In the Internet market, content providers (CPs) continue to play a primordial role in the pro-cess of accessing different types of data: Images, Texts, Videos ..etc. Competition in this area is fierce, customers are looking for providers that offer them good content ( credibility of content and quality of service) with a reasonable price. In this work, we analyze this competition between CPs and the economic influence of their strategies on the market. We formulate our problem as a non-cooperative game among multiple CPs for the same market. Through a detailed analysis, we prove uniqueness of pure Nash Equilibrium (NE). Further-more, a fully distributed algorithm to converge to the NE point is presented. In order to quantify how efficient is the NE point, a detailed analysis of the Price of Anarchy (PoA) is adopted to ensure the performance of the system at equilibrium. Finally, we provide an extensive numerical study to describe the interactions between CPs and to point out the importance of quality of service (QoS) and credibility of content in the market.
A NOVEL APPROACH FOR ALLOCATING NETWORK AND IT RESOURCES OFFERED BY DIFFERENT...ijdpsjournal
IT TECHNOLOGIES ARE INCREASINGLY BEING USED TO OFFER COMPUTING RESOURCES OR INFORMATION IN
DIFFERENT LOCATIONS USING NETWORK RESOURCES. IN THIS PAPER WE ADDRESS THE PROBLEM OF
ALLOCATING RESOURCES TO ENABLE CUSTOMERS COMPOSE THEIR OWN DESIRED SERVICES. WE PROPOSE AN
AUCTION MECHANISM THAT COMPRISES INDEPENDENT AUCTIONS PERFORMED BY EACH PROVIDER AND
INVESTIGATE BIDDING STRATEGIES AND SOCIAL WELFARE.
Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers. For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
In this work, we present an economic model of computer networks that describes the in-teraction between Internet Service Providers (ISP ), customers and content provider. The competition between ISP s may be translated by the prices they require and the qualities of service (QoS) they offer. The customer demand for service from an ISP does not only de-pend on the price and quality of service (QoS) of the ISP , but it is influenced by all those offered by its competitors. This behavior has been extensively analyzed using game the-ory as a decision support tool. We interpret a non-neutral network when a content provider privileges ISP s by offering them more bandwidth to ensure proper QoS to support ap-plications that require more data transport capacity (voice over internet protocol (V OIP ) the live video streaming, online gaming). In addition, our work focuses on the price game analysis and QoS between ISP s in two cases: neutral network and non-neutral network. After showing the existence and uniqueness of equilibrium in terms of quality of service, we analyzed the impact of net neutrality on competition between ISP s. We also validated our theoretical study with numerical results, which show that the game has an equilibrium point which depends on all the parameters of the system.
Conducted a year-long study and thesis titled "A Study of Contractual Structure in Subscription Service Models and
Consumer Purchasing Behavior".
• Developed and derived a theoretical model using a two-period multi-good consumption model.
• Collected primary data and performed an in-depth empirical analysis using applied regression and statistical techniques.
A NOVEL APPROACH FOR ALLOCATING NETWORK AND IT RESOURCES OFFERED BY DIFFERENT...ijdpsjournal
IT TECHNOLOGIES ARE INCREASINGLY BEING USED TO OFFER COMPUTING RESOURCES OR INFORMATION IN
DIFFERENT LOCATIONS USING NETWORK RESOURCES. IN THIS PAPER WE ADDRESS THE PROBLEM OF
ALLOCATING RESOURCES TO ENABLE CUSTOMERS COMPOSE THEIR OWN DESIRED SERVICES. WE PROPOSE AN
AUCTION MECHANISM THAT COMPRISES INDEPENDENT AUCTIONS PERFORMED BY EACH PROVIDER AND
INVESTIGATE BIDDING STRATEGIES AND SOCIAL WELFARE.
Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers. For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
In this work, we present an economic model of computer networks that describes the in-teraction between Internet Service Providers (ISP ), customers and content provider. The competition between ISP s may be translated by the prices they require and the qualities of service (QoS) they offer. The customer demand for service from an ISP does not only de-pend on the price and quality of service (QoS) of the ISP , but it is influenced by all those offered by its competitors. This behavior has been extensively analyzed using game the-ory as a decision support tool. We interpret a non-neutral network when a content provider privileges ISP s by offering them more bandwidth to ensure proper QoS to support ap-plications that require more data transport capacity (voice over internet protocol (V OIP ) the live video streaming, online gaming). In addition, our work focuses on the price game analysis and QoS between ISP s in two cases: neutral network and non-neutral network. After showing the existence and uniqueness of equilibrium in terms of quality of service, we analyzed the impact of net neutrality on competition between ISP s. We also validated our theoretical study with numerical results, which show that the game has an equilibrium point which depends on all the parameters of the system.
Conducted a year-long study and thesis titled "A Study of Contractual Structure in Subscription Service Models and
Consumer Purchasing Behavior".
• Developed and derived a theoretical model using a two-period multi-good consumption model.
• Collected primary data and performed an in-depth empirical analysis using applied regression and statistical techniques.
A Game theoretic approach for competition over visibility in social networksjournalBEEI
Social Networks have known an important evolution in the last few years. These structures, made up of individuals who are tied by one or more specific types of interdependency, constitute the window for members to express their opinions and thoughts by sending posts to their own walls or others' timelines. Actually, when a content arrives, it's located on the top of the timeline pushing away older messages. This situation causes a permanent competition over visibility among subscribers who jump on opponents to promote conflict. Our study presents this competition as a non-cooperative game; each source has to choose frequencies which assure its visibility. We model it, exploring the theory of concave games, to reach a situation of equilibrium; a situation where no player has the ultimate ability to deviate from its current strategy. We formulate the named game, then we analyze it and prove that there is exactly one Nash equilibrium which is the convergence of all players' best responses. We finally provide some numerical results, taking into consideration a system of two sources with a specific frequency space, and analyze the effect of different parameters on sources' visibility on the walls of social networks.
Managing collaboration within networks and relationships in the serious game ...ijcsit
This research develop the managing within network and relationship mechanism in agribusiness
management through serious game. Agribusiness is represented as sand that work together in the market
(sandpile) to maintain networks and relationships. This research apply agent base model for predicting
activity network based on the parameters that exist in the collaboration. The result indicate that average
selling, average buying and market price (CK = 4) are not approach the value of the open market but
precisely coincide with eachother. Total bought and total sold are tend to be high value. This condition
suggests a very tight competition. The average selling, average buying and market price (CK = 0.01) are
approach the value of the open market. Total bought and total sold are not as high as total bought and total
sold, by using CK = 4, this condition shows the competition is not too tight.
Market Analysis and a Detailed Study of Leading Cloud Telephony and SMS Gatew...IJSRD
The process in an IT service provider company depends on the products and the services it is providing to the customers. As there are many competitors present in the market with same services This Company wanted to have a different quality which separates them from other competitors. This Project is about the study of wireless services provided by the telecom industry which consist Cloud telephony and SMS gateway. Many different products come under cloud telephony and SMS gateway. A detail study of the products like IVR Studio, Integrated analytics, API integration, Miss Call Solutions, Call Forwarding and Conferencing Services & SMS Services like SMS Short Code, SMS Long Code, Enterprise Messaging solutions, Mobile Marketing, Email2SMS, are done in this project. And also a detailed study on the company Competitors and their Products are conducted. As compared to others the services provided by the company was at a lower price with good quality and 24/7 available support team and constant up gradation with new technology. This survey was made to find out whether the customers using the services are happy and satisfied comparing with the competitors’ products for Pricing, Quality and Customer Support.
Auctions for perishable goods such as internet ad inventory need to make real-time allocation
and pricing decisions as the supply of the good arrives in an online manner, without knowing the
entire supply in advance. These allocation and pricing decisions get complicated when buyers
SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
ABCrowd: An Auction Mechanism on Blockchain for Spatial CrowdsourcingMaha Kadadha
In this paper, a fully distributed auction-blockchain-based crowdsourcing framework is proposed- ABCrowd. In a typical crowdsourcing framework, independent workers compete to be allocated requesters’ tasks. These workers advertise their costs to the centralized platform, which then decides the final allocation of tasks. While performing the allocation, centralized platforms face two main challenges: 1) how to ensure trusted execution for the allocation of tasks, and 2) how to motivate workers to declare their truthful costs. To address these challenges, ABCrowd proposes to run the crowdsourcing platform entirely on Ethereum Blockchain while incorporating auctions. Blockchain and smart contracts guarantee trusted
execution for the allocation through autonomous and transparent on-Chain execution. ABCrowd uses the Repeated-Single-Minded Bidder (R-SMB) auction mechanism, which motivates workers to bid truthfully before allocating them and calculating their payments. R-SMB is an approximation of the optimized off-Chain Vickrey-Clarke-Groves (VCG) mechanism in terms of maximized profit. It entails repeating the Single-Minded Bidder (SMB) auction mechanism to meet the allocation requirement of crowdsourcing
applications. ABCrowd is implemented and evaluated using Solidity on a private Ethereum Blockchain,
where a real publicly available dataset is used. The proposed on-Chain R-SMB auction mechanism
is compared to the off-Chain VCG mechanism, where the results show that R-SMB provides similar
performance to VCG in terms of the average number of allocated tasks. Furthermore, R-SMB outperforms
VCG in workers’ travelled distance and requesters’ costs, at a low execution cost.
Link: https://www.researchgate.net/publication/338523572_ABCrowd_An_Auction_Mechanism_on_Blockchain_for_Spatial_Crowdsourcing
Rank Computation Model for Distribution Product in Fuzzy Multiple Attribute D...TELKOMNIKA JOURNAL
Ranking of an activity is very important to support work effectiveness. Previous works, ranking for distribution product is used by manual process or averaging value. Problem in this research, the research should be found the effective way to rank the distribution product. This research proposes assist the ranking with a computational model based on Fuzzy Multiple Decision Making (FMADM). Getting an effective ranking, a variable in FMADM computing is required. Variables is used in this research such as number of households, number of small-scale enterprises run by households, gross domestic regional income, and economic growth rate of a region. Research completion is assisted by using self-built research methods. Research method consists of determining value of origin, determining degree of membership, determining weight of each variable, calculation of relation matrix, calculation of the preference value in each village for ranking value, and last is sorting. Operationalized FMADM is gain a result with three priorities district. Priority number one is all of district that have a rank or Vij (alternative rank) higher than 0.4. It means only 7% or 5 villages with the highest rank. Priority number second s all of district that have rank between Vij = 0.26 and Vij = 0.4. It means only 62% or 44 villages. Priority number three is district that have a rank lower than Vij = 0.26, and only 31% or 22 villages. Impact in use of FMADM, calculated in rank, is the process runs effective and dynamic with changing of weighted. User can arrange of weighted as needed.
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Value creation in relationship exchange explication by Ethical Approach: an a...IOSR Journals
This research developed an integrative model to explain the impact of the ethical dimension and bonding on value relationship in the field of services to morocco SMES on inter organizational context. In this article, the authors provide a thorough conceptualization of value relationship and its possible antecedents, i.e., bond relationship; equity drawing on an empirical base of 240 SMEs questionnaires, Structural equations modeling (SEM) is used to evaluate the simultaneous effects of the predictive variables. Implications for marketers’ academicians and managers are discussed, and areas for future research are presented.
Is freemium a viable pricing strategy for cloud services?Izam Ryan
An in-depth study of the application of freemium pricing practice in the cloud services space that Amazon EC2, Google Compute Engine, Microsoft Azure and Rackshare compete in.
Submitted in partial fulfilment of the requirements of the Imperial MBA degree and the Diploma of Imperial College London. I was awarded a Distinction for this Pricing Strategy elective.
Excluding appendixes: 2,497 words
Match Makingin B2B Using Extensive Games with Perfect Information ijgttjournal
Match making is becoming important in this rapidly changing world for identifying the required supplier and buyer pair. In this paper we are building a mathematical model using extensive games with perfect information, Nash equilibrium is found in order to find the exact match. The matching is based on multi
attribute priority, the attribute are called constraints which are classified into hard and soft constraints are identified. The best matched is identified by running the algorithm on Mat Lab and even here time is considered. Two models are designed first model is one manufacturer and n-suppliers and second model is
m-manufacturers and n-suppliers.
Incentive mechanism design for citizen reporting application using Stackelber...IJECEIAES
The growing utilization of smartphones equipped with various sensors to collect and analyze information around us highlights a paradigm called mobile crowdsensing. To motivate citizens’ participation in crowdsensing and compensate them for their resources, it is necessary to incentivize the participants for their sensing service. There are several studies that used the Stackelberg game to model the incentive mechanism, however, those studies did not include a budget constraint for limited budget case. Another challenge is to optimize crowdsourcer (government) profit in conducting crowdsensing under the limited budget then allocates the budget to several regional working units that are responsible for the specific city problems. We propose an incentive mechanism for mobile crowdsensing based on several identified incentive parameters using the Stackelberg game model and applied the multi-objective optimization problem (MOOP) to the incentive model in which the participant reputation is taken into account. The evaluation of the proposed incentive model is performed through simulations. The simulation indicated that the result appropriately corresponds to the theoretical properties of the model.
A Game theoretic approach for competition over visibility in social networksjournalBEEI
Social Networks have known an important evolution in the last few years. These structures, made up of individuals who are tied by one or more specific types of interdependency, constitute the window for members to express their opinions and thoughts by sending posts to their own walls or others' timelines. Actually, when a content arrives, it's located on the top of the timeline pushing away older messages. This situation causes a permanent competition over visibility among subscribers who jump on opponents to promote conflict. Our study presents this competition as a non-cooperative game; each source has to choose frequencies which assure its visibility. We model it, exploring the theory of concave games, to reach a situation of equilibrium; a situation where no player has the ultimate ability to deviate from its current strategy. We formulate the named game, then we analyze it and prove that there is exactly one Nash equilibrium which is the convergence of all players' best responses. We finally provide some numerical results, taking into consideration a system of two sources with a specific frequency space, and analyze the effect of different parameters on sources' visibility on the walls of social networks.
Managing collaboration within networks and relationships in the serious game ...ijcsit
This research develop the managing within network and relationship mechanism in agribusiness
management through serious game. Agribusiness is represented as sand that work together in the market
(sandpile) to maintain networks and relationships. This research apply agent base model for predicting
activity network based on the parameters that exist in the collaboration. The result indicate that average
selling, average buying and market price (CK = 4) are not approach the value of the open market but
precisely coincide with eachother. Total bought and total sold are tend to be high value. This condition
suggests a very tight competition. The average selling, average buying and market price (CK = 0.01) are
approach the value of the open market. Total bought and total sold are not as high as total bought and total
sold, by using CK = 4, this condition shows the competition is not too tight.
Market Analysis and a Detailed Study of Leading Cloud Telephony and SMS Gatew...IJSRD
The process in an IT service provider company depends on the products and the services it is providing to the customers. As there are many competitors present in the market with same services This Company wanted to have a different quality which separates them from other competitors. This Project is about the study of wireless services provided by the telecom industry which consist Cloud telephony and SMS gateway. Many different products come under cloud telephony and SMS gateway. A detail study of the products like IVR Studio, Integrated analytics, API integration, Miss Call Solutions, Call Forwarding and Conferencing Services & SMS Services like SMS Short Code, SMS Long Code, Enterprise Messaging solutions, Mobile Marketing, Email2SMS, are done in this project. And also a detailed study on the company Competitors and their Products are conducted. As compared to others the services provided by the company was at a lower price with good quality and 24/7 available support team and constant up gradation with new technology. This survey was made to find out whether the customers using the services are happy and satisfied comparing with the competitors’ products for Pricing, Quality and Customer Support.
Auctions for perishable goods such as internet ad inventory need to make real-time allocation
and pricing decisions as the supply of the good arrives in an online manner, without knowing the
entire supply in advance. These allocation and pricing decisions get complicated when buyers
SMART CLOUD STORAGE SERVICE SELECTION BASED ON FUZZY LOGIC, THEORY OF EVIDEN...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
ABCrowd: An Auction Mechanism on Blockchain for Spatial CrowdsourcingMaha Kadadha
In this paper, a fully distributed auction-blockchain-based crowdsourcing framework is proposed- ABCrowd. In a typical crowdsourcing framework, independent workers compete to be allocated requesters’ tasks. These workers advertise their costs to the centralized platform, which then decides the final allocation of tasks. While performing the allocation, centralized platforms face two main challenges: 1) how to ensure trusted execution for the allocation of tasks, and 2) how to motivate workers to declare their truthful costs. To address these challenges, ABCrowd proposes to run the crowdsourcing platform entirely on Ethereum Blockchain while incorporating auctions. Blockchain and smart contracts guarantee trusted
execution for the allocation through autonomous and transparent on-Chain execution. ABCrowd uses the Repeated-Single-Minded Bidder (R-SMB) auction mechanism, which motivates workers to bid truthfully before allocating them and calculating their payments. R-SMB is an approximation of the optimized off-Chain Vickrey-Clarke-Groves (VCG) mechanism in terms of maximized profit. It entails repeating the Single-Minded Bidder (SMB) auction mechanism to meet the allocation requirement of crowdsourcing
applications. ABCrowd is implemented and evaluated using Solidity on a private Ethereum Blockchain,
where a real publicly available dataset is used. The proposed on-Chain R-SMB auction mechanism
is compared to the off-Chain VCG mechanism, where the results show that R-SMB provides similar
performance to VCG in terms of the average number of allocated tasks. Furthermore, R-SMB outperforms
VCG in workers’ travelled distance and requesters’ costs, at a low execution cost.
Link: https://www.researchgate.net/publication/338523572_ABCrowd_An_Auction_Mechanism_on_Blockchain_for_Spatial_Crowdsourcing
Rank Computation Model for Distribution Product in Fuzzy Multiple Attribute D...TELKOMNIKA JOURNAL
Ranking of an activity is very important to support work effectiveness. Previous works, ranking for distribution product is used by manual process or averaging value. Problem in this research, the research should be found the effective way to rank the distribution product. This research proposes assist the ranking with a computational model based on Fuzzy Multiple Decision Making (FMADM). Getting an effective ranking, a variable in FMADM computing is required. Variables is used in this research such as number of households, number of small-scale enterprises run by households, gross domestic regional income, and economic growth rate of a region. Research completion is assisted by using self-built research methods. Research method consists of determining value of origin, determining degree of membership, determining weight of each variable, calculation of relation matrix, calculation of the preference value in each village for ranking value, and last is sorting. Operationalized FMADM is gain a result with three priorities district. Priority number one is all of district that have a rank or Vij (alternative rank) higher than 0.4. It means only 7% or 5 villages with the highest rank. Priority number second s all of district that have rank between Vij = 0.26 and Vij = 0.4. It means only 62% or 44 villages. Priority number three is district that have a rank lower than Vij = 0.26, and only 31% or 22 villages. Impact in use of FMADM, calculated in rank, is the process runs effective and dynamic with changing of weighted. User can arrange of weighted as needed.
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Value creation in relationship exchange explication by Ethical Approach: an a...IOSR Journals
This research developed an integrative model to explain the impact of the ethical dimension and bonding on value relationship in the field of services to morocco SMES on inter organizational context. In this article, the authors provide a thorough conceptualization of value relationship and its possible antecedents, i.e., bond relationship; equity drawing on an empirical base of 240 SMEs questionnaires, Structural equations modeling (SEM) is used to evaluate the simultaneous effects of the predictive variables. Implications for marketers’ academicians and managers are discussed, and areas for future research are presented.
Is freemium a viable pricing strategy for cloud services?Izam Ryan
An in-depth study of the application of freemium pricing practice in the cloud services space that Amazon EC2, Google Compute Engine, Microsoft Azure and Rackshare compete in.
Submitted in partial fulfilment of the requirements of the Imperial MBA degree and the Diploma of Imperial College London. I was awarded a Distinction for this Pricing Strategy elective.
Excluding appendixes: 2,497 words
Match Makingin B2B Using Extensive Games with Perfect Information ijgttjournal
Match making is becoming important in this rapidly changing world for identifying the required supplier and buyer pair. In this paper we are building a mathematical model using extensive games with perfect information, Nash equilibrium is found in order to find the exact match. The matching is based on multi
attribute priority, the attribute are called constraints which are classified into hard and soft constraints are identified. The best matched is identified by running the algorithm on Mat Lab and even here time is considered. Two models are designed first model is one manufacturer and n-suppliers and second model is
m-manufacturers and n-suppliers.
Incentive mechanism design for citizen reporting application using Stackelber...IJECEIAES
The growing utilization of smartphones equipped with various sensors to collect and analyze information around us highlights a paradigm called mobile crowdsensing. To motivate citizens’ participation in crowdsensing and compensate them for their resources, it is necessary to incentivize the participants for their sensing service. There are several studies that used the Stackelberg game to model the incentive mechanism, however, those studies did not include a budget constraint for limited budget case. Another challenge is to optimize crowdsourcer (government) profit in conducting crowdsensing under the limited budget then allocates the budget to several regional working units that are responsible for the specific city problems. We propose an incentive mechanism for mobile crowdsensing based on several identified incentive parameters using the Stackelberg game model and applied the multi-objective optimization problem (MOOP) to the incentive model in which the participant reputation is taken into account. The evaluation of the proposed incentive model is performed through simulations. The simulation indicated that the result appropriately corresponds to the theoretical properties of the model.
A study on the chain restaurants dynamic negotiation games of the optimizatio...ijcsit
In the era of meager profit, production costs often become an important factor affecting SMEs’ operating
conditions, and how to effectively reduce production costs has become an issue of in-depth consideration
for the business owners. Especially, the food and beverage (F&B) industry cannot accurately predict the
demand. It many cause demand forecast fall and excess or insufficient inventory pressure. Companies of
the F&B industry may be even unable to meet immediate customer needs. They are faced great challenges
in quick response and inventory pressure. This study carried out the product inventory model analysis of
the most recent year’s sales data of the fresh food materials for chain restaurants in a supply chain region
with raw material suppliers and demanders. Moreover, this study adopted the multi-agent dynamic strategy
game to establish the joint procurement decision model negotiation algorithm for analysis and verification
by simulation cases to achieve the design of dynamic negotiation optimization mechanism for the joint
procurement of food materials. Coupled with supply chain management 3C theory for food material
inventory management, we developed the optimization method for determining the order quantities of the
chain restaurants. For product demand forecast, we applied the commonality model, production and
delivery capacity model, and the model of consumption and replenishment based on market demand
changes in categorization and development. Moreover, with the existence of dependencies between product
demands as the demand forecast basis, we determined the appropriate inventory model accordingly.
A Coalition-Formation Game Model for Energy-Efficient Routing in Mobile Ad-ho...IJECEIAES
One of the most routing problems in Mobile Ad-hoc Network is the node’s selfishness. Nodes are generally selfish and try to maximize their own benefit; hence these nodes refuse to forward packet on behalf of others to preserve their limited energy resources. This selfishness may lead to a low efficiency of routing. Therefore, it is important to study mechanisms which can be used encourage cooperation among nodes, to maintain the network efficiency. In this paper, we propose a cooperative game theoretic model to support more energy-aware and available bandwidth routing in MANET. We introduce a novel framework from coalitional-formation game theory, called hedonic coalition-formation game. We integrate this model to OLSR protocol that is an optimization over the classical link state protocol for the MANETs. Within each coalition, a coalition coordinator acts as a special MPR node to improve the energy efficient and the packet success rate of the transmission. Simulation results show how the proposed algorithm improve the performance in terms of the percentage of selected MPR nodes in the network, the percentage of alive nodes by time, and the Packet Delivery Ratio. Which prove that our proposed model leads, to better results compared to the classical OLSR.
Business Models for the Next Generation of Mobile Communications ijmnct
The Next Generation of mobile network 5G, which will be based on a high-speed wireless broadband
connection, could bring important changes to the way individuals and businesses employ
telecommunications services and solve the issues related to the explosive growth in demand for mobile
traffic, and the profitability decreasing of the mobile Broadband market. Therefore, the OMNs (Operator
Mobile Networks) should plan for deploying 5G mobile network beyond 2020, which is the expected year
for launching 5G. A business analysis study and mathematic modelling approach was considered. Also, a
new pricing model is proposed to be consistent with the growth of mobile broadband. The results show that
5G is very beneficial, not only because of its lower cost compared with 4G LTE, but also due to the
increment of average data consumptions offered by 5G mobile technologies and the increasing growth of
number of users. We also found that good analysis of Price Elasticity of Volume (PED) gives an important
margin of benefit. We confirm that the reuse of existing sites have a large impact on reducing costs when a
denser macro network deployed. However, we encountered a lack of the limited capacity related to the
macro sites and coverage limited with small cell solutions like femtocells, picocells deployed with 5G
millimeter Wave system and Wi-Fi.
Business models for the next generation of mobile communicationsijmnct
The Next Generation of mobile network 5G, which will be based on a high-speed wireless broadband connection, could bring important changes to the way individuals and businesses employ telecommunications services and solve the issues related to the explosive growth in demand for mobile
traffic, and the profitability decreasing of the mobile Broadband market. Therefore, the OMNs (Operator Mobile Networks) should plan for deploying 5G mobile network beyond 2020, which is the expected year for launching 5G. A business analysis study and mathematic modelling approach was considered. Also, a new pricing model is proposed to be consistent with the growth of mobile broadband. The results show that 5G is very beneficial, not only because of its lower cost compared with 4G LTE, but also due to the
increment of average data consumptions offered by 5G mobile technologies and the increasing growth of number of users. We also found that good analysis of Price Elasticity of Volume (PED) gives an important margin of benefit. We confirm that the reuse of existing sites have a large impact on reducing costs when a denser macro network deployed. However, we encountered a lack of the limited capacity related to the
macro sites and coverage limited with small cell solutions like femtocells, picocells deployed with 5G millimeter Wave system and Wi-Fi.
BUSINESS MODELS FOR THE NEXT GENERATION OF MOBILE COMMUNICATIONSijmnct
The Next Generation of mobile network 5G, which will be based on a high-speed wireless broadband connection, could bring important changes to the way individuals and businesses employ
telecommunications services and solve the issues related to the explosive growth in demand for mobile traffic, and the profitability decreasing of the mobile Broadband market. Therefore, the OMNs (Operator Mobile Networks) should plan for deploying 5G mobile network beyond 2020, which is the expected year for launching 5G. A business analysis study and mathematic modelling approach was considered. Also, a
new pricing model is proposed to be consistent with the growth of mobile broadband. The results show that 5G is very beneficial, not only because of its lower cost compared with 4G LTE, but also due to the increment of average data consumptions offered by 5G mobile technologies and the increasing growth of
number of users. We also found that good analysis of Price Elasticity of Volume (PED) gives an important margin of benefit. We confirm that the reuse of existing sites have a large impact on reducing costs when a
denser macro network deployed. However, we encountered a lack of the limited capacity related to the macro sites and coverage limited with small cell solutions like femtocells, picocells deployed with 5G millimeter Wave system and Wi-Fi.
Value Creation in Collaborative Supply Chain Network in Automobile Industry i...Waqas Tariq
ABSTRACT Abstract Purpose : This paper aims to determine the key factors that influence the value based supply chain in the collaborative network of Automotive sector in India and the extent of information sharing in a B2B set up and its implication on business decisions in the Automobile sector. The paper makes an attempt to examine the value creation in the supply chain network of e-commerce based automobile companies. The predominant factors that influence the Collaborative practices of Automobile Original Equipment Manufacturers (OEMs) in Karnataka and their dealership network in the background of e-commerce is thoroughly examined. Design/methodology/approach : In the paper, the systemic and logical analysis of value creation expert research made over the past several years is used and statistical analysis(Exploratory Factor Analysis) has been conducted based on the survey results of perceptions of the dealers assimilated through online survey. Findings : Major empirical findings based on automobile companies’ data analysis vide Exploratory factor analysis allow stating that adoption of e-based collaborative arrangements and information sharing based on trust and long term alliance between partners enhances the value creation and results in the improvement in Supply chain management. It thus results in: Savings in cost, Timely decisions based on superior information, Better and positive relationships with Manufacturer-Suppliers and Dealers, Superior and strong collaboration, Integrated customer service and Enhancement of ultimate consumer value. Originality value: This paper has thoroughly examined the Collaborative network of the e-commerce based automobile co’s. and empirical findings suggest that the entire supply chain network has reaped the benefits of technology adoption and its impact on business results is tangible which could be evidenced in positive outcomes like improvement in Manufacturer-Supplier-Dealer co-ordination and enhancement of long term customer relations. Research limitations/implications : The presented research work confirms the positive implications of technology on value creation in the supply chain network of e-commerce based automobile companies. Research in this area highlights only the value addition in the collaborative supply chain network in select automobile co’s (OEMs) in Karnataka and their dealership network in India. Broader generalisations could be drawn using this information, by selecting a larger sample size. The future research should be made on the entire industry in the country and by bringing more co’s. and suppliers into the sampling frame. Keywords : Value creation, Collaborative supply chain, Information sharing, Superior collaboration.
A Novel Intelligence-based e-Procurement System to offer Maximum Fairness Ind...IJECEIAES
A perfect auction policy is one of the most strategic elements that contribute to success factor for any e-Procurement system. An auction policy can be only term as an effective if it really offer win-win situation to both the bidder as well as to the merchant. After reviewing existing studies on e-Procurement system, it is found that there isno effective research work focusing on this point and maximum research contribution has limited its scope to certain application or case studis. Hence, the proposed system introduces a novel eProcurement system which is equipped by an itelligence-building process for performing predictive analysis of ongoing auction process. A mathematical modelling is implemented where all teh variables have been formed using practical implementation of auction system and followed by optimization process using regression-based approach. The study outcome shows that proposed system offers better response time and higher predictive accuracy in contrast to existing approaches.
In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
Augmented reality, the new age technology, has widespread applications in every field imaginable. This technology has proven to be an inflection point in numerous verticals, improving lives and improving performance. In this paper, we explore the various possible applications of Augmented Reality (AR) in the field of Medicine. The objective of using AR in medicine or generally in any field is the fact that, AR helps in motivating the user, making sessions interactive and assist in faster learning. In this paper, we discuss about the applicability of AR in the field of medical diagnosis. Augmented reality technology reinforces remote collaboration, allowing doctors to diagnose patients from a different locality. Additionally, we believe that a much more pronounced effect can be achieved by bringing together the cutting edge technology of AR and the lifesaving field of Medical sciences. AR is a mechanism that could be applied in the learning process too. Similarly, virtual reality could be used in the field where more of practical experience is needed such as driving, sports, neonatal care training.
Image fusion is a sub field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus, it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed which fuses multi-focus images. Thus, the results of extensive experimentation performed to highlight the efficiency and utility of the proposed technique is presented. The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Feature selection problem is one of the main important problems in the text and data mining domain. This paper presents a comparative study of feature selection methods for Arabic text classification. Five of the feature selection methods were selected: ICHI square, CHI square, Information Gain, Mutual Information and Wrapper. It was tested with five classification algorithms: Bayes Net, Naive Bayes, Random Forest, Decision Tree and Artificial Neural Networks. In addition, Data Collection was used in Arabic consisting of 9055 documents, which were compared by four criteria: Precision, Recall, F-measure and Time to build model. The results showed that the improved ICHI feature selection got almost all the best results in comparison with other methods.
In this paper Gentoo Penguin Algorithm (GPA) is proposed to solve optimal reactive power problem. Gentoo Penguins preliminary population possesses heat radiation and magnetizes each other by absorption coefficient. Gentoo Penguins will move towards further penguins which possesses low cost (elevated heat concentration) of absorption. Cost is defined by the heat concentration, distance. Gentoo Penguins penguin attraction value is calculated by the amount of heat prevailed between two Gentoo penguins. Gentoo Penguins heat radiation is measured as linear. Less heat is received in longer distance, in little distance, huge heat is received. Gentoo Penguin Algorithm has been tested in standard IEEE 57 bus test system and simulation results show the projected algorithm reduced the real power loss considerably.
08 20272 academic insight on applicationIAESIJEECS
This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Notary is an official authorized to make an authentic deed regarding all deeds, agreements and stipulations required by a general rule. Activities carried out at the notary office such as recording client data and file data still use traditional systems that tend to be manual. The problem that occurs is the inefficiency in data processing and providing information to clients. Clients have difficulty getting information related to the progress of documents that are being taken care of at the notary's office. The client must take the time to arrive to the notary's office repeatedly to check the progress of the work of the document file. The purpose of this study is to facilitate clients in obtaining information about the progress of the work in progress, and make it easier for employees to process incoming documents by implementing an administrative system. This system was developed with the waterfall system development method and uses the Multi-Channel Access Technology integrated in the website to simplify the process of delivering information and requesting information from clients and to clients with Telegram and SMS Gateway. Clients will come to the office only when there is a notification from the system via Telegram or SMS notifying that the client must come directly to the notary's office, thus leading to an efficient time and avoiding excessive transportation costs. The overall functional system can function properly based on the results of alpha testing. The results of beta testing conducted by distributing the system feasibility test questionnaire to end users, get a percentage of 96% of users agree the system is feasible to be implemented.
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents’ numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range. Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
In this work Predestination of Particles Wavering Search (PPS) algorithm has been applied to solve optimal reactive power problem. PPS algorithm has been modeled based on the motion of the particles in the exploration space. Normally the movement of the particle is based on gradient and swarming motion. Particles are permitted to progress in steady velocity in gradient-based progress, but when the outcome is poor when compared to previous upshot, immediately particle rapidity will be upturned with semi of the magnitude and it will help to reach local optimal solution and it is expressed as wavering movement. In standard IEEE 14, 30, 57,118,300 bus systems Proposed Predestination of Particles Wavering Search (PPS) algorithm is evaluated and simulation results show the PPS reduced the power loss efficiently.
In this paper, Mine Blast Algorithm (MBA) has been intermingled with Harmony Search (HS) algorithm for solving optimal reactive power dispatch problem. MBA is based on explosion of landmines and HS is based on Creativeness progression of musicians-both are hybridized to solve the problem. In MBA Initial distance of shrapnel pieces are reduced gradually to allow the mine bombs search the probable global minimum location in order to amplify the global explore capability. Harmony search (HS) imitates the music creativity process where the musicians supervise their instruments’ pitch by searching for a best state of harmony. Hybridization of Mine Blast Algorithm with Harmony Search algorithm (MH) improves the search effectively in the solution space. Mine blast algorithm improves the exploration and harmony search algorithm augments the exploitation. At first the proposed algorithm starts with exploration & gradually it moves to the phase of exploitation. Proposed Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) has been tested on standard IEEE 14, 300 bus test systems. Real power loss has been reduced considerably by the proposed algorithm. Then Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) tested in IEEE 30, bus system (with considering voltage stability index)- real power loss minimization, voltage deviation minimization, and voltage stability index enhancement has been attained.
Artificial Neural Networks have proved their efficiency in a large number of research domains. In this paper, we have applied Artificial Neural Networks on Arabic text to prove correct language modeling, text generation, and missing text prediction. In one hand, we have adapted Recurrent Neural Networks architectures to model Arabic language in order to generate correct Arabic sequences. In the other hand, Convolutional Neural Networks have been parameterized, basing on some specific features of Arabic, to predict missing text in Arabic documents. We have demonstrated the power of our adapted models in generating and predicting correct Arabic text comparing to the standard model. The model had been trained and tested on known free Arabic datasets. Results have been promising with sufficient accuracy.
In the present-day communications speech signals get contaminated due to
various sorts of noises that degrade the speech quality and adversely impacts
speech recognition performance. To overcome these issues, a novel approach
for speech enhancement using Modified Wiener filtering is developed and
power spectrum computation is applied for degraded signal to obtain the
noise characteristics from a noisy spectrum. In next phase, MMSE technique
is applied where Gaussian distribution of each signal i.e. original and noisy
signal is analyzed. The Gaussian distribution provides spectrum estimation
and spectral coefficient parameters which can be used for probabilistic model
formulation. Moreover, a-priori-SNR computation is also incorporated for
coefficient updation and noise presence estimation which operates similar to
the conventional VAD. However, conventional VAD scheme is based on the
hard threshold which is not capable to derive satisfactory performance and a
soft-decision based threshold is developed for improving the performance of
speech enhancement. An extensive simulation study is carried out using
MATLAB simulation tool on NOIZEUS speech database and a comparative
study is presented where proposed approach is proved better in comparison
with existing technique.
Previous research work has highlighted that neuro-signals of Alzheimer’s disease patients are least complex and have low synchronization as compared to that of healthy and normal subjects. The changes in EEG signals of Alzheimer’s subjects start at early stage but are not clinically observed and detected. To detect these abnormalities, three synchrony measures and wavelet-based features have been computed and studied on experimental database. After computing these synchrony measures and wavelet features, it is observed that Phase Synchrony and Coherence based features are able to distinguish between Alzheimer’s disease patients and healthy subjects. Support Vector Machine classifier is used for classification giving 94% accuracy on experimental database used. Combining, these synchrony features and other such relevant features can yield a reliable system for diagnosing the Alzheimer’s disease.
Attenuation correction designed for PET/MR hybrid imaging frameworks along with portion making arrangements used for MR-based radiation treatment remain testing because of lacking high-energy photon weakening data. We present a new method so as to uses the learned nonlinear neighborhood descriptors also highlight coordinating toward foresee pseudo-CT pictures starting T1w along with T2w MRI information. The nonlinear neighborhood descriptors are acquired through anticipating the direct descriptors interested in the nonlinear high-dimensional space utilizing an unequivocal constituent guide also low-position guess through regulated complex regularization. The nearby neighbors of every near descriptor inside the data MR pictures are looked during an obliged spatial extent of the MR pictures among the training dataset. By that point, the pseudo-CT patches are evaluated through k-closest neighbor relapse. The planned procedure designed for pseudo-CT forecast is quantitatively broke downward on top of a dataset comprising of coordinated mind MRI along with CT pictures on or after 13 subjects.
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
In this paper, the author provides insights and lessons that can be learned from colleagues at American universities about their online education experiences. The literature review and previous studies of online educations gains are explored and summarized in this research. Emerging trends in online education are discussed in detail, and strategies to implement these trends are explained. The author provides several tools and strategies that enable universities to ensure the quality of online education. At the end of this research paper, the researcher provides examples from Arab universities who have successfully implemented online education and expanded their impact on the society. This research provides a strategy and a model that can be used by universities in the Middle East as a roadmap to implement online education in their regions.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. ISSN: 2252-8776
IJECE Vol. 6, No. 3, December 2017 : 189 – 198
190
result of a mixed strategy. Hence, when using the term Nash equilibrium we mean pure strategy exact NE
unless mentioned otherwise.
CPs may be faced with the question of ”how to choose in what content to specialize” [10]. E.
Altman considers several CPs that are faced with a similar problem and study the impact of their decisions on
each other using a game theoretic approach. The author shows that the problem of selecting the content type
is equivalent to a congestion game. In [11], the authors have studied game problems involving two types of
CPs : one that corresponds to independent CPs, and one that correspond to CPs that have exclusive
agreements with Internet Service Providers (ISPs). The cost for the internet users who are subscribers of
some ISP of fetching content from an independent CP or from a CP that has an exclusive agreement with
another ISP, was assumed to be larger than for fetching it from the CP that has an exclusive agreement with
their own ISP.
Weijie Wu et al. consider a Stackelberg game, where the CP decides reward first, and after that, the
peers decide amount of capacity [5]. The CP rewards the peers based on the amount of upload capacity they
contribute. From CP point of view, it aims at minimizing its total cost, i.e., the cost of uploading and the cost
of rewarding the peers. The utility of a peer is the reward it receives, minus its cost of upload contribution.
The rest of the paper is organized as follows : in section 2., we describe the problem model. In
section 3., we formulate our model as a non-cooperative game. We present numerical results in section 4. and
conclude our work in section 5.
2. PROBLEM MODELING
In this section, we formulate the interaction among content providers (CPs) as a non-cooperative
game. Each CP chooses credibility of content and the corresponding price. We consider a system with N
content providers. Let pi and ci, be, respectively, the tariff and the credibility of content guaranteed by CPi.
Now, each customer seeks to the content provider which allows him to meet a credibility of content sufficient
to satisfy his/her needs, at suitable price. We consider that behaviors of customer’s has been handled by a
simple function so called demand functions, see equation (1). This later depends on the price and credibility
of content strategies of all. CPs are supposed to know the effect of their policy on the customer’s.
2.1. Model of Content Credibility Function
We assume that the function of the credibility of content ci of CPi is a function of the quality of
service qsi and quality content qci above which is written as follows :
The quality of content provided can be specified for a specific domain of content, e.g., video
streaming.
2.2. Demand Model
3. IJ-ICT ISSN: 2252-8776
Analysis of Competition Fronting the Popularity… (Hamid Garmani)
191
Assumption 1 and 2 will be needed to ensure the uniqueness of the resulting equilibrium. It is
furthermore a reasonable condition, in that Assumption 1 (resp. Assumption 2 ) implies that the influence of
a CP price (resp. credibility of content) is significantly greater on its observed demand than the prices (resp.
credibilities of content) of its competi-tors. This condition could then take into account the presence of
customer loyalties and/or imperfect knowledge of competitors prices [13].
2.3. Utility model for CP
3. NON-COOPERATIVE GAME FORMULATION
4. ISSN: 2252-8776
IJECE Vol. 6, No. 3, December 2017 : 189 – 198
192
3.1. QoS Game
3.2. Price Game
5. IJ-ICT ISSN: 2252-8776
Analysis of Competition Fronting the Popularity… (Hamid Garmani)
193
3.3. QoC Game
3.4. Joint Price, QoC and QoS Game
In the subsections cited above, we have shown the existence and the uniqueness of NE, by fixing
each time one of the parameters. The next task is to determine the price, QoS and QoC at equilibrium. This
calculation will be based on the best response algorithm:
6. ISSN: 2252-8776
IJECE Vol. 6, No. 3, December 2017 : 189 – 198
194
3.5. Price of Anarchy
The concept of social welfare [16], is defined as the sum of the utilities of all agents in the systems
(i.e. Providers). It is well known in game theory that agent selfishness, such as in a Nash equilibrium, does
not lead in general to a socially efficient situation. As a measure of the loss of efficiency due to the
divergence of user interests, we use the Price of Anarchy (PoA) [17], this latter is a measure of the loss of
efficiency due to actors’ selfishness. This loss has been defined in [17] as the worst-case ratio comparing the
global efficiency measure (that has to be chosen) at an outcome of the noncooperative game played among
actors, to the optimal value of that efficiency measure. A PoA close to 1 indicates that the equilibrium is
approximately socially optimal, and thus the consequences of selfish behavior are relatively benign. The term
Price of Anarchy was first used by Koutsoupias and Papadimitriou [17] but the idea of measuring
inefficiency of equilibrium is older. The concept in its current form was designed to be the analogue of the
”approximation ratio” in Approximation Algorithms or the ”competitive ratio” in Online Algorithms. As in
[18], we measure the loss of efficiency due to actors selfishness as the quotient between the social welfare
obtained at the Nash equilibrium and the maximum value of the social welfare:
4. NUMERICAL INVESTIGATIONS
To clarify and show how to take advantage from our theoretical study, we suggest to study
numerically the market share game while considering the best response dynamics and expressions of demand
as well as utility functions of CPs. Hence, we consider a system with tree CPs seeking to maximize their
respective revenues. Table 1 represents the system parameter values considered in this numerical study.
Table 1. System parameters used for numerical examples
Figures 1, 2 and 3 present respectively curves of the convergence to Nash Equilibrium Price, to
Nash Equi-librium QoC and to Nash Equilibrium QoS. It is clear that the best response dynamics converges
to the unique Nash equilibrium price, QoC and QoS. We also remark that the speed of convergence is
relatively high (around 5 rounds are enough to converge to the joint price and QoS equilibrium).
7. IJ-ICT ISSN: 2252-8776
Analysis of Competition Fronting the Popularity… (Hamid Garmani)
195
Figure 1. Price game : Convergence to the Price Nash Equilibrium
Figure 2. QoC game : Convergence to the QoC Nash Equilibrium.
Figure 3. QoS game : Convergence to the QoS Nash Equilibrium
In the following, we discuss the impact of the system parameters on the system efficiency in terms
of Price of Anarchy (PoA). Figure 4 and 5 plot the variation curve of PoA with respect to and which
represents the sensitivity of CPi to his price pi and his credibility ci. In these figures, we first notice that the
PoA increases when and increases, the fact that the PoA increases with and finds the simple intuition that
increasing the sensitivity of CPs to their prices and their credibilities gives more and more freedom to CPs
8. ISSN: 2252-8776
IJECE Vol. 6, No. 3, December 2017 : 189 – 198
196
for optimizing the Nash equilibrium. When = 11 = 22 = 33 = 1 and = 11 = 22 = 33 = 1, in the other word,
when the sensitivity of an CP to the prices of its competitors is zero, PoA converges to 1 and the equilibrium
is approximately socially optimal.
9. IJ-ICT ISSN: 2252-8776
Analysis of Competition Fronting the Popularity… (Hamid Garmani)
197
5. CONCLUSION AND PERSPECTIVES
In this work, we presented and analyzed a framework to model the complex interactions among
content providers as players through a class of two parameter Nash equilibrium model. The model is based
on a simple linear demand functions which describe the behaviour of customers. These functions take into
account not only the characteristics of a current but also of all other CPs in presence of two parameters
describing each CP service price and credibility of content. We established uniqueness of a Nash equilibrium
point and showed it with relevant numerical results. To quantify how efficient is the NE point we used PoA
measurement and showed its variation according to the parameters of the model. Our proposed algorithm
finds very fast the equilibrium price and the content credibility to be chosen by each CP.
This work can be developed to achieve the following purposes :
a. Modeling the users choice with a nonlinear function which is based on the Logit model.
b. Introducing advertising revenues in the utility of CPs to achieve maximum revenue. In
2010, advertising rev-enues of Google are more than 20 billions.
c. Taking into consideration the purchasing power of a target market for CPs.
10. ISSN: 2252-8776
IJECE Vol. 6, No. 3, December 2017 : 189 – 198
198
REFERENCES
[1] T. Wolf; J. Griffioen; K. L. Calvert; R. Dutta; G. N. Rouskas; I. Baldine; A. Nagurney; , “Choice as a principle in
network architecture,” ACM SIGCOMM Computer Communication Review, vol. 42, no. 4, pp. 105–106, 2012.
[2] J.-J. Laffont; S. Marcus; P. Rey; J. Tirole; , “Internet interconnection and the off-net-cost pricing principle,” RAND
Journal of Economics, pp. 370–390, 2003.
[3] Z.-L. Zhang; P. Nabipay; A. Odlyzko; R. Guerin; , “Interactions, competition and innovation in a service-oriented
internet: an economic model,” in INFOCOM, 2010 Proceedings IEEE. IEEE, pp. 1–5, 2010.
[4] E. Altman; S. Caron; G. Kesidis; , “Application neutrality and a paradox of side payments,” arXiv preprint
arXiv:1008.2267, 2010.
[5] Y. Hu; Q. Qiang; , “An equilibrium model of online shopping supply chain networks with service capacity
investment,” Service Science, vol. 5, no. 3, pp. 238–248, 2013.
[6] A. Nagurney; D. Li; , “A dynamic network oligopoly model with transportation costs, product differentiation, and
quality competition,” Computational Economics, vol. 44, no. 2, pp. 201–229, 2014.
[7] A. Nagurney; D. Li; L. S. Nagurney; , “Pharmaceutical supply chain networks with outsourcing under price and
quality competition,” International Transactions in Operational Research, vol. 20, no. 6, pp. 859–888, 2013.
[8] A. Nagurney; D. Li; T. Wolf; S. Saberi, “A network economic game theory model of a service-oriented internet
with choices and quality competition,” NETNOMICS: Economic Research and Electronic Networking, vol. 14, no.
1-2, pp. 1–25, 2013.
[9] A. Nagurney; T. Wolf; , “A cournot–nash–bertrand game theory model of a service-oriented internet with price and
quality competition among network transport providers,” Computational Management Science, vol. 11, no. 4, pp.
475–502, 2014.
[10] E. Altman; , “In which content to specialize a game theoretic analysis,” in International Conference on Research in
Networking. Springer, pp. 121–125, 2012.
[11] T. Jimenez; Y. Hayel; E. Altman; , “Competition in access to content,” in International Conference on Re-search in
Networking. Springer, pp. 211–222, 2012.
[12] E. Altman; A. Legout; Y. Xu; , “Network non-neutrality debate: An economic analysis,” in International
Conference on Research in Networking. Springer, pp. 68–81, 2011.
[13] R. El Azouzi; E. Altman; L. Wynter; , “Telecommunications network equilibrium with price and quality-of-service
characteristics,” Teletraffic Science and Engineering, vol. 5, pp. 369–378, 2003.
[14] J. B. Rosen, “Existence and uniqueness of equilibrium points for concave n-person games,” Econometrica: Jour-
nal of the Econometric Society, pp. 520–534, 1965.
[15] H. Moulin, On the uniqueness and stability of Nash equilibrium in non-cooperative games. North-Holland
Publishing Company, 1980, no. 130.
[16] P. Maille´ and B. Tuffin, “Analysis of price competition in a slotted resource allocation game,” in INFOCOM
2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.
[17] E. Koutsoupias and C. Papadimitriou, “Worst-case equilibria,” Computer science review, vol. 3, no. 2, pp. 65–69,
2009.
[18] L. Guijarro, V. Pla, J. R. Vidal, J. Martinez-Bauset, “Analysis of price competition under peering and transit
agreements in internet service provision to peer-to-peer users,” in 2011 IEEE Consumer Communications and
Networking Conference (CCNC). IEEE, 2011, pp. 1145–1149.