نتایج جستجو برای: time queuing theory
تعداد نتایج: 2527645 فیلتر نتایج به سال:
Cloud computing is a recently developed new technology for complex systems with massivescale service sharing, which is different from the resource sharing of the grid computing systems. Cloud reliability analysis and modeling are not easy tasks because of the complexity and large scale of the system. This paper systematically analyzes cloud computing and models the reliability of the cloud serv...
In this paper, a stochastic cell formation problem is studied using queuing theory framework and considering reliability. Since cell formation problem is NP-Hard, two algorithms based on genetic and modified particle swarm optimization (MPSO) algorithms are developed to solve the problem. For generating initial solutions in these algorithms, a new heuristic method is developed, which always cre...
This paper presents a new nonlinear mathematical model to solve a cell formation problem which assumes that processing time and inter-arrival time of parts are random variables. In this research, cells are defined as a queue system which will be optimized via queuing theory. In this queue system, each machine is assumed as a server and each part as a customer. The grouping of machines and parts...
Introduction: Online queuing systems in medical centers significantly reduce waiting time and costs, and increase patient satisfaction with the quality of services provided. Service provisions with the desired quality through these systems will manage the crowds in the health care centers. In the current situation, gatherings cause an upward trend of the COVID-19 pandemic and subsequent problem...
We consider a queuing network with M exponential service stations and with N customers. We study the behavior of a subsystem u, which has a single node as input and a single node as output, when the subsystem parameters are varied. An “equivalent” network is constructed in which all queues except those in subsystem u are replaced by a single composite queue. We show that for certain classes of ...
This paper offers a novel approach to the evaluation of provenance blockchain security and reliability using analytical methods for assessing system availability against malicious miner DoS attacks. In particular, we present analysis LightWeight Mining (LWM) protocol securing data provenance. Our shows its ability protect We use digital signatures prove integrity non-repudiation messages passin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید