• Title/Summary/Keyword: Call patterns

Search Result 98, Processing Time 0.036 seconds

Modeling and Analysis of Load-Balancing Based on Base-Station CoMP with Guaranteed QoS

  • Feng, Lei;Li, WenJing;Yin, Mengjun;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.2982-3003
    • /
    • 2014
  • With the explosive deployment of the wireless communications technology, the increased QoS requirement has sparked keen interest in network planning and optimization. As the major players in wireless network optimization, the BS's resource utilization and mobile user's QoS can be improved a lot by the load-balancing technology. In this paper, we propose a load-balancing strategy that uses Coordinated Multiple Points (CoMP) technology among the Base Stations (BS) to effectively extend network coverage and increase edge users signal quality. To use universally, different patterns of load-balancing based on CoMP are modeled and discussed. We define two QoS metrics to be guaranteed during CoMP load balancing: call blocking rate and efficient throughput. The closed-form expressions for these two QoS metrics are derived. The load-balancing capacity and QoS performances with different CoMP patterns are evaluated and analyzed in low-dense and high-dense traffic system. The numerical results present the reasonable CoMP load balancing pattern choice with guaranteed QoS in each system.

Java API Pattern Extraction and Recommendation using Collocation Analysis (연어 관계 분석을 통한 Java API 패턴 추출 및 추천 방법)

  • Kwon, Chanwoo;Hwang, Sangwon;Nam, Youngkwang
    • Journal of KIISE
    • /
    • v.44 no.11
    • /
    • pp.1165-1177
    • /
    • 2017
  • Many developers utilize specific APIs to develop software, and to identify the use of a particular API, a developer can refer to a website that provides the API or can retrieve the API from the web. However, the site that provides the API does not necessarily provide guidance on how to use it while it can be partially provided in many other cases. In this paper, we propose a novel system JACE (Java AST collocation-pattern extractor) as a method to reuse commonly-used code as a supplement. The JACE extracts the API call nodes, collocation patterns and analyzes the relations between the collocations to extract significant API patterns from the source code. The following experiment was performed to verify the accuracy of a defined pattern: 794 open source projects were analyzed to extract about 15M API call nodes. Then, the Eclipse plug-in test program was utilized to retrieve the pattern using the top 10 classes of API call nodes. Finally, the code search results from reference pages of the API classes and the Searchcode [1] were compared with the test program results.

The Third Communication Channel in the Diffusion Process (확산과정에서의 세 번째 의사전달경로)

  • Park, Sang-June;Shin, Changhoon
    • Asia Marketing Journal
    • /
    • v.8 no.3
    • /
    • pp.1-11
    • /
    • 2006
  • The Bass model assumes two communication channels: mass-media and word-of-mouth. In this paper, we call the mass-media Type I channel of communications. The word-of-mouth channel means interaction between non-adopters and adopters. Let us call it Type II channel of communications. In the real world, however, the non-adopters who are not aware of the innovation can be affected by communications with other non-adopters who are aware of it. Let us call it Type III channel of communications to differentiate with Type II channel. This paper analyzes the impact of Type III channel on diffusion process. The result shows that exponential growth patterns (for example, the adoption patterns of the blockbuster movies) can be observed when non-adopters are influenced by other non-adopters who aware of the innovation.

  • PDF

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

A Design for Elevator Group Controller of Building Using Adaptive Dual Fuzzy Algorithm

  • Kim, Hun-Mo
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.12
    • /
    • pp.1664-1675
    • /
    • 2001
  • In this paper, the development of a new group controller for high-speed elevators is described utilizing the approach of adaptive dual fuzzy logic. Some goals of the control are to minimize the waiting time, mean-waiting time and long-waiting time in a building. When a new hall call is generated, all adaptive dual fuzzy controller evaluates the traffic patterns and changes the membership function of a fuzzy rule base appropriately. A control algorithm is essential to control the cooperation of multiple elevators in a group and the most critical control function in the group controller is an effective and proper hall call assignment of the elevators. The group elevator system utilizing adaptive dual fuzzy control clearly performs more effectively than previous group controllers.

  • PDF

Customer′s Job Identification using the Usage Patterns of Mobile Telecommunication (이동 통신 사용패턴을 이용한 고객의 직업판정)

  • 이재석;조유정
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.06a
    • /
    • pp.243-252
    • /
    • 2001
  • Recently, as most companies recognize the importance of the customer relationship management, they strongly believe that they must know who their customers are. The job of a customer is very important information for us to understand the customer. However, since most customers are reluctant to reveal themselves, they do not let us know their jobs, and even provide false information about their jobs. The target domain of our research is mobile telecommunication. In this research, we developed a system that identifies the customer's job by utilizing the Call Detailed Record. From the Call Detailed Record, we extracted such variables as 'Average Monthly Payment'and 'Age of the Customer'and so forth. Moreover, we generated many summary variables and derived variables such as 'Number of Calls during Work Hours in Weekday', and 'Ratio of Calls from other Mobile Telephone'. Using artificial neural networks, we developed a two-step Job Identification System. In the first step, it identifies the four job classes then in the second step, it subdivides these four job classes into seven jobs. The accuracy of identifying the seven jobs was 69.1%.

  • PDF

Integration Testing Approach using Usage Patterns of Global Variables

  • Hossain, Muhammad Iqbal;Shin, Youngsul;Lee, Woo Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1213-1214
    • /
    • 2012
  • Global variables can be read or modified by any part of the program, making it difficult to remember or reason about every possible use. Sometime it has tight couplings between some of other variables, and couplings between variables and functions. The main focus of this paper is to use call graph and the control flow analysis to design a model from where we generate the test cases for testing global variables.

Personalized Battery Lifetime Prediction for Mobile Devices based on Usage Patterns

  • Kang, Joon-Myung;Seo, Sin-Seok;Hong, James Won-Ki
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.338-345
    • /
    • 2011
  • Nowadays mobile devices are used for various applications such as making voice/video calls, browsing the Internet, listening to music etc. The average battery consumption of each of these activities and the length of time a user spends on each one determines the battery lifetime of a mobile device. Previous methods have provided predictions of battery lifetime using a static battery consumption rate that does not consider user characteristics. This paper proposes an approach to predict a mobile device's available battery lifetime based on usage patterns. Because every user has a different pattern of voice calls, data communication, and video call usage, we can use such usage patterns for personalized prediction of battery lifetime. Firstly, we define one or more states that affect battery consumption. Then, we record time-series log data related to battery consumption and the use time of each state. We calculate the average battery consumption rate for each state and determine the usage pattern based on the time-series data. Finally, we predict the available battery time based on the average battery consumption rate for each state and the usage pattern. We also present the experimental trials used to validate our approach in the real world.

DEVELOPMENT OF IDEA HIERARCHY MODEL FOR IDEA GENERATION OF CONSTRUCTION VE

  • Jinkook Yang;Sungwoo Moon
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.504-509
    • /
    • 2011
  • Recently, construction projects are very complicated and diverse such as high-rise buildings and big bridges, etc. These complicated projects call for a system which can effectively generate productive ideas and activities. Value Engineering (V.E.) activity within construction projects is a necessity for systematic design management and to improve construction ability. This need in the construction industry has required a regular implementation of VE into construction projects. For this reason; America, South Korea, and some other nations have adopted VE applications which control the baseline investments of the construction projects. The process of VE activity is a preferred system and a reasonable alternative. In particular, idea generation within these projects is an important stage in the VE job plan. In this study, VE idea patterns are extracted through best practice analysis from VE cases of road construction projects. Next, we suggest an idea hierarchy model to be used in conjunction with VE idea patterns. This model is supported by reasonable idea generation in VE activity of construction projects. Finally, this model could possibly be the outcome of successful VE results.

  • PDF

An Efficient Candidate Pattern Tree Structure and Algorithm for Incremental Web Mining (점진적인 웹 마이닝을 위한 효율적인 후보패턴 저장 트리구조 및 알고리즘)

  • Kang, Hee-Seong;Park, Byung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • Recent advances in the internet infrastructure have resulted in a large number of huge Web sites and portals worldwide. These Web sites are being visited by various types of users in many different ways. Among all the web page access sequences from different users, some of them occur so frequently that may need an attention from those who are interested. We call them frequent access patterns and access sequences that can be frequent the candidate patterns. Since these candidate patterns play an important role in the incremental Web mining, it is important to efficiently generate, add, delete, and search for them. This thesis presents a novel tree structure that can efficiently store the candidate patterns and a related set of algorithms for generating the tree structure, adding new patterns, deleting unnecessary patterns, and searching for the needed ones. The proposed tree structure has a kind of the 3 dimensional link structure and its nodes are layered.