We consider an equilibrium threshold balking strategy in an unobservable GI/M/c queue with customers' impatience. Upon arriving a customer decides whether to join or balk the queue based on random probability know...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
We consider an equilibrium threshold balking strategy in an unobservable GI/M/c queue with customers' impatience. Upon arriving a customer decides whether to join or balk the queue based on random probability known as joining probability (f). Once a customer decides to join the system it initiates an impatient timer with random duration T, such that, if customers' service is not completed before the timer expires, the customer abandons the system. The waiting time of a customer in system has been associated with a linear cost-reward structure for estimating the net benefit if a customer chooses to participate in the system. The study has been limited to unobservable queue where the information regarding system-length is unknown to the arriving customer. The proposed analysis is based on a root of the characteristic equation formed using the probability generating function of embedded pre-arrival epoch probabilities. Therefore, we obtain the stationary system-length distribution at pre-arrival and arbitrary epochs and thereby we obtain mean system sojourn time. Finally, we present numerical results in the form of graphs for observing net benefit against different model parameters. The proposed model has applications in the modeling of balking and impatient behavior of incoming calls in a call center, multi-core computing, multi-path routing in delay sensitive communications networks.
Cloud computingtechnology is an innovative IT application mode, which integrates computing, storage, network, information services infrastructure, operating system, application platform, WEB services and software res...
详细信息
ISBN:
(纸本)9783037859032
Cloud computingtechnology is an innovative IT application mode, which integrates computing, storage, network, information services infrastructure, operating system, application platform, WEB services and software resources. By using cloud computingtechnology, users can use many different services though the internet. This technology is the result of a variety of technologies evolution and integration, including distributedcomputing, grid computing, utility computing, visualization's technology, and SOA, etc. This paper introduces cloud computing principles and analyzes the necessity, key points and difficulties of the simulation cloud computing project of power system.
In recent years, the scale of mobile internet is rapidly increasing because of the explosive growing of smartphone users and applications. The traffic analysis and anomaly detection become critical for mobile operator...
详细信息
ISBN:
(纸本)9781479947195
In recent years, the scale of mobile internet is rapidly increasing because of the explosive growing of smartphone users and applications. The traffic analysis and anomaly detection become critical for mobile operators. Up to now, there are a number of studies for detecting anomaly network traffic. However, the way of detecting anomalies on massive traffic data in real-time manner is not well studied. In this paper, we propose a real-time anomaly detection method based on dynamic k-NN cumulative-distance abnormal detection algorithm. We also present the design and implementation of the method by leveraging Strom, a distributed steam computingtechnology. Experimental results from evaluation by real-world dataset show that our system is a promised solution for real-time anomaly detection solution in high-speed network.
Speaker age recognition is an essential technique in automation speech recognition based on the speech wavform parameters in speaker's voice. However, there are several challenges in speaker age recognition, such ...
详细信息
ISBN:
(纸本)9781479947195
Speaker age recognition is an essential technique in automation speech recognition based on the speech wavform parameters in speaker's voice. However, there are several challenges in speaker age recognition, such as innate differences in speaker's voice, subjective classification fuzzy, etc. The issue of speaker age based on isolated words is proposed in this paper, including support vector machine (SVM), picking up Mel frequency cepstrum coefficient (MFCC) characteristics of isolated words to distinguish the speaker's age. The voicebox of this paper includes 4507 isolated word speech. Experimental results show that the recognition rate based on isolated word speech can reach 72.93%. Through the experiment towards SVM classifier, we could find that the performance is improved without normalization for MFCC.
Increasingly complex biomedical data from diverse sources demands large storage, efficient software and high performance computing for the data's computationally intensive analysis. Cloud technology provides flexi...
详细信息
ISBN:
(纸本)9781479927302
Increasingly complex biomedical data from diverse sources demands large storage, efficient software and high performance computing for the data's computationally intensive analysis. Cloud technology provides flexible storage and data processing capacity to aggregate and analyze complex data;facilitating knowledge sharing and integration from different disciplines in a collaborative research environment. The ICTBioMed collaborative is a team of internationally renowned academic and medical research institutions committed to advancing discovery in biomedicine. In this work we describe the cloud framework design, development, and associated software platform and tools we are working to develop, federate and deploy in a coordinated and evolving manner to accelerate research developments in the biomedical field. Further, we highlight some of the essential considerations and challenges to deploying a complex open architecture cloud-based research infrastructure with numerous software components, internationally distributed infrastructure and a diverse user base.
internet of Things (IoT) is playing a more and more important role in modern agriculture development. However, problems of efficient storing and reasoning those massive heterogeneous sensor data collected from variety...
详细信息
Binaural source localization is a popular technique in various applications, such as hearing aids, mobile robot, video conference, etc. However, robust binaural cues estimate and suitable localization strategy are alw...
详细信息
ISBN:
(纸本)9781479947195
Binaural source localization is a popular technique in various applications, such as hearing aids, mobile robot, video conference, etc. However, robust binaural cues estimate and suitable localization strategy are always limiting its performance. In this paper, a new algorithm for binaural sound source localization is presented, which is a two-layer model. In the first layer, a spectral weighting generalized cross correlation-phase transformation (GCC-PHAT) method is presented for robust time-delay estimation, by which the probabilistic azimuths of sound source are obtained. In the second layer, an improved algorithm is introduced, which is named Compensated Interaural Intensity Difference (CIID). Based on the probabilistic azimuth localization results and CIID features, spatial grid matching (SGM) is presented to provide a Bayesian model for localizing azimuth and elevation. Compared with three other algorithms, experimental results show that the proposed method has a robust result even in noisy environments.
Robust hand tracking is a great challenge due to human hand's small size and drastic appearance changes. Recently, machine learning especially online learning methods have shown their promising ability in object t...
详细信息
ISBN:
(纸本)9781479947195
Robust hand tracking is a great challenge due to human hand's small size and drastic appearance changes. Recently, machine learning especially online learning methods have shown their promising ability in object tracking. This paper successfully achieved hand tracking under a lately popular online learning framework named Tracking-Learning-Detection (TLD) by a win-win thought that hand tracking and posture recognition can benefit from each other. Firstly, the object model is extended in order to import posture recognition which is done without extra recognition algorithms. In turn, the introducing of hand postures enhance hand tracking since the tracker is adaptive to different hand shapes. At last, skin color is sufficiently applied in every module (tracking, learning and detection) of TLD further improving the speed and accuracy of tracking. Experiments show that the proposed method works well on hand tracking with the additional ability to recognize some given hand postures under various difficulties.
With the prevalence of graph data in real-world applications (e.g., social networks, mobile phone networks, web graphs, etc.) and their ever-increasing size, many distributed graph computing systems have been develope...
详细信息
This proceedings contains 12 papers. The conference covers current issues in data management, database, and information systems research. Data management and databases remain among the main technological cornerstones ...
This proceedings contains 12 papers. The conference covers current issues in data management, database, and information systems research. Data management and databases remain among the main technological cornerstones of the applications of the twenty-first century. With the emergence of Big Data, data-related technologies are becoming more important. VLDB 2015 is a platform where several notable areas like Data Management, Data, Research, Big Data, Big Data Technologies and Information Systems are reviewed. The key terms of this proceedings include database system, inductive logic programming, concurrency control, parametric query optimization, multicores, elastic partitioning, distributed graph computing systems, phrase mining, SIMD instructions, temporal behavior prediction.
暂无评论