The mobile cellular systems are expected to support multiple services with guaranteed Quality of Service(QoS). But, the ability of wireless systems to accommodate expected growth of traffic load and broadband services...
详细信息
The mobile cellular systems are expected to support multiple services with guaranteed Quality of Service(QoS). But, the ability of wireless systems to accommodate expected growth of traffic load and broadband services is limited by available radio frequency spectrum. Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. To deal with these problems, we implemented a Fuzzy Admission Control System (FACS). We compared the performance of FACS with Shadow Cluster Concept (SCC). In another work, we extended FACS by considering the priority of the on-going connections. We called this system FACS-P. As priority parameter, we considered only one parameter (service request). In this work, we improve our previous system by adding different priorities. We call this system FACS-MP. We evaluate and compare the performance of implemented systems by simulations. From the simulations results, we conclude that the FACS-MP can differentiate better different services compared with previous systems.
The code of Occupational Health and Safety (OHS) is an important regulation to improve the on-the-job safety of employees. Several factors affect the planning and implementation of OHS managementsystems (OHSMS). The ...
详细信息
The code of Occupational Health and Safety (OHS) is an important regulation to improve the on-the-job safety of employees. Several factors affect the planning and implementation of OHS managementsystems (OHSMS). The evaluation of OHS practice is the most important component when building a safety environment policy for employees and administration. Begin aware of subjective nature of factors affecting OHS and the use of statistical method, it becomes controversial as to a way of handling this type of survey data. This research presents a combination of possibilistic regression analysis with a convex hull approach to analyze the fitting factors that impact good practices of OHS. In addition, selected samples of data could be represented as fuzzy sets. This study offers an alternative platform to evaluate influential factors being used towards a successful implementation of the OHS policy.
This paper explores two important themes in the implementation of RFID in supply chain management: (1) analyzing differences between actual (perceived) and potential (expected) key benefits to see if there are benefit...
详细信息
This paper explores two important themes in the implementation of RFID in supply chain management: (1) analyzing differences between actual (perceived) and potential (expected) key benefits to see if there are benefit shortfalls for the key performances; and (2) performing a two-dimensional expectation-perception analysis (EPA) for the purpose of identifying competitive niche and strategically allocating and adjusting the company's resources. Empirical data were collected through surveys of executives of selected Taiwan based companies who had experienced RFID adoption in the supply chain practices. Finally, managerial implications and suggestions were provided for companies and industries that may be considering the adoption of RFID in SCM.
The purpose of this study is to optimally allocate the human resources to tasks while minimizing the total daily human resource costs and smoothing the human resource usage. This human resource allocation problem (hRA...
详细信息
The purpose of this study is to optimally allocate the human resources to tasks while minimizing the total daily human resource costs and smoothing the human resource usage. This human resource allocation problem (hRAP) has two kinds of special constraints, i.e. operational precedence and skill constraints in addition to the ordinary constraints. To deal with the multiple objectives and the special constraints, first we designed this hRAP as a network problem and then proposed a Pareto multistage decision-based genetic algorithm (P-mdGA) to solve it. During the evolutionary process of P-mdGA, a Pareto evaluation procedure called generalized Pareto-based scale-independent fitness function approach was used to evaluate the solutions. Additionally, in order to improve the performance of P-mdGA, we used fuzzy logic controller for fine-tuning genetic parameters. Finally, in order to demonstrate the applicability and to evaluate the performance of the proposed approach, P-mdGA was applied to solve a case study in a hotel, where the managers usually need helpful automatic support for effectively allocating hotel staff to hotel tasks.
In this paper, a pseudo-bitrate mechanism to simulate the layer optimization step in rate allocation is proposed. The simulation forces bit readjustments in the compressed bitstreams so that all significant bitstreams...
详细信息
In this paper, a pseudo-bitrate mechanism to simulate the layer optimization step in rate allocation is proposed. The simulation forces bit readjustments in the compressed bitstreams so that all significant bitstreams will be transferred to the first q - 1 output layers leaving more space in the last qth layer for hiding data. Experimental results showed that pseudo-bitrates can be used to manipulate the amounts of data-to-hide in the compressed bitstreams.
This paper reports application results of Monte-Carlo Tree Search (MCTS) for a practical problem. In this paper, a reentrant scheduling problem is considered as a practical problem which has been addressed by our prev...
详细信息
ISBN:
(纸本)9781424472956
This paper reports application results of Monte-Carlo Tree Search (MCTS) for a practical problem. In this paper, a reentrant scheduling problem is considered as a practical problem which has been addressed by our previous works. MCTS introduced by Coulom is a best-first search where the pseudorandom simulations guide the solution of problem. Recent improvements on MCTS have produced strong computer Go program, which has a large search space, and the success is a hot topic for selecting the best move. So far, most of reports about MCTS have been on two-player game, and MCTS has been applied rarely in one-player perfect-information games. MCTS does not need an admissible heuristic, so the application of MCTS for one-player games might be an interesting alternative. Additionally, one-player games like puzzles are determinately operated only by one player's decision, so sequences of changes in state are describable as a network diagram of interdependence of operations. Therefore if MCTS for one-player games is considered as a meta-heuristic algorithm, we can use this algorithm for not only many practical problems, but also combinatorial optimization problems. Especially as MCTS does not fully depend on evaluation function, so the solutions based on MCTS remain effective if objective function of problem is modified. This paper firstly investigated on the application of Single Player MCTS (SP-MCTS) introduced by Schadd et al. Next this paper showed the effectiveness of new simulation strategies on SP-MCTS by numerical experiments. Based on the results, this paper discussed the application potentiality of SP-MCTS for a practical reentrant scheduling problem.
We propose HyperShield, which is a hypervisor that can be inserted into and removed from a running operating system, for improving security. While many existing security-oriented hypervisors require modifying or reboo...
详细信息
We propose HyperShield, which is a hypervisor that can be inserted into and removed from a running operating system, for improving security. While many existing security-oriented hypervisors require modifying or rebooting an overlying operating system, HyperShield does not require this. HyperShield is intended to be a general framework for various security mechanisms. The current implementation provides two mechanisms for preventing kernel-level buffer overflow. One detects the execution of user code with the kernel privilege, and the other detects malicious modification of a return address in a control stack. HyperShield is implemented on Linux as a loadable kernel module. When the module is inserted, it places itself under the operating system and executes as a hypervisor. The operating system is migrated into a virtual machine and managed by the hypervisor. HyperShield detects attacks by combining virtualization of memory management with a hardware-assisted execution-bit feature. We have confirmed through experiments that HyperShield successfully prevented kernel-level buffer overflow attacks.
The purpose of this study is using HYPERMESH/LS-DYNA finite element analysis to analyze cargo trucks with speeds of 48, 52, 56, 60 kilometer per hour impacting on a rigid wall as well as to investigate the vehicle str...
详细信息
The purpose of this study is using HYPERMESH/LS-DYNA finite element analysis to analyze cargo trucks with speeds of 48, 52, 56, 60 kilometer per hour impacting on a rigid wall as well as to investigate the vehicle structure deformation and safety upon impact. Truck structure after impact at different speeds is analyzed and compared with further analytical CAE computer program showed no serious passenger compartment deformation. The result meets US FMVSS208, EU ECER84, and Japan's TRIAS74 design regulations. It shows that vehicle integrity is intact and results can be used as a reference for vehicle design and development.
In this study, we design and present the novel wearable system with the interactive posture caption and recognition functions based on the non-vision over the ZigBee wireless sensor network (ZigBee-WSN). There are two...
详细信息
In this study, we design and present the novel wearable system with the interactive posture caption and recognition functions based on the non-vision over the ZigBee wireless sensor network (ZigBee-WSN). There are two type sensors, 3-axis accelerometer and clip type, to be employed in our wearable system. These sensors are arranged on user's four limbs such that the posture information can be gathered by them. Then, the posture information is transmitted to the data-controlling center over ZigBee-WSN. Finally, this center can analyze and distinguish various postures by our proposed algorithm through the friend user's interface to express. Our presented wearable system can distinguish out 28 kinds of hand postures and 13 kinds of leg postures altogether. Moreover, under our presented ZigBee-WSN system with small size, low-power consumption, and high-reliability characteristics, the data-controlling center can simultaneously tele-monitor the real-time body interactive postures of 8 persons, when the transmitting distance is less than 18 M and the package correct transmitted rate is more than 97.5%.
The mobile cellular systems are expected to support multiple services with guaranteed Quality of Service(QoS). But, the ability of wireless systems to accommodate expected growth of traffic load and broadband services...
详细信息
The mobile cellular systems are expected to support multiple services with guaranteed Quality of Service(QoS). But, the ability of wireless systems to accommodate expected growth of traffic load and broadband services is limited by available radio frequency spectrum. Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In our previous work, we proposed a fuzzy-based CAC system by considering the priority of the on-going connections. As priority parameter, we considered only one parameter (service request). In this work, we extend our work by adding different priorities. We call this system FACS-MP. We evaluate by simulations the performance of the proposed system. From the simulations results, we conclude that the FACS-MP can differentiate better different services compared with previous system.
暂无评论