SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 01-05
www.iosrjournals.org
DOI: 10.9790/0661-1901020105 www.iosrjournals.org 1 | Page
Linear Regression Model Fitting and Implication to Self Similar
Behavior Traffic Arrival Data Pattern at Web Centers
D. Mallikarjuna Reddy1
Pushpalatha Sarla2
1,2,
Department of Engineering Mathematics, GITAM University Hyderabad Campus , Hyderabad-502329,
Telangana, India.
Abstract: We present a simple linear regression model fit in the direction of self-similarity behavior of internet
user’s arrival data pattern. It has been reported that Internet traffic exhibits self-similarity. Motivated by this
fact, real time internet users arrival patterns considered as traffic and the results carried out and proven that it
has the self-similar nature by various Hurst index methods. The present study provides a mathematical model
equation in terms linear regression as a tool to predict the arrival pattern of Internet users data at web centers.
Numerical results, analysis discussed and presented here plays a significant role in improvement of the services
and forecasting analysis of arrival protocols at web centers in the view of quality of service (QOS).
Keywords: long-range dependence, self-similarity, Poisson Process, Linear Regression, Hurst Index.
I. Introduction
Normally traffic that is bursty on many or all time scales can be described statistically using the notion
of self-similarity. Self-similarity is the property we associate with fractals; the object appears the same
regardless of the scale at which it is viewed [1]. In the case of stochastic objects like time series, self similarity
is used in the distributional sense when viewed at varying scales, the objects distribution remains same. Since a
self-similar process has observable bursts on all time scales, it exhibits long-range dependence values at any
instant are typically correlated with values at all future instants; Surprisingly the self-similarity of Ethernet
network traffic has been thoroughly established. The importance of long-range dependence in network traffic is
beginning to be observed in studies such as [2], [5] which show that packet loss and delay behavior is radically
different in simulations using real traffic data rather than traditional network models. While the understanding
the nature of network traffic is significant in order to know the design and implement computer networks and
network services like the World Wide Web (WWW) [3]. Recent examinations of LAN traffic and wide area
network (WAN) traffic have challenged the commonly assumed models for network traffic [4], e.g., the Poisson
process. Were traffic to follow a Poisson or Markovian arrival process (MAP), it would have a characteristic
burst length which would tend to be smoothed by averaging over a long enough time scale. Rather,
measurements of real traffic indicate that significant traffic variance (burstiness) is present on a wide range of
time scales [6]. Recently Poison process has been used to model the highway traffic irrespective of traffic
intensity [7-11].
The scheme of this paper is first, we provide a mathematical model equation fit in terms linear
regression [16] as a tool to predict the arrival pattern of Internet users data at web centers, second, using the
fitted data we examine whether web users traffic data has again the self similar behavior. This is an
enhancement of prior results carried out using a real time series data [12-15]. This kind of analysis is often
useful in improvement of the services and forecasting analysis of arrival pattern at various organizations. The
rest of the paper is organized as follows: Definition of self-similarity or long range dependence is given in
Section II. Statistical Tests for Self-Similar Characteristics: placed in Section III. In Section IV, Linear
Regression Model Fitting and Analysis of data discussed. Finally, conclusions are given in Section V.
II. Definitions Of Self-Similarity And Long-Range Dependence
In this section we give brief idea of the mathematical basis for self-similar processes and long-range
dependence.
Self-Similarity: Self-similarity, in general, describes a phenomenon where a certain property of an object is
preserved with respect to scaling in space or time. Let { 1,2,3,...}tX X t  be a discrete time covariance
stationary stochastic process or a stationary time series with mean μ and variance σ2
.In terms of arrival pattern,
tX can be described as number of users logged on to an Internet server each minute overtime period t on a
day. Given the stochastic process X, we can define the m -aggregated stochastic process
Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data
DOI: 10.9790/0661-1901020105 www.iosrjournals.org 2 | Page
{ 1,2,3,...}m m
iX X i  where m is a positive integer, by averaging the original stochastic process X
over non overlapping blocks of size m , namely
(1)
is the average of the original sequence in m non-overlapping blocks. Then the process X is defined as self-
similar process with the Hurst parameter,
2/1 H if .1,)( 2)(
 
mmXVar m 
 (2)
Exact second-order self-similar process:
The exact second-order self-similar process is defined as follows. Arrival instants are modeled as point process.
Divide the time axis into disjoint intervals of unit length and let ,....}2,1:{  tXX t be the number of
points (arrival) in the
th
t interval. Let X be a second order stationary process with variance
2
 and the
autocorrelation function 0),( kk is given by
)(
),(
)(
t
ktt
XVar
XXCov
k 
 (3)
For each ,....,3,2,1m let a new time series
)(m
tX is obtained averaging the original time series X over
non-overlapping blocks of size m. That is
,...2,1,
1
1
)1(
)(
 
 tX
m
X
m
i
imt
m
t (4)
This new series
)(m
tX , for each m, is also a second order stationary process with autocorrelation function
)()(
km
 .
Definition (i): The process '' X is said to be exactly second order self-similar with Hurst parameter
2
1

H and variance
2
 if
  1,)1(2)1(
2
)( 22
2
 kkkkk HHH
 (5)
Definition (ii): The process '' X is said to be asymptotically second order self-similar with Hurst parameter
2
1

H and variance
2
 if
  1,)1(2)1(
2
)( 22
2
)(

kkkkk HHH
m
m 
 (6)
In terms of variance, self- similar process is defined as follows:
Definition (iii): The process '' X is said to be exactly second order self-similar with Hurst parameter
2
1

H and variance
2
 if
1,)( 2)(
 
mmXVar m 
 (7)
Now we shall differentiate long range dependence (LRD) and short range dependence (SRD) processes. For
,5.0H from the Eq.(5), we can see that
22
)12()( 
 H
kHHk as k , and we have
( ) ~ , (2 1).
k k
k c k c H H
 
  
(8) The series  
k
kc 
is divergent if 15.0  H or 10   otherwise they are convergent, being a
positive term series. Accordingly the left hand series k
k)( is divergent if 15.0  H or 10   ,
otherwise they are convergent. That is, for 15.0  H , the autocorrelation functions decays slowly, that is
( )
( 1)
1
1
, 1, 2,...
m
m
t t m i
i
X X t
m
 

 
Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data
DOI: 10.9790/0661-1901020105 www.iosrjournals.org 3 | Page
hyperbolically. In this case, the process X is called Long Range Dependent (LRD). The process X is Short
Range Dependent (SRD) if 5.00  H and the autocorrelation function is summable (finite).
III. Tests For Self Similar Variable Traffic:
In assessing the self similarity for the number of users logged on to an Internet server each minute over
100-minutes time series data four statistical methods have been applied to measure Hurst index which gives the
intensity of self-similarity [15]. The parameter H has range 15.0  H . Using Periodogram Analysis
computed value of H is 0.763. Obtained value of index H by Correlogram method is 0.79 . Whereas in
this case of Percentile method estimated value of H is 0.762 and by means of Variance Time analysis
obtained value of H is 0.76 [16].
IV. Linear Regression Model Fitting And Analysis Of Data:
In this section, we present some practical ideas and analysis of linear regression model fitting for self-
similar variable traffic arrival data pattern at various web centers. Some applications of regression involve
regressor and response variables that have a natural sequential order over time. Such data are called time series
data. Regression models using time series data occur relatively often in economics, business, and some fields of
engineering [17-18]. It is used when we want to predict the value of a variable based on the value of another
variable. The variable we want to predict is called the dependent variable/outcome variable. The variable we are
using to predict the other variable's value is called the independent variable or the predictor variable. For
instance, we could use linear regression curves to understand whether test performance can be predicted based
on review time; Here, how the data exhibit a significant degree of scatter and the strategy is to derive a single
curve that represents the general trend of the data? The linear regression model equation and procedures, a
complete explanation of the output by this model is explained.
In lines of statistical modeling the linear regression model equation of time series data is
0 1Y x     (9)
0 and 1 are model parameters.
Where
^
,Y Y    is the error or noise term, Y and
^
Y are respectively, the observed and predicted values
of the response variable for each individual of data set. Error terms often assumed independent observations
from a
2
(0, )N  distribution. Clearly, by assumptions in linear regression are that the error terms  has mean
zero i.e. ( ) 0,E   2
( )Var   and uncorrelated.
Thus
2
0 1( , )Y N x   and 0 1( )E Y x   (10)
For the time series data, we will estimate the model parameters with coefficients
^ ^ ^
0 1( / )E Y X Y x    (11)
Parameters are fit to minimize the sums of squared errors: that is
2 2
0 1
1 1
( )
n n
i i i
i i
E e y x 
 
     is minimum. (12)
The coefficients 0 and 1 that minimize E must satisfy the following conditions:
0 1
0, 0
E E
 
 
 
 
(13) on simplification we obtain are model parameters 0 and 1 .
 
1 22
i i i i
i i
n x y x y
n x x




  
 
and 0 1Y X 
 
  . (14)
Thus the model parameters are estimated in liner regression curve using Eqn.8-14.
Below by using SPSS tool, we focus on the results for the linear regression analysis of self- similar
variable traffic arrival data pattern at various web centers only. The model Summary and analysis of results
discussed, as shown in tables. Table 4.1 provides the R and R2
values. The R value is 0.669, which indicates a
high degree of correlation of data. The R2
value total variation in the dependent variable i.e. internet users, can
be explained by the independent variable, say time. In this case, 44.7% can be explained. Also most of the
Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data
DOI: 10.9790/0661-1901020105 www.iosrjournals.org 4 | Page
regression problems involving time series data exhibit positive autocorrelation, the hypotheses usually tested by
Durbin-Watson test (d=0.028) and conclude that the errors are positively auto correlated. Analysis of variance
(ANOVA), which reports well about the regression model equation fits the data (i.e., predicts the dependent
variable) is shown in table 4.2. Also it reveals, the regression model predicts the dependent variable significantly
well. Since the statistical significance of the regression model that was run. Here, i.e. F(1, 98) = 24.754, p =
.0001, which is less than 0.05, and indicates that, overall, the regression model statistically significant and
predicts the outcome variable and it is a good fit for the data. The Coefficients table-4.3 provides the
information to predict the dependent variable with respect to independent variable time, as well as determine
whether time in minutes contributes statistically significance to the model since observed t-statistic is 4.975 and
p value < 0.01. Residual statistics for dependent variable (Internet users) shown in table-4.4.
A linear regression model equation established that time in minutes to predict number of users log on to
internet server. The real time series data exhibited a significant degree of scatter plot and the linear regression
model curve that represents the general trend of the data is depicted in Figure. 4.1 and the predicted regression
model fit shown in Figure 4.2.
105.9 0.616Y X  (15)
Table-4.1
Figure 1 Time (in minutes) Vs Internet Users
Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data
DOI: 10.9790/0661-1901020105 www.iosrjournals.org 5 | Page
Figure 2: Time (in minutes) Vs Internet Users
V. Conclusions
In this paper, self-similar behavior time series data has been considered as traffic data set from various
web centers. A mathematical model equation fitted in terms linear regression as a tool to predict the arrival
pattern of Internet user‟s data at web centers. These kind of fitting models offered here can plays significant role
in improvement of the services and forecasting analysis of arrival patterns at web centers in the view of quality
of service (QOS).
References
[1]. W.E. Leland, M.S. Taqqu, W. Willinger and D.V. Wilson On the Self-Similar Nature of Ethernet Traffic (Extended version) , IEEE
/ ACM Trans. Networking, 2, pp. 1-15, 1994.
[2]. J.Beran, M. S. Taqqu and W. Willinger, Long- range dependence in variable bit rate traffic," IEEE Trans. on Communications, Vol.
43, pp.1566-1579
[3]. M. Crovella and A.Bestavros, Self-Similarity in World Wide Web traffic: evidence and possible causes, IEEE/ ACM Trans.
Networking, pp.835-846, 1997.
[4]. Vern Paxson, Sally Floyd, Wide Area Traffic: The Failure of Poisson Modeling, IEEE/ACM Trans. Networking, 3, pp.226-244,
1995.
[5]. Allan T. Anderson, Bo Friis Nielsen , A Markovian Approach for Modeling Packet Traffic with Long Range Dependence, IEEE
Journal on Selected Areas in Communications, Vol.16, No.5, pp.719-732, June 1998.
[6]. T. Yoshihara, S.Kasahara, and Y. Takahashi, Practical time-scale fitting of self-similar traffic with Markov-modulated Poisson
process, Telecommun. Syst., vol.17, pp.185-211, 2001.
[7]. S.K. Shao, Malla Reddy Perati, M.G. Tsai, H.W. Tsao and J. Wu, Generalized variance-based Markovian fitting for self-similar
traffic modeling, IEICE Trans. Commun., Vol.E88-B, no.12, pp.4659-4663, April 2005.
[8]. M. M. A. Sarker, Estimation of the Self-similarity parameter in long memory processes, Journal of Mechanical Engineering, Vol.
ME38, Dec. 2007, Transaction of the Mech. Eng. Div., The Institution of Engineers, Bangladesh.
[9]. Nagatani, T. (2005). Self-similar behavior of a single vehicle through periodic traffic lights, Physica A, 347, 673–682.
[10]. Qiang Meng and Hooi Ling Khoo, Self-similar characteristics of vehicle arrival pattern on Highways. Journal of Transportation
Engineering, © ASCE / November 2009.
[11]. K. Raghavendra, Malla Reddy Perati; H. K. Reddy Koppula; Mallikarjuna Reddy Doodipala, Rajaiah Dasari „Self-Similar
Behavior of Highway Road Traffic and Performance Analysis at Toll Plazas” 1234 Journal of Transportation Engineering © Asce
October 2012.
[12]. D.Mallikarjuna Reddy “Second Order Statistics of Time Series of Various Real Time Problems in Conjunction with Periodogram
Technique” International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 3 Issue 1 September 2013
[13]. Pushpalatha Sarla, D.Mallikarjuna Reddy, Manohar Dingari, “A Study on Self Similarity Analysis of Web Users Data at Selected
Web Centers” Proceedings of International conference on Mathematics ICM- 2015.
[14]. P. J. Brockwell and R. A. Davis, An introduction to time series and fore-casting”, Springer - Verlag, New York (1996).
[15]. Sarla, P. , Doodipala, M. and Dingari, M. (2016) Self Similarity Analysis of Web Users Arrival Pattern at Selected Web Centers.
American Journal of Computational Mathematics, 6, 17-22. doi: 10.4236/ajcm.2016.61002
[16]. Pushpalatha Sarla, D.Mallikarjuna Reddy, Manohar Dingari “ Queue Length-Busy Time Distribution Of Web Users Data With Self
Similar Behavior Volume: 05 Special Issue: 05 | ICIAC-2016 | May-2016,
[17]. Montgomery, D. C., Peck, E. A. and Vining, G. G. (2001). Introduction to Linear regression Analysis. 3rd Edition, New York, New
York: John Wiley & Sons.
[18]. Spyros Markidakis, steven C.Wheelwright, Rob J.Hydman “Forcating Methods and Applications” John Wiley & Sons.Inc. Third
edition”.

More Related Content

What's hot

Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...Alexander Decker
 
Queuing theory and its applications
Queuing theory and its applicationsQueuing theory and its applications
Queuing theory and its applicationsDebasisMohanty37
 
Application Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionApplication Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionCSCJournals
 
Open and closed queueing network
Open and closed queueing networkOpen and closed queueing network
Open and closed queueing networkFahmida Afrin
 
Integration Of Gis And Optimization Routines For The Vehicle Routing Problem
Integration Of Gis And Optimization Routines For The Vehicle Routing ProblemIntegration Of Gis And Optimization Routines For The Vehicle Routing Problem
Integration Of Gis And Optimization Routines For The Vehicle Routing Problemijccmsjournal
 
INTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEM
INTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEMINTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEM
INTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEMijccmsjournal
 
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSEVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSijcsit
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSijscmcj
 
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...cscpconf
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSecij
 
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELS
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELSTEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELS
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELSVLSICS Design
 

What's hot (18)

Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...
 
Queuing theory and its applications
Queuing theory and its applicationsQueuing theory and its applications
Queuing theory and its applications
 
Application Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionApplication Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts Prediction
 
C05211326
C05211326C05211326
C05211326
 
Open and closed queueing network
Open and closed queueing networkOpen and closed queueing network
Open and closed queueing network
 
AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30
 
Integration Of Gis And Optimization Routines For The Vehicle Routing Problem
Integration Of Gis And Optimization Routines For The Vehicle Routing ProblemIntegration Of Gis And Optimization Routines For The Vehicle Routing Problem
Integration Of Gis And Optimization Routines For The Vehicle Routing Problem
 
INTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEM
INTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEMINTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEM
INTEGRATION OF GIS AND OPTIMIZATION ROUTINES FOR THE VEHICLE ROUTING PROBLEM
 
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSEVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
 
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...
 
Jmestn42351212
Jmestn42351212Jmestn42351212
Jmestn42351212
 
G0354451
G0354451G0354451
G0354451
 
Ica 2013021816274759
Ica 2013021816274759Ica 2013021816274759
Ica 2013021816274759
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
 
Av33274282
Av33274282Av33274282
Av33274282
 
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELS
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELSTEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELS
TEST GENERATION FOR ANALOG AND MIXED-SIGNAL CIRCUITS USING HYBRID SYSTEM MODELS
 

Similar to Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data Pattern at Web Centers

FUZZY INPUT THRESHOLD.pdf
FUZZY INPUT THRESHOLD.pdfFUZZY INPUT THRESHOLD.pdf
FUZZY INPUT THRESHOLD.pdfMikailuSamuel
 
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...ijwmn
 
Information Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationInformation Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationDr. Mirko Kämpf
 
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...IJERA Editor
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 
Review of Fuzzy Model
Review of Fuzzy Model Review of Fuzzy Model
Review of Fuzzy Model NurudeenIshaq1
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
 
Prediction of nodes mobility in 3-D space
Prediction of nodes mobility in 3-D space Prediction of nodes mobility in 3-D space
Prediction of nodes mobility in 3-D space IJECEIAES
 
Adaptive traffic lights based on traffic flow prediction using machine learni...
Adaptive traffic lights based on traffic flow prediction using machine learni...Adaptive traffic lights based on traffic flow prediction using machine learni...
Adaptive traffic lights based on traffic flow prediction using machine learni...IJECEIAES
 
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...IJECEIAES
 
Analytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment ModelsAnalytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment ModelsMary Calkins
 
Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Asoka Korale
 
Event triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsEvent triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsISA Interchange
 
Options on Quantum Money: Quantum Path- Integral With Serial Shocks
Options on Quantum Money: Quantum Path- Integral With Serial ShocksOptions on Quantum Money: Quantum Path- Integral With Serial Shocks
Options on Quantum Money: Quantum Path- Integral With Serial ShocksAM Publications,India
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 

Similar to Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data Pattern at Web Centers (20)

FUZZY INPUT THRESHOLD.pdf
FUZZY INPUT THRESHOLD.pdfFUZZY INPUT THRESHOLD.pdf
FUZZY INPUT THRESHOLD.pdf
 
0505.pdf
0505.pdf0505.pdf
0505.pdf
 
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
 
Information Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation OptimizationInformation Spread in the Context of Evacuation Optimization
Information Spread in the Context of Evacuation Optimization
 
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
Enhancement of Single Moving Average Time Series Model Using Rough k-Means fo...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 
ITS for Crowds
ITS for CrowdsITS for Crowds
ITS for Crowds
 
Review of Fuzzy Model
Review of Fuzzy Model Review of Fuzzy Model
Review of Fuzzy Model
 
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
Prediction of nodes mobility in 3-D space
Prediction of nodes mobility in 3-D space Prediction of nodes mobility in 3-D space
Prediction of nodes mobility in 3-D space
 
Adaptive traffic lights based on traffic flow prediction using machine learni...
Adaptive traffic lights based on traffic flow prediction using machine learni...Adaptive traffic lights based on traffic flow prediction using machine learni...
Adaptive traffic lights based on traffic flow prediction using machine learni...
 
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
 
Analytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment ModelsAnalytical Dynamic Traffic Assignment Models
Analytical Dynamic Traffic Assignment Models
 
Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...Improving predictability and performance by relating the number of events and...
Improving predictability and performance by relating the number of events and...
 
Event triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsEvent triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizations
 
Options on Quantum Money: Quantum Path- Integral With Serial Shocks
Options on Quantum Money: Quantum Path- Integral With Serial ShocksOptions on Quantum Money: Quantum Path- Integral With Serial Shocks
Options on Quantum Money: Quantum Path- Integral With Serial Shocks
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
Korea Uni Presentation
Korea Uni PresentationKorea Uni Presentation
Korea Uni Presentation
 

More from IOSRjournaljce

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover MapsIOSRjournaljce
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXIOSRjournaljce
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.IOSRjournaljce
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A ReviewIOSRjournaljce
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud ComputingIOSRjournaljce
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...IOSRjournaljce
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsIOSRjournaljce
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...IOSRjournaljce
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...IOSRjournaljce
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security SurveyIOSRjournaljce
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsIOSRjournaljce
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...IOSRjournaljce
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingIOSRjournaljce
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageIOSRjournaljce
 

More from IOSRjournaljce (20)

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSX
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud Computing
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital Footprints
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and Evaluating
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri Image
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data Pattern at Web Centers

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 01-05 www.iosrjournals.org DOI: 10.9790/0661-1901020105 www.iosrjournals.org 1 | Page Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data Pattern at Web Centers D. Mallikarjuna Reddy1 Pushpalatha Sarla2 1,2, Department of Engineering Mathematics, GITAM University Hyderabad Campus , Hyderabad-502329, Telangana, India. Abstract: We present a simple linear regression model fit in the direction of self-similarity behavior of internet user’s arrival data pattern. It has been reported that Internet traffic exhibits self-similarity. Motivated by this fact, real time internet users arrival patterns considered as traffic and the results carried out and proven that it has the self-similar nature by various Hurst index methods. The present study provides a mathematical model equation in terms linear regression as a tool to predict the arrival pattern of Internet users data at web centers. Numerical results, analysis discussed and presented here plays a significant role in improvement of the services and forecasting analysis of arrival protocols at web centers in the view of quality of service (QOS). Keywords: long-range dependence, self-similarity, Poisson Process, Linear Regression, Hurst Index. I. Introduction Normally traffic that is bursty on many or all time scales can be described statistically using the notion of self-similarity. Self-similarity is the property we associate with fractals; the object appears the same regardless of the scale at which it is viewed [1]. In the case of stochastic objects like time series, self similarity is used in the distributional sense when viewed at varying scales, the objects distribution remains same. Since a self-similar process has observable bursts on all time scales, it exhibits long-range dependence values at any instant are typically correlated with values at all future instants; Surprisingly the self-similarity of Ethernet network traffic has been thoroughly established. The importance of long-range dependence in network traffic is beginning to be observed in studies such as [2], [5] which show that packet loss and delay behavior is radically different in simulations using real traffic data rather than traditional network models. While the understanding the nature of network traffic is significant in order to know the design and implement computer networks and network services like the World Wide Web (WWW) [3]. Recent examinations of LAN traffic and wide area network (WAN) traffic have challenged the commonly assumed models for network traffic [4], e.g., the Poisson process. Were traffic to follow a Poisson or Markovian arrival process (MAP), it would have a characteristic burst length which would tend to be smoothed by averaging over a long enough time scale. Rather, measurements of real traffic indicate that significant traffic variance (burstiness) is present on a wide range of time scales [6]. Recently Poison process has been used to model the highway traffic irrespective of traffic intensity [7-11]. The scheme of this paper is first, we provide a mathematical model equation fit in terms linear regression [16] as a tool to predict the arrival pattern of Internet users data at web centers, second, using the fitted data we examine whether web users traffic data has again the self similar behavior. This is an enhancement of prior results carried out using a real time series data [12-15]. This kind of analysis is often useful in improvement of the services and forecasting analysis of arrival pattern at various organizations. The rest of the paper is organized as follows: Definition of self-similarity or long range dependence is given in Section II. Statistical Tests for Self-Similar Characteristics: placed in Section III. In Section IV, Linear Regression Model Fitting and Analysis of data discussed. Finally, conclusions are given in Section V. II. Definitions Of Self-Similarity And Long-Range Dependence In this section we give brief idea of the mathematical basis for self-similar processes and long-range dependence. Self-Similarity: Self-similarity, in general, describes a phenomenon where a certain property of an object is preserved with respect to scaling in space or time. Let { 1,2,3,...}tX X t  be a discrete time covariance stationary stochastic process or a stationary time series with mean μ and variance σ2 .In terms of arrival pattern, tX can be described as number of users logged on to an Internet server each minute overtime period t on a day. Given the stochastic process X, we can define the m -aggregated stochastic process
  • 2. Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data DOI: 10.9790/0661-1901020105 www.iosrjournals.org 2 | Page { 1,2,3,...}m m iX X i  where m is a positive integer, by averaging the original stochastic process X over non overlapping blocks of size m , namely (1) is the average of the original sequence in m non-overlapping blocks. Then the process X is defined as self- similar process with the Hurst parameter, 2/1 H if .1,)( 2)(   mmXVar m   (2) Exact second-order self-similar process: The exact second-order self-similar process is defined as follows. Arrival instants are modeled as point process. Divide the time axis into disjoint intervals of unit length and let ,....}2,1:{  tXX t be the number of points (arrival) in the th t interval. Let X be a second order stationary process with variance 2  and the autocorrelation function 0),( kk is given by )( ),( )( t ktt XVar XXCov k   (3) For each ,....,3,2,1m let a new time series )(m tX is obtained averaging the original time series X over non-overlapping blocks of size m. That is ,...2,1, 1 1 )1( )(    tX m X m i imt m t (4) This new series )(m tX , for each m, is also a second order stationary process with autocorrelation function )()( km  . Definition (i): The process '' X is said to be exactly second order self-similar with Hurst parameter 2 1  H and variance 2  if   1,)1(2)1( 2 )( 22 2  kkkkk HHH  (5) Definition (ii): The process '' X is said to be asymptotically second order self-similar with Hurst parameter 2 1  H and variance 2  if   1,)1(2)1( 2 )( 22 2 )(  kkkkk HHH m m   (6) In terms of variance, self- similar process is defined as follows: Definition (iii): The process '' X is said to be exactly second order self-similar with Hurst parameter 2 1  H and variance 2  if 1,)( 2)(   mmXVar m   (7) Now we shall differentiate long range dependence (LRD) and short range dependence (SRD) processes. For ,5.0H from the Eq.(5), we can see that 22 )12()(   H kHHk as k , and we have ( ) ~ , (2 1). k k k c k c H H      (8) The series   k kc  is divergent if 15.0  H or 10   otherwise they are convergent, being a positive term series. Accordingly the left hand series k k)( is divergent if 15.0  H or 10   , otherwise they are convergent. That is, for 15.0  H , the autocorrelation functions decays slowly, that is ( ) ( 1) 1 1 , 1, 2,... m m t t m i i X X t m     
  • 3. Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data DOI: 10.9790/0661-1901020105 www.iosrjournals.org 3 | Page hyperbolically. In this case, the process X is called Long Range Dependent (LRD). The process X is Short Range Dependent (SRD) if 5.00  H and the autocorrelation function is summable (finite). III. Tests For Self Similar Variable Traffic: In assessing the self similarity for the number of users logged on to an Internet server each minute over 100-minutes time series data four statistical methods have been applied to measure Hurst index which gives the intensity of self-similarity [15]. The parameter H has range 15.0  H . Using Periodogram Analysis computed value of H is 0.763. Obtained value of index H by Correlogram method is 0.79 . Whereas in this case of Percentile method estimated value of H is 0.762 and by means of Variance Time analysis obtained value of H is 0.76 [16]. IV. Linear Regression Model Fitting And Analysis Of Data: In this section, we present some practical ideas and analysis of linear regression model fitting for self- similar variable traffic arrival data pattern at various web centers. Some applications of regression involve regressor and response variables that have a natural sequential order over time. Such data are called time series data. Regression models using time series data occur relatively often in economics, business, and some fields of engineering [17-18]. It is used when we want to predict the value of a variable based on the value of another variable. The variable we want to predict is called the dependent variable/outcome variable. The variable we are using to predict the other variable's value is called the independent variable or the predictor variable. For instance, we could use linear regression curves to understand whether test performance can be predicted based on review time; Here, how the data exhibit a significant degree of scatter and the strategy is to derive a single curve that represents the general trend of the data? The linear regression model equation and procedures, a complete explanation of the output by this model is explained. In lines of statistical modeling the linear regression model equation of time series data is 0 1Y x     (9) 0 and 1 are model parameters. Where ^ ,Y Y    is the error or noise term, Y and ^ Y are respectively, the observed and predicted values of the response variable for each individual of data set. Error terms often assumed independent observations from a 2 (0, )N  distribution. Clearly, by assumptions in linear regression are that the error terms  has mean zero i.e. ( ) 0,E   2 ( )Var   and uncorrelated. Thus 2 0 1( , )Y N x   and 0 1( )E Y x   (10) For the time series data, we will estimate the model parameters with coefficients ^ ^ ^ 0 1( / )E Y X Y x    (11) Parameters are fit to minimize the sums of squared errors: that is 2 2 0 1 1 1 ( ) n n i i i i i E e y x         is minimum. (12) The coefficients 0 and 1 that minimize E must satisfy the following conditions: 0 1 0, 0 E E         (13) on simplification we obtain are model parameters 0 and 1 .   1 22 i i i i i i n x y x y n x x          and 0 1Y X      . (14) Thus the model parameters are estimated in liner regression curve using Eqn.8-14. Below by using SPSS tool, we focus on the results for the linear regression analysis of self- similar variable traffic arrival data pattern at various web centers only. The model Summary and analysis of results discussed, as shown in tables. Table 4.1 provides the R and R2 values. The R value is 0.669, which indicates a high degree of correlation of data. The R2 value total variation in the dependent variable i.e. internet users, can be explained by the independent variable, say time. In this case, 44.7% can be explained. Also most of the
  • 4. Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data DOI: 10.9790/0661-1901020105 www.iosrjournals.org 4 | Page regression problems involving time series data exhibit positive autocorrelation, the hypotheses usually tested by Durbin-Watson test (d=0.028) and conclude that the errors are positively auto correlated. Analysis of variance (ANOVA), which reports well about the regression model equation fits the data (i.e., predicts the dependent variable) is shown in table 4.2. Also it reveals, the regression model predicts the dependent variable significantly well. Since the statistical significance of the regression model that was run. Here, i.e. F(1, 98) = 24.754, p = .0001, which is less than 0.05, and indicates that, overall, the regression model statistically significant and predicts the outcome variable and it is a good fit for the data. The Coefficients table-4.3 provides the information to predict the dependent variable with respect to independent variable time, as well as determine whether time in minutes contributes statistically significance to the model since observed t-statistic is 4.975 and p value < 0.01. Residual statistics for dependent variable (Internet users) shown in table-4.4. A linear regression model equation established that time in minutes to predict number of users log on to internet server. The real time series data exhibited a significant degree of scatter plot and the linear regression model curve that represents the general trend of the data is depicted in Figure. 4.1 and the predicted regression model fit shown in Figure 4.2. 105.9 0.616Y X  (15) Table-4.1 Figure 1 Time (in minutes) Vs Internet Users
  • 5. Linear Regression Model Fitting and Implication to Self Similar Behavior Traffic Arrival Data DOI: 10.9790/0661-1901020105 www.iosrjournals.org 5 | Page Figure 2: Time (in minutes) Vs Internet Users V. Conclusions In this paper, self-similar behavior time series data has been considered as traffic data set from various web centers. A mathematical model equation fitted in terms linear regression as a tool to predict the arrival pattern of Internet user‟s data at web centers. These kind of fitting models offered here can plays significant role in improvement of the services and forecasting analysis of arrival patterns at web centers in the view of quality of service (QOS). References [1]. W.E. Leland, M.S. Taqqu, W. Willinger and D.V. Wilson On the Self-Similar Nature of Ethernet Traffic (Extended version) , IEEE / ACM Trans. Networking, 2, pp. 1-15, 1994. [2]. J.Beran, M. S. Taqqu and W. Willinger, Long- range dependence in variable bit rate traffic," IEEE Trans. on Communications, Vol. 43, pp.1566-1579 [3]. M. Crovella and A.Bestavros, Self-Similarity in World Wide Web traffic: evidence and possible causes, IEEE/ ACM Trans. Networking, pp.835-846, 1997. [4]. Vern Paxson, Sally Floyd, Wide Area Traffic: The Failure of Poisson Modeling, IEEE/ACM Trans. Networking, 3, pp.226-244, 1995. [5]. Allan T. Anderson, Bo Friis Nielsen , A Markovian Approach for Modeling Packet Traffic with Long Range Dependence, IEEE Journal on Selected Areas in Communications, Vol.16, No.5, pp.719-732, June 1998. [6]. T. Yoshihara, S.Kasahara, and Y. Takahashi, Practical time-scale fitting of self-similar traffic with Markov-modulated Poisson process, Telecommun. Syst., vol.17, pp.185-211, 2001. [7]. S.K. Shao, Malla Reddy Perati, M.G. Tsai, H.W. Tsao and J. Wu, Generalized variance-based Markovian fitting for self-similar traffic modeling, IEICE Trans. Commun., Vol.E88-B, no.12, pp.4659-4663, April 2005. [8]. M. M. A. Sarker, Estimation of the Self-similarity parameter in long memory processes, Journal of Mechanical Engineering, Vol. ME38, Dec. 2007, Transaction of the Mech. Eng. Div., The Institution of Engineers, Bangladesh. [9]. Nagatani, T. (2005). Self-similar behavior of a single vehicle through periodic traffic lights, Physica A, 347, 673–682. [10]. Qiang Meng and Hooi Ling Khoo, Self-similar characteristics of vehicle arrival pattern on Highways. Journal of Transportation Engineering, © ASCE / November 2009. [11]. K. Raghavendra, Malla Reddy Perati; H. K. Reddy Koppula; Mallikarjuna Reddy Doodipala, Rajaiah Dasari „Self-Similar Behavior of Highway Road Traffic and Performance Analysis at Toll Plazas” 1234 Journal of Transportation Engineering © Asce October 2012. [12]. D.Mallikarjuna Reddy “Second Order Statistics of Time Series of Various Real Time Problems in Conjunction with Periodogram Technique” International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 3 Issue 1 September 2013 [13]. Pushpalatha Sarla, D.Mallikarjuna Reddy, Manohar Dingari, “A Study on Self Similarity Analysis of Web Users Data at Selected Web Centers” Proceedings of International conference on Mathematics ICM- 2015. [14]. P. J. Brockwell and R. A. Davis, An introduction to time series and fore-casting”, Springer - Verlag, New York (1996). [15]. Sarla, P. , Doodipala, M. and Dingari, M. (2016) Self Similarity Analysis of Web Users Arrival Pattern at Selected Web Centers. American Journal of Computational Mathematics, 6, 17-22. doi: 10.4236/ajcm.2016.61002 [16]. Pushpalatha Sarla, D.Mallikarjuna Reddy, Manohar Dingari “ Queue Length-Busy Time Distribution Of Web Users Data With Self Similar Behavior Volume: 05 Special Issue: 05 | ICIAC-2016 | May-2016, [17]. Montgomery, D. C., Peck, E. A. and Vining, G. G. (2001). Introduction to Linear regression Analysis. 3rd Edition, New York, New York: John Wiley & Sons. [18]. Spyros Markidakis, steven C.Wheelwright, Rob J.Hydman “Forcating Methods and Applications” John Wiley & Sons.Inc. Third edition”.