scholarly journals Awareness Modeling and Computing for Quality-Aware Coordination

2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Qing Liu ◽  
Charles Z. Liu ◽  
Lan-lan Li ◽  
Maria T. Gambino

In this paper, we address the issues of the trade-off between QoS and QoE with an analytical analysis based on mathematical modeling under a unified normalization measurement. We model through computation the awareness of QoS and QoE with a strategy of quality-aware QoE-QoS coordination. A balanced coordination is proposed using modeling correlations between user experience and service performance. The main contributions of this paper include three main parts. First, a comprehensive mapping is modeled in a close form to illustrate the analytic correlations between QoS, QoE, and data communication. Second, an analytical method to analyze and coordinate the nonlinear trade-off between QoE and QoS is proposed based on the theoretical proof with discussions on necessary-sufficient conditions. Third, an algorithmic framework is provided to perform QoE-QoS coordination based on quality-awareness computing with a test proof. An assessment model for user experience quantification is built with the mean opinion score (MOS) test. Quality-aware QoE and QoS models are built based on the subspace learning strategy. Simulations are given to prove the feasibility and effectiveness of the proposed method. The results show that the operations with the proposed solution can be obtained analytically with balanced efficiency in both user experience performance and network performance.

2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


Author(s):  
Benjamin Grant ◽  
Itai Gurvich ◽  
R. Kannan Mutharasan ◽  
Jan A. Van Mieghem

Problem definition: We study dynamic stochastic appointment scheduling when delaying appointments increases the risk of incurring costly failures, such as readmissions in healthcare or engine failures in preventative maintenance. When near-term base appointment capacity is full, the scheduler faces a trade-off between delaying an appointment at the risk of costly failures versus the additional cost of scheduling the appointment sooner using surge capacity. Academic/practical relevance: Most appointment-scheduling literature in operations focuses on the trade-off between waiting times and utilization. In contrast, we analyze preventative appointment scheduling and its impact on the broader service-supply network when the firm is responsible for service and failure costs. Methodology: We adopt a stochastic dynamic programming (DP) formulation to characterize the optimal scheduling policy and evaluate heuristics. Results: We present sufficient conditions for the optimality of simple policies. When analytical solutions are intractable, we solve the DP numerically and present optimality gaps for several practical policies in a healthcare setting. Managerial implications: Intuitive appointment policies used in practice are robust under moderate capacity utilization, but their optimality gap can quadruple under high load.


Author(s):  
Li Yan ◽  
Matteo Fiorani ◽  
Ajmal Muhammad ◽  
Massimo Tornatore ◽  
Erik Agrell ◽  
...  

Author(s):  
Jiří Kamínek ◽  
Martin Klimánek

This article deals with the possible deployment of the Apple iPhone device as mobile geoinformation technology. An examination of the possibilities of the device, the development tools and the Web Mapping Service (WMS) was followed by developing a prototype of an application called WhateverMap. The application uses maps from the WMS, which are available in the field through mobile data communication. The application interface was designed around the User Experience model so that its control is easy to grasp and intuitive. It also features support to the determination of the current location. To make working with the application more comfortable it integrates a database of WMS ser­vers. The user is thus given an overview of all the maps available and can easily add them as desired. The application can be downloaded free of charge from Apple’s AppStore on the internet.


Author(s):  
G. Mohan Ram ◽  
M. V. Subba Rao ◽  
T. Kesava

For personal, mobiles and sensor communications wireless sensor networking are an emerging concept in recent years. Normally wireless sensor network (WSN) is combined and integrated data relations for modern communication in infrastructure, energy efficiency; these are the main design parameters to improve network performance with respect to mitigate communication relations. This paper describes different types of energy optimization techniques/approaches and basic routing scenarios used for efficient communication in wireless sensor networks. We also give brief description about different routing protocols to support data communication in wireless sensor networks. And also define different routing algorithms used in data communication to increase network efficiency with respect to different network parameters. In this survey, discuss about energy optimization approaches in wireless sensor networks, and also define several techniques which aim energy consumption in wireless nodes in WSNs.


Author(s):  
Ayisat Wuraola Yusuf-Asaju ◽  
Zulkhairi Md. Dahalin ◽  
Azman Ta’a

The increase in the usage of different mobile internet applications can cause deterioration in the mobile network performance. Such deterioration often declines the performance of the mobile network services that can influence the mobile Internet user’s experience, which can make the internet users switch between different mobile network operators to get good user experience. In this case, the success of mobile network operators primarily depends on the ability to ensure good quality of experience (QoE), which is a measure of users’ perceived quality of mobile Internet service. Traditionally, QoE is usually examined in laboratory experiments to enable a fixed contextual factor among the participants even though the results derived from these laboratory experiments presented an estimated mean opinion score representing perceived QoE. The use of user experience dataset involving time and location gathered from the mobile network traffic for modelling perceived QoE is still limited in the literature. The mobile Internet user experience dataset involving the time and location constituted in the mobile network can be used by the mobile network operators to make data-driven decisions to deal with disruptions observed in the network performance and provide an optimal solution based on the insights derived from the user experience data. Therefore, this paper proposed a framework for modelling mobile network QoE using the big data analytics approach. The proposed framework describes the process of estimating or predicting perceived QoE based on the datasets obtained or gathered from the mobile network to enable the mobile network operators effectively to manage the network performance and provide the users a satisfactory mobile Internet QoE.  


2021 ◽  
Author(s):  
Anusha Kannan ◽  
Manikandan N ◽  
Mallikarjuna Nandi ◽  
Morsa Chaitanya ◽  
Chunduru Anilkumar

Abstract The existence of intruders is a threat factor in any network. Degradation of the network operation occur which include delay in transmission, reduced network energy level, low throughput and many. In heterogeneous networks, the threat is complex since it has several interconnected devices working with different operating systems. To solve the trust dispute in the network a Robust and Secure Data Communication Protocol for MANET termed as Software Defined networking enabled Virtual Certification Authority (SDVCA) is proposed. In MANET, the nodes forward information among them. To control the data flow in a MANET the network has to establish a controller node and forwarder nodes for transmitting or forwarding data. The forwarder node carries out the operation of router. The VCA provides authentication certificate for all the network nodes. Without this authentication, the node will be declared as an untrusted intruder. No data will be transferred to or through them. Hence a trusted network is formed and efficient safe data transfer is achieved. In the proposed scheme, the control logic of MANET is moved from forwarding plane (node) to control plane (node) for improving the network performance. A social network model in MANET is designed to create controller-based architecture. This controller node will function as a host and also as a pathway of connecting different social networks in MANET architecture. The results provide improved performances and the network has better throughput, and lesser end to end delay when compared with the existing techniques.


Sign in / Sign up

Export Citation Format

Share Document