Entity

Time filter

Source Type

Oneonta, NY, United States

Lokshina I.V.,Management | Bartolacci M.R.,Pennsylvania State University
International Journal of Mobile Network Design and Innovation | Year: 2014

The paper recommends an approach to estimate effectively probability of buffer overflow in self-similar queuing networks with finite buffer capacity. Simulations with stochastic (or long-range dependent) traffic source models are conducted. A new efficient algorithm, based on the RESTART method, is developed and applied to accelerate the buffer overflow simulation in a finite buffer single server model under long-range dependent self-similar traffic load with different buffer sizes. Numerical examples and simulation results are provided. Copyright © 2014 Inderscience Enterprises Ltd. Source


Gomes L.F.A.M.,Management | De Mattos Fernandes J.E.,Aereo | De Mello J.C.C.B.S.,Federal University of Fluminense
Journal of Advanced Transportation | Year: 2014

This article deals with the problem of decision support for the selection of an aircraft. This is a problem faced by an airline company that is investing in regional charter flights in Brazil. The company belongs to an economic group whose core business is logistics. The problem has eight alternatives to be evaluated under 11 different criteria, whose measurements can be exact, stochastic, or fuzzy. The technique chosen for analyzing and then finding a solution to the problem is the multicriteria decision aiding method named NAIADE (Novel Approach to Imprecise Assessment and Decision Environments). The method used allows tackling the problems by working with quantitative as well as qualitative criteria under uncertainty and imprecision. Another considerable advantage of NAIADE over other multicriteria methods relies in its characteristics of not requiring a prior definition of the weights by the decision maker. As a conclusion, it can be said that the use of NAIADE provided for consistent results to that aircraft selection problem. Copyright © 2012 John Wiley & Sons, Ltd. Source


Lokshina I.,Management | Thomas W.,SUNY College at Oneonta
International Symposium on Wireless Personal Multimedia Communications, WPMC | Year: 2013

The significance, which businesses and governments have placed on the RFID and NFC technologies in electronic article surveillance, the cashless payment systems from credit cards and public transportation tickets to the consumer devices, healthcare, and e-government, involves reviewing requirements for the electronic tags. This paper defines the electronic tag life cycle that follows the product life cycle, considers representative business processes and interacting business entities, classifies the electronic tag usage methods, identifies the electronic tag risks, and summarizes the design requirements for the electronic tags from a business viewpoint to be considered by the RFID and NFC developers. © 2013 NICT. Source


Lokshina I.,Management | Bartolacci M.R.,Pennsylvania State University
International Journal of Mobile Network Design and Innovation | Year: 2012

The paper recommends an effective approach to estimate probability of buffer overflow in wireless communication networks. The buffer overflow probability in queuing systems is defined as a rare event and can be estimated using rare event simulation with Markov chains. Two-node queuing networks are considered in this paper; and an event of buffer overflow at the second node is studied. Two efficient rare event simulation algorithms, based on the importance sampling and cross-entropy methods, are developed and applied to accelerate the overflow probability simulation with Markov chain modelling. Numerical examples and simulation results are provided. Copyright © 2012 Inderscience Enterprises Ltd. Source


Lokshina I.,Management
International Journal of Mobile Network Design and Innovation | Year: 2012

The paper examines self-similar properties of real communication network traffic data over a wide range of time scales. These self-similar properties are very different from the properties of traditional models based on Poisson and Markov-modulated Poisson processes. Advanced self-similar models of sequentional generators and fixed-length sequence generators, and efficient algorithms that are used to simulate self-similar behaviour of IP network traffic processes are developed and applied. Simulations and numerical results are shown and analysed. Furthermore, simulations with stochastic and long range dependent traffic source models are conducted; and efficient algorithms for buffer overflow simulation in finite buffer single server model under self-similar traffic load are developed and applied. Simulations and numerical results are shown and analysed. Copyright © 2012 Inderscience Enterprises Ltd. Source

Discover hidden collaborations