222,387 research outputs found

    Managing the bullwhip effect in multi-echelon supply chains

    Get PDF
    This editorial article presents the bullwhip effect which is one of the major problems faced by supply chain management. The bullwhip effect represents the demand variability amplification as demand information travels upstream in the supply chain. The bullwhip effect research has been attempting to prove its existence, identify its causes, quantify its magnitude and propose mitigation and avoidance solutions. Previous research has relied on different modeling approaches to quantify the bullwhip effect and to investigate the proposed mitigation/avoidance solutions. Extensive research has shown that smoothing replenishment rules and collaboration in supply chain are the most powerful approaches to counteract the bullwhip effect. The objective of this article is to highlight the bullwhip effect avoidance approaches with providing some interesting directions for future research

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc

    Supporting Service Differentiation with Enhancements of the IEEE 802.11 MAC Protocol: Models and Analysis

    Get PDF
    As one of the fastest growing wireless access technologies, Wireless LANs must evolve to support adequate degrees of service differentiation. Unfortunately, current WLAN standards like IEEE 802.11 Distributed Coordination Function (DCF) lack this ability. Work is in progress to define an enhanced version capable of supporting QoS for multimedia traffic at the MAC layer. In this paper, we aim at gaining insight into three mechanisms to differentiate among traffic categories, i.e., differentiating the minimum contention window size, the Inter-Frame Spacing (IFS) and the length of the packet payload according to the priority of different traffic categories. We propose an analysis model to compute the throughput and packet transmission delays. In additions, we derive approximations to get simpler but more meaningful relationships among different parameters. Comparisons with discrete-event simulation results show that a very good accuracy of performance evaluation can be achieved by using the proposed analysis model

    On Efficiency and Validity of Previous Homeplug MAC Performance Analysis

    Get PDF
    The Medium Access Control protocol of Power Line Communication networks (defined in Homeplug and IEEE 1901 standards) has received relatively modest attention from the research community. As a consequence, there is only one analytic model that complies with the standardised MAC procedures and considers unsaturated conditions. We identify two important limitations of the existing analytic model: high computational expense and predicted results just prior to the predicted saturation point do not correspond to long-term network performance. In this work, we present a simplification of the previously defined analytic model of Homeplug MAC able to substantially reduce its complexity and demonstrate that the previous performance results just before predicted saturation correspond to a transitory phase. We determine that the causes of previous misprediction are common analytical assumptions and the potential occurrence of a transitory phase, that we show to be of extremely long duration under certain circumstances. We also provide techniques, both analytical and experimental, to correctly predict long-term behaviour and analyse the effect of specific Homeplug/IEEE 1901 features on the magnitude of misprediction errors
    • …
    corecore