Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

A Bayesian Beta Kernel Model For Binary Classification And Online Learning Problems, Cameron A. Mackenzie, Theodore B. Trafalis, Kash Barker Dec 2014

A Bayesian Beta Kernel Model For Binary Classification And Online Learning Problems, Cameron A. Mackenzie, Theodore B. Trafalis, Kash Barker

Cameron A. MacKenzie

Recent advances in data mining have integrated kernel functions with Bayesian probabilistic analysis of Gaussian distributions. These machine-learning approaches can incorporate prior information with new data to calculate probabilistic rather than deterministic values for unknown parameters. This article extensively analyzes a specific Bayesian kernel model that uses a kernel function to calculate a posterior beta distribution that is conjugate to the prior beta distribution. Numerical testing of the beta kernel model on several benchmark datasets reveals that this model's accuracy is comparable with those of the support vector machine (SVM), relevance vector machine, naive Bayes, and logistic regression, and the …


A New Fuzzy Logic Approach To Capacitated Dynamic Dial-A-Ride Problem, Maher Maalouf, Cameron A. Mackenzie, Sridhar Radakrishnan, Mary Court Nov 2014

A New Fuzzy Logic Approach To Capacitated Dynamic Dial-A-Ride Problem, Maher Maalouf, Cameron A. Mackenzie, Sridhar Radakrishnan, Mary Court

Cameron A. MacKenzie

Almost all Dial-a-Ride problems (DARP) described in the literature pertain to the design of optimal routes and schedules for n customers who specify pick-up and drop-off times. In this article we assume that the customer is mainly concerned with the drop-off time because it is the most important to the customer. Based on the drop-off time specified by the customer and the customer's location, a pick-up time is calculated and given to the customer by the dispatching office. We base our formulation on a dynamic fuzzy logic approach in which a new request is assigned to a vehicle. The fuzzy …


Outage Constrained Robust Secure Transmission For Miso Wiretap Channels, Shuai Ma, Mingyi Hong, Engin Song, Xiangfeng Wang, Dechun Sun Oct 2014

Outage Constrained Robust Secure Transmission For Miso Wiretap Channels, Shuai Ma, Mingyi Hong, Engin Song, Xiangfeng Wang, Dechun Sun

Mingyi Hong

In this paper, we consider the robust secure beam-former design for multiple-input-single-output wiretap channels. Assuming that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and the secrecy rate outage probability constraint. The outage probability constraint requires that the secrecy rate exceed certain thresholds with high probability. Therefore, including such constraint in the design naturally ensures the desired robustness. Unfortunately, the presence of the probabilistic constraints makes the problem nonconvex and, hence, difficult to solve. In this paper, we investigate the outage probability constrained secrecy rate maximization problem …


Base Station Activation And Linear Transceiver Design For Optimal Resource Management In Heterogeneous Networks, Wei-Cheng Liao, Mingyi Hong, Ya-Feng Liu, Zhi-Quan Luo Aug 2014

Base Station Activation And Linear Transceiver Design For Optimal Resource Management In Heterogeneous Networks, Wei-Cheng Liao, Mingyi Hong, Ya-Feng Liu, Zhi-Quan Luo

Mingyi Hong

In a densely deployed heterogeneous network (HetNet), the number of pico/micro base stations (BS) can be comparable with the number of the users. To reduce the operational overhead of the HetNet, proper identification of the set of serving BSs becomes an important design issue. In this work, we show that by jointly optimizing the transceivers and determining the active set of BSs, high system resource utilization can be achieved with only a small number of BSs. In particular, we provide formulations and efficient algorithms for such joint optimization problem, under the following two common design criteria: i) minimization of the …


Min Flow Rate Maximization For Software Defined Radio Access Networks, Wei-Cheng Liao, Mingyi Hong, Hamid Farmanbar, Xu Li, Zhi-Quan Luo, Hang Zhang Jun 2014

Min Flow Rate Maximization For Software Defined Radio Access Networks, Wei-Cheng Liao, Mingyi Hong, Hamid Farmanbar, Xu Li, Zhi-Quan Luo, Hang Zhang

Mingyi Hong

We consider a cloud-based heterogeneous network of base stations (BSs) connected via a backhaul network of routers and wired/wireless links with limited capacity. The optimal provision of such networks requires proper resource allocation across the radio access links in conjunction with appropriate traffic engineering within the backhaul network. In this paper, we propose an efficient algorithm for joint resource allocation across the wireless links and flow control over the entire network. The proposed algorithm, which maximizes the min-rate among all the transmitted commodities, is based on a decomposition approach that leverages both the alternating direction method of multipliers (ADMM) and …


Modeling A Severe Supply Chain Disruption And Post-Disaster Decision Making With Application To The Japanese Earthquake And Tsunami, Cameron A. Mackenzie, Kash Barker, Joost R. Santos Jan 2014

Modeling A Severe Supply Chain Disruption And Post-Disaster Decision Making With Application To The Japanese Earthquake And Tsunami, Cameron A. Mackenzie, Kash Barker, Joost R. Santos

Cameron A. MacKenzie

Modern supply chains are increasingly vulnerable to disruptions, and a disruption in one part of the world can cause supply difficulties for companies around the globe. This article develops a model of severe supply chain disruptions in which several suppliers suffer from disabled production facilities and firms that purchase goods from those suppliers may consequently suffer a supply shortage. Suppliers and firms can choose disruption management strategies to maintain operations. A supplier with a disabled facility may choose to move production to an alternate facility, and a firm encountering a supply shortage may be able to use inventory or buy …