• Title/Summary/Keyword: Policy matrix

Search Result 199, Processing Time 0.025 seconds

A Novel Spectrum Access Strategy with ${\alpha}$-Retry Policy in Cognitive Radio Networks: A Queueing-Based Analysis

  • Zhao, Yuan;Jin, Shunfu;Yue, Wuyi
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.193-201
    • /
    • 2014
  • In cognitive radio networks, the packet transmissions of the secondary users (SUs) can be interrupted randomly by the primary users (PUs). That is to say, the PU packets have preemptive priority over the SU packets. In order to enhance the quality of service (QoS) for the SUs, we propose a spectrum access strategy with an ${\alpha}$-Retry policy. A buffer is deployed for the SU packets. An interrupted SU packet will return to the buffer with probability ${\alpha}$ for later retrial, or leave the system with probability (1-${\alpha}$). For mathematical analysis, we build a preemptive priority queue and model the spectrum access strategy with an ${\alpha}$-Retry policy as a two-dimensional discrete-time Markov chain (DTMC).We give the transition probability matrix of the Markov chain and obtain the steady-state distribution. Accordingly, we derive the formulas for the blocked rate, the forced dropping rate, the throughput and the average delay of the SU packets. With numerical results, we show the influence of the retrial probability for the strategy proposed in this paper on different performance measures. Finally, based on the trade-off between different performance measures, we construct a cost function and optimize the retrial probabilities with respect to different system parameters by employing an iterative algorithm.

Singularity Avoidance Path Planning on Cooperative Task of Dual Manipulator Using DDPG Algorithm (DDPG 알고리즘을 이용한 양팔 매니퓰레이터의 협동작업 경로상의 특이점 회피 경로 계획)

  • Lee, Jonghak;Kim, Kyeongsoo;Kim, Yunjae;Lee, Jangmyung
    • The Journal of Korea Robotics Society
    • /
    • v.16 no.2
    • /
    • pp.137-146
    • /
    • 2021
  • When controlling manipulator, degree of freedom is lost in singularity so specific joint velocity does not propagate to the end effector. In addition, control problem occurs because jacobian inverse matrix can not be calculated. To avoid singularity, we apply Deep Deterministic Policy Gradient(DDPG), algorithm of reinforcement learning that rewards behavior according to actions then determines high-reward actions in simulation. DDPG uses off-policy that uses 𝝐-greedy policy for selecting action of current time step and greed policy for the next step. In the simulation, learning is given by negative reward when moving near singulairty, and positive reward when moving away from the singularity and moving to target point. The reward equation consists of distance to target point and singularity, manipulability, and arrival flag. Dual arm manipulators hold long rod at the same time and conduct experiments to avoid singularity by simulated path. In the learning process, if object to be avoided is set as a space rather than point, it is expected that avoidance of obstacles will be possible in future research.

A Distributed Domain Document Object Management using Semantic Reference Relationship (SRR을 이용한 분산 도메인 문서 객체 관리)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.267-273
    • /
    • 2012
  • The semantic relationship structures hierarchically the huge amount of document objects which is usually not formatted. However, it is very difficult to structure relevant data from various distributed application domains. This paper proposed a new object management method to service the distributed domain objects by using semantic reference relationship. The proposed mechanism utilized the profile structure in order to extract the semantic similarity from application domain objects and utilized the joint matrix to decide the semantic relationship of the extracted objects. This paper performed the simulation to show the performance of the proposed method, and simulation results show that the proposed method has better retrieval performance than the existing text mining method and information extraction method.

An analysis of effectiveness and safety about matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜의 효율성 및 안정성 분석)

  • Shin, Hyo-Young;Hwang, Chi-Gon;Jung, Kye-Dong
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.249-255
    • /
    • 2014
  • RFID system is used in several fields such as traffic and access control. The study about RFID security is actively progressed as security threat has been increased. This paper suggests matrix-based authentication protocol. And we analyze the safety of authentication protocol and compares the effectiveness of the protocol with other authentication protocols. The suggested authentication protocol secures from wiretapping attack, replay attack, and spoofing attack, and reduces overload of back-end database so that has efficient performance.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

A Study on the Development of Proposal Evaluation Index for the Overseas Weapon System Purchasing Projects using Axiomatic Design/AHP (공리적설계/AHP를 이용한 해외무기체계 구매사업 제안서 평가지표 개발에 관한 연구)

  • Cho, Hyun-Ki;Kim, Woo-Je
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.3
    • /
    • pp.441-457
    • /
    • 2011
  • In this study, the axiomatic design(AD) method is applied to construct the hierarchical structure of evaluation criteria and the AHP method is used to calculate the weights of criteria in order to develop the proposal evaluation index for the overseas weapon system purchasing projects. The common evaluation items as main categories are selected through the review of evaluation criteria from the previous works and projects, relevant regulations and defense policy, and the design matrix using fuzzy concept is established and evaluated by the expert group in each design phase to determine the independency, that is the satisfaction of decoupled or uncoupled design, for each criteria in the same hierarchy when they are derived from the main categories. The establishment of decoupled or uncoupled design matrix provides mutually exclusiveness of how small number of DPs can be accounted for FRs within the same hierarchy. The proposal evaluation index developed in this study will be used as a general proposal evaluation index for the overseas weapon system purchasing projects which there are no systematically established evaluation tools.

ANALYSIS OF M/M/c RETRIAL QUEUE WITH THRESHOLDS, PH DISTRIBUTION OF RETRIAL TIMES AND UNRELIABLE SERVERS

  • CHAKRAVARTHY, SRINIVAS R.;OZKAR, SERIFE;SHRUTI, SHRUTI
    • Journal of applied mathematics & informatics
    • /
    • v.39 no.1_2
    • /
    • pp.173-196
    • /
    • 2021
  • This paper treats a retrial queue with phase type retrial times and a threshold type-policy, where each server is subject to breakdowns and repairs. Upon a server failure, the customer whose service gets interrupted will be handed over to another available server, if any; otherwise, the customer may opt to join the retrial orbit or depart from the system according to a Bernoulli trial. We analyze such a multi-server retrial queue using the recently introduced threshold-based retrial times for orbiting customers. Applying the matrix-analytic method, we carry out the steady-state analysis and report a few illustrative numerical examples.

Risk Assessment in the Shipbuilding Industry: Present and the Future

  • Jeong, Byung-Yong;Kim, Woo-Jin;Jeong, Ye-Seul
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.143-149
    • /
    • 2012
  • Objective: The aim of this study is to gain an overview of the risk assessment and management system in the shipbuilding industry. Background: The use of risk assessment techniques has grown significantly in recent years. Method: Various references have been reviewed to evaluate risk assessment and management policy. Results: Adapting the risk assessment system has become an important approach not only to prevent industrial accidents but also to enhance the efficiency of works for shipbuilding workers. Conclusion: Risk assessment is an approved technology for operators to address larger hazards, and to ensure risks have been reduced to appropriate levels cost effectively. Application: These results can be used to provide baseline information for risk assessment and management policy.

A Novel Spectrum Allocation Strategy with Channel Bonding and Channel Reservation

  • Jin, Shunfu;Yao, Xinghua;Ma, Zhanyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4034-4053
    • /
    • 2015
  • In order to meet various requirements for transmission quality of both primary users (PUs) and secondary users (SUs) in cognitive radio networks, we introduce a channel bonding mechanism for PUs and a channel reservation mechanism for SUs, then we propose a novel spectrum allocation strategy. Taking into account the mistake detection and false alarm due to imperfect channel sensing, we establish a three-dimensional Markov chain to model the stochastic process of the proposed strategy. Using the method of matrix geometric solution, we derive the performance measures in terms of interference rate of PU packets, average delay and throughput of SU packets. Moreover, we investigate the influence of the number of the reserved (resp. licensed) channels on the system performance with numerical experiments. Finally, to optimize the proposed strategy socially, we provide a charging policy for SU packets.

Fuzzy Multi-Layer Relational Design for the explosive rule-based applications (폭발적인크기의 룰-기반의 응용을 위한 멀티 레이어 퍼어지 관계 설계)

  • Kim, Young Taek
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.343-346
    • /
    • 2012
  • There are many realistic system necessities on the huge size of rule matrices with any Fuzzy Logical Inferences. This paper indicates the experimental design policy on the PCS design for the Platoon and AOS for the social application with some identical resemblances in between them so that we could use a design for two different usages feasibly.