首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Multi-expert operational risk management   总被引:3,自引:0,他引:3  
Operational risk management is the process of monitoring, evaluating, and changing courses of actions with potential detrimental consequences in real time. In this paper, we extend the decision models proposed in the literature for individual risk managers to account for situations where multiple risk managers are involved. For this purpose, two dynamic and adaptive preference aggregation models for cardinal and ordinal assessments are proposed and discussed. The mechanical aspects of the models are then validated using field data collected from experienced operational risk managers in an individual-expert setting. Sensitivity analysis indicates that the models have enough flexibility to be adapted to account for behavioral considerations. The paper closes with a research agenda  相似文献   

2.
LTE基于QoS业务的比例公平调度算法研究   总被引:2,自引:0,他引:2  
陈磊  卢军  印翀 《光通信研究》2012,38(5):64-67
首先介绍目前无线通信中常用的3种调度算法。为了提高频谱利用率,通过仿真比较了3种常用调度算法对系统性能的影响,提出基于QoS(服务质量)业务的比例公平调度算法。该调度算法兼容了其他调度算法的优点。实验中对用户配置不同的QoS参数,从吞吐量的角度来验证不同配置的用户有不同的吞吐量,而且系统会优先保障最优用户的需求。该调度算法提高了系统的最大吞吐量,满足了用户调度的公平性,给用户提供了不同的业务服务,保障了用户的不同需求。  相似文献   

3.
随着汽车功能的逐步增加,尤其是信息娱乐功能和智能驾驶辅助功能的增加,传统的车载网络技术出现瓶颈,无法满足汽车的发展需求,因此将车载以太网作为下一代网络已经成为学术界的研究热点。车载以太网应用层选用SOME/IP协议,开发基于服务的车载以太网总线通信协议;进行车载以太网软件设计及硬件设计,搭建基于服务的车载以太网仿真系统,使用CANoe软件进行仿真模拟实验并进行测试实验。结果表明,服务可以应用到车载以太网的网络传输中并且满足SOME/IP报文的一致性测试。  相似文献   

4.
针对不断增长的高速数据、高音质音频和视频数据等移动应用新需求,提出了一种新的基于业务的无线接入点(AP)转发模式智能切换方法.通过在无线局域网的AP内加入特定的邻近AP状态表和智能切换模块来动态地决定转发模式,以减小传输时延,提高用户对不同业务的体验感,达到对现有切换方式进行优化的目的.此方法在无线局域网实验室环境中进...  相似文献   

5.
6.
7.
8.
Operational risk management is a reflection of the need for enterprises to demonstrate that they are prepared for all eventualities, through monitoring day-to-day operational risks. IT is an area that is critical to modern enterprises and consequently carries with it the capacity to cripple those same enterprises — business disruption as a result of IT failure is a major area of operational risk. Modern IT in many enterprises, especially large ones such as BT, is distributed and heterogeneous. This presents challenges to collecting and correlating management, monitoring and audit data in a timely manner. It also highlights the need to take an end-to-end view, with data collected from a number of sources and presented as an integrated picture of the health of a business solution. In an eBusiness environment, there is also a need to manage, monitor and audit the IT interfaces with customers, suppliers and partners. This paper looks at operational risk in an IT context and provides an overview of the contribution made by systems and applications monitoring to successful operational risk management. This paper has concentrated on using monitoring to address the downside of risk and reflects a culture in many organisations to eliminate or minimise risk. However, risk has an upside whereby an enterprise can gain competitive advantage through ‘right setting’ risk tolerance — this advantage can only be gained when the organisation begins to understand and articulates its risk appetite. Monitoring can contribute significantly to the upside through supplying the information required to manage and control the risk exposure to perform within the accepted risk appetite, facilitate risk taking and imbue a better risk culture in the organisation.  相似文献   

9.
A fair protocol for signing contracts   总被引:16,自引:0,他引:16  
Two parties, A and B, want to sign a contract C over a communication network. To do so, they must simultaneously exchange their commitments to C. Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchanging partial commitments in piece-by-piece manner. During such a protocol, one party or another may have a slight advantage; a fair protocol keeps this advantage within acceptable limits. A new protocol is proposed. It is fair in the sense that, at any stage in its execution, the conditional probability that one party cannot commit both parties to the contract given that the other party can, is close to zero. This is true even if A and B have vastly different computing powers and is proved under very weak cryptographic assumptions  相似文献   

10.
In this letter, we provide the lower and upper bounds of Erlang capacity of multiaccess systems supporting several different radio access technologies in the multiservice scenario, by considering two extreme operation methods; separate and common operation. In a numerical example with GSM/EDGE-like and WCDMA-like subsystems, it is shown that the common operation method can provide up to 60% Erlang capacity improvement over the separate operation method when using a near optimum so-called service-based user assignment scheme, with the combined effects of the assignment and the trunking gains. Even in the worst-case, the common operation method still can provide about 15% capacity improvement over the separate operation method, which mainly comes from the trunking gain.  相似文献   

11.
12.
13.
A low-cost internally compensated integrated-circuit operational amplifier occupying a small die area can be fabricated if the compensation capacitor value is low. This objective is attained when the amplifier-input-stage transconductance is reduced to a minimum provided the frequency response remains unchanged. A new technique, transconductance cancellation, meets the objective without extra devices or components.  相似文献   

14.
保证电力系统正常运行的继电保护,当继电保护发生隐患时,会对电力系统产生极大的不利影响.本文针对继电保护隐患的运行风险在线评估问题进行分析.  相似文献   

15.
’Uncertainty creates winners and losers. Organisations that want to survive have to adapt.’ Kees van der Heijden, Professor of General and Strategic Management at the Graduate Business School of Strathclyde University, Glasgow [1]. Horizon scanning is the practice of monitoring the business environment, and tracking the changes in the environment that could have an impact on individual businesses. Understanding change in the business environment is a key element to understanding and managing business risk.  相似文献   

16.
17.
The characteristics of recently developed integrated-circuit components are reviewed and some new devices are described. Their impact on the design of monolithic operational amplifiers is also discussed. Emphasis is placed on realizing particularly good dc characteristics-especially low input current. However, techniques for obtaining higher operating speeds are also covered.  相似文献   

18.
We propose an analytical model for integrated real-time and non-real-time services in a wireless mobile network with priority reservation and preemptive priority handoff schemes. We categorize the service calls into four different types, namely, real-time and non-real-time service originating calls, and real-time and non real-time handoff service request calls. Accordingly, the channels in each cell are divided into three parts: one is for real-time service calls only, the second is for non-real-time service calls only, and the last one is for overflow of handoff requests that cannot be served in the first two parts. In the third group, several channels are reserved exclusively for real-time service handoffs so that higher priority can be given to them. In addition, a realtime service handoff request has the right to preempt non-real-time service in the preemptive priority handoff scheme if no free channels are available, while the interrupted non-real-time service call returns to its handoff request queue. The system is modeled using a multidimensional Markov chain and a numerical analysis is presented to estimate blocking probabilities of originating calls, forced termination probability, and average transmission delay. This scheme is also simulated under different call holding time and cell dwell time distributions. It is observed that the simulation results closely match the analytical model. Our scheme significantly reduces the forced termination probability of real-time service calls. The probability of packet loss of non-real-time transmission is shown to be negligibly small, as a non-real-time service handoff request in waiting can be transferred from the queue of the current base station to another one.  相似文献   

19.
可运营智慧家庭开放平台构建   总被引:1,自引:0,他引:1       下载免费PDF全文
郭涛  孙凯 《电信科学》2018,34(11):105-112
近几年电信运营商开始向智慧家庭生态圈进行战略转型和布局,并借助构建智慧家庭开放平台来实现业务生态化和运营智慧化,为用户提供创新的业务模式和消费体验,如何基于运营商特点来构建智慧家庭开放平台成为行业探讨的热点。首先分析了面向智慧家庭主流开放平台的构建模式和存在问题,然后研究了运营商进行智慧家庭平台开放的关键要素,最后提出运营商进行开放平台构建的关键技术方向和应用实践。  相似文献   

20.
A macromodel for integrated all-MOS operational amplifiers is developed with reference to circuits where the settling behavior of the op amps is of particular concern. Expressions for the values of the elements of the macromodel are obtained from typical measured characteristics. It is shown that the proposed macromodel can satisfactorily predict both small-signal and large-signal behavior of the op amps.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号