• Title/Summary/Keyword: Markov process model

검색결과 369건 처리시간 0.028초

이단계 대기모형에서 손실확률에 대한 근사 (Approximations to blocking probability in two-stage queueing model)

  • 서정강;이계민
    • 한국통신학회논문지
    • /
    • 제22권12호
    • /
    • pp.2644-2652
    • /
    • 1997
  • 본 논문에서는 오버플로우에 관한 연구에서 흔히 나타나는 이단계 대기모형을 연구하였다. 첫번째 단계는 여러개의 큐(queue)로 이루어져 있고, 이 큐들의 수용능력을 넘어서는 순간에 두번째 단계로 오버플로우가 발생한다. 두번째 단계로의 입력과정을 두 개의 상태를 가지는 MMPP로 근사함으로써 손실확률에 대한 계산을 이끌어 내었다. 근사방법으로써, Heffes의 방법과 SAM procedure를 이용하였다.

  • PDF

부품 판매 옵션을 갖는 두 단계 일렬 생산 시스템에서의 최적 생산 전략 (Optimal Production Controls in a Two-Stage Production System with a Component Selling Option)

  • 김은갑
    • 대한산업공학회지
    • /
    • 제41권5호
    • /
    • pp.447-452
    • /
    • 2015
  • This paper considers a two-stage make-to-stock production system. The first stage produces a single-component and the second stage produces a make-to-stock product using components. In addition to internal demands, the first stage faces external demands with the option of accepting or rejecting. To ration component inventory, the manufacturer adopts a static rule. This paper analyzes the production controls at both facilities that maximizes the manufacturer's profit. Using the Markov decision process model, we characterize the optimal production policy by two monotonic switching curves.

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF

A New Approach of Intensity Predictio in Copper Electroplating Monitoring Using Hybrid HSMM and ANN

  • Wang, Li;Hwan, Ahn-Jong;Lee, Ho-Jae;Hong, Sang-Jeen
    • 한국진공학회:학술대회논문집
    • /
    • 한국진공학회 2009년도 제38회 동계학술대회 초록집
    • /
    • pp.137-137
    • /
    • 2010
  • Copper electroplating is a very popular and important technology for depositing high-quality conductor interconnections, especially in through silicon via (TSV). As this advanced packaging technique developing, a mass of copper and chemical solution are used, so attention to these chemical materials into the utilization and costs can not be ignored. An economical and practical real-time chemical solution monitoring has not been achieved yet. Either Red-green-blue (RGB) or optical emission spectroscopy (OES) color sensor can successfully monitor the color condition of solution during the process. The reaction rate, uniformity and quality can map onto the color changing. Hidden Semi Markov model (HSMM) can establish mapping from the color change to upper indicators, and artificial neural network (ANN) can be integrated to comprehensively determine its targets, whether the solution inside the container can continue to use.

  • PDF

Dynamic Computation Offloading Based on Q-Learning for UAV-Based Mobile Edge Computing

  • Shreya Khisa;Sangman Moh
    • 스마트미디어저널
    • /
    • 제12권3호
    • /
    • pp.68-76
    • /
    • 2023
  • Emerging mobile edge computing (MEC) can be used in battery-constrained Internet of things (IoT). The execution latency of IoT applications can be improved by offloading computation-intensive tasks to an MEC server. Recently, the popularity of unmanned aerial vehicles (UAVs) has increased rapidly, and UAV-based MEC systems are receiving considerable attention. In this paper, we propose a dynamic computation offloading paradigm for UAV-based MEC systems, in which a UAV flies over an urban environment and provides edge services to IoT devices on the ground. Since most IoT devices are energy-constrained, we formulate our problem as a Markov decision process considering the energy level of the battery of each IoT device. We also use model-free Q-learning for time-critical tasks to maximize the system utility. According to our performance study, the proposed scheme can achieve desirable convergence properties and make intelligent offloading decisions.

Application of a Semi-Physical Tropical Cyclone Rainfall Model in South Korea to estimate Tropical Cyclone Rainfall Risk

  • Alcantara, Angelika L.;Ahn, Kuk-Hyun
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2022년도 학술발표회
    • /
    • pp.152-152
    • /
    • 2022
  • Only employing historical data limits the estimation of the full distribution of probable Tropical Cyclone (TC) risk due to the insufficiency of samples. Addressing this limitation, this study introduces a semi-physical TC rainfall model that produces spatially and temporally resolved TC rainfall data to improve TC risk assessments. The model combines a statistical-based track model based on the Markov renewal process to produce synthetic TC tracks, with a physics-based model that considers the interaction between TC and the atmospheric environment to estimate TC rainfall. The simulated data from the combined model are then fitted to a probability distribution function to compute the spatially heterogeneous risk brought by landfalling TCs. The methodology is employed in South Korea as a case study to be able to implement a country-scale-based vulnerability inspection from damaging TC impacts. Results show that the proposed model can produce TC tracks that do not only follow the spatial distribution of past TCs but also reveal new paths that could be utilized to consider events outside of what has been historically observed. The model is also found to be suitable for properly estimating the total rainfall induced by landfalling TCs across various points of interest within the study area. The simulated TC rainfall data enable us to reliably estimate extreme rainfall from higher return periods that are often overlooked when only the historical data is employed. In addition, the model can properly describe the distribution of rainfall extremes that show a heterogeneous pattern throughout the study area and that vary per return period. Overall, results show that the proposed approach can be a valuable tool in providing sufficient TC rainfall samples that could be an aid in improving TC risk assessment.

  • PDF

추이행렬(推移行列) 모델에 의한 오대산(五臺山) 활엽수(闊葉樹)-젓나무속(屬) 혼효림(混淆林)의 천이(遷移) 경향(傾向) 분석(分析) (Analysis of Successional Trend by Transition Matrix Model in the Mixed Broadleaved-Abies Forest of Mt. Odae)

  • 김지홍
    • 한국산림과학회지
    • /
    • 제81권4호
    • /
    • pp.325-336
    • /
    • 1992
  • 본 연구는 오대산(五臺山) 국립공원내(國立公園內)의 활엽수(闊葉樹)-젓나무속(屬) 혼효림(混淆林)에서 삼림천이(森林遷移) 경향과 잠재(潛在) 삼림식생(森林植生)을 검토 분석한 것이다. 88개의 $5m{\times}50m$ 대상표본구(帶狀標本區)를 설치하여 상층(上層) 우세목(優勢木)의 아래에서 생육하는 하층목(下層木)에 의해서 세대(世代) 교체(交替)되는 과정을 바탕으로 천이(遷移) 경향을 평가하였다. 조사 대상 삼림(森林)의 천이(遷移) 경향 분석은 Markov chain의 수학적(數學的) 이론에서 변형된 추이행렬(推移行列) 모델을 사용하였다. 본 연구 결과가 암시하는 바에 의하면 조사 삼림(森林)은 천이(遷移)의 중간단계(中間段階)에 있으며, 수종(樹種) 구성상(構成上) 극성상림(極盛相林)에 도달하려면 700년(年) 이상의 기간이 소요될 것으로 나타났다. 현재 28%와 13%의 높은 상대밀도(相對密度)를 유지하고 있는 신갈나무와 피나무는 극성상(極盛相)의 안정상태(安定狀態)가 되면 각각 3%와 5% 이하로 수종(樹種) 구성비율(構成比率)이 감소하리라 예상된다. 반면에, 젓나무, 당단풍, 까치박달, 그리고 잣나무의 구성비율(構成比率)은 증가할 것으로 사료되며, 현재 활엽수(闊葉樹)와 침엽수(針葉樹)의 혼효율(混淆率)이 6.5 : 3.5에서 5.0 : 5.0로 변화할 것이다. 신갈나무의 천이계열상(遷移系列上)의 문제점을 고찰한 바, 신갈나무는 천이(遷移) 중반단계의 우세종(優勢種)으로써 역할을 하며 극성상(極盛相) 수종(樹種)은 아닌 것으로 추정한다. 추이행렬(推移行列) 모델의 실제 상황에 대한 적용성을 평가하기 위하여 연구 모델의 단정(假定)과 민감도(敏感度) 역시 고찰하였다. 전반적인 연구 결과가 지적하는 바에 의하면 조사 삼림의 현재 생태적(生態的) 동태(動態)는 인간에 의한 방해와 교란(攪亂)이 있은후 천이가 진행 중임을 반영(反映)한다.

  • PDF

Comprehensive Investigations on QUEST: a Novel QoS-Enhanced Stochastic Packet Scheduler for Intelligent LTE Routers

  • Paul, Suman;Pandit, Malay Kumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.579-603
    • /
    • 2018
  • In this paper we propose a QoS-enhanced intelligent stochastic optimal fair real-time packet scheduler, QUEST, for 4G LTE traffic in routers. The objective of this research is to maximize the system QoS subject to the constraint that the processor utilization is kept nearly at 100 percent. The QUEST has following unique advantages. First, it solves the challenging problem of starvation for low priority process - buffered streaming video and TCP based; second, it solves the major bottleneck of the scheduler Earliest Deadline First's failure at heavy loads. Finally, QUEST offers the benefit of arbitrarily pre-programming the process utilization ratio.Three classes of multimedia 4G LTE QCI traffic, conversational voice, live streaming video, buffered streaming video and TCP based applications have been considered. We analyse two most important QoS metrics, packet loss rate (PLR) and mean waiting time. All claims are supported by discrete event and Monte Carlo simulations. The simulation results show that the QUEST scheduler outperforms current state-of-the-art benchmark schedulers. The proposed scheduler offers 37 percent improvement in PLR and 23 percent improvement in mean waiting time over the best competing current scheduler Accuracy-aware EDF.

정보보호인력의 직무이동과정에 대한 분석 (Analysis on a Turnover Process of Information Security Professionals)

  • 김태성;김길환
    • 정보보호학회논문지
    • /
    • 제21권6호
    • /
    • pp.101-108
    • /
    • 2011
  • 정보보호분야에 종사하고 있는 인력 중 10% 이상이 매년 직장을 옮기고 있고, 퇴사 인력 중 50% 이상이 정보보호 이외의 직무로 전환을 하고 있어 정보보호 전문인력의 유출이 상당한 규모이다[1]. 정보보호 분야에 신규로 우수한 인력을 채용하는 것 뿐만 아니라, 이미 정보보호 분야에 근무하고 있는 인력들에게 만족스럽게 업무를 수행할 수 있는 여건을 제공하여 정보보호인력들의 전문성을 높이고 정보보호 관련 업무의 완성도를 높이는 것이 중요한 과제이다. 본 연구에서는 정보보호인력의 직무 이동 과정을 마코프체인을 이용하여 모델링하고 향후 정보보호인력의 직무별 구성에 대하여 전망한다. 본 연구의 결과는 유망 분야 중점 육성의 효과를 예측하는 등 정보보호 인력양성 관련 세부적인 정책추진의 타당성을 확보하는데 참고가 될 수 있을 것이다.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권8호
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.