In demanding for repair items or standard products, customers sometimes require multiple common items. In this study the waiting time of demand which require multiple items under base stock policy is analyzed theoreti...
详细信息
ISBN:
(纸本)9783839602935
In demanding for repair items or standard products, customers sometimes require multiple common items. In this study the waiting time of demand which require multiple items under base stock policy is analyzed theoretically and numerically. It is assumed that the production time has an exponential distribution and the demand is satisfied under a FCFS rule. Each demand waits until all of its requirements are satisfied. An arriving process of demand is assumed to follow a Poisson process and the numbers of required items are independent and generally distributed. A method for deriving waiting time distribution of demand is shown by using known methods for computing MX/M/1 waiting time distribution and for deriving the distribution on the order corresponding to the last item the current customer requires. By using the analytical results, properties of waiting time distribution of demand and optimal numbers of base stocks are discussed through numerical experiments.
In the 21st century, lots of entity Retail Companies chooses online selling as a channel for their promotion. However, the technology based on catalogues to classify product information is no longer efficient for cust...
详细信息
Challenges on the Internet infrastructure such as distributed Denial of Service (DDoS) attacks are becoming more and more elaborate. DDoS attacks have emerged as a growing threat not only to businesses and organizatio...
详细信息
ISBN:
(纸本)9781467320160
Challenges on the Internet infrastructure such as distributed Denial of Service (DDoS) attacks are becoming more and more elaborate. DDoS attacks have emerged as a growing threat not only to businesses and organizations but also to national security and public safety. DDoS attacks have become more dynamic and intelligent than before, prompting equally advanced responses for dealing with these attacks. In this paper, we aim to apply a modified version of our "D~2R~2+DR" Resilience strategy to help solve this problem. We adopt a fuzzy rule based learning technique with self-evolving capability. Two scenarios are proposed for our case studies. The first is focusing on the traffic classification problem, while the latter aims to capitalise on policy to control the activities within the resilience framework. The two scenarios are investigated using a resilience simulator framework that provides a near-realistic large scale attack scenario on a network operator network topology. The novelty of our proposal lies in the combination of policy-based management and the application of an advanced online, self-evolving learning technique that has been proved to work in uncertain environments or in environments where obtaining detailed knowledge from the surrounding is almost impossible. It also requires fewer computational and human resources, which is key to contributing towards a more practical, resource efficient and autonomous resilience framework.
Advances in the fields of distributedcomputing, wireless sensor networks, ubiquitous computing and many more have facilitated the development of a plenitude of intelligent Environments (IE). The development processes...
详细信息
The current state of information technologies requires high-performance processing and storing of large data volumes. To satisfy these constantly growing requirements, leading IT companies provide cloud computing serv...
详细信息
The current state of information technologies requires high-performance processing and storing of large data volumes. To satisfy these constantly growing requirements, leading IT companies provide cloud computing services - pool of abstract, virtualized, highly-scalable resources, available on-demand over Internet. However, this concept still has limitations, which sometimes are too high to give in. striving for the possible solutions in order to escape such limitations and finding a compromise between flexibility of cloud computing and confidence of local resources is an important step for further development of distributedcomputing.
Databases are normally designed to support a specific application domain, and the globalization process brings new issues to integrate data from more than one database. This paper proposes an architecture to integrati...
详细信息
Databases are normally designed to support a specific application domain, and the globalization process brings new issues to integrate data from more than one database. This paper proposes an architecture to integrating databases, by demonstrating a method for integrating semantically heterogeneous databases with a single tool and grid computingtechnology, which enables access to different databases in different formats through a single interface, as if they were a single database. Thus, this architecture can carry out queries simultaneously on shared integrated databases in a parallel way.
The mobile ad hoc networks (MANETs) are highly vulnerable to attacks because of its unique characteristics such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic n...
详细信息
ISBN:
(纸本)9783642178801
The mobile ad hoc networks (MANETs) are highly vulnerable to attacks because of its unique characteristics such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic network topology. In particular, distributed denial-of-service (DDoS) attacks can severely cripple network performance with relatively little effort expended by the attacker. These attacks throttle the tcp throughput heavily. A new defense scheme is proposed to develop a flow monitoring scheme to defend against such attacks in mobile adhoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The defense mechanism includes bandwidth reservation and distributed rate control. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users.
Scheduling of jobs is one of the crucial tasks in grid environment. We consider non-preemptive scheduling of mixed tasks in a computational grid. Recently, a general distributed scalable grid scheduler (GDS) was propo...
详细信息
ISBN:
(纸本)9783642240362;9783642240379
Scheduling of jobs is one of the crucial tasks in grid environment. We consider non-preemptive scheduling of mixed tasks in a computational grid. Recently, a general distributed scalable grid scheduler (GDS) was proposed. which prioritizes mission-critical tasks while maximizing the number of tasks meeting deadlines. However, the GDS scheduler did not consider the reliability factor, which may result in low successful schedule rates. In this paper, we propose a novel distributed grid scheduler which considers various parameters Priority, Deadline. CCR and reliability of grid nodes. The proposed scheduler maintains the tasks allocated to deficient grid nodes in a queue. Further the queued tasks are rescheduled to the other nodes of the grid. It is observed that RDGS-MT scheduler shows a significant improvement in terms of successfully scheduled tasks (hard, firm, soft) as compared to a GDS-S (GDS without shuffle phase). The results of our exhaustive simulation experiments demonstrate the superiority of the proposed scheduler over the GDS-S scheduler.
The proceedings contain 24 papers. The special focus in this conference is on Smart grids, Active houses, Smart meters, intelligent applications, Communication and control protocols, Multi-agent systems, Power system ...
ISBN:
(纸本)9783642193217
The proceedings contain 24 papers. The special focus in this conference is on Smart grids, Active houses, Smart meters, intelligent applications, Communication and control protocols, Multi-agent systems, Power system automation, Electric vehicles, Competitive environment and distributed generation. The topics include: microgrid modelling and analysis using game theory methods;implementation of gossip algorithms in power systems;a review of ICT considerations in actual AMI deployments;performance evaluation of a web service enabled smart metering platform;a review of customer management tools;high level requirements for smart meters that will enable the efficient deployment of electric vehicles;suppressing peak load at simultaneous demand of electric heating in residential areas;design and implementation of a practical smart home system based on DECT technology;field trials towards integrating smart houses with the smart grid;demand side management in smart buildings using KNX/EIB;cutting-edge information and telecommunication technologies meet energy;routing and G-networks to optimise energy and quality of service in packet networks;the beywatch conceptual model for demand-side management;monitoring and control for energy efficiency in the smart house;the powermatching city field test;ICT-platform based distributed control in electricity grids with a large share of distributed energy resources and renewable energy sources and cellular system model for smart grids combining active distribution networks and smart buildings.
In the development of large ad-hoc Wireless Sensor and Actuator Agent Networks (SANETS), a multitude of disparate problems are faced. In order for these networks to function, software must be able to effectively manag...
详细信息
In the development of large ad-hoc Wireless Sensor and Actuator Agent Networks (SANETS), a multitude of disparate problems are faced. In order for these networks to function, software must be able to effectively manage: unreliable dynamic distributed communication, the power constraints of un-wired devices, failure of hardware devices in hostile environments and the remote allocation of distributed processing tasks throughout the network. The solutions to these problems must be solved in a highly scalable manner. The paper describes the process of analysis of the requirements and presents a design of a service-oriented software infrastructure (middleware) solution for scalable ad-hoc networks, in a context of a system made of mobile sensors and actuators.
暂无评论