SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012



 Demand Modelling of Asymmetric Digital Subscriber
           Line in the Czech Republic
                                                         Martin Chvalina
                    Czech Technical University, Department of Economics, Management and Humanities,
                                         Zikova 4, 166 29 Praha, Czech Republic
                                              Email: martin.chvalina@email.cz

Abstract - This article describes and analyses the existing              the Box-Jenkins Metodology, or by applying Artificial
possibilities for using Standard Statistical Methods and                 Intelligence methods, including for example Neural Networks
Artificial Intelligence Methods for a short-term forecast and            [8].
simulation of demand in the field of Asymmetric Digital
Subscriber Line Internet Connection in the Czech Republic.               A. Decomposition Time Series
The most widespread methods are based on Time Series                        The series {yt, t = 1, ..., T} is gradually decomposed to
Analysis. Nowadays, approaches based on Artificial
                                                                         several components: trend, circular component, seasonal
Intelligence M ethods, including Neural Networks, are
booming. Separate approaches will be used in the study of
                                                                         component and residual component (unsystematic
Demand Modelling in the field of Asymmetric Digital                      component). This method is based on work with time series
Subscriber Line, and the results of these models will be                 systematic components. Features of time series behaviour
compared with actual guaranteed values. Then we will examine             can be better observed in separate components than in the
the quality of Neural Network models. The another part of                undecomposed original time series [8]. In this research study
study will be focused on improving the quality of Neural                 from the field of standard statistical methods, exponential
Network models with the use of indicator Gross Domestic                  smoothing will be used for demand modelling of the
Product.                                                                 Asymmetric Digital Subscriber Line internet connection.
Index Terms - Demand, Telecommunications, Standard                       I. Exponential Smoothing
Statistical Methods, Neural Network, Asymmetric Digital                      The above defined time series will be written as        {yt ,
Subscriber Line, Gross Domestic Product
                                                                         t = 1, ..., T}. Simple Exponential Smoothing is described in the
                                                                         recurrent form
                     I. INTRODUCTION
                                                                                           ˆ                     ˆ
                                                                                           y t  y t  (1   ) y t 1 ,
    Demand can be defined as the relation between price and
the quantity of goods that buyers are willing to purchase.
This correlation is displayed in relation to the global market            ˆ                                              ˆ
                                                                         y t is the Exponential Average in time t, y t 1 is the
by the sold product quantity at one time-point. If we focus              Exponential Average in time t-1, value  is the Smoothing
on the telecommunication services sector, we can note the
                                                                         Constant from the interval   0;1  [8]. The Exponential
development of the sale of cell phones and internet
connection (Asymmetric Digital Subscriber Line, Wireless                 Average can be expressed on the basis of the recurrent form
connection, etc.). This article will be focused on Demand                as [8]:
Modelling of the Asymmetric Digital Subscriber Line internet             yt  yt  (1   ) yt 1  yt  (1   )[yt 1  (1   ) yt 2 ] 
                                                                         ˆ                   ˆ                                        ˆ
connection (ADSL) in the Czech Republic. Considering the
                                                                          yt   (1   ) yt 1  (1   ) 2 [yt  2 (1   ) yt 3 ]  ... 
                                                                                                                                 ˆ
fact that in the literature listed in the paper, an effective
procedure of demand modelling of the Asymmetric Digital                   yt   (1   ) yt 1  (1   ) 2 yt 2  ...   (1   ) i yt i  ....
                                                                                                t 1
Subscriber Line Internet Connection was not described, this              ..  (1   ) t y 0    (1   ) i yt i  (1   )t y0
                                                                                         ˆ                                      ˆ
research project conceives the demand as time series under                                      i 0

which the demand model can be designed and trends
predicted. The demand model was formed on the basis of the               II. Brown’s Simple Exponential Smoothing
data of statistical survey on the territory of the Czech Republic            The time series yt is constructed with a stationary process
(e.g. number of households in the Czech Republic who have
the technology of ADSL) which were published by the Czech                in the form y t               0   t ,  0 is the mean value of the
Statistical Office in the period of 2006 – 2011. The theoretical
description of the methods for construction of the demand                process, and         t are random values with the features of white
model is listed below.                                                   noise. After applying Exponential Smoothing to the Time
                                                                         Series we obtain the relation [8]:
     II. CONSTRUCTION OF THE DEMAND MODEL                                                                                                   
                                                                          yt (1)i yti (1)i (0 ti )  0 (1)i ti
                                                                          ˆ
    The demand model can be constructed using standard                            i0                   i0                                  i0
statistical methods including Decomposition Time Series, and
© 2012 ACEEE                                                        53
DOI: 01.IJCSI.03.01.518
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012

               
                                                                      comparison of traditional non-linear models and a back-
because   (1   )  1 applies to the mean value and                propagation network). The neurone function scheme can be
              i 1
dispersion:                                                           demonstrated graphically as follows [8]:



Brown’s Linear (double) Exponential Smoothing, alternatively,
we can make a double application of the Simple Exponential
Smoothing method on the time series yt expression in the
form [8]:
              ˆ ( 2)              ˆ ( 2)
              yt  yt  (1   ) yt 1
B. Box-Jenkins Methodology
    Unlike classical decompositional methods, which deal
with systematic time series components (trend, circular and
seasonal), the Box-Jenkins methodology deals with a                                     Figure 1. Model of a neurone [8]
residual (unsystematic) component. The method involves
searching for relations of individual observations. By this                                       N            
                                                                                            y  S  wi x i   
method we are able to describe time series which are not                                           i 1        
manageable by standard methods [8]. The time series is                where y is the output (neurone activity), S demonstrates a
perceived as a realization of the stochastic process which is
defined as a series of accidental quantities arranged in time         transmission function (jump, linear, non-linear), xi is neurone
X (s, t ), s  S, t  T, where S is a selective space and T is an   input (inputs are in total N), wi represents a level of synoptic
index series. For each s S the realization of the stochastic
process is defined on the index series T [8]. For the Box-            weight,  describes a trigger level.
Jenkins methodology, the following special accesses are               I. The Principle of Back-Propagation Network Learning
significant: autoregressive process AR, moving average                Let us consider a neurone network with L – layers l = 1,
process MA, and combined process ARMA. These                          ….,L and as the output i-th neurone in the 1-th layer we use
processes result from the linear process by resetting all
parameters till the final number. The parameters are chosen           the indication Vi l . Vi 0 means xi , i.e. the i-th output. The
in such a way that the stationarity and invertibility of the                        l
processes will be ensured. A special non-stationary ARIMA             indication wij expresses a connection from Vi l 1 to . Vi l .
model also exists in the Box-Jenkins metodology [8].                  An algorithm can then be inscribed after separate stages as
I. ARIMA Processes                                                    follows [8] :
                                                                      1. Subranged    random       numbers based - Weight
    Some integrated processes may be arranged by means of             Initialization
differentiation to stationary and are expressed in the form of        2. Insertion of   into the network input (layer l = 0), i.e.
the stationary and invertible ARMA(p,q) model. The original
integrated process in the form [8]:                                                      Vk0  x kp
             p ( B)(1  B) d y t   q ( B) t                       3. Network signal propagation:
                                                                              Vi l  g (hil )  g ( wijV jl 1 )
                                                                                                      l

is called the autoregressive integrated process of sliding                                            k
averages of the order p, d, q. This is called ARIMA (p, d,            4. Calculation of delta for the output layer:
q). Models with d = 1,2 are usually used [8].
                                                                                                 
                                                                               i p  g (hiP )  y ip  Vi P   
C. Artificial Intelligence Methods - Neural Networks                  5. Calculation of delta for previous layers by Error Back-
    The benefit of the Artificial Neural Network lies in its          Propagation
ability to implement complex non-linear functions. Neural
systems co-execute a large number of operations and work                         il 1  g (hil 1 ) w lji  lj
                                                                                                       i
without an algorithm [8]. Their activity is based upon the
learning process, when the neural network gradually                   6. Weight change according to formula:
conforms to calculation. In the course of a learning phase                    wij   il V jl 1 , wij  wij  wij
                                                                                l                     new   old
we do not have to be occupied by the problem of the right
selection function, because the neural network is able to             7. If all samples have been submitted to the network
make do only with practise examples [8]. This is the main             we continue in phase no. 8, otherwise we go back to
difference in comparison with a traditional approach (e.g.            phase no. 2.
© 2012 ACEEE                                                 54
DOI: 01.IJCSI.03.01.518
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012


8. If the network error compared to the selected criterion
value was minor or the maximum number of steps was
exhausted, then the learning process can be completed, else
phase no. 2.
D. Choice of a Relevant Model
    An appropriate model can be determined on the basis of
a) the graph of the time series, or from its absolute or relative
characteristics [8],
b) interpolative criteria (a decisive deviation of residues,
coefficient of determination, coefficient of autocorrelation of                    Figure 2. ARIMA Demand Modelling of ADSL
residues, average characteristics of residues ) [8],
c) extrapolative criteria (average characteristics of “ex post”          The figure 3 shows the course of residual values (i.e. the
forecast mistakes, graph forecasts) [8].                                 difference between the number of Households which are
                                                                         using the Asymmetric Digital Subscriber Line Internet
E. Average Characteristics of Residues                                   Connection, and the value predicted by demand model based
   The average square mistake - dispersion [8]:                          on ARIMA(1,1,0)).

           1 n                    1 n
MSE             ( y t  yt ) 2   a t2
                          ˆ              ˆ
           n t 1                 n t 1
The root mean square mistake [8]:

            1 n                   1 n
RMSE             ( yt  yt )2  at2
                          ˆ              ˆ
            n t 1                n t 1

The average absolute mistake [8]:

          1 n              1 n
MAE        
          n t 1
                 y t  yt   at
                       ˆ
                           n t 1
                                  ˆ
                                                                         Figure 3. Residual values for ARIMA Demand Modelling of ADSL

The lower the values of the specified characteristics, the               In the figure 4, we can observe the course of residual
better the chosen model is [8].                                          autocorrelations for a demand model based on ARIMA(1,1,0).
                                                                         In this case, the residual autocorrelation was not recorded.
    III. DEMAND MODELLING OF ASYMMETRIC
DIGITAL SUBSCRIBER LINE INTERNET CONNECTION
   The above mentioned methods will be used for demand
modelling of the Asymmetric Digital Subscriber Line Internet
Connection (ADSL) in the Czech Republic. The ADSL Demand
Model (i.e. the number of households which are using a
Asymmetric Digital Subscriber Line Internet Connection) is
based on the values from the Czech Statistical Office (between
2006 and 2011) and estimate made by an expert. The results
for the ADSL demand model based upon Box-Jenkins
methodology, Brown’s linear exponential smoothing and
Neural Networks are graphically displayed below.
A. ARIMA Processes                                                                Figure 4. Residual Autocorrelations for ADSL
    The figure 2 describes the comparison of the real values
                                                                         B. Brown’s linear exponential smoothing
(i.e. the number of households which are using an
Asymmetric Digital Subscriber Line Internet Connection), and                The figure 5 shows the comparison of the real values (i.e.
the values from a demand model based on ARIMA (1,1,0).                   the number of households which are using an Asymmetric
                                                                         Digital Subscriber Line Internet Connection), and the values
                                                                         from a demand model based on Brown’s linear exponential
                                                                         smoothing.


© 2012 ACEEE                                                        55
DOI: 01.IJCSI.03.01. 518
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012




                                                                                     Figure 8. Residual values for ADSL

    Figure 5. Brown’s linear exponential smoothing of ADSL            The figure 9 shows the course of residual autocorrelations
In the figure 6, we can observe the course of residual                for a demand model based on Neural Network. In this case,
autocorrelations for a demand model based on Brown’s lin-             the residual autocorrelation was recorded.
ear exponential smoothing. In this case, the residual
autocorrelation was not recorded.




          Figure 6. Residual Autocorrelation for ADSL                      Figure 9. Residual Autocorrelation for Neural Network

C. Back-Propagation Neural Network                                     Within the research project on demand modelling in the field
                                                                      of Asymmetric Digital Subscriber Line Internet Connection
    The figure 7 shows the comparison of the real values (i.e.
                                                                      in the Czech Republic we obtained the following values for
the number of households which are using the Asymmetric
                                                                      the average characteristics of residues, as shown in Table I.
Digital Subscriber Line Internet Connection), and the values
from a demand model based on Neural Network.                                     TABLE I. AVERAGE CHARACTERISTICS OF RESIDUES




                                                                      On the basis of the results of RMSE and MAE average char-
                                                                      acteristics of residues, the demand model based upon Neural
                                                                      Networks can be considered as best, but a different result
                                                                      arises from an evaluation of prediction quality, because the
                                                                      best prediction value result was obtained from a demand
                                                                      model based on ARIMA (1,1,0). In the figure 10, we can
                                                                      observe an evaluation of prediction quality for the ADSL
                                                                      demand model based upon ARIMA(1,1,0), Brown’s linear
          Figure 7. Neural Network Demand Modelling
                                                                      exponential smoothing and Neural Network. With respect to
                                                                      the above mentioned facts, another part of the study was
The course of residual values (i.e. the difference between the
                                                                      focused on improving the quality or accuracy of the ADSL
number of Households which are using the Asymmetric Digi-
                                                                      demand model with the use of neuron networks.
tal Subscriber Line Internet Connection), and the value pre-
dicted by demand model based on Neural Network is shown
in figure 8.
© 2012 ACEEE                                                     56
DOI: 01.IJCSI.03.01. 518
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012




                                                                                              Figure 13. Residual values for ADSL
                                                                                 The figure 14 describes the course of residual
                                                                              autocorrelations for a demand model based on Neural
                                                                              Network (including GDP). The residual autocorrelation was
Figu re 10.   Comparison of the ADSL internet connection used by
households    in the 2nd quarter of 2010, values published on February
                                                                              not recorded.
10th, 2011     by the Czech Statistical Office, and results predicted
by demand       models for ADSL.

D. Back-Propagation Neural Network (including GDP)
    Within the framework of the progressive proposal for
bringing more precision to the current approach, the
Asymmetric Digital Subscriber Line Internet Connection
demand model was extended by the effect of the indicator
Gross Domestic Product (GDP) of the Czech Republic and a
Back-Propagation neural network was subsequently applied
to the model formed in this way, as shown in figure 11.
                                                                               Figure 14. Residual Autocorrelation for Neural Network (GDP)
                                                                              In this case, we obtained the following values for the aver-
                                                                              age characteristics of residues, as shown in Table II.
Figure 11. Inclusion of GDP into Neural Network Demand Model
                                                                                          TABLE II. AVERAGE CHARACTERISTICS OF RESIDUES




In the figure 12, we can observe the comparison of the real
values (i.e. the number of households which are using an                      On the basis of the results of RMSE and MAE average char-
Asymmetric Digital Subscriber Line Internet Connection), and                  acteristics of residues, the demand model based upon Neural
the values from a demand model based on Neural Network                        Networks (including GDP) can be considered as best and
which was extended by the effect of the indicator GDP Czech                   same result arises from an evaluation of prediction quality
Republic.                                                                     because the best prediction value result was obtained from
                                                                              a demand model based on Neural Network (including GDP),
                                                                              as shown in figure 15.




  Figure 12. Neural Network (including GDP) Demand Modelling
The course of residual values (i.e. the difference between the
number of Households which are using the Asymmetric Digi-
tal Subscriber Line Internet Connection, and the value pre-
dicted by demand model based on Neural Network which                          Figure 15. Comparison of the ADSL internet connection used by
was extended by the effect of the indicator GDP Czech Re-                     households in the 2nd quarter of 2010, values published on July 8th,
                                                                              2011 by the Czech Statistical Office, and results predicted by demand
public) is shown in figure 13.                                                models for Asymmetric Digital Subscriber Line Internet Connection.
© 2012 ACEEE                                                             57
DOI: 01.IJCSI.03.01.518
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012


                       CONCLUSION                                      With respect to the above mentioned results, the figure 16
                                                                       offers the percentage accuracy of the values predicted by
     This article deals with the demand modelling of the
                                                                       demand models for Asymmetric Digital Subscriber Line
Asymmetric Digital Subscriber Line Internet Connection in
                                                                       Internet Connection which were drawn up on the basis of
the Czech Republic. Considering the fact that in the literature
                                                                       the above described methods. Unlike the approaches which
listed in the paper, an effective procedure of demand
                                                                       have been applied so far, the accuracy of the demand models
modelling of the Asymmetric Digital Subscriber Line Internet
                                                                       drawn up on the basis of neural networks was reached by the
 Connection was not described, this research project
                                                                       progressive method resting in implementation of the indicator
conceives the demand as time series under which the demand
                                                                       GDP, as shown in figure 15, 16. The progressive method of
model can be designed and trends predicted. The
                                                                       modelling the demand in the course of which the results of
introductory chapters summarize in theory individual
                                                                       the research project were obtained may potentially contribute
approaches of formation of demand modelling based on
                                                                       to economic parameters of telecommunication companies,
statistical analysis of time series and further current
                                                                       because quality demand models which provide precise results
procedures based on Artificial Intelligence Methods including
                                                                       in a short-term forecast, contribute to telecommunication
Neural Networks. Furthermore, the objective of article was to
                                                                       companies from the point of view of planning and evaluation
evaluate contemporary possibilities concerning application
                                                                       of investment strategy, and furthermore, they positively affect
of standard statistical methods and approaches of artificial
                                                                       the whole financial results and economic indicators of a
intelligence with focusing on neural networks in forecasting
                                                                       company.
and modelling demand in the segment of the Asymmetric
Digital Subscriber Line Internet Connection in the Czech
Republic. Individual demand models which were drawn up                                          REFERENCES
on the basis of the above described methods were evaluated
and the results of forecast following from these models were           [1] M. Šnorek, “Neural Network and Neural Computers”, Prague
compared with real development. On the basis of the results,           CVUT, 2002
it is possible to make a conclusion that the demand models             [2] J. Artl, M. Artlová, “Financial Time Series”, Grada Publishing
formed with the aid of standard statistical methods prove              a.s., Prague, 2003
higher quality or accuracy of the short-term forecast than the         [3] J. Artl, M. Artlová, E. Rulíková, “Analysis of Economical
models drawn up by the aid of a neural network, as shown in            Time Series with examples”, Prague VŠE, 2002
                                                                       [4] P. McBurney, S. Parsons, J. Green, “Forecasting market
figure 10. With respect to the above mentioned facts, another
                                                                       demand for new telecommunications services: an introduction”,
part of the study was focused on improving the quality or              Telematics and Informatics, 2002
accuracy of the demand models with the use of neuron                   [5] C. Garbacz, H. G. Thompson, “Demand for telecommunication
networks. Within the framework of the progressive proposal             services in developing countries”, Telecommunications Policy, 2007
for bringing more precision to the current approach, the               [6] T. Evens, D. Schuurman, L. Marez, G. Verleye, “Forecasting
demand models in the segment of Asymmetric Digital                     broadband Internet adoption on trains in Belgium”, Telematics
Subscriber Line Internet Connection were extended by the               and Informatics, vol. 27, pp. 10-20, 2010
effect of the indicator GDP Czech Republic and a neural                [7] S. Crone, “Business Forecasting with Neural Networks”,
network was subsequently applied to the model formed in                Institute of Business Forecasting, Boston, 2004
                                                                       [8] M. Chvalina, “Demand Modelling in Telecommunications,
this way, as shown in figure 11. The values resulting from
                                                                       Comparison of Standard Statistical Methods and Approaches Based
such demand models proved positive effect of the indicator             upon Artificial Intelligence Methods Including Neural Networks”,
GDP on the quality or accuracy of the short-term forecast, as          Acta Polytechnica, vol. 49, Prague, 2009
shown in figure 15.                                                    [9] R. Nau, “Introduction to ARIMA”, Duke University Durham,
                                                                       2007
                                                                       [10] M. Kuba, “Neural Networks”, Masaryk University Brno,
                                                                       1995
                                                                       [11] J. G. De Gooijer, R. J. Hyndman, “25 years of time series
                                                                       forecasting”, International Journal of Forecasting, 2006
                                                                       [12] C. Chakraborty, B. Nandi, “Mainline telecommunications
                                                                       infrastructure, levels of developmentand economic growth: Evidence
                                                                       from a panel of developing countries”, Telecommunications Policy,
                                                                       2011
                                                                       [13] P. N. Baecker, G. Grass and U. Hommel, “Business value and
                                                                       risk in the presence of price controls: an option-based analysis of
                                                                       margin squeeze rules in the telecommunications industry”, Annals
                                                                       of operations research, 2010
                                                                       [14] R. Fildes, V. Kumar, “Telecommunications demand
                                                                       forecasting”, International Journal of Forecasting, 2002
                                                                       [15] Ch. Agiakloglou, S. Karkalakos, “A spatial and economic
                                                                       analysis for telecommunication: evidence from the European
                Figure 16. Quality of prediction
                                                                       Union”, Journal of Applied Economics, vol. 12, pp. 11-33, 2009

© 2012 ACEEE                                                      58
DOI: 01.IJCSI.03.01. 518

Weitere ähnliche Inhalte

Was ist angesagt?

FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Conceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri NetConceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri NetIJRES Journal
 
Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...eSAT Publishing House
 
Eugen Zaharescu-STATEMENT OF RESEARCH INTEREST
Eugen Zaharescu-STATEMENT OF RESEARCH INTERESTEugen Zaharescu-STATEMENT OF RESEARCH INTEREST
Eugen Zaharescu-STATEMENT OF RESEARCH INTERESTEugen Zaharescu
 
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsParameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsSSA KPI
 
Detection of singular points from fingerprint images using an innovative algo...
Detection of singular points from fingerprint images using an innovative algo...Detection of singular points from fingerprint images using an innovative algo...
Detection of singular points from fingerprint images using an innovative algo...Alexander Decker
 
Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...
Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...
Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...Tatsuya Yokota
 
Ijcga1
Ijcga1Ijcga1
Ijcga1ijcga
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...ijaia
 
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...AIRCC Publishing Corporation
 

Was ist angesagt? (13)

FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Conceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri NetConceptual Fixture Design Method Based On Petri Net
Conceptual Fixture Design Method Based On Petri Net
 
Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...Object recognition from image using grid based color moments feature extracti...
Object recognition from image using grid based color moments feature extracti...
 
Eugen Zaharescu-STATEMENT OF RESEARCH INTEREST
Eugen Zaharescu-STATEMENT OF RESEARCH INTERESTEugen Zaharescu-STATEMENT OF RESEARCH INTEREST
Eugen Zaharescu-STATEMENT OF RESEARCH INTEREST
 
Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...
Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...
Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...
 
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its ApplicationsParameter Estimation for Semiparametric Models with CMARS and Its Applications
Parameter Estimation for Semiparametric Models with CMARS and Its Applications
 
Detection of singular points from fingerprint images using an innovative algo...
Detection of singular points from fingerprint images using an innovative algo...Detection of singular points from fingerprint images using an innovative algo...
Detection of singular points from fingerprint images using an innovative algo...
 
Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...
Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...
Introduction to Common Spatial Pattern Filters for EEG Motor Imagery Classifi...
 
Ijcga1
Ijcga1Ijcga1
Ijcga1
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
The Application Of Bayes Ying-Yang Harmony Based Gmms In On-Line Signature Ve...
 
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matr...
 

Andere mochten auch

Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...
Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...
Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...IDES Editor
 
Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...
Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...
Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...IDES Editor
 
Context Driven Technique for Document Classification
Context Driven Technique for Document ClassificationContext Driven Technique for Document Classification
Context Driven Technique for Document ClassificationIDES Editor
 
Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...
Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...
Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...IDES Editor
 
Modularity and Enterprise Software
Modularity and Enterprise SoftwareModularity and Enterprise Software
Modularity and Enterprise SoftwareIDES Editor
 
Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...
Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...
Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...IDES Editor
 
Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...
Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...
Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...Työterveyslaitos
 
Performance Analysis of Interconnect Drivers for Ultralow Power Applications
Performance Analysis of Interconnect Drivers for Ultralow Power ApplicationsPerformance Analysis of Interconnect Drivers for Ultralow Power Applications
Performance Analysis of Interconnect Drivers for Ultralow Power ApplicationsIDES Editor
 
New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...
New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...
New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...IDES Editor
 
A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...
A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...
A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...IDES Editor
 
Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...
Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...
Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...IDES Editor
 
Hst3000 adsl manual_rev b
Hst3000 adsl manual_rev bHst3000 adsl manual_rev b
Hst3000 adsl manual_rev bnguyensun
 
Asymmetric digital subscriber line
Asymmetric digital subscriber lineAsymmetric digital subscriber line
Asymmetric digital subscriber lineAshwani Kumar
 
Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)
Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)
Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)Huanetwork
 
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...IDES Editor
 
Integrated Active Filters using low gain modules
Integrated Active Filters using low gain modulesIntegrated Active Filters using low gain modules
Integrated Active Filters using low gain modulesIDES Editor
 
Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...
Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...
Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...IDES Editor
 

Andere mochten auch (20)

Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...
Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...
Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...
 
Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...
Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...
Quadrangular Bézier Patches in Modeling and Modification of the Curvilinear B...
 
Context Driven Technique for Document Classification
Context Driven Technique for Document ClassificationContext Driven Technique for Document Classification
Context Driven Technique for Document Classification
 
Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...
Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...
Optimal Synthesis of Array Pattern for Concentric Circular Antenna Array Usin...
 
Modularity and Enterprise Software
Modularity and Enterprise SoftwareModularity and Enterprise Software
Modularity and Enterprise Software
 
Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...
Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...
Dynamic Spectrum Derived Mfcc and Hfcc Parameters and Human Robot Speech Inte...
 
Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...
Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...
Työsuojelun korttipakassa voiton avaimet, asiantuntija Kerttuli Harjanne, Työ...
 
Performance Analysis of Interconnect Drivers for Ultralow Power Applications
Performance Analysis of Interconnect Drivers for Ultralow Power ApplicationsPerformance Analysis of Interconnect Drivers for Ultralow Power Applications
Performance Analysis of Interconnect Drivers for Ultralow Power Applications
 
New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...
New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...
New Model Variable Frequency Transformer (NMVFT) – A Technology for V/f Contr...
 
A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...
A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...
A PIC compatible RISC CPU core Implementation for FPGA based Configurable SOC...
 
Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...
Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...
Software Reliability Growth Model with Logistic- Exponential Testing-Effort F...
 
Hst3000 adsl manual_rev b
Hst3000 adsl manual_rev bHst3000 adsl manual_rev b
Hst3000 adsl manual_rev b
 
Asymmetric digital subscriber line
Asymmetric digital subscriber lineAsymmetric digital subscriber line
Asymmetric digital subscriber line
 
Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)
Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)
Huanetwork x dsl solution - huawei adsl2+ and vdsl2 solution)
 
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
Performance analysis of Multiband - OFDM systems using LDPC coder in pulsed -...
 
Integrated Active Filters using low gain modules
Integrated Active Filters using low gain modulesIntegrated Active Filters using low gain modules
Integrated Active Filters using low gain modules
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
101 ch9
101 ch9101 ch9
101 ch9
 
Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...
Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...
Improved Indirect Rotor Flux Oriented Control of PWM inverter fed Induction M...
 
Chapter2
Chapter2Chapter2
Chapter2
 

Ähnlich wie Demand Modelling of Asymmetric Digital Subscriber Line in the Czech Republic

Financial Time Series Analysis Based On Normalized Mutual Information Functions
Financial Time Series Analysis Based On Normalized Mutual Information FunctionsFinancial Time Series Analysis Based On Normalized Mutual Information Functions
Financial Time Series Analysis Based On Normalized Mutual Information FunctionsIJCI JOURNAL
 
Prediction of stock market index using neural networks an empirical study of...
Prediction of stock market index using neural networks  an empirical study of...Prediction of stock market index using neural networks  an empirical study of...
Prediction of stock market index using neural networks an empirical study of...Alexander Decker
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET Journal
 
Analysis of intelligent system design by neuro adaptive control no restriction
Analysis of intelligent system design by neuro adaptive control no restrictionAnalysis of intelligent system design by neuro adaptive control no restriction
Analysis of intelligent system design by neuro adaptive control no restrictioniaemedu
 
Analysis of intelligent system design by neuro adaptive control
Analysis of intelligent system design by neuro adaptive controlAnalysis of intelligent system design by neuro adaptive control
Analysis of intelligent system design by neuro adaptive controliaemedu
 
Session 4 a chen et al discussion
Session 4 a chen et al   discussionSession 4 a chen et al   discussion
Session 4 a chen et al discussionIARIW 2014
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methodsijdmtaiir
 
Robust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsRobust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsCemal Ardil
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
 
Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...
Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...
Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...orajjournal
 
Perishable Inventory Model Having Weibull Lifetime and Time Dependent Demand
Perishable Inventory Model Having Weibull Lifetime and Time Dependent DemandPerishable Inventory Model Having Weibull Lifetime and Time Dependent Demand
Perishable Inventory Model Having Weibull Lifetime and Time Dependent DemandIOSR Journals
 
DETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIES
DETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIESDETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIES
DETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIESIJCSEA Journal
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...ijtsrd
 
An inventory control model for fixed deterioration and logarithmic demand rates
An inventory control model for fixed  deterioration and logarithmic demand ratesAn inventory control model for fixed  deterioration and logarithmic demand rates
An inventory control model for fixed deterioration and logarithmic demand ratesAlexander Decker
 
COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...
COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...
COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...ijcsit
 
IRJET- A Generalized Delta Shock Maintenance Model
IRJET-  	  A Generalized Delta Shock Maintenance ModelIRJET-  	  A Generalized Delta Shock Maintenance Model
IRJET- A Generalized Delta Shock Maintenance ModelIRJET Journal
 

Ähnlich wie Demand Modelling of Asymmetric Digital Subscriber Line in the Czech Republic (20)

Financial Time Series Analysis Based On Normalized Mutual Information Functions
Financial Time Series Analysis Based On Normalized Mutual Information FunctionsFinancial Time Series Analysis Based On Normalized Mutual Information Functions
Financial Time Series Analysis Based On Normalized Mutual Information Functions
 
Prediction of stock market index using neural networks an empirical study of...
Prediction of stock market index using neural networks  an empirical study of...Prediction of stock market index using neural networks  an empirical study of...
Prediction of stock market index using neural networks an empirical study of...
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary Logic
 
D143136
D143136D143136
D143136
 
Analysis of intelligent system design by neuro adaptive control no restriction
Analysis of intelligent system design by neuro adaptive control no restrictionAnalysis of intelligent system design by neuro adaptive control no restriction
Analysis of intelligent system design by neuro adaptive control no restriction
 
Analysis of intelligent system design by neuro adaptive control
Analysis of intelligent system design by neuro adaptive controlAnalysis of intelligent system design by neuro adaptive control
Analysis of intelligent system design by neuro adaptive control
 
Session 4 a chen et al discussion
Session 4 a chen et al   discussionSession 4 a chen et al   discussion
Session 4 a chen et al discussion
 
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM MethodsA Study on Youth Violence and Aggression using DEMATEL with FCM Methods
A Study on Youth Violence and Aggression using DEMATEL with FCM Methods
 
Robust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systemsRobust fuzzy-observer-design-for-nonlinear-systems
Robust fuzzy-observer-design-for-nonlinear-systems
 
U4301106110
U4301106110U4301106110
U4301106110
 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
 
Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...
Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...
Fuzzy Inventory Model of Deteriorating Items under Power Dependent Demand and...
 
Perishable Inventory Model Having Weibull Lifetime and Time Dependent Demand
Perishable Inventory Model Having Weibull Lifetime and Time Dependent DemandPerishable Inventory Model Having Weibull Lifetime and Time Dependent Demand
Perishable Inventory Model Having Weibull Lifetime and Time Dependent Demand
 
DETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIES
DETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIESDETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIES
DETECTION AND ELIMINATION OF NON-TRIVIAL REVERSIBLE IDENTITIES
 
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
Unit 4.pdf
Unit 4.pdfUnit 4.pdf
Unit 4.pdf
 
An inventory control model for fixed deterioration and logarithmic demand rates
An inventory control model for fixed  deterioration and logarithmic demand ratesAn inventory control model for fixed  deterioration and logarithmic demand rates
An inventory control model for fixed deterioration and logarithmic demand rates
 
Phd Defense 2007
Phd Defense 2007Phd Defense 2007
Phd Defense 2007
 
COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...
COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...
COMPARISON OF WAVELET NETWORK AND LOGISTIC REGRESSION IN PREDICTING ENTERPRIS...
 
IRJET- A Generalized Delta Shock Maintenance Model
IRJET-  	  A Generalized Delta Shock Maintenance ModelIRJET-  	  A Generalized Delta Shock Maintenance Model
IRJET- A Generalized Delta Shock Maintenance Model
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Demand Modelling of Asymmetric Digital Subscriber Line in the Czech Republic

  • 1. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 Demand Modelling of Asymmetric Digital Subscriber Line in the Czech Republic Martin Chvalina Czech Technical University, Department of Economics, Management and Humanities, Zikova 4, 166 29 Praha, Czech Republic Email: martin.chvalina@email.cz Abstract - This article describes and analyses the existing the Box-Jenkins Metodology, or by applying Artificial possibilities for using Standard Statistical Methods and Intelligence methods, including for example Neural Networks Artificial Intelligence Methods for a short-term forecast and [8]. simulation of demand in the field of Asymmetric Digital Subscriber Line Internet Connection in the Czech Republic. A. Decomposition Time Series The most widespread methods are based on Time Series The series {yt, t = 1, ..., T} is gradually decomposed to Analysis. Nowadays, approaches based on Artificial several components: trend, circular component, seasonal Intelligence M ethods, including Neural Networks, are booming. Separate approaches will be used in the study of component and residual component (unsystematic Demand Modelling in the field of Asymmetric Digital component). This method is based on work with time series Subscriber Line, and the results of these models will be systematic components. Features of time series behaviour compared with actual guaranteed values. Then we will examine can be better observed in separate components than in the the quality of Neural Network models. The another part of undecomposed original time series [8]. In this research study study will be focused on improving the quality of Neural from the field of standard statistical methods, exponential Network models with the use of indicator Gross Domestic smoothing will be used for demand modelling of the Product. Asymmetric Digital Subscriber Line internet connection. Index Terms - Demand, Telecommunications, Standard I. Exponential Smoothing Statistical Methods, Neural Network, Asymmetric Digital The above defined time series will be written as {yt , Subscriber Line, Gross Domestic Product t = 1, ..., T}. Simple Exponential Smoothing is described in the recurrent form I. INTRODUCTION ˆ ˆ y t  y t  (1   ) y t 1 , Demand can be defined as the relation between price and the quantity of goods that buyers are willing to purchase. This correlation is displayed in relation to the global market ˆ ˆ y t is the Exponential Average in time t, y t 1 is the by the sold product quantity at one time-point. If we focus Exponential Average in time t-1, value  is the Smoothing on the telecommunication services sector, we can note the Constant from the interval   0;1  [8]. The Exponential development of the sale of cell phones and internet connection (Asymmetric Digital Subscriber Line, Wireless Average can be expressed on the basis of the recurrent form connection, etc.). This article will be focused on Demand as [8]: Modelling of the Asymmetric Digital Subscriber Line internet yt  yt  (1   ) yt 1  yt  (1   )[yt 1  (1   ) yt 2 ]  ˆ ˆ ˆ connection (ADSL) in the Czech Republic. Considering the  yt   (1   ) yt 1  (1   ) 2 [yt  2 (1   ) yt 3 ]  ...  ˆ fact that in the literature listed in the paper, an effective procedure of demand modelling of the Asymmetric Digital  yt   (1   ) yt 1  (1   ) 2 yt 2  ...   (1   ) i yt i  .... t 1 Subscriber Line Internet Connection was not described, this ..  (1   ) t y 0    (1   ) i yt i  (1   )t y0 ˆ ˆ research project conceives the demand as time series under i 0 which the demand model can be designed and trends predicted. The demand model was formed on the basis of the II. Brown’s Simple Exponential Smoothing data of statistical survey on the territory of the Czech Republic The time series yt is constructed with a stationary process (e.g. number of households in the Czech Republic who have the technology of ADSL) which were published by the Czech in the form y t   0   t ,  0 is the mean value of the Statistical Office in the period of 2006 – 2011. The theoretical description of the methods for construction of the demand process, and  t are random values with the features of white model is listed below. noise. After applying Exponential Smoothing to the Time Series we obtain the relation [8]: II. CONSTRUCTION OF THE DEMAND MODEL    yt (1)i yti (1)i (0 ti )  0 (1)i ti ˆ The demand model can be constructed using standard i0 i0 i0 statistical methods including Decomposition Time Series, and © 2012 ACEEE 53 DOI: 01.IJCSI.03.01.518
  • 2. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012  comparison of traditional non-linear models and a back- because   (1   )  1 applies to the mean value and propagation network). The neurone function scheme can be i 1 dispersion: demonstrated graphically as follows [8]: Brown’s Linear (double) Exponential Smoothing, alternatively, we can make a double application of the Simple Exponential Smoothing method on the time series yt expression in the form [8]: ˆ ( 2) ˆ ( 2) yt  yt  (1   ) yt 1 B. Box-Jenkins Methodology Unlike classical decompositional methods, which deal with systematic time series components (trend, circular and seasonal), the Box-Jenkins methodology deals with a Figure 1. Model of a neurone [8] residual (unsystematic) component. The method involves searching for relations of individual observations. By this N  y  S  wi x i    method we are able to describe time series which are not  i 1  manageable by standard methods [8]. The time series is where y is the output (neurone activity), S demonstrates a perceived as a realization of the stochastic process which is defined as a series of accidental quantities arranged in time transmission function (jump, linear, non-linear), xi is neurone X (s, t ), s  S, t  T, where S is a selective space and T is an input (inputs are in total N), wi represents a level of synoptic index series. For each s S the realization of the stochastic process is defined on the index series T [8]. For the Box- weight,  describes a trigger level. Jenkins methodology, the following special accesses are I. The Principle of Back-Propagation Network Learning significant: autoregressive process AR, moving average Let us consider a neurone network with L – layers l = 1, process MA, and combined process ARMA. These ….,L and as the output i-th neurone in the 1-th layer we use processes result from the linear process by resetting all parameters till the final number. The parameters are chosen the indication Vi l . Vi 0 means xi , i.e. the i-th output. The in such a way that the stationarity and invertibility of the l processes will be ensured. A special non-stationary ARIMA indication wij expresses a connection from Vi l 1 to . Vi l . model also exists in the Box-Jenkins metodology [8]. An algorithm can then be inscribed after separate stages as I. ARIMA Processes follows [8] : 1. Subranged random numbers based - Weight Some integrated processes may be arranged by means of Initialization differentiation to stationary and are expressed in the form of 2. Insertion of into the network input (layer l = 0), i.e. the stationary and invertible ARMA(p,q) model. The original integrated process in the form [8]: Vk0  x kp  p ( B)(1  B) d y t   q ( B) t 3. Network signal propagation: Vi l  g (hil )  g ( wijV jl 1 ) l is called the autoregressive integrated process of sliding k averages of the order p, d, q. This is called ARIMA (p, d, 4. Calculation of delta for the output layer: q). Models with d = 1,2 are usually used [8].   i p  g (hiP )  y ip  Vi P  C. Artificial Intelligence Methods - Neural Networks 5. Calculation of delta for previous layers by Error Back- The benefit of the Artificial Neural Network lies in its Propagation ability to implement complex non-linear functions. Neural systems co-execute a large number of operations and work  il 1  g (hil 1 ) w lji  lj i without an algorithm [8]. Their activity is based upon the learning process, when the neural network gradually 6. Weight change according to formula: conforms to calculation. In the course of a learning phase wij   il V jl 1 , wij  wij  wij l new old we do not have to be occupied by the problem of the right selection function, because the neural network is able to 7. If all samples have been submitted to the network make do only with practise examples [8]. This is the main we continue in phase no. 8, otherwise we go back to difference in comparison with a traditional approach (e.g. phase no. 2. © 2012 ACEEE 54 DOI: 01.IJCSI.03.01.518
  • 3. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 8. If the network error compared to the selected criterion value was minor or the maximum number of steps was exhausted, then the learning process can be completed, else phase no. 2. D. Choice of a Relevant Model An appropriate model can be determined on the basis of a) the graph of the time series, or from its absolute or relative characteristics [8], b) interpolative criteria (a decisive deviation of residues, coefficient of determination, coefficient of autocorrelation of Figure 2. ARIMA Demand Modelling of ADSL residues, average characteristics of residues ) [8], c) extrapolative criteria (average characteristics of “ex post” The figure 3 shows the course of residual values (i.e. the forecast mistakes, graph forecasts) [8]. difference between the number of Households which are using the Asymmetric Digital Subscriber Line Internet E. Average Characteristics of Residues Connection, and the value predicted by demand model based The average square mistake - dispersion [8]: on ARIMA(1,1,0)). 1 n 1 n MSE   ( y t  yt ) 2   a t2 ˆ ˆ n t 1 n t 1 The root mean square mistake [8]: 1 n 1 n RMSE  ( yt  yt )2  at2 ˆ ˆ n t 1 n t 1 The average absolute mistake [8]: 1 n 1 n MAE   n t 1 y t  yt   at ˆ n t 1 ˆ Figure 3. Residual values for ARIMA Demand Modelling of ADSL The lower the values of the specified characteristics, the In the figure 4, we can observe the course of residual better the chosen model is [8]. autocorrelations for a demand model based on ARIMA(1,1,0). In this case, the residual autocorrelation was not recorded. III. DEMAND MODELLING OF ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET CONNECTION The above mentioned methods will be used for demand modelling of the Asymmetric Digital Subscriber Line Internet Connection (ADSL) in the Czech Republic. The ADSL Demand Model (i.e. the number of households which are using a Asymmetric Digital Subscriber Line Internet Connection) is based on the values from the Czech Statistical Office (between 2006 and 2011) and estimate made by an expert. The results for the ADSL demand model based upon Box-Jenkins methodology, Brown’s linear exponential smoothing and Neural Networks are graphically displayed below. A. ARIMA Processes Figure 4. Residual Autocorrelations for ADSL The figure 2 describes the comparison of the real values B. Brown’s linear exponential smoothing (i.e. the number of households which are using an Asymmetric Digital Subscriber Line Internet Connection), and The figure 5 shows the comparison of the real values (i.e. the values from a demand model based on ARIMA (1,1,0). the number of households which are using an Asymmetric Digital Subscriber Line Internet Connection), and the values from a demand model based on Brown’s linear exponential smoothing. © 2012 ACEEE 55 DOI: 01.IJCSI.03.01. 518
  • 4. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 Figure 8. Residual values for ADSL Figure 5. Brown’s linear exponential smoothing of ADSL The figure 9 shows the course of residual autocorrelations In the figure 6, we can observe the course of residual for a demand model based on Neural Network. In this case, autocorrelations for a demand model based on Brown’s lin- the residual autocorrelation was recorded. ear exponential smoothing. In this case, the residual autocorrelation was not recorded. Figure 6. Residual Autocorrelation for ADSL Figure 9. Residual Autocorrelation for Neural Network C. Back-Propagation Neural Network Within the research project on demand modelling in the field of Asymmetric Digital Subscriber Line Internet Connection The figure 7 shows the comparison of the real values (i.e. in the Czech Republic we obtained the following values for the number of households which are using the Asymmetric the average characteristics of residues, as shown in Table I. Digital Subscriber Line Internet Connection), and the values from a demand model based on Neural Network. TABLE I. AVERAGE CHARACTERISTICS OF RESIDUES On the basis of the results of RMSE and MAE average char- acteristics of residues, the demand model based upon Neural Networks can be considered as best, but a different result arises from an evaluation of prediction quality, because the best prediction value result was obtained from a demand model based on ARIMA (1,1,0). In the figure 10, we can observe an evaluation of prediction quality for the ADSL demand model based upon ARIMA(1,1,0), Brown’s linear Figure 7. Neural Network Demand Modelling exponential smoothing and Neural Network. With respect to the above mentioned facts, another part of the study was The course of residual values (i.e. the difference between the focused on improving the quality or accuracy of the ADSL number of Households which are using the Asymmetric Digi- demand model with the use of neuron networks. tal Subscriber Line Internet Connection), and the value pre- dicted by demand model based on Neural Network is shown in figure 8. © 2012 ACEEE 56 DOI: 01.IJCSI.03.01. 518
  • 5. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 Figure 13. Residual values for ADSL The figure 14 describes the course of residual autocorrelations for a demand model based on Neural Network (including GDP). The residual autocorrelation was Figu re 10. Comparison of the ADSL internet connection used by households in the 2nd quarter of 2010, values published on February not recorded. 10th, 2011 by the Czech Statistical Office, and results predicted by demand models for ADSL. D. Back-Propagation Neural Network (including GDP) Within the framework of the progressive proposal for bringing more precision to the current approach, the Asymmetric Digital Subscriber Line Internet Connection demand model was extended by the effect of the indicator Gross Domestic Product (GDP) of the Czech Republic and a Back-Propagation neural network was subsequently applied to the model formed in this way, as shown in figure 11. Figure 14. Residual Autocorrelation for Neural Network (GDP) In this case, we obtained the following values for the aver- age characteristics of residues, as shown in Table II. Figure 11. Inclusion of GDP into Neural Network Demand Model TABLE II. AVERAGE CHARACTERISTICS OF RESIDUES In the figure 12, we can observe the comparison of the real values (i.e. the number of households which are using an On the basis of the results of RMSE and MAE average char- Asymmetric Digital Subscriber Line Internet Connection), and acteristics of residues, the demand model based upon Neural the values from a demand model based on Neural Network Networks (including GDP) can be considered as best and which was extended by the effect of the indicator GDP Czech same result arises from an evaluation of prediction quality Republic. because the best prediction value result was obtained from a demand model based on Neural Network (including GDP), as shown in figure 15. Figure 12. Neural Network (including GDP) Demand Modelling The course of residual values (i.e. the difference between the number of Households which are using the Asymmetric Digi- tal Subscriber Line Internet Connection, and the value pre- dicted by demand model based on Neural Network which Figure 15. Comparison of the ADSL internet connection used by was extended by the effect of the indicator GDP Czech Re- households in the 2nd quarter of 2010, values published on July 8th, 2011 by the Czech Statistical Office, and results predicted by demand public) is shown in figure 13. models for Asymmetric Digital Subscriber Line Internet Connection. © 2012 ACEEE 57 DOI: 01.IJCSI.03.01.518
  • 6. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 CONCLUSION With respect to the above mentioned results, the figure 16 offers the percentage accuracy of the values predicted by This article deals with the demand modelling of the demand models for Asymmetric Digital Subscriber Line Asymmetric Digital Subscriber Line Internet Connection in Internet Connection which were drawn up on the basis of the Czech Republic. Considering the fact that in the literature the above described methods. Unlike the approaches which listed in the paper, an effective procedure of demand have been applied so far, the accuracy of the demand models modelling of the Asymmetric Digital Subscriber Line Internet drawn up on the basis of neural networks was reached by the Connection was not described, this research project progressive method resting in implementation of the indicator conceives the demand as time series under which the demand GDP, as shown in figure 15, 16. The progressive method of model can be designed and trends predicted. The modelling the demand in the course of which the results of introductory chapters summarize in theory individual the research project were obtained may potentially contribute approaches of formation of demand modelling based on to economic parameters of telecommunication companies, statistical analysis of time series and further current because quality demand models which provide precise results procedures based on Artificial Intelligence Methods including in a short-term forecast, contribute to telecommunication Neural Networks. Furthermore, the objective of article was to companies from the point of view of planning and evaluation evaluate contemporary possibilities concerning application of investment strategy, and furthermore, they positively affect of standard statistical methods and approaches of artificial the whole financial results and economic indicators of a intelligence with focusing on neural networks in forecasting company. and modelling demand in the segment of the Asymmetric Digital Subscriber Line Internet Connection in the Czech Republic. Individual demand models which were drawn up REFERENCES on the basis of the above described methods were evaluated and the results of forecast following from these models were [1] M. Šnorek, “Neural Network and Neural Computers”, Prague compared with real development. On the basis of the results, CVUT, 2002 it is possible to make a conclusion that the demand models [2] J. Artl, M. Artlová, “Financial Time Series”, Grada Publishing formed with the aid of standard statistical methods prove a.s., Prague, 2003 higher quality or accuracy of the short-term forecast than the [3] J. Artl, M. Artlová, E. Rulíková, “Analysis of Economical models drawn up by the aid of a neural network, as shown in Time Series with examples”, Prague VŠE, 2002 [4] P. McBurney, S. Parsons, J. Green, “Forecasting market figure 10. With respect to the above mentioned facts, another demand for new telecommunications services: an introduction”, part of the study was focused on improving the quality or Telematics and Informatics, 2002 accuracy of the demand models with the use of neuron [5] C. Garbacz, H. G. Thompson, “Demand for telecommunication networks. Within the framework of the progressive proposal services in developing countries”, Telecommunications Policy, 2007 for bringing more precision to the current approach, the [6] T. Evens, D. Schuurman, L. Marez, G. Verleye, “Forecasting demand models in the segment of Asymmetric Digital broadband Internet adoption on trains in Belgium”, Telematics Subscriber Line Internet Connection were extended by the and Informatics, vol. 27, pp. 10-20, 2010 effect of the indicator GDP Czech Republic and a neural [7] S. Crone, “Business Forecasting with Neural Networks”, network was subsequently applied to the model formed in Institute of Business Forecasting, Boston, 2004 [8] M. Chvalina, “Demand Modelling in Telecommunications, this way, as shown in figure 11. The values resulting from Comparison of Standard Statistical Methods and Approaches Based such demand models proved positive effect of the indicator upon Artificial Intelligence Methods Including Neural Networks”, GDP on the quality or accuracy of the short-term forecast, as Acta Polytechnica, vol. 49, Prague, 2009 shown in figure 15. [9] R. Nau, “Introduction to ARIMA”, Duke University Durham, 2007 [10] M. Kuba, “Neural Networks”, Masaryk University Brno, 1995 [11] J. G. De Gooijer, R. J. Hyndman, “25 years of time series forecasting”, International Journal of Forecasting, 2006 [12] C. Chakraborty, B. Nandi, “Mainline telecommunications infrastructure, levels of developmentand economic growth: Evidence from a panel of developing countries”, Telecommunications Policy, 2011 [13] P. N. Baecker, G. Grass and U. Hommel, “Business value and risk in the presence of price controls: an option-based analysis of margin squeeze rules in the telecommunications industry”, Annals of operations research, 2010 [14] R. Fildes, V. Kumar, “Telecommunications demand forecasting”, International Journal of Forecasting, 2002 [15] Ch. Agiakloglou, S. Karkalakos, “A spatial and economic analysis for telecommunication: evidence from the European Figure 16. Quality of prediction Union”, Journal of Applied Economics, vol. 12, pp. 11-33, 2009 © 2012 ACEEE 58 DOI: 01.IJCSI.03.01. 518