-
161
On a Stochastic Approach to Extensions of the Susceptible-Infected-Susceptible (SIS) Model Applied to Malaria
Published 2024-01-01“…We first calculated the basic reproduction number R0 of the models ShIhRhSh‐SvIv and ShLhIhRhSh‐SvLvIv in order to show that the malaria-free equilibrium is asymptotically stable; then, we used a finite Markov chain model to describe the interactions between the different compartments of the model SeLeIeReSe‐SaLaIaRaSa‐SvIv. …”
Get full text
Article -
162
Estimations in a Constant-Stress Partially Accelerated Life Test for Generalized Rayleigh Distribution under Type-II Hybrid Censoring Scheme
Published 2022-01-01“…Bayesian and E-Bayesian estimates are obtained using Markov chain Monte Carlo (MCMC) methods. To prove the applicability and the importance of the subject, a test for real data will be provided. …”
Get full text
Article -
163
Research on the Correlation between Information and Communication Technology Development and Consumer Spending Based on Artificial Intelligence and Time Series Econometric Model
Published 2022-01-01“…Moreover, this paper organically combines the advantages of wavelet analysis and hidden Markov model to construct a wavelet domain hidden Markov chain model. It is used to examine the flow of information on different scales related to the development of communication technology and consumer spending, so as to infer the potential mechanism of the interaction of different traders’ behaviors from the other side. …”
Get full text
Article -
164
Bayesian Estimation of Archimedean Copula-Based SUR Quantile Models
Published 2020-01-01“…As there are many parameters to be estimated, we consider the Bayesian Markov chain Monte Carlo approach to estimate the parameter interests in the model. …”
Get full text
Article -
165
A Novel BBO Algorithm Based on Local Search and Nonuniform Variation for Iris Classification
Published 2021-01-01“…On this base, the convergence condition of NBBO was proposed by using the Markov chain strategy. Finally, simulation results were given to demonstrate the effectiveness and efficiency of the proposed iris classification method.…”
Get full text
Article -
166
A Polling-Based Dynamic Order-Picking System considering Priority Orders
Published 2020-01-01“…A mathematical model is established for such a system by applying polling theory, a probability generating function, and an embedded Markov chain. Numerical analysis shows that this priority polling-based picking system can improve the picking efficiency and is well suited to practical operations.…”
Get full text
Article -
167
Bayesian and non-bayesian analysis for stress-strength model based on progressively first failure censoring with applications.
Published 2024-01-01“…It is suggested that Markov chain Monte Carlo techniques be used for Bayesian estimation in order to achieve Bayes estimators and the associated credible intervals. …”
Get full text
Article -
168
Study on the Queue-Length Distribution in Geo/G(MWV)/1/N Queue with Working Vacations
Published 2015-01-01“…Using supplementary variable technique and embedded Markov chain method, the queue-length distribution solution in the form of formula at arbitrary epoch is obtained. …”
Get full text
Article -
169
A stochastic goal-based economic order quantity model for multi-item inventory
Published 2024-12-01“…This paper proposes a multiobjective goal programming model to optimize the EOQ of multiple items under stochastic demand. Adopting Markov chain methodologies, the model initially defines the demand transition matrix, inventory cost matrix, objective function, priorities, and goal constraints. …”
Get full text
Article -
170
Trajectory differential privacy protection mechanism based on prediction and sliding window
Published 2020-04-01“…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
Get full text
Article -
171
Hierarchical Bayesian Spatio-Temporal Modeling for PM10 Prediction
Published 2021-01-01“…The disaggregating technique with a Markov chain Monte Carlo method with Gibbs sampler are used to handle the missing data. …”
Get full text
Article -
172
Joint admission control algorithm based on load transfer in heterogeneous networks
Published 2018-05-01“…A load-transfer-based joint admission control (LJAC) algorithm in heterogeneous networks was proposed.The access requirements of users were admitted based on load balancing,the dynamic load transfer of traffics in the overlapping coverage areas of heterogeneous networks were introduced,and the influence of such factors as the layout of heterogeneous networks and the vertical handoff was considered in the algorithm.The integrated system of heterogeneous networks was modeled as a multidimensional Markov chain,the steady-state probabilities were obtained and the quality of service (QoS) performance metrics were derived.Based on the Poisson point process theory,the upper bound of capacity of the heterogeneous networks satisfying QoS limitations was obtained.The admission control parameters of the integrated system of heterogeneous networks were optimized in order to maximize the resource utilization rate as well as guaranteeing the QoS of users.The simulation results demonstrate lower traffic blocking probability,lower failure probability of vertical handoff requirements,and larger system capacity gain can be achieved by using the proposed LJAC algorithm.…”
Get full text
Article -
173
The Discrete-Time Bulk-Service Geo/Geo/1 Queue with Multiple Working Vacations
Published 2013-01-01“…By using embedded Markov chain approach and difference operator method, queue length of the whole system at random slots and the waiting time for an arriving customer are obtained. …”
Get full text
Article -
174
Distributed Cognitive Radio Spectrum Access with Imperfect Sensing Using CTMC
Published 2013-05-01“…In this paper, a primary prioritized distributed DSA algorithm using continuous-time Markov chain (CTMC) model is proposed. In a distributed scheme, each secondary user needs to be aware of the statistics—arrival and service rates—of the other secondary users to optimize the throughput while maintaining fairness. …”
Get full text
Article -
175
Stochastic Modeling of Internet Service for Profit Optimization in Uganda
Published 2020“…Considering customer demand, price and operating costs of internet service, we formulate a finite state Markov decision process model where states of a Markov chain represent possible states of demand for internet service. …”
Get full text
Article -
176
Variance Swap Pricing under Markov-Modulated Jump-Diffusion Model
Published 2021-01-01“…The jump diffusion, as well as other parameters of the underlying stock’s dynamics, is modulated by a Markov chain representing different states of the market. …”
Get full text
Article -
177
LED Lighting System Reliability Modeling and Inference via Random Effects Gamma Process and Copula Function
Published 2015-01-01“…Considering the model is so complicated and analytically intractable, the Markov chain Monte Carlo (MCMC) method is used to estimate the unknown parameters. …”
Get full text
Article -
178
Using the Bayesian Model Averaging Approach for Genomic Selection by Considering Skewed Error Distributions
Published 2024-12-01“…Occam’s window and Markov-Chain Monte Carlo model composition (MC3) were used to determine the best model and its uncertainty. …”
Get full text
Article -
179
Realms of aesthetic experience of classical Chinese gardens based on semantic analysis of online tourism reviews
Published 2025-01-01“…A probability transition model of the realms of aesthetic experience was constructed based on a Markov chain and used to mine the transition pattern of the aesthetic realms. …”
Get full text
Article -
180
Research on scheduled WLAN MAC protocol with failure retries on RoF-DAS architecture
Published 2020-03-01“…Aim to reduce control frames consumption and improve the delay performance,a scheduled gated-service polling access (SGPA) mechanism was proposed,in which the total data packets in the buffer at the polling instant were aggregated into a data set,that was transmitted and acknowledged uniformly.Then,an inner-arrival gated-service polling (IAGP) model was proposed to analyze the quantitative relationship between failure retry mechanism and network access performance of the wireless local area network (WLAN) in RoF-DAS.The failure retry mechanism were modeled as the arrival and service process of inner customers in IAGP.Using the Markov chain and generating function method,the closed-form expressions for the quantitative relationship between delay performance and retrial parameters,such as retry times,and the probability of retransmission,were achieved.The simulation results show that the proposed SGPA can achieve a lower delay than IEEE 802.11,and the theoretical performance evaluation calculated by IAGP are identical with the simulation results,which provides an effective evaluation mechanism for the access performance in RoF-DAS WLAN,with inperfect channel and failure retry mechanism.…”
Get full text
Article