assigned
to a switch located in west America. In this case, the
variable cost is 1.
3. Evolutionary approach
Evolutionary thought, however, extends beyond the
study of life. Evolution is an optimization process that can
be simulated using a computer or other device and put to
good engineering purpose. The interest in such simu-
lations has increased dramatically in recent years as
applications of this technology have been developed to
supplant conventional technologies in power systems,
pattern recognition, control systems, factory scheduling,
pharmaceutical design, and diverse other areas [8,9].
Evolutionary algorithms have been applied successfully in
various domains of search, optimization, and artificial
intelligence [16,29,33,34,36]. In the field of combinatorial
optimization, it has been shown that combine evolutionary
algorithms with problem-specific heuristics can lead to
highly effective approaches. These hybrid evolutionary
algorithms combine the advantages of efficient heuristics
incorporating domain knowledge and population-based
search approaches.
3.1. Basic principles of classical genetic algorithms
The process used by genetic algorithms to solve
optimization problems is analogous to the natural
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938 929
process of evolution by natural selection [17,35]. Genetic
algorithms apply the natural evolutionary processes of
evaluation and selection to string representations of the
arguments of the function being optimized. Structures
(individuals in natural systems) are encoded into one or
more strings (chromosomes). The chromosome represents
individuals or solutions. At each generation, the individuals
reproduced and fit persist, yielding improved results. The
structure is analogous to the phenotype in natural systems
and corresponds to a candidate solution to the optimization
problem. The string encoding is analogous to the genotype
[10].
The initial search space of a GA usually consists of a
population of randomly generated solutions. A diversified
initial population is a prerequisite to good solutions. The
execution of a genetic algorithm can be viewed as a two-
stage process, which starts with a current population to
which selection operations are applied to create an
intermediate population. The selection scheme determines
which individuals are chosen for reproduction. For a
selection, two essential ingredients are required: (1)
inheritance: offspring must retain at least some of the
features that made their parents fitter than average; (2)
variability: at any given time, individuals of varying
fitness must coexist in the population. Then recombina-
tion (crossover) and mutation are applied to the
intermediate population to create a new population
[14]. In genetic algorithms, evolution from generation
to generation is simulated both by preserving the genetic
information contained in the chromosome and by altering
this information by means of random genetic changes.
Genetic operators affect both these goals. The goal
of preserving the genetic information of fit individuals is
achieved through crossover, one of the genetic
operators used to recombine the population’s genetic
material. Fig. 2 shows the flow chart of the genetic
process.
Crossover is the process by which two chosen string
genes arc interchanged. To execute the crossover, strings of
the mating pool are coupled at random. The crossover of a
string pair of length l is performed as follows: a position i is
chosen uniformly between 1 and (1 2 1 ), then two new
strings are created by exchanging all characters between
positions (i þ l) and l of each string of the pair considered.
The new strings can be totally different from their parents.
Mutation is the process by which a randomly chosen
bit in a chromosome is permuted. It is employed to
introduce new information into the population and also to
prevent the population from becoming saturated with
similar chromosomes (premature convergence). Large
mutation rates increase the probability that
good schemata be destroyed, but increase population
diversity.
Diversity is the term used to describe the relative
uniqueness of each individual in the population. However,
crossover and mutation generate new solutions, but with
certain limitations. Crossing nearly identical strings yields
offspring similar to the parent string. Consequently,
crossover cannot reintroduce diversity. Mutation, on the
other hand, can generate the full space, but may take
excessively long time to yield a desirable solution.
3.2. Basic principles of memetic algorithms
In problems characterized by many local optima,
traditional optimization techniques fail to find high-quality
solutions. In these cases, standard genetic algorithm
(SGA) can be considered as an efficient and interesting
option. However, SGA can suffer from excessively slow
convergence before finding an accurate solution because
of their characteristics of using a priori minimal knowl-
edge and failure to exploit local information [6,29,30,34].
This may prevent them from being really of practical
interest for a lot of large-scale constrained applications.
Genetic algorithms promise convergence but not optim-
ality. This implies that the choice of when to stop a
genetic algorithm is not well defined. Since there is no
guarantee of optimality, successive runs of the GA will
provide different chromosomes with varying fitness
measures. If we run an SGA several times, it will
converge each time, possibly at different optimal
chromosomes.
Memetic algorithms (MA) are population-based heuristic
search approaches for combinatorial optimization problems
based on cultural evolution [27,28]. They are inspired by
Dawkins’ notion of a meme defined as a unit of information
that reproduces itself while people exchange ideas. The
person usually modifies a meme before he or she passes it on
to the next generation. Memetic algorithm is a marriage
between a population-based global search and the heuristic
local search made by each of the individuals [27].
A brief description of memetic algorithm could be:
Given a representation of an optimization problem, a certain
number of individuals are created. The state of these
individuals can be randomly chosen or according to a
certain initialization procedure. A heuristic can be chosen to
initialize the population. After that, each individual makes
local search. The mechanism to do local search can be to
reach a local optima or to improve (regarding the objectiveFig. 2. Genetic process flow chart.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938930
cost function) up to a predetermined level. After that, when
the individual has reached a certain development, it interacts
with the other members of the population. The interaction
can be cooperative; it can be similar to the selection
processes of SGA. The cooperative behavior can be
understood as the mechanisms of crossover in SGA or
other types of breeding that result in the creation of a new
individual. More generally, we must understand cooperation
as an interchange of information. The local search and
cooperation (mating, interchange of information) or com-
petition (selection of better individuals) are repeated until a
stopping criterion is satisfied [27]. Fig. 3 shows the flow
chart of the memetic process.
In the context of evolutionary computation, a hybrid
evolutionary algorithm is called memetic if the individuals
representing solutions to a given problem are improved by a
local search or another improvement technique [26]. Kado
et al. [19] compare different implementations of hybrid
genetic algorithms.
In this paper, we propose memetic algorithms with local
refinement strategies to combine the strengths of both by
providing global and local exploitation aspects to the
problem of assigning cells to switches in cellular mobile
networks. The local refinement strategies used with
memetic algorithms are tabu search and simulated
annealing.
A tabu search method is an adaptive technique used in
combinatorial optimization to solve difficult problems [13,
18,21,22]. It is considered as a meta-heuristic method
because it can be applied to different instances of problems
to provide good solutions. The tabu search method is an
improvement to the general descent algorithm, because it
attempts to avoid the trap of local minima. For this purpose,
it is necessary to accept, from time to time, solutions, which
do not improve the objective function, with the hope to
reach better solutions later. However, accepting solutions
that are not necessary, the best introduces a cycle risk,
i.e. return to solutions that had already considered, hence the
idea of keeping a tabu list T of solutions that had already
considered. Thus, during the generation of the set V of
neighbour candidates, the candidates present in the tabu list
are removed.
The simulated annealing (SA) starts from an initial
solution, which they attempt to improve through a series of
greedy moves, while avoiding to be stranded in a local
minimum. The moves used to escape a local minimum
explore only a very limited set of options. They depend on
the initial solution and do not necessarily lead to a good final
solution.
SA can be applied to a large variety of technological
domains and in particular to telecommunications. It is a
heuristic optimization method, which consists of a local
search by perturbations. This process gives the possibility of
going away, from time to time, from a local minimum to
allow an extension of the field of research of the best
solution.
According to SA, the current topology considered for
a moment as the better one is constantly compared with
the other topologies, which are very ‘close’ to it, i.e. that
can be obtained by carrying out a small perturbation. If a
perturbation results in a topology better than the current
solution, then this topology is saved as current one.
However, it happens that, further to a disturbance, the
obtained nearby topology is kept as current solution,
even if it is not better than the current one, provided that
it respects a certain probability of acceptance. The fact of
accepting from time to time an empirical solution allows
to avoid being trapped too early into a local optimum.
On the other hand, the probability of acceptance should
be weak enough, so that the algorithm can approach as
good as possible the global optimum. Finally, the
algorithm ends when the stopping criterion is reached.
In this stage, the local search should have ended in a
local minimum or in a global optimum. It follows that
the ideal solution found is, either locally optimal,
considering the high number of local optima, or globally
optimal in the best of the cases.
It is customary, for simulated annealing practitioners, to
use the word temperature to denote the parameter u that
controls the probability of accepting a worsening pertur-
bation over time. At the beginning of the process, u is set to
a relatively high value. Then, it is reduced by a
multiplication by a factor a (0 , a , 1), called the cooling
rate or the annealing factor. This reduction of u takes place
every L iterations or trials.
3.3. Multi-population approach
Classical genetic and memetic algorithms are powerful
and perform well on a broad class of problems. However,
part of the biological and cultural analogies used to motivate
a genetic or memetic algorithm search are inherently
parallels.Fig. 3. Memetic process flow chart.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938 931
There exist different ways of exploiting parallelism in
genetic algorithms, and it could be classified into fine-
gained parallel genetic algorithms (also called diffusion or
neighbourhood model) and coarse-gained parallel genetic
algorithms (also called migration model). In the fine-grained
model, one individual resides at each processor. The
individuals have only local interactions and neighbourhood.
In coarse-grained models, the isolated subpopulations help
maintain genetic diversity. Individuals in a subpopulation or
deme (a separately evolving subset of the whole population)
are relatively isolated from individuals on another sub-
population. Therefore, the subpopulation of each island is
exploring a different part of the search space. Every
subpopulation evolves isolate for a few generations before
one or more individuals are exchanged between the sub-
populations. This exchange of individuals is called
migration [12]. Jens [21] indicates that parallel genetic
algorithms in isolated evolving subpopulations with
migrations may offer advantages over sequential
approaches.
The migration model divides the population into multiple
subpopulations, which evolve independently from each
other for a certain number of generations (isolation time).
After the isolation time, some individuals are distributed
between the subpopulations (migration).
By introducing migration, the island model is able to
exploit genetic and cultural differences in the various
subpopulations: this variation in fact represents a source of
genetic and memetic diversities. Each subpopulation is an
island, and there is some designated way in which genetic
and memetic material are moved from one island to another.
The migration algorithm partitions a population of
designs into a set of subpopulations, at specified
intervals, and shares information between these subpopu-
lations. The parameters associated with the migration
algorithm are introduced in Refs. [3–5]: the migration
interval and the migration rate. The migration interval is
the number of generations between each migration, and
the migration rate is the number of individuals selected
for migration.
4. Implementation details
We submitted our memetic algorithms with local
refinement strategies to a series of tests in order to determine
its efficiency and sensitivity to different parameters. Thus,
we will present a few results, which we compare to those
provided by other known heuristics.
4.1. Local search strategies
This section presents the implementations details of the
local refinement strategies used to improve the individuals
representing solutions provided by genetic algorithms: tabu
search and simulated annealing.
Tabu search program was executed by supposing that the
cells are arranged on an hexagonal grid of almost equal
length and width. The antennas are located at the center of
cells and distributed evenly on the grid. However, when two
or several antennas are too close to each other, the antenna
arrangement is rejected and a new arrangement is chosen.
The maximum cell size for the service area is related to the
desired availability level. Principle factors affecting cell
radius and availability include the rain region, the antenna
and its height, foliage loss, modulation, Tx power, Rx
sensitivity, and sectorization. These effects are generally
related to the service area, such as dense urban, suburban,
and low-density. The cost of cabling between a cell and a
switch is proportional to the distance separating both. We
took a proportionality coefficient equal to the unit. The call
rate gi of a cell i follows a gamma law of average and
variance equal to the unit. The call duration inside the cells
are distributed according to an exponential law of parameter
equal to 1. This is justified by the fact that we are
considering a simple model. For more realistic call duration
distributions and models, the reader is referred to Ref. [7]. If
a cell j has k neighbours, the [0,1] interval is divided into
k þ 1 sub-intervals by choosing k random numbers
distributed evenly between 0 and 1. At the end of the
service period in cell j, the call could be either transferred to
the ith neighbour (i ¼ 1;…; k) with a handoff probability rij
equal to the length of ith interval, or ended with a
probability equal to the length of the k þ 1th interval. To
find the call volumes and the rates of coherent handoff, the
cells are considered as M/M/1 queues forming a Jackson
network [20]. The incoming rates ai in cells are obtained by
solving the following system:
ai 2Xn
j¼1
ajrji ¼ gi avec i ¼ 1;…; n
If the incoming rate ai is greater than the service rate, the
distribution is rejected and chosen again. The handoff rate
hij is defined by:
hij ¼ li·rij
All the switches have the same capacity M calculated as
follows:
M ¼1
mð1 þ
K
100ÞXn
i¼1
li
where K is uniformly chosen between 10 and 50, which
insures a global excess of 10–50% of the switches’ capacity
compared to the cells’ volume of call.
In simulated annealing, the parameters are the tempera-
ture u, the annealing factor að0 , a , 1Þ; the current
solution S1; the solution after perturbations S2; and the
stopping criterion. The steps in simulated annealing are:
Create the initial solution S1 (at random, each cell being
allocated to a switch in an unpredictable way, we create a
solution free from capacity constraints on the switches, but
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938932
respecting the constraint of unique assignment of cells to
switches), u is set to a relatively high value (the best solution
cost); Select a new solution S2 that can be obtained by
carrying out a small perturbation over S1;If the solution S2 is
better than S1, then this topology is saved as current one.
However, it happens that, further to a disturbance, the
obtained nearby topology is kept as current solution, even if
it is not better than the current one, provided that it respects
a certain probability of acceptance (the fact of accepting a
loss of quality or fitness allows to avoid being trapped too
early into a local optimum); u is reduced by a multiplication
by an annealing factor aðukþ1 ¼ uk*aÞ; where a ¼ 0:95; If
the stopping criterion will not have been reached, go to step
to select a new solution S2.
4.2. Memetic algorithm implementation
It is desirable that the encoding makes the representation
as robust as possible. This means that even if a piece of the
representation is randomly changed, it will still represent a
viable individual. We have introduced a simple notation to
represent cells and switches, and for encoding chromosomes
and genes. We opted for a non-binary representation of the
chromosomes [15]. In this representation, the genes
(squares) represent the cells, and the integers they contain
represent the switch to which the cell of row i (gene of the
ith position) is assigned. Our chromosomes have therefore a
length equal to the number of cells in the network n, and the
maximal value that a gene can take is equal to the maximal
number of switches m. A chromosome represents the set of
cells in the cellular mobile network, and the length is the
number of cells. A particular value of the string is called a
gene and the possible values are called alleles, taken from
the alphabet V ¼ {1; 2;…;m}: For example, the position 3
in the chromosome represents the third cell and it is
assigned to switch in (Fig. 4).
The first element of the initial population is the one
obtained when all cells are assigned to the nearest switch.
This first chromosome is created therefore in a deterministic
way. The creation of other chromosomes of the population
is probabilistic and follows the strategy of population
without doubles. This strategy permits to ensure the
diversity of the population and a good cover of the search
space. All chromosomes of the population verify the unique
assignment constraint, but not necessarily the one of the
switches’ capacity. The maximum size of this initial
population must be lower than or equal to m n to respect
the principle of the population without doubles.
The crossover operator crosses, under a certain prob-
ability, two randomly chosen chromosomes in the population.
The two chosen chromosomes (parents) are directly inserted
into the new population. Then, the two obtained chromo-
somes (children) are then inserted if the generated probability
of crossover is lower than or equal to the prefixed one.
The mutation operator transfers, under a certain prob-
ability, the elements of the population. It is necessary to
bring back the genetic material that would have been
forgotten during the generations. The size of the population
obtained after applying the operators is then the double of
the one of the initial population.
The choice of the candidates is based on the evaluation
function. In our adaptation, every chromosome is evaluated
according to the criterion of cost in a first time. The sort by
ascending order of the objective value of those chromo-
somes permits to have the best potential chromosomes as
the first elements of population. The second stage of
evaluation consists of verifying the chromosomes in relation
to the capacity constraint on the switches and to determine
the best chromosome that verifies this constraint.
To select the elements of the new generation, we used the
method of the casino caster. As the problem that we have to
solve is a minimization problem, we applied the caster to the
inverses of the objective values of the chromosomes of
the population whose the size is the double of the
initial population one. We recover then in the new selected
population either chromosomes that verify the constraint on
Fig. 4. Representation of individuals.
Fig. 5. MA convergence results.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938 933
the capacity of the switches or those that rape it. The number
of generations is fixed at the beginning of the execution. We
inserted into our adaptation the concept of cycle that permits
to run several successive genetic processes. At every cycle,
a new initial population is created.
Our multi-population memetic algorithm (MA) is con-
trolled by many parameters that affect their efficiency and
accuracy. Among other things, one must decide the number
and the size of the populations, the rate of the migration, and
the destination of the migrants.
For the migration algorithm used in this paper,
subpopulations are arranged in fully-meshed topology.
Here, individuals may migrate from any subpopulation to
another. For each subpopulation, a pool of potential
emigrants is constructed from the other subpopulations.
The migration interval is incorporated into the parallel
algorithm as a probability Pm; and the migration rate is
incorporated as a maximum value Sm: For each subpopu-
lation in the parallel algorithm, migration is achieved as
follows. At the end of a generation, a uniformly distributed
random number x is generated. If x , Pm then migration is
initialized. During migration, a uniform random number
determines the number of individual ns between 1 and Sm to
send. The selection of the individuals for migration is
a fitness-based process. The best ns individuals
in the subpopulation are sent to the other subpopulations.
Whether or not emigrants are sent to the other
subpopulations, each subpopulation then checks to see if
emigrants are arriving from its neighbour. If so, a uniform
random number pr determines the number of accepted
individuals, then the best pr individuals are received into the
subpopulation and replace the pr least fit individuals.
4.3. Some computational experiments
In the first step, we generate an initial population of size
200 chromosomes, then we choose at random the values,
which compose each chromosome: it is the first generation
of chromosomes. In the second step, we estimate each
chromosome by the objective function, what allows to
deduct its value of capacity. Finally, in the last step, the
cycle of generations of the populations begins then, each
new population replacing the previous one. The number of
400 generations is defined at first. In each generation, we
will apply the various genetic operators and the local search
to 200 chromosomes. After each generation, 200 newly
created chromosomes replace the previous generation. After
the ith generation, chromosomes will have evolved in such a
way that this last generation contains chromosomes better
than those in previous generations (i 2 1)th.
To determine the number of subpopulations in parallel,
MA was executed over a set of 600 test cases with 3 instances
of problem in series of 20 tests for each assignment pattern,
with a number of populations varying between 1 and 10. This
experience shows that MA converges to good solutions, close
the lower bound, with a number of populations varying
between 7 and 10, as shown in Fig. 5. An intuitive lower
bound for the problem is the link cost of the solution obtained
by assigning each cell ito the nearest switch k. This lower
bound does not take into account handoff cost. In fact, we
suppose that capacity constraint is being relaxed and that all
cells could be assigned to a single switch.
To define the population size, MA was executed over a set
of600 test caseswith3mobilenetworks inseriesof20 tests for
each assignment pattern with 8 populations. This experience
shows that MA converges to provide good solutions with a
population size varying between 80 and 140 (Fig. 6).
Fig. 6. Population size in MA.
Table 1
CPU Time for MA execution
Element CPU Time percentage (%)
Generate an initial population 1
Evaluation of the chromosomes 42
Crossover, mutation, local-search 20
Immigration procedure 1
Selection procedure 25
Emigration procedure 1
Others 7
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938934
The values used by MA and SGA are: the number of
generations is 200; the population size is 100; the number of
populations is 8 for MA and 1 for SGA; the crossover
probability is 0.9; the mutation probability is 0.08; the
migration interval (Pm) is0.1; themigration rate (Sm) is0.4and
the emigrants accepted (Pr) is 0.2. The number of exchanged
individuals (migration rate) determines the importance
of genetic and memetic diversities in the subpopulations.
Theexperiences showthat anumber ofexchanged individuals
between 40 and 80% of the subpopulation size provide good
solutions. In terms of evaluation fitness, a migration rate of
40% or 80% provides similar results.
Whereas the migration algorithm seeks to improve the
normalized cost and reliability of the SGA, it is important
also to ensure that unacceptable time overhead is not
introduced by migration (Table 1). In order to analyze the
performance of the memetic algorithm independent of
the migration algorithm, migration is turned off ðpm ¼ 0:0Þ:
Table 2
MA and SGA parameters
Number
of generations
Population
size
Number
of cycles
Number
of populations
Crossover
probability
Mutation
probability
SGA 100 100 40 1 0.9 0.08
MA1 (SMA-Simulated
annealing)
100 100 1 1 0.9 0.08
MA2 (SMA-tabu
search)
100 100 1 1 0.9 0.08
Fig. 7. Comparison between MA and SGA.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938 935
Turning off migration for analysis of the memetic algorithm
ensures that timing measurements indicate the effects of
parallel algorithm, rather than the effects of migration.
5. Performance evaluation and numerical results
In order to compare the performance of memetic
algorithm (MA) and genetic algorithm (SGA) with that of
the other heuristics, two types of experiments were
performed: a set of experiments to evaluate the quality of
the solutions in terms of their costs, and another set to
evaluate the performance of MA and SGA in terms of CPU
times. All the test runs described in this section were
performed in a networked workstation environment operat-
ing at 100 Mbps with 10 PCs (Pentium 500 MHz).
5.1. Comparison with standard genetic algorithm approach
In this section, we present the comparative results,
solution costs and CPU times, between memetic
algorithm (MA) and standard genetic algorithm (SGA).
Fig. 8. Comparison between MA, tabu search and simulated annealing.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938936
For the experiments, MA and SGA are executed over a set
of 600 test cases with 3 topologies in series of 50 tests for
each assignment pattern. Table 2 shows the parameter
values used by MA and SGA.
We have tested two memetic algorithms (standard
genetic algorithm in combination with simulated annealing
and tabu search). For these experiments, SMA and MA are
executed over a set of 600 test cases with 3 instances of
problem in series of 50 tests for each assignment pattern.
MA were executed with 8 parallel populations. The results
of this experiment show that the simulated annealing and
tabu search improved the individuals representing solutions
provided by sequential genetic algorithm and multi-
population algorithm. In the case of simulated annealing,
the average improvement rate for sequential algorithm is
39.69% and the average improvement rate for multi-
population algorithm is 22.34%. In the case of tabu search,
the average improvement rate for sequential algorithm is
40.24% and the average improvement rate for multi-
population algorithm is 16.5%.
A comparison between MA and SGA is undertaken in
order to measure the evolution cost and the execution
time. In the first set of experiments, the results obtained
by SGA are compared directly with those provided by
MA. MA and SGA always find the feasible solutions. In
each of the three considered series of tests, MA yields an
improvement in terms of both CPU times and evaluation
cost, in comparison with SGA. In terms of CPU times,
MA2 is between 10 and 20 faster than MA1 and SGA to
find a feasible solution (Fig. 7a). In terms of costs, MA
provide always feasible solutions with a very similar
cost, with better results than sequential memetic
algorithm and standard genetic algorithm. Fig. 7b
shows the comparison between MA and SGA in which
each simulation represents the average over 50 tests of
each algorithm. In conclusion, experimental results from
solving different instances of assignment problem show
that MA approach provides better results than a standard
genetic algorithm.
5.2. Comparison with other heuristics
In this section, we compare tabu search method,
simulated annealing and memetic algorithm (MA) against.
For the experiments, memetic algorithm and the other
heuristics are executed over a set of 600 test cases with a
number of cells varying between 100 and 200, and a number
of switches varying between 5 and 7, that means the search
space size is between 5100 and 7200. We did not consider
problems with small search spaces, because in these cases it
is possible to use enumerative searches to solve them.
The three heuristics always find feasible solutions. In
each of the all considered series of tests, MA yields an
improvement in the cost function in comparison with the
other two heuristics. In terms of costs, MA provides better
results than tabu search and simulated annealing and
the average improvement rates are 1.6 and 4.5% (Fig. 8).
However, in terms of CPU MA is slower than simulated
annealing and tabu search.
6. Conclusions
In this paper, we proposed an evolutionary approach
(memetic algorithms) to solve the problem of assigning cells
to switches in cellular mobile networks. Experiments have
been conducted to measure the quality of solutions provided
by these algorithms. Experimental results from solving
different instances of assignment problem show that our
approach provides better results than a standard genetic
algorithm (SGA). In each of the series of tests considered,
memetic algorithms (MA) yield an improvement in CPU
times and in costs in comparison with SGA.
Finally, the results obtained have been compared with
the results provided by tabu search and simulated
annealing. MA, tabu search and simulated annealing
provide feasible solutions with a very similar cost. In
general, they results obtained with MA are better than
those generated by tabu search and simulated annealing.
The MA were tested with data supplied by a local
network operator and the obtained results were
also satisfying. However the best guarantee of the
efficiency of the algorithm is the large range of data
used in our tests. In summary, the numerical results have
shown that MA can adequately solve this NP-hard
problem and they provide good solutions for moderate-
and large-sized cellular networks (from 5 switches and
100 cells).
References
[1] P. Bhattacharjee, D. Saba, A. Mukherjee, Heuristics for assignment of
cells to switches in a pcsn: a comparative study, International
Conference on Personal Wireless Communications, Jaipur, India
(1999) 331–334.
[2] R. Beaubrun, S. Pierre, J. Conan, An efficient method for optimizing
the assignment of cells to MSCs in PCS networks, Proceedings 11th
International Conference on Wireless Comm., Wireless 99, Calgary
(AB) 1 (1999) 259–265.
[3] E. Cantu-Paz, On the effects of migration on the fitness distribution of
parallel evolutionary algorithms, Proceedings of Genetic and
Evolutionary Computational Conference Workshop Program, Las
Vegas, Nevada 8 (2000) 3.
[4] E. Cantu-Paz, D. Goldberg, in: J. Koza, K. Deb, M. Dorigo, D. Fogel,
M. Garzon, H. Iba, R. Riolo (Eds.), Genetic Programming,
Proceedings of the Second Annual Conference, San Francisco,
Morgan Kaufmann, Los Altos, CA, 1997, pp. 353–361.
[5] E. Cantu-Paz, D. Goldberg, Predicting speedups of idealized bounding
cases of parallel genetic algorithms, in: T. Back (Ed.), Proceedings of
the Seventh International Conference on Genetic Algorithms, San
Francisco, Morgan Kaufmann, Los Altos, CA, 1997, pp. 113–121.
[6] W. Ching-Hung, H. Tzung-Pei, T. Shian-Shyong, Integrating fuzzy
knowledge by genetic algorithms, IEEE Transactions on Evolutionary
Computation 2 (4) (1998) 138–149.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938 937
[7] Y. Fang, I. Chlamtac, Y. Lin, P.C.S. Modeling, Networks under
general call holding time and cell residence time distributions, IEEE/
ACM Transactions on Networking 5 (6) (1997) 893–905.
[8] D. Fogel, in: L. Davis, K. De Jong, M. Vose, L.D. Whitley (Eds.), An
Overview of Evolutionary Programming, Evolutionary Algorithms,
IMA Volumes in Mathematics and its Applications, Springer, Berlin,
1999, pp. 89–109.
[9] D. Fogel, in: K. Miettinen, M.M. Makela, P. Neittaanmaki, J. Periaux
(Eds.), An introduction to evolutionary computation and some
applications, Evolutionary Algorithms in Engineering and Computer
Science, Wiley, Chichester, UK, 1999, pp. 23–41.
[10] D. Fogel, Evolutionary Computation, IEEE Press, Piscataway, NJ,
1995, pp. 38–43.
[11] B. Gavish, S. Sridhar, Economic aspects of configuring cellular
networks, Wireless Networks 1 (1) (1995) 115–128.
[12] M. Georges-Schleuter, Explicit Parallelism of Genetic Algorithms
Through Populations Structures, Parallel Problem Solving from
Nature, Springer, Berlin, 1991, pp. 150–159.
[13] F. Glover, E. Taillard, D. de Werra, A user’s guide to tabu search,
Annals of Operations Research 41 (3) (1993) 3–28.
[14] D.E. Goldberg, Genetic Algorithms in Search, Optimization and
Machines Learning, Addison-Wesley, Reading, MA, 1989.
[15] R.L.P. Gondim, Genetic algorithms and the location area partitioning
problem in cellular networks, Proceedings of the Vehicular Technol-
ogy Conference 96, Atlanta, VA, April 29–30, May 1 (1996)
1835–1838.
[16] L. He, N. Mort, Hybrid genetic algorithms for telecommunications
network back-up routing, BT Technology Journal 18 (4) (2000)
42–50.
[17] J. Holland, Adaptation in Natural and Artificial Systems, The
University of Michigan Press, Ann Arbor, 1975.
[18] F. Houeto, S. Pierre, A tabu search approach for assigning cells to
switches in cellular mobile networks, Computer Communications 25
(2002) 464–477.
[19] K. Kado, P. Ross, D. Come, in: L.J. Eshelman (Ed.), A Study of
Genetic Algorithms Hybrids for Facility Layout Problems, Proceed-
ings Sixth International Conference on Genetic Algorithms, Morgan
Kaufmann, San Mateo, CA, 1995, pp. 498–505.
[20] L. Kleinrock, Queuing Systems I: Theory, Wiley, New York, 1975.
[21] A. Merchant, B. Sengupta, Assignment of cells to switches in PCS
networks, IEEE/ACM Transactions on Networking 3 (5) (1995)
521–526.
[22] A. Merchant, B. Sengupta, Multiway graph partitioning with
applications to PCS networks, IEEE Infocom’94 2 (1994) 593–600.
[23] P. Merz, B. Freisleben, Genetic local search for the tsp: new results,
Proceedings IEEE International Conference on Evolutionary Com-
putation, Piscataway, NJ (1997) 159–164.
[24] P. Merz, B. Freisleben, in: A.-E. Eiben, T. Back, M. Schoenauer,
H.P. Schwefel (Eds.), Memetic Algorithms and the Fitness
Landscape of the Graph Bi-Partitioning Problem, Proceedings
of the Fifth International Conference on Parallel Problem
Solving from Nature PPSN V, Springer, Berlin, 1998, pp.
765–774.
[25] P. Mer-z, B. Freisleben, A comparison of memetic algorithms, tabu
Search, and Ant Colonies for the quadratic assignment problem,
Proceedings of the 1999 International Congress of Evolutionary
Computation (CEC’99), IEEE Press, New York, 1999, pp. 2063–
2070.
[26] P. Merz, B. Freislcben, Fitness landscape analysis and memetic
algorithms for the quadratic assignment problem, IEEE Transactions
on Evolutionary Computation 4 (4) (2000) 337–352.
[27] P. Moscato, On Evolution, Search, Optimization, Genetic Algorithms
and Martial Arts: Towards Memetic Algorithms, Caltech Concurrent
Computation Program, Technical Report. 826, California Institute of
Technology, Pasadena, California, USA, 1989.
[28] P. Moscato, M.G. Norman, in: M. Valero, E. Onate, M. Jane, J.L.
Larriba, B. Suarez (Eds.), Memetic Approach for the Travelling
Salesman Problem Implementation of a Computational Ecology for
Combinatorial Optimization on Message-Passing Systems, Parallel
Computing and Transputer Applications, IOS Press, Amsterdam,
1992, pp. 177–186.
[29] F. Olivier, An evolutionary strategy for global minimization and its
Markov chain analysis, IEEE Transactions on Evolutionary Compu-
tation 2 (3) (1998) 77–90.
[30] R. Rankin, R. Wilkerson, G. Harris, J. Spring, A hybrid genetic
algorithm for an NP-complete problem with an expensive evaluation
function, Proceedings of the 1993 ACM/SIGAPP Symposium on
Applied Computing: States of the Art and Practice, Indianapolis, USA
(1993) 251–256.
[31] D.P. Reed, The cost structure of personal communication services,
IEEE Communications Magazine (1993) 102–108.
[32] D. Saha, A. Mukherjee, P. Bhattacharjee, A simple heuristic for
assignment of cell to switches in a PCS network, Wireless Personal
Communication 12 (2000) 209–224.
[33] R. Salomon, Evolutionary algorithms and gradient search: similarities
and differences, IEEE Transactions on Evolutionary Computation 2
(2) (1998) 45–55.
[34] V. Schenecke, O. Vornberger, Hybrid genetic algorithms for
constrained placement problems, IEEE Transactions on Evolutionary
Computation 1 (4) (1997) 266–277.
[35] T. Shigeyoshi, G. Ashish, Genetic algorithms with a robust solution
searching scheme, IEEE Transactions on Evolutionary Computation 1
(3) (1997) 201–208.
[36] P. Turney, Cost-sensitive classification: empirical evaluation of a
hybrid genetic decision tree induction algorithm, Journal of Artificial
Intelligence Research 2 (1995) 369–409.
[37] C. Wheatly, Trading coverage for capacity in cellular systems: a
system perspective, Microwave Journal (1995) 62–79.
A. Quintero, S. Pierre / Computer Communications 26 (2003) 927–938938