The search functionality is under construction.

Keyword Search Result

[Keyword] performance evaluation(105hit)

61-80hit(105hit)

  • Modeling and Performance Evaluation on Change Time for Migrate Dynamic Workflow Changes

    Shingo YAMAGUCHI  Akira MISHIMA  Qi-Wei GE  Minoru TANAKA  

     
    PAPER

      Vol:
    E86-A No:6
      Page(s):
    1466-1475

    This paper discusses formal modeling and performance evaluation for a type of dynamic change of workflow, called Migrate. Workflow means the flow of work and is designed to process similar instances, called cases. Companies need to continuously refine their current workflow in order to adapt them to various requirements. The change of a current workflow is called dynamic change of the workflow. Before changing a workflow, there exist cases in the workflow. If these cases are ignored or fall into deadlock, the changed workflow would become inconsistent. Since Ellis et al. proposed three change types, Flush, Abort, and Synthetic Cut-Over that keep consistency of workflows in 1995, various change types have been proposed, in which there is a promising change type called Migrate that is proposed by Sadiq et al. Sadiq et al. proposed the concept of Migrate, but did not give a formal model of Migrate. Meanwhile, we have proposed a measure, called change time, in order to evaluate dynamic change of workflows, and used this measure to evaluate the performance on change time for Ellis et al. 's three change types. However, the performance evaluation on change time for Migrate has not been done. In this paper, we first give a Petri-nets-based model of Migrate. Then we present a method of computing change time based on the net model. Finally, we apply the method to 270 examples and show the comparison results between Migrate and Ellis et al. 's three change types.

  • Integrated Performance Evaluation Criteria for Network Traffic Control

    Chuang LIN  Yong JIANG  Wenjiang ZHOU  

     
    PAPER-Network

      Vol:
    E85-B No:11
      Page(s):
    2447-2456

    Performance evaluation criterion is one of the most important issues for design of network traffic control mechanisms and algorithms. Due to multiple performance objectives of network traffic control, performance evaluation criteria must include multiple performance metrics executed simultaneously, which is called integrated performance evaluation criteria. In this paper, we analyze various performance metrics of network traffic control, and propose three integrated performance evaluation criteria. One is the improvement on original Power formula; our new Power formula is based on the multi-service-class model. Another is about the fairness of user's QoS (Quality of Service) requirements (queuing delay and loss rate); especially the detailed discussion on Proportional Fairness Principle is given. And the third one is the integration of preceding two, in which the throughput, queuing delay, packet loss rate, and the fairness are considered simultaneously.

  • Mean Value Analysis of the Waiting Time for the Drop-Head Buffer Management

    Seongcheon KIM  Taekeun PARK  Cheeha KIM  

     
    LETTER-Network

      Vol:
    E85-B No:9
      Page(s):
    1860-1862

    This letter presents a new approach for obtaining the expected waiting time for packets under the drop-head (also called a drop-from-front) scheme for buffer management. The results show that the drop-head scheme is more effective in reducing queueing delays than the drop-tail scheme.

  • Evaluation of the Performance of the Mobile Communications Network Providing Internet Access Service

    Akira MIURA  Toshihiro SUZUKI  Keiko YOSHIHARA  Koji SASADA  Yoko KIKUTA  

     
    PAPER-Mobile Service and Technologies

      Vol:
    E84-B No:12
      Page(s):
    3166-3172

    Internet access via mobile communications networks is growing rapidly; NTT DoCoMo's Internet access service using cellular phones, known as i-mode and started in February 1999, is no exception. The i-mode service enables the user to send e-mail and access Web sites for a variety of information through simple operation of a mobile terminal equipped with a browser. As a result, the traffic to be carried by the PDC (Personal Digital Cellular)-- Packet mobile communication network, which is used to provide the i-mode service, is also increasing rapidly. To meet this growing demand, the switching systems in place are being either increased in capacity or replaced by more powerful ones. To plan this effectively, it is necessary to make an accurate evaluation of the i-mode processing capacity. We have developed a new method of evaluating processing capacity, which is based on the conventional method but takes account of the characteristics specific to the PDC-Packet network. This paper discusses the method of evaluating the processing capacity of switching systems used in the PDC-Packet mobile network.

  • Performance Evaluation on Transient Time of Dynamic Workflow Changes

    Shingo YAMAGUCHI  Yuko SHIODE  Qi-Wei GE  Minoru TANAKA  

     
    PAPER

      Vol:
    E84-A No:11
      Page(s):
    2852-2864

    A workflow is a flow of work carried out by workers, and workflow management is to automate the flow of work. In workflow management, an actual work is carried out based on the workflow, which is called case. In order to effectively meet various requirements, it is necessary to change current workflow dynamically, which is called dynamic workflow change. When the dynamic change is required, there exist cases in the workflow. In order to handle these cases and further to keep the queuing order, the dynamic change takes period of time (called transient time) until the changed workflow becomes steady state again. During the transient time, workers are forced to do irregular work, and therefore it is important to clarify if a change type takes shorter transient time. In this paper, we do the performance evaluation on transient time of dynamic workflow changes. To do so, we first give a definition of transient time, and then propose methods of computing transient time of three change types proposed by Ellis et al. Finally, we do the performance evaluation for 90 dynamic changes by computing the transient times.

  • Designing Multi-Agent Systems Based on Pairwise Agent Interactions

    Takahiro KAWAMURA  Sam JOSEPH  Akihiko OHSUGA  Shinichi HONIDEN  

     
    PAPER

      Vol:
    E84-D No:8
      Page(s):
    968-980

    Systems comprised of multiple interacting mobile agents provide an alternate network computing paradigm that integrates remote data access, message exchange and migration; which up until now have largely been considered independently. On the surface distributed systems design could be helped by a complete specification of the different interaction patterns, however the number of possible designs in any large scale system undergoes a combinatorial explosion. As a consequence this paper focuses on basic one-to-one agent interactions, or paradigms, which can be used as building blocks; allowing larger system characteristics and performance to be understood in terms of their combination. This paper defines three basic agent paradigms and presents associated performance models. The paradigms are evaluated quantitatively in terms of network traffic, overall processing time and size of memory used, in the context of a distributed DB system developed using the Bee-gent Agent Framework. Comparison of the results and models illustrates the performance trade-off for each paradigm, which are not represented in the models, and some implementation issues of agent frameworks. The paper ends with a case study of how to select an appropriate paradigm.

  • Biometrics Systems: Anatomy of Performance

    Anil JAIN  Sharath PANKANTI  

     
    PAPER

      Vol:
    E84-D No:7
      Page(s):
    788-799

    An accurate automatic personal identification is critical to a wide range of application domains such as access control, electronic commerce, and welfare benefits disbursement. Traditional personal identification methods (e.g., passwords, and PIN) suffer from a number of drawbacks and are unable to positively identify a person. Biometrics refers to automatic identification of an individual based on her distinct physiological and/or behavioral traits. While biometrics is not an identification panacea, it is beginning to provide very powerful tools for a variety of new applications (e.g., cellular phones, smart cards and international border control) requiring positive identification. This paper attempts to summarize important research issues in biometrics.

  • Effectiveness and Issues of Rerouting Algorithms for QoS Networks

    Takeshi IKENAGA  Kenji KAWAHARA  Yuji OIE  

     
    PAPER

      Vol:
    E84-B No:6
      Page(s):
    1553-1560

    In QoS networks, routing algorithms for QoS traffic have to provide the transmission path satisfying its QoS requirement while achieving high utilization of network resources. Therefore, server-based QoS routing algorithms would be more effective than distributed routing ones which are very common on the Internet. Furthermore, we believe that rerouting function enhances the advantage of their algorithms in which an already accepted flow with established path is replaced on some other path in order to accept newly arriving transmission request if it can not be accepted without doing so. Thus in this paper, we will propose a rerouting algorithm with the server-based QoS routing and evaluate its performance in terms of the blocking probability by computer simulation. In addition, we will investigate the impact of the amount of traffic with high-priority on the performance in some network topologies. Through some simulation results, we also discuss some issues arising in improving the effectiveness of rerouting.

  • Performance Evaluation for Multiple DSSS Systems with Channel Bands Overlapped

    Ming-Huei CHEN  Bih-Hwang LEE  Chwan-Chia WU  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E84-A No:5
      Page(s):
    1315-1325

    This paper conducts performance evaluation and performs simulation for a code division multiple access (CDMA) system when channel bands of multiple neighboring CDMA/DSSS are overlapped in time domain. It is assumed that all systems adopt direct-sequence spread-spectrum (DSSS) technique and are BPSK modulated by the different carrier frequencies. Automatic power control (APC) is also applied in the interfered system such that the receiver gets the same power from all users. Without loss generality, an additive white Gaussian noise (AWGN) channel is also assumed during analysis. In this paper, the analytic solution of the signal to noise ratio (SNR) is first derived in which both CDMA systems are modulated by different carrier frequencies. We have the results by simulation with Δ f = 0 and Δ f = 1 MHz, respectively. This analysis is good for general cases; and the results show an excellent computational performance. In particular, the result is very close to Pursley's result, when the systems have the same code length with no carrier difference.

  • Percolating Data Delivery on Cellular-Ad Hoc Integrated Network

    Yoshiki SHIMOTSUMA  Takashi SAKAKURA  Kouji YOSHIDA  Masahiro KURODA  Tadanori MIZUNO  

     
    PAPER

      Vol:
    E84-B No:4
      Page(s):
    771-778

    The third generation cellular system will provide high bandwidth data service and multimedia applications are proposed on the high-speed data link. On the other hand, cellular handsets are getting equipped with a short-range radio communication device that is mainly targeted to connect cellular handsets to computers. In this paper, we propose a percolating data delivery mechanism for a cellular-ad hoc integrated network utilizing multicast/broadcast communication, which is endorsed by data synchronization, and single-hop ad hoc networks for information shower/exchange services. The mechanism lessens data traffic in both the cellular and the ad hoc network for data delivery and tolerates unexpected disconnection in the ad hoc network. The mechanism also compensates data delivery in areas out of the cellular service. Our implementation of the data delivery mechanism utilizes Bluetooth for an ad hoc network configuration, and delivers data in the cellular network to the Bluetooth ad hoc network via the data synchronization mechanism. We evaluate communication traffic and delivery time on the prototype system and discuss about the efficiency of the mechanism.

  • A Speech Translation System Applied to a Real-World Task/Domain and Its Evaluation Using Real-World Speech Data

    Atsushi NAKAMURA  Masaki NAITO  Hajime TSUKADA  Rainer GRUHN  Eiichiro SUMITA  Hideki KASHIOKA  Hideharu NAKAJIMA  Tohru SHIMIZU  Yoshinori SAGISAKA  

     
    PAPER-Speech and Hearing

      Vol:
    E84-D No:1
      Page(s):
    142-154

    This paper describes an application of a speech translation system to another task/domain in the real-world by using developmental data collected from real-world interactions. The total cost for this task-alteration was calculated to be 9 Person-Month. The newly applied system was also evaluated by using speech data collected from real-world interactions. For real-world speech having a machine-friendly speaking style, the newly applied system could recognize typical sentences with a word accuracy of 90% or better. We also found that, concerning the overall speech translation performance, the system could translate about 80% of the input Japanese speech into acceptable English sentences.

  • Performance Evaluation on Change Time of Dynamic Workflow Changes

    Shingo YAMAGUCHI  Qi-Wei GE  Minoru TANAKA  

     
    PAPER

      Vol:
    E83-A No:11
      Page(s):
    2177-2187

    A workflow is a flow of work carried out in parallel and in series by people. In order to improve efficiency, it is required to change the current workflow dynamically. Since dynamic change of workflows may probably make the series of work inconsistent, it is necessary to find out consistent change of workflow. As consistent ways, three types of dynamic changes: flush, abort, and synthetic cut-over (SCO), have been proposed. However, the concrete analysis and evaluation have not been done. To do the performance evaluation for the dynamic workflow changes, comparison of the times (called change time) cost in the individual change and the methods how to obtain such times become ever important. In this paper, we first give a definition of change time and then propose the computation methods individually for each change type. Finally, we do experiments to evaluate the performance of three changes by doing the comparison of the change times.

  • Performance Evaluation of Video Transmission with the PCF of the IEEE 802.11 Standard MAC Protocol

    Takahiro SUZUKI  Shuji TASAKA  

     
    PAPER-Terrestrial Radio Communications

      Vol:
    E83-B No:9
      Page(s):
    2068-2076

    This paper focuses on a single BSA (Basic Service Area) in an infrastructure network and studies the performance of the IEEE 802.11 standard MAC protocol by means of simulation. The MAC protocol supports DCF (Distributed Coordination Function) and PCF (Point Coordination Function). The simulation model includes both data transmission with the DCF and H.263 video transmission with the PCF. In the simulation we assume that the channel transmission rate is 2 Mbps and use the system parameters specified in the standard for the DSSS (Direct Sequence Spread Spectrum) physical layer. We evaluate the performance of this protocol in terms of throughput and MPDU (MAC Protocol Data Unit) delay for various values of the CFP (Contention Free Period) repetition interval and the CFP maximum duration. Numerical results show that if the CFP repetition interval is set too long, video MPDU delay becomes very large periodically; therefore, average video MPDU delay deteriorates. We also find that as the CFP maximum duration decreases, the number of video terminals that can be accommodated in the system decreases. Furthermore, how channel transmission errors affect the performance of the protocol is examined. A two-state continuous-time Markov model is used as a burst error model. As a result, we see that for a small number of video terminals, the average video-MPDU-delay performance does not deteriorate drastically for larger values of bit error rate.

  • Performance Evaluation for a Direct-Sequence Spread- Spectrum Multiple-Access Communication System Interfered by Other CDMA/DSSS Systems

    Ming-Heui CHEN  Bih-Hwang LEE  Chwan-Chia WU  

     
    PAPER-Spread Spectrum Technologies and Applications

      Vol:
    E83-A No:6
      Page(s):
    1247-1256

    This paper conducts performance evaluation for a code division multiple access (CDMA) system when channel bands of multiple neighboring CDMA/DSSS are overlapped in frequency domain. It is assumed that all systems adopt direct-sequence spread-spectrum (DSSS) technique and are BPSK modulated by the different carrier frequencies. Automatic power control (APC) is also applied in the interfered system such that the receiver gets the same power from all users. Without loss generality, an additive white Gaussian noise (AWGN) channel is also assumed during analysis. In this paper, the analytic solution of the signal to noise ratio (SNR) is first derived in which both CDMA systems are modulated by different carrier frequencies. This analysis is good for general cases; and the result shows an excellent computational performance. In particular, the result is very close to Pursly's result, when the systems have the same code length with no carrier difference.

  • Two-Processor Scheduling of General Acyclic SWITCH-less Program Nets via Hybrid Priority Lists

    Qi-Wei GE  

     
    PAPER

      Vol:
    E83-A No:3
      Page(s):
    471-479

    This paper deals with two-processor scheduling for general acyclic SWITCH-less program nets with random node firing times. First, we introduce a hybrid priority list L* that has been shown to generate optimal schedules for the acyclic SWITCH-less program nets with unity node firing times, of which AND-nodes possess at most single input edge. Then considering the factors of existence of the AND-nodes with two input edges as well as random node firing times, we extend L* to design a new dynamic priority list Ld and four static priority lists {Lsii=1,2,3,4}; and then combining Ld and Lsi (i=1,2,3,4) we propose four hybrid priority lists {L*ii=1,2,3,4}. Finally, we apply genetic algorithm to evaluate the schedules generated by the four lists through simulations on 400 program nets. Our simulation results show two of the four lists can generate reasonably good schedules.

  • A Two-Processor Scheduling Method for a Class of Program Nets with Unity Node Firing Time

    Qi-Wei GE  

     
    LETTER

      Vol:
    E82-A No:11
      Page(s):
    2579-2583

    This paper deals with two-processor scheduling for a class of program nets, that are acyclic and SWITCH-less, and of which each node has unity node firing time. Firstly, we introduce a hybrid priority list L* that generates optimal schedules for the nets whose AND-nodes possess at most single input edge. Then we extend L* to suit for general program nets to give a new priority list L**. Finally, we use genetic algorithm to do the performance evaluation for the schedules generated by L** and show these schedules are quite close to optimal ones.

  • Call Loss and Forced Termination Probabilities in Cellular Radio Communication Networks with Non-Uniform Traffic Conditions

    Hideaki TAKAGI  Ken-ichi SAKAMAKI  Tohru MIYASHIRO  

     
    PAPER-Mobile Communication

      Vol:
    E82-B No:9
      Page(s):
    1496-1504

    We propose and analyze a traffic model of a cellular radio communication network with an arbitrary cell connection and arbitrary probabilistic movement of mobiles between the cells. Our analytic model consists of birth-and-death processes for individual cells connected by the numerical adjustment of hand-off rates. This approximation is validated by simulation. We evaluate the probabilities of the immediate loss, the completion, and the forced termination during hand-off for an arbitrary call in the network. Our numerical examples reveal the cases in which the increase in the generation rate of new calls results in the increase in the loss probability without affecting much the probability of forced termination in a limited service area.

  • Data Transfer Evaluation of Nomadic Data Consistency Model for Large-Scale Mobile Systems

    Masahiro KURODA  Ryoji ONO  Yoshiki SHIMOTSUMA  Takashi WATANABE  Tadanori MIZUNO  

     
    PAPER

      Vol:
    E82-D No:4
      Page(s):
    822-830

    The optimistic consistency scheme has been established with respect to data consistency and availability in distributed systems. The nomadic data consistency model using version vectors to support data versioning for data synchronization and concurrent conflict detection is suitable for an optimistic replication system that supports large-scale wireless networks. This paper describes the architecture and its data consistency model using data versioning and its access domain control targeted for nomadic data sharing systems, such as collaborative works using database and messaging, and the data transfer optimizations of the model. We evaluate our data versioning scheme comparing with a traditional data versioning and the data transfer optimization by estimation and measurement assuming a mobile worker's job. We generate arithmetic formulas for data transfer estimation using the optimizing techniques and apply them to large-scale data sharing configurations in which collaboration groups are dynamically formed and data is exchanged in each group. The data versioning with an access domain increases flexibility in data sharing configurations, such as mobile collaboration systems and client/server type mobile systems. We confirmed that the combination of the general optimizations and the access domain configurations based on our data consistency model is applicable for large-scale mobile data sharing systems.

  • Performance Analysis of the D Channel Access Control Scheme in the ISDN Basic User/Network Interface

    Shimpei YAGYU  Hideaki TAKAGI  

     
    PAPER-Communication Networks and Services

      Vol:
    E82-B No:4
      Page(s):
    575-585

    In the basic user/network interface of ISDN (ITU-T Recommendation I. 430), the D-channel is shared by up to 8 terminals for signal and data packets. An analytical model is proposed to reveal the performance characteristics of the access control scheme for the D-channel. Numerical and simulation results are shown to demonstrate the performance differentiation of the terminals with different priorities. It is observed that the mean signal delay at low load may become large because of long service time for packets, and that the priority mechanism may not work properly when the loads at terminals are very asymmetric.

  • Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

    Toshihisa OZAWA  

     
    LETTER-Communication Networks and Services

      Vol:
    E82-B No:1
      Page(s):
    184-187

    A packet-based leaky-bucket algorithm functions like the early packet discard (EPD), and accepts a newly arriving packet if the probability that all the cells of the packet are accepted is high. We derive some performance characteristics of the cell and packet arrival processes that are accepted by the leaky-bucket algorithm. From these analyses, a method to determine the values of the parameters of the leaky-bucket algorithm and certain relations between this leaky-bucket algorithm and the generic cell rate algorithm (GCRA) are obtained.

61-80hit(105hit)