簡易檢索 / 詳目顯示

研究生: Peter Gerhat
Peter - Gerhat
論文名稱: EFT交換器節點選擇之模糊推論系統
Fuzzy Algorithm for EFT Switch Node Selection
指導教授: 歐陽超
Chao Ou-Yang
口試委員: 阮業春
Yeh-Chun Juan
羅士哲
Shih-Che Lo
學位類別: 碩士
Master
系所名稱: 管理學院 - 工業管理系
Department of Industrial Management
論文出版年: 2012
畢業學年度: 100
語文別: 英文
論文頁數: 89
中文關鍵詞: 電子資金轉帳績效評估路由演算法模糊邏輯
外文關鍵詞: Electronic funds transfer, Performance evaluation, Routing algorithms, Fuzzy Logic
相關次數: 點閱:175下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 即時系統需要用建模與模擬來當作其重要衡量指標,諸如它的回應時效和處理能力等。電子資金轉帳系統在每秒內需處理大量的交易,任何當機的狀況發生對業務的影響均非常巨大,然而目前的資料交換系統易產生效能障礙與缺少資料運算來源,其中最重要的工作之一是資料交換路由,當資料交換時必須由一個網絡節點到另一個節點,為了盡量減少每個節點的佇列長度與提高系統整體效能,本研究提供一個最優化的路由選擇的運算方法。另運用模糊方式而捨棄分析方法,這是基於複雜的數學公式的運算,易產生較大的計算負擔。再者本研究選擇節點效能、安全性與可靠度以作為決策標準。最後我們模擬各種情況下實際工作量用隨機虛擬數據加以測試。


    Real-time systems require modeling and simulation to evaluate important performance measures such as response time and throughput. Electronic Funds Transfer systems process large amounts of transactions in each second and any downtime could have very negative impact on business. The systems are especially vulnerable to performance bottlenecks and lack of computational resources. One of the most critical tasks is transaction routing, when transactions have to be routed from one network node to another. In order to minimize the queue lengths for each node and improve overall system performance an efficient algorithm has to be chosen to determine the most optimal routing option. The fuzzy approach performs better in comparison to analytical methods, which are based on complex mathematical formulas and would present a large computational overhead. Node performance, security and reliability were chosen as decision criteria. The algorithm was tested with pseudo-random data under various scenarios representing actual workloads.

    Chapter 1: Introduction 1 1.1 Electronic Funds Transfer 1 1.2 Current Algorithm 4 1.3 Research Goals 6 Chapter 2: Background 8 2.1 EFT Systems 8 2.2 Routing 10 2.3 Fuzzy Routing 10 2.4 Software Performance Models 13 2.5 Network Performance 15 2.6 Network Security 16 Chapter 3: Proposed Approach 18 3.1 Research Framework 18 3.2 Algorithm Overview 19 3.3 BIN Routing 26 3.4 Static Fuzzy Routing 28 3.5 Dynamic Fuzzy Routing 29 3.6 Queue Rating 31 3.7 Performance Rating 32 3.8 User Rating 37 3.9 Security Rating 38 3.10 Reliability Rating 39 3.12 Simulator 41 3.13 Modeling Language 43 Chapter 4: Experimental Results 50 4.1 Experimental Design 50 4.2 Performance Experiments 53 4.3 Fuzzy Experiments 57 Chapter 5: Conclusions 63 5.1 Conclusion 63 5.2 Future Work 64 References 66 Appendix A 69 Appendix B 72 Appendix C 74 Appendix D 78 Appendix E 80

    [1] E. Sousa, P. Maciel, C. Araujo and F. Chicout, "Performability Evaluation of EFT Systems for SLA Assurance," IPDPS, pp. 1-8, 2009.
    [2] C. Araujo, E. Sousa, P. Maciel, F. Chicout and E. Andrade, "Performance Modeling for Evaluation and Planning of Electronic Funds Transfer Systems With Bursty Arrival Traffic," First International Conference on Intensive Applications and Services, vol. 17, pp. 65-70, 2009.
    [3] C. Araujo, P. Maciel, A. Zimmermann, E. Andrade, E. Sousa, G. Callou and P. Cunha, "Performability Modeling of Electronic Funds Transfer Systems," Computing, pp. 315-334, 2010.
    [4] D. A. Menasce, R. Fonesca, V. A. F. Almeida and M. A. Mendes, "A Methodology for Workload Characterization of E-Commerce Sites," E-Commerce, Denver, Colorado, pp. 119-128, 1999.
    [5] Y. Arian and Y. Levy, "Algorithms for Generalized Round Robin Routing," Operations Research Letters, vol. 12, pp. 313-319, 1992.
    [6] N. Saquib, M. S. R. Sakib and A. S. K. Pathan, "ViSim: A User-Friendly Graphical Simulation Tool for Performance Analysis of MANET Routing Protocols," Mathematical and Computer Modeling, vol. 53, pp. 2204-2218, 2011.
    [7] L. A. Zadeh, "Fuzzy Sets," Information and Control, vol. 8, no. 3, pp. 338-353, 1965.
    [8] S. Upadhayay and M. Sharma, "Performance Evaluation of Fuzzy Routing Algorithms for a New Fuzzy Mixed Metric Approach," IJCSNS, vol. 8, no. 4, pp. 21-28, April 2008.
    [9] W. Arnold, H. Hellendoorn, R. Seising, C. Thomas and A. Weitzel, "Fuzzy Routing," Fuzzy Sets and Systems, vol. 85, pp. 131-153, 1997.
    [10] Z. Jing, C. Xuefen, L. Guan, L. Hongxia and I. Awan, "Design of Fuzzy Based Multi-Constrained Routing Protocol and the Performance Evaluation," Journal of Interconnection Networks, vol. 9, no. 4, pp. 369-387, 2008.
    [11] S. Pi and B. Sun, "Fuzzy Controllers Based Multipath Routing Algorithm in MANET," Physics Procedia, vol. 24, pp. 1178-1185, 2012.
    [12] J. Nie, J. Wen, J. Luo, X. He and Z. Zhou, "An Adaptive Fuzzy Logic Based Secure Routing Protocol in Mobile Ad Hoc Networks," Fuzzy Sets and Systems, vol. 157, pp. 1704-1712, 2006.
    [13] P. Dutta and A. Banerjee, "Fuzzy Controlled Power-Aware Multicast Routing (FPMR) For Mobile Ad Hoc Networks," Procedia Technology, vol. 4, pp. 38-49, 2012.
    [14] T. Boubana and M. Belmesk, "An Object Oriented Approach to Formally Analyze the UML 2.0 Activity Partitions," Information and Software Technology, vol. 49, pp. 999-1016, 2007.
    [15] C.-J. Huang, Y.-W. Wang, H.-H. Liao, C.-F. Lin, K.-W. Hu and T.-Y. Chang, "A Power Efficient Routing Protocol for Underwater Wireless Sensor Networks," Applied Soft Computing, vol. 11, no. 2, pp. 2348-2355, March 2011.
    [16] K. Sacha, "Real-Time Specification Using Petri Nets," Microprocessing and Microprogramming, vol. 38, pp. 607-614, 1993.
    [17] J. C. Vidal, M. Lama and A. Bugarin, "OPENET: Ontology-Based Engine for High-Level Petri Nets," Expert Systems With Applications, vol. 37, pp. 6493-6509, 2010.
    [18] N. Lohmann, S. Mennicke and C. Sura, "The Petri Net API," 2010.
    [19] M. I. Catalan, D. A. Ludena and H. Umeno, "VM-Based Benchmark and Analysis System for Testing Online Transaction Processing," Proceedings of Second International Conference on Innovative Computing, Informaion and Control, ICICIC, IEEE Computer Society, Washington, DC.
    [20] Q. Zhang, N. Mi, E. Smirni, A. Riska and E. Riedel, "Evaluating the Performability of Systems With Background Jobs," Proceedings of the International Conference on Dependable Systems and Networks, pp. 495-504, 2006.
    [21] R. Jain, Art of Computer Systems Performance Analysis Techniques for Experimental Design Measurements Simulation and Modeling, New York: Wiley Computer Publishing, April 1991.
    [22] N. Gharbi and M. Ioualalen, "GSPN Analysis of Retrial Systems With Server Breakdowns and Repairs," Applied Mathematics and Computation, vol. 174, pp. 1151-1168, 2006.
    [23] J. L. Hellerstein, K. Katircioglu and M. Surendra, "An On-Line, Business-Oriented Optimization of Performance and Availability for Utility Computing," Selected Areas in Communications, IEEE J, vol. 23, pp. 2013-2021, 2010.
    [24] K. S. Trivedi, S. Hunter, S. Graig and R. Fricks, "Reliability Analysis Techniques Explored Through a Communication Network Example," Proceedings of International Workshop on Computer-Aided Design, Test and Evaluation for Dependability, 1996.
    [25] L. Sesmun and F. Turner, "Using Performability in the Design of Communication Networks," IEEE Proceedings - Computers and Digital Technologies, vol. 147, pp. 355-363, 2000.
    [26] G. R. Ash, "Design and Control of Networks With Dynamic Nonhierarchical Routing," Communications Magazine, IEEE, vol. 28, no. 10, pp. 34-40, October 1990.
    [27] T. Tsiakis and G. Sthephanides, "The Concept of Security and Trust in Electronic Payments," Computers & Security, vol. 24, no. 1, pp. 10-15, February 2005.
    [28] T. Aura and D. Gollmann, "Communications Security on the Internet," Software Focus, vol. 2, no. 3, pp. 104-111, January 2002.

    QR CODE