• Title/Summary/Keyword: Markov process model

Search Result 368, Processing Time 0.025 seconds

Optimal Production Controls in a Two-Stage Production System with a Component Selling Option (부품 판매 옵션을 갖는 두 단계 일렬 생산 시스템에서의 최적 생산 전략)

  • Kim, Eungab
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.5
    • /
    • pp.447-452
    • /
    • 2015
  • This paper considers a two-stage make-to-stock production system. The first stage produces a single-component and the second stage produces a make-to-stock product using components. In addition to internal demands, the first stage faces external demands with the option of accepting or rejecting. To ration component inventory, the manufacturer adopts a static rule. This paper analyzes the production controls at both facilities that maximizes the manufacturer's profit. Using the Markov decision process model, we characterize the optimal production policy by two monotonic switching curves.

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF

A New Approach of Intensity Predictio in Copper Electroplating Monitoring Using Hybrid HSMM and ANN

  • Wang, Li;Hwan, Ahn-Jong;Lee, Ho-Jae;Hong, Sang-Jeen
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.137-137
    • /
    • 2010
  • Copper electroplating is a very popular and important technology for depositing high-quality conductor interconnections, especially in through silicon via (TSV). As this advanced packaging technique developing, a mass of copper and chemical solution are used, so attention to these chemical materials into the utilization and costs can not be ignored. An economical and practical real-time chemical solution monitoring has not been achieved yet. Either Red-green-blue (RGB) or optical emission spectroscopy (OES) color sensor can successfully monitor the color condition of solution during the process. The reaction rate, uniformity and quality can map onto the color changing. Hidden Semi Markov model (HSMM) can establish mapping from the color change to upper indicators, and artificial neural network (ANN) can be integrated to comprehensively determine its targets, whether the solution inside the container can continue to use.

  • PDF

Dynamic Computation Offloading Based on Q-Learning for UAV-Based Mobile Edge Computing

  • Shreya Khisa;Sangman Moh
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.68-76
    • /
    • 2023
  • Emerging mobile edge computing (MEC) can be used in battery-constrained Internet of things (IoT). The execution latency of IoT applications can be improved by offloading computation-intensive tasks to an MEC server. Recently, the popularity of unmanned aerial vehicles (UAVs) has increased rapidly, and UAV-based MEC systems are receiving considerable attention. In this paper, we propose a dynamic computation offloading paradigm for UAV-based MEC systems, in which a UAV flies over an urban environment and provides edge services to IoT devices on the ground. Since most IoT devices are energy-constrained, we formulate our problem as a Markov decision process considering the energy level of the battery of each IoT device. We also use model-free Q-learning for time-critical tasks to maximize the system utility. According to our performance study, the proposed scheme can achieve desirable convergence properties and make intelligent offloading decisions.

Application of a Semi-Physical Tropical Cyclone Rainfall Model in South Korea to estimate Tropical Cyclone Rainfall Risk

  • Alcantara, Angelika L.;Ahn, Kuk-Hyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.152-152
    • /
    • 2022
  • Only employing historical data limits the estimation of the full distribution of probable Tropical Cyclone (TC) risk due to the insufficiency of samples. Addressing this limitation, this study introduces a semi-physical TC rainfall model that produces spatially and temporally resolved TC rainfall data to improve TC risk assessments. The model combines a statistical-based track model based on the Markov renewal process to produce synthetic TC tracks, with a physics-based model that considers the interaction between TC and the atmospheric environment to estimate TC rainfall. The simulated data from the combined model are then fitted to a probability distribution function to compute the spatially heterogeneous risk brought by landfalling TCs. The methodology is employed in South Korea as a case study to be able to implement a country-scale-based vulnerability inspection from damaging TC impacts. Results show that the proposed model can produce TC tracks that do not only follow the spatial distribution of past TCs but also reveal new paths that could be utilized to consider events outside of what has been historically observed. The model is also found to be suitable for properly estimating the total rainfall induced by landfalling TCs across various points of interest within the study area. The simulated TC rainfall data enable us to reliably estimate extreme rainfall from higher return periods that are often overlooked when only the historical data is employed. In addition, the model can properly describe the distribution of rainfall extremes that show a heterogeneous pattern throughout the study area and that vary per return period. Overall, results show that the proposed approach can be a valuable tool in providing sufficient TC rainfall samples that could be an aid in improving TC risk assessment.

  • PDF

Analysis of Successional Trend by Transition Matrix Model in the Mixed Broadleaved-Abies Forest of Mt. Odae (추이행렬(推移行列) 모델에 의한 오대산(五臺山) 활엽수(闊葉樹)-젓나무속(屬) 혼효림(混淆林)의 천이(遷移) 경향(傾向) 분석(分析))

  • Kim, Ji Hong
    • Journal of Korean Society of Forest Science
    • /
    • v.81 no.4
    • /
    • pp.325-336
    • /
    • 1992
  • The successional status and potential natural vegetation were examined in a mixed broadleaved-Abies forest located at Mt, Odae National Park. The examination was based on the subsequent process of generation replacement by understory saplings for the dominant canopy trees within 88 $5m{\times}50m$ belt transects. The transition matrix model, which was modified from mathematical theory of Markov chain, was employed to analyze the successional status of the study forest. The model suggests that the study forest is still seral, and it is considered to be more than 700 years away from the steady state or climax in terms of species composition. The simulations predict a remarkable decrease in the proportion of species composition of the present dominant Quercus mongolica and Tilia amurensi.s from current 28% and 13% to less than 3% and 5%, respectively, at the steady state. On the contrary, the proportions of Abies holophylla, Acer pseudo-sieboldianum, Carpinus cordata, and Pinus koraiensis will increase at the steady state. The ratio of mixture between deciduous and coniferous trees will be gradually changed from current 6.5 : 3.5 to 5.0 : 5.0 at equilibrium. Discussion for the problems of Quercus mongolica in successional status noted that the species behaved as a mid-successional dominant, not a climax species in the study forest. The hypothesis and sensitivity of the transition matrix model were also discussed to evaluate the applicability to the real situation. The overall results indicated that the present dynamics of the forest must reflect the seral state due to previous disturbance mainly by hyman related interference.

  • PDF

Comprehensive Investigations on QUEST: a Novel QoS-Enhanced Stochastic Packet Scheduler for Intelligent LTE Routers

  • Paul, Suman;Pandit, Malay Kumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.579-603
    • /
    • 2018
  • In this paper we propose a QoS-enhanced intelligent stochastic optimal fair real-time packet scheduler, QUEST, for 4G LTE traffic in routers. The objective of this research is to maximize the system QoS subject to the constraint that the processor utilization is kept nearly at 100 percent. The QUEST has following unique advantages. First, it solves the challenging problem of starvation for low priority process - buffered streaming video and TCP based; second, it solves the major bottleneck of the scheduler Earliest Deadline First's failure at heavy loads. Finally, QUEST offers the benefit of arbitrarily pre-programming the process utilization ratio.Three classes of multimedia 4G LTE QCI traffic, conversational voice, live streaming video, buffered streaming video and TCP based applications have been considered. We analyse two most important QoS metrics, packet loss rate (PLR) and mean waiting time. All claims are supported by discrete event and Monte Carlo simulations. The simulation results show that the QUEST scheduler outperforms current state-of-the-art benchmark schedulers. The proposed scheduler offers 37 percent improvement in PLR and 23 percent improvement in mean waiting time over the best competing current scheduler Accuracy-aware EDF.

Analysis on a Turnover Process of Information Security Professionals (정보보호인력의 직무이동과정에 대한 분석)

  • Kim, Tae-Sung;Kim, Kil-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.101-108
    • /
    • 2011
  • The turnover rate of information security professionals in Korea is over 10% and turnover into non-information security fields accounts for over 50% of all the turnovers [1]. It is not only important to recruit a new quality workforce, but also to make the current workforce perform satisfactorily, to improve their performance, and eventually to attain information security objectives. This study proposes a Markov chain model for the turnover process of information security professionals and forecasts the job duty composition of information security professionals. The results of this study can be applied to secure the justification of government policies for the promotion of information security professionals.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

A HMM-based Method of Reducing the Time for Processing Sound Commands in Computer Games (컴퓨터 게임에서 HMM 기반의 명령어 신호 처리 시간 단축을 위한 방법)

  • Park, Dosaeng;Kim, Sangchul
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.119-128
    • /
    • 2016
  • In computer games, most of GUI methods are keyboards, mouses and touch screens. The total time of processing the sound commands for games is the sum of input time and recognition time. In this paper, we propose a method for taking only the prefixes of the input signals for sound commands, resulting in the reduced the total processing time, instead of taking the whole input signals. In our method, command sounds are recognized using HMM(Hidden Markov Model), where separate HMM's are built for the whole input signals and their prefix signals. We experiment our proposed method with representative commands of platform games. The experiment shows that the total processing time of input command signals reduces without decreasing recognition rate significantly. The study will contribute to enhance the versatility of GUI for computer games.