• Title/Summary/Keyword: Continuous-time Markov model

Search Result 67, Processing Time 0.026 seconds

Quality of Service Assurance Model for AMR Voice Traffic in Downlink WCDMA System (순방향 WCDMA 채널에서 AMR 음성 트래픽의 품질 보증 모델)

  • Jung, Sung Hwan;Hong, Jung Wan;Lie, Chang Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.2
    • /
    • pp.191-200
    • /
    • 2007
  • We propose the QoS (Quality of Service) assurance model for AMR (Adaptive MultiRate) voice users considering the capacity and service quality jointly in downlink WCDMA system. For this purpose, we introduce a new system performance measure and the number-based AMR mode allocation scheme. The proposed number-based AMR mode allocation can be operated only with the information of total number of ongoing users. Therefore, it can be more simply implemented than the existing power-based allocation. The proposed system performance measure considers the stochastic variations of AMR modes of ongoing users and can be analytically obtained using CTMC (Continuous Time Markov Chain) modeling. In order to validate the proposed analytical model, a discrete event-based simulation model is also developed. The performance measure obtained from the analytical model is in agreement with the simulation results and is expected to be useful for parameter optimization.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

An Approach to a Quantitative Evaluation of U-Service Survivability Reflecting Cyber-terrorism (사이버테러를 고려한 U-Service 생존성의 정량적 평가 방안)

  • Kim, Sung-Ki
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.67-72
    • /
    • 2011
  • A system that provides a ubiquitous service is a networked system that has to overcome their circumstances that the service survivability is weak. the survivability of a networked system is defined as an ability of the system that can offer their services without interruption, regardless of whether components comprising the system are under failures, crashes, or physical attacks. This paper presents an approach that end users can obtain a quantitative evaluation of U-service survivability to reflect intended cyber attacks causing the networked system to fall into byzantine failures in addition to the definition of the survivability. In this paper, a Jini system based on wireless local area networks is used as an example for quantitative evaluation of U-service survivability. This paper also presents an continuous time markov chain (CTMC) Model for evaluation of survivability of U-service that a Jini system provides, and an approach to evaluate the survivability of the U-service as a blocking probability that end users can not access U-services.

Development of a Korean Speech Recognition Platform (ECHOS) (한국어 음성인식 플랫폼 (ECHOS) 개발)

  • Kwon Oh-Wook;Kwon Sukbong;Jang Gyucheol;Yun Sungrack;Kim Yong-Rae;Jang Kwang-Dong;Kim Hoi-Rin;Yoo Changdong;Kim Bong-Wan;Lee Yong-Ju
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.8
    • /
    • pp.498-504
    • /
    • 2005
  • We introduce a Korean speech recognition platform (ECHOS) developed for education and research Purposes. ECHOS lowers the entry barrier to speech recognition research and can be used as a reference engine by providing elementary speech recognition modules. It has an easy simple object-oriented architecture, implemented in the C++ language with the standard template library. The input of the ECHOS is digital speech data sampled at 8 or 16 kHz. Its output is the 1-best recognition result. N-best recognition results, and a word graph. The recognition engine is composed of MFCC/PLP feature extraction, HMM-based acoustic modeling, n-gram language modeling, finite state network (FSN)- and lexical tree-based search algorithms. It can handle various tasks from isolated word recognition to large vocabulary continuous speech recognition. We compare the performance of ECHOS and hidden Markov model toolkit (HTK) for validation. In an FSN-based task. ECHOS shows similar word accuracy while the recognition time is doubled because of object-oriented implementation. For a 8000-word continuous speech recognition task, using the lexical tree search algorithm different from the algorithm used in HTK, it increases the word error rate by $40\%$ relatively but reduces the recognition time to half.

A Model for the Optimal Mission Allocation of Naval Warship Based on Absorbing Markov Chain Simulation (흡수 마코프 체인 시뮬레이션 기반 최적 함정 임무 할당 모형)

  • Kim, Seong-Woo;Choi, Kyung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.558-565
    • /
    • 2021
  • The Republic of Korea Navy has deployed naval fleets in the East, West, and South seas to effectively respond to threats from North Korea and its neighbors. However, it is difficult to allocate proper missions due to high uncertainties, such as the year of introduction for the ship, the number of mission days completed, arms capabilities, crew shift times, and the failure rate of the ship. For this reason, there is an increasing proportion of expenses, or mission alerts with high fatigue in the number of workers and traps. In this paper, we present a simulation model that can optimize the assignment of naval vessels' missions by using a continuous time absorbing Markov chain that is easy to model and that can analyze complex phenomena with varying event rates over time. A numerical analysis model allows us to determine the optimal mission durations and warship quantities to maintain the target operating rates, and we find that allocating optimal warships for each mission reduces unnecessary alerts and reduces crew fatigue and failures. This model is significant in that it can be expanded to various fields, not only for assignment of duties but also for calculation of appropriate requirements and for inventory analysis.

Optimization for Inventory Level of Spare Parts Considering System Availability (시스템 가용도를 고려한 수리부품의 재고수준 최적화)

  • Kim, Heung-Seob;Kim, Pansoo
    • Korean Management Science Review
    • /
    • v.31 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • In almost all of the organizations, the cost for acquiring and maintaining the inventory takes a considerable portion of the management budget, and thus a certain constraint is set upon the budget itself. The previous studies on inventory control for each item that aimed to improve the fill rate, backorder, and the expenditure on inventory are fitting for the commercially-operated SCM, but show some discrepancies when they are applied to the spare parts for repairing disabled systems. Therefore, many studies on systematic approach concept considering spare parts of various kinds simultaneously have been conducted to achieve effective performance for the inventory control at a lower cost, and primarily, METRIC series models can be named. However, the past studies were limited when dealing with the probability distributions for representing the situation on demand and transportation of the parts, with the (S-1, S) inventory control policy, and so on. To address these shortcomings, the Continuous Time Markov Chain (CTMC) model, which considers the phase-type distributions and the (s, Q) inventory control policies to best describe the real-world situations inclusively, is presented in this study. Additionally, by considering the cost versus the system availability, the optimization of the inventory level, based on this model, is also covered.

Utility Bounds of Joint Congestion and Medium Access Control for CSMA based Wireless Networks

  • Wang, Tao;Yao, Zheng;Zhang, Baoxian;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.193-214
    • /
    • 2017
  • In this paper, we study the problem of network utility maximization in a CSMA based multi-hop wireless network. Existing work in this aspect typically adopted continuous time Markov model for performance modelling, which fails to consider the channel conflict impact in actual CSMA networks. To maximize the utility of a CSMA based wireless network with channel conflict, in this paper, we first model its weighted network capacity (i.e., network capacity weighted by link queue length) and then propose a distributed link scheduling algorithm, called CSMA based Maximal-Weight Scheduling (C-MWS), to maximize the weighted network capacity. We derive the upper and lower bounds of network utility based on C-MWS. The derived bounds can help us to tune the C-MWS parameters for C-MWS to work in a distributed wireless network. Simulation results show that the joint optimization based on C-MWS can achieve near-optimal network utility when appropriate algorithm parameters are chosen and also show that the derived utility upper bound is very tight.

Modeling and Performance Analysis of Distance-Based Registration Considering Implicit Registration (묵시적 위치등록을 고려한 거리기준 위치등록의 모형화 및 성능 분석)

  • Lee, Tae-Han;Suh, Jae-Joon;Moon, Yu-Ri;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.23 no.4
    • /
    • pp.357-364
    • /
    • 2010
  • In this study, we consider performance analysis of distance-based registration (DBR). DBR causes a mobile station (MS) to register its location when the distance between the current base station (BS) and the BS in which it last registered exceeds a distance threshold D. In general, DBR has some advantages over the other registration schemes but has a tendency to causes an MS to register more frequently than zone-based registration (ZBR) that is adopted in most of mobile communication systems. The DBR with implicit registration (DBIR) was proposed to improve the performance of DBR. In this study, we point out some problems of the previous analytical model based on continuous time Markov chain and analyze exact performance of the DBIR. We show that the DBIR always outperforms the DBR by using our exact analytical model.

Speech Recognition in Noisy environment using Transition Constrained HMM (천이 제한 HMM을 이용한 잡음 환경에서의 음성 인식)

  • Kim, Weon-Goo;Shin, Won-Ho;Youn, Dae-Hee
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.85-89
    • /
    • 1996
  • In this paper, transition constrained Hidden Markov Model(HMM) in which the transition between states occur only within prescribed time slot is proposed and the performance is evaluated in the noisy environment. The transition constrained HMM can explicitly limit the state durations and accurately de scribe the temporal structure of speech signal simply and efficiently. The transition constrained HMM is not only superior to the conventional HMM but also require much less computation time. In order to evaluate the performance of the transition constrained HMM, speaker independent isolated word recognition experiments were conducted using semi-continuous HMM with the noisy speech for 20, 10, 0 dB SNR. Experiment results show that the proposed method is robust to the environmental noise. The 81.08% and 75.36% word recognition rates for conventional HMM was increased by 7.31% and 10.35%, respectively, by using transition constrained HMM when two kinds of noises are added with 10dB SNR.

  • PDF

Predictive Location Management Strategy Using Two Directional Consecutive LAs in a Cellular Network (이동 통신망에서 방향성을 지닌 2개의 연속적 위치영역을 이용한 예측 위치 관리 전략)

  • Chang, I.K.;Hong, J.S.;Kim, J.P.;Lie, C.H.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.33 no.3
    • /
    • pp.43-58
    • /
    • 2008
  • In this paper, we have presented a dynamic, predictive location update scheme that takes into account each user's mobility patterns. A user's past movement history is used to create two-dimensional transition probability matrix which makes use of two directional consecutive location areas. A mobile terminal utilizes the transition probability to develop a predictive path which consists of several predictive nodes and then the location update is saved as long as a mobile user follows the predictive path. Using continuous-time Markov chain, cost functions of location update and paging are derived and it is shown that the number of predictive nodes can be determined optimally. To evaluate the proposed scheme, simulations are designed and the numerical analysis is carried out. The numerical analysis features user's mobility patterns and regularity, call arrival rates, and cost ratio of location update to paging. Results show that the proposed scheme gives lower total location management cost, compared to the other location update schemes.