نتایج جستجو برای: fcfs ratio

تعداد نتایج: 502669  

Journal: :International Journal of Integrated Engineering 2022

In production process, scheduling isan important role in meeting the orders and reducing cost. This process becomes more complicated when factory produces various products. Scheduling model can be divided into two groups: make-to-stock (MTS) make-to-order (MTO). General constraint MTSmodel is limited capacity inventory work aims to propose hybrid MTS-MTO that improve lead time maintain low inve...

1997
Saifallah Benjaafar Mehdi Sheikhzadeh

In this paper, we examine the impact of scheduling policies on batch sizing decisions in a multi-item production system. We also investigate the joint effect of scheduling policies and batch sizing decisions on production lead times. In particular, we compare the performance of a first come-first-served (FCFS) policy with a group scheduling (GS) policy and study the effect of both on the optima...

2002
R. D. van der Mei N. in’t Veld

The study presented in this paper is motivated by the performance analysis of response times in distributed information systems, where transactions are handled by iterative server and database actions. We model system response times as sojourn times in a two-node open queueing network with a processor sharing (PS) node and a first-come-first-served (FCFS) node. External customers arrive at the ...

2014
Sajal Mukhopadhyay Varun Kumar

First-come-first-serve (FCFS) scheme is used for selling the goods in market that is a multi-million dollar industry for any popular event. But in a competitive environment is this FCFS efficient? In earlier literature it has been shown that the auction based alternative solutions using the framework of mechanism design, a sub field of game theory [18] can provide better results against FCFS in...

2016
Mohamed Lotfi Mona Gharib

The IP(Internet Protocol) spoofing is a technique that consists in replacing the IP address of the sender by another sender’s address. This technique allows the attacker to send a message without being intercepted by the firewall. The most used method to deal with such attacks is the technique called "Network Ingress Filtering". This technique has been used, initially, forIPv4 networks, but its...

2015
Abdul Khalique Shaikh Saadat M. Alhashmi Rajendran Parthiban Kalaivany Nataraja

Resources in Grid computing are geographically distributed across the world through a wide area network under various virtual organizations. Due to the distributed nature of the Grid, the selection and allocation of the optimal resources from the available resource are challenging. However, the overall Grid performance depends on the selection of Grid resources for user jobs. A significant amou...

2016
N. Arrar

The research in the area of retrial queues focused mainly on the fact that the retrials operate under classical retrial policy, which suppose that the intervals between successive repeated attempts are exponentially distributed with total rate jθ (j is the number of customers in the orbit). There is another discipline, called constant retrial policy, where the total retrial rate does not depend...

Journal: :IEEE Transactions on Information Theory 2021

We consider a priority queueing system where single processor serves k classes of packets that are generated randomly following Poisson processes. Our objective is to compute the expected Peak Age Information (PAoI) under various scenarios. In particular, we two situations buffer size at each queue one and infinite, in infinite case First Come Serve (FCFS) Last (LCFS) as service disciplines. Fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید