• Title/Summary/Keyword: tradeoff analysis

Search Result 107, Processing Time 0.031 seconds

Stochastic Time-Cost Tradeoff Using Genetic Algorithm

  • Lee, Hyung-Guk;Lee, Dong-Eun
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.114-116
    • /
    • 2015
  • This paper presents a Stochastic Time-Cost Tradeoff analysis system (STCT) that identifies optimal construction methods for activities, hence reducing the project completion time and cost simultaneously. It makes use of schedule information obtained from critical path method (CPM), applies alternative construction methods data obtained from estimators to respective activities, computes an optimal set of genetic algorithm (GA) parameters, executes simulation based GA experiments, and identifies near optimal solution(s). A test case verifies the usability of STCT.

  • PDF

Analysis on TMD-Tradeoff and State Entropy Loss of Stream Cipher MICKEY (스트림 암호 MICKEY의 TMD-Tradeoff와 내부 상태 엔트로피의 손실에 관한 분석)

  • Kim, Woo-Hwan;Hong, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.73-81
    • /
    • 2007
  • We give two weaknesses of a recently proposed streamcipher MICKEY. We show time-memory-data tradeoff is applicable. We also show that the state update function reduces entropy of the internal state as it is iterated, resulting in keystreams that start out differently but become merged together towards the end.

Diversity-Multiplexing Tradeoff Analysis for Half-Duplex Dynamic Decode-and-Forward Relay Protocol Using Multiple Antennas at a Single Node (단일 노드에서 다중 안테나를 사용하는 HD DDF Relay 프로토콜에 대한 DMT 분석)

  • Yim, Changho;Kim, Taeyoung;Yoon, Eunchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.5
    • /
    • pp.426-435
    • /
    • 2013
  • The diversity-multiplexing tradeoff (DMT) functions of three special half-duplex (HD) dynamic decode-and-forward (DDF) protocols with multiple antennas only at the source node, only at the destination node, and only at the relay node are analytically derived. The DMT functions of these three relay protocols are compared with one another and with those of the nonorthogonal amplify and forward (NAF) protocols.

On the Diversity-Multiplexing Tradeoff of Cooperative Multicast System with Wireless Network Coding

  • Li, Jun;Chen, Wen
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.11-18
    • /
    • 2010
  • Diversity-multiplexing tradeoff (DMT) is an efficient tool to measure the performance of multiple-input and multiple-output (MIMO) systems and cooperative systems. Recently, cooperative multicast system with wireless network coding stretched tremendous interesting due to that it can drastically enhance the throughput of the wireless networks. It is desirable to apply DMT to the performance analysis on the multicast system with wireless network coding. In this paper, DMT is performed at the three proposed wireless network coding protocols, i.e., non-regenerative network coding (NRNC), regenerative complex field network coding (RCNC) and regenerative Galois field network coding (RGNC). The DMT analysis shows that under the same system performance, i.e., the same diversity gain, all the three network coding protocols outperform the traditional transmission scheme without network coding in terms of multiplexing gain. Our DMT analysis also exhibits the trends of the three network coding protocols' performance when multiplexing gain is changing from the lower region to the higher region. Monte-Carlo simulations verify the prediction of DMT.

A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information

  • Gu, Yonghao;Wang, Yongfei;Yang, Zhen;Gao, Yimu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2778-2791
    • /
    • 2017
  • In the age of big data, distributed data providers need to ensure the privacy, while data analysts need to mine the value of data. Therefore, how to find the privacy-utility tradeoff has become a research hotspot. Besides, the adversary may have the background knowledge of the data source. Therefore, it is significant to solve the privacy-utility tradeoff problem in the distributed environment with side information. This paper proposes a distributed privacy-utility tradeoff method using distributed lossy source coding with side information, and quantitatively gives the privacy-utility tradeoff region and Rate-Distortion-Leakage region. Four results are shown in the simulation analysis. The first result is that both the source rate and the privacy leakage decrease with the increase of source distortion. The second result is that the finer relevance between the public data and private data of source, the finer perturbation of source needed to get the same privacy protection. The third result is that the greater the variance of the data source, the slighter distortion is chosen to ensure more data utility. The fourth result is that under the same privacy restriction, the slighter the variance of the side information, the less distortion of data source is chosen to ensure more data utility. Finally, the provided method is compared with current ones from five aspects to show the advantage of our method.

Diversity-Multiplexing Tradeoff Analysis for Half-Duplex Dynamic Decode and Forward Relay MIMO Protocol Using More than Two Source Antennas (두 개 이상의 소스 안테나를 갖는 HD DDF Relay MIMO 프로토콜에 대한 DMT 분석)

  • Kim, Taeyoung;Yim, Changho;Yoon, Eunchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.5
    • /
    • pp.436-442
    • /
    • 2013
  • The diversity-multiplexing tradeoff (DMT) function of a special half-duplex (HD) dynamic decode and forward (DDF) relay protocol with more than two antennas at the source node, two antennas at the relay node, and two antennas at the destination node is derived. This protocol is compared to a HD NAF protocol with the same number of source antennas and a HD DDF relay protocol with two antennas at the source node, more than two antennas at the relay node, and two antennas at the destination node.

Modified Software Equation for Software Cost-Schedule Tradeoff (소프트웨어 비용-일정 타협을 위한 수정된 소프트웨어 공식)

  • Lee, Sang-Un;Choi, Myeong-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.35-43
    • /
    • 2011
  • To develop a software, there is a relationship between development organization's productivity, effort, development schedule, and software size. It is software equation that motive these relations. Basically, relationship between size-effort and size-schedule is applied. If this relationship is not proper, there would be no effect of the cost-schedule tradeoff equation that is derived from software equation, and the manpower profile analysis, etc. To solve these unwanted problems, we presented a modified software equation and a cost-schedule tradeoff model based on the modified software equation. To improve software development success rate, applying proposed model will help in contract negotiation or bid.

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application

  • Lee, Sungju;Sa, Jaewon;Cho, Hyeonjoong;Park, Daihee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6152-6168
    • /
    • 2017
  • Recently, the biometric-based authentication systems such as FIDO (Fast Identity Online) are increased in mobile computing environments. The biometric-based authentication systems are performed on the mobile devices with the battery, the improving energy efficiency is important issue. In the case, the size of images (i.e., face, fingerprint, iris, and etc.) affects both recognition accuracy and energy consumption, and hence the tradeoff analysis between the both recognition accuracy and energy consumption is necessary. In this paper, we propose an energy-efficient way to authenticate based on biometric information with tradeoff analysis between the both recognition accuracy and energy consumption in multimedia IoT (Internet of Things) transmission environments. We select the facial information among biometric information, and especially consider the multicore-based mobile devices. Based on our experimental results, we prove that the proposed approach can enhance the energy efficiency of GABOR+LBP+GRAY VALUE, GABOR+LBP, GABOR, and LBP by factors of 6.8, 3.6, 3.6, and 2.4 over the baseline, respectively, while satisfying user's face recognition accuracy.

A Tradeoff between Customer Efficiency and Firm Productivity in Service Delivery Systems

  • Trinh, Truong Hong;Kachitvichyanukul, Voratas;Luong, Huynh Trung
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.3
    • /
    • pp.224-232
    • /
    • 2012
  • The paper proposes a non-parametric methodology, data envelopment analysis, for measuring efficiency and productivity in service delivery systems with capacity constraints. The methodology provides allocation approaches for studying behaviors of firm and customers in service delivery strategy. The experimental study is carried out to investigate allocation behaviors and conduct an objective tradeoff between efficiency approach and productivity approach. The experimental result indicates that the efficiency approach allocates resource via maximizing customer efficiency rather than firm productivity as in the productivity approach. Moreover, the experiment reveals that there exists an objective tradeoff between the efficiency approach and the productivity approach. These findings provide strategic options for allocation policy in service delivery systems.

Performance Analysis of Tradeoff between Energy Consumption and Activation Delay in UMTS State Transition Mechanism (UMTS 상태 천이 방식에서 에너지 소비와 활성 지연간의 트레이드오프 성능 분석)

  • Choi, Hyun-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1085-1092
    • /
    • 2012
  • Mobile communication systems define user state transition mechanisms in order to manage radio resources and battery power efficiently. In the state transition mechanism, a state with a higher energy consumption inherently offers a shorter access delay, so there is a tradeoff between the energy and delay performances. In this paper, we analyze the user state transition mechanism of UMTS by considering the bursty traffic attributes of mobile applications. We perform a numerical evaluation for both the energy consumption and the activation delay by Markov modeling of the state transition mechanism, and investigate their tradeoff relationship as functions of operational parameters. The resulting energy-delay tradeoff curves clearly show an achievable performance bound of the user state transition mechanism and also offer an optimal operation strategy to minimize the energy consumption while guaranteeing the delay requirement.