STUDY OF THE BEHAVIOR MODELS BASED ON PROBABILITY AND TIME BY USING MARKOV PROCESS AND TRANSITION MATRIX.
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 3
Abstract
This paper suggests an approach to software system architecture specification based on behavior models. The behavior of the system is defined as an event occurring probability and time. The behavior of the system over a time of stationary Markov process is completely characterized by the one step transition matrix, the matrix of instantaneous transition rates. Given the element of the appropriative matrix, it is possible to calculate probability of event of the process.
Authors and Affiliations
Sumangala Patil , P. Nagaraju , Somashekar Deasi
Robust Algorithm for Impulse Noise Detection
Efficiency of noise removing algorithms depends on two main parameters first one is how accurately it identify the noisy pixels and second one is how much accurately it calculate the replacing value for noisy pixels. Thi...
On the Timing Analysis of Cluster based Communication Devices for Large Scale Computing Systems
Many parallel computing environments utilize cluster based architecture for large scale computing owing to the ease of their availability. As the cluster based approach may be used extensively, the interconnection mechan...
M-Band Graphic Equalizer
This paper deals with the concept of filter banks. Filter banks are a group of band-pass filters connected in parallel. Each parallel connection forms a channel for different frequency-bands present in the input signal....
Optimized Query Plan Algorithm for the Nested Query
The SQL language allows users to express the queries that have nested sub-queries in them. Optimization of nested queries has received considerable attention over the last few years. Most of the previous optimization wor...
Implementation of Secured password for Web applications using two server model
The secured password is the most commonly used uthentication mechanism in security applications [11]. There ay be chances of password hacking from the hackers, so hat t is very essential to protect password informati...