نتایج جستجو برای: queuing theory

تعداد نتایج: 786015  

2014
ADRIAN H. ZAI ELIZABETH MORT HENRY C. CHUEH

Design: We used a queuing theory model to simulate 3 different potential solutions to decrease the delay from patient identification to connection with discharge services. Measurements: The measures included average rate at which patients were being connected to the post discharge heart failure services program, average number of patients in line, and average patient waiting time. Results: Usin...

Journal: :Perner's Contacts 2022

The toll road service is planned and built to fund construction management of traffic operations. Although the has several benefits, it also challenges by creating a queue in event high traffic. Queues at addition pollution waiting time costs expose drivers accidents affect economy country. Queuing problems highway gates exits due have become main concern for transport managers planners because...

2011
Haihang You Qing Liu Zhiqiang Li Shirley Moore

As high performance computing (HPC) heads towards the exascale era, the computing power surges tremendously and applications will scale to hundreds of thousands cores. Consequently, the amount of data processed and generated will increase dramatically. Nowadays, a parallel shared file system is a must have for a supercomputer. To utilize I/O effectively is essential for an application to scale ...

2016
Zhang Yong-Hua Zhou Zhen Zeng Fan-Zi Li Yuan

To make comprehensive and objective analysis of the performance of the cloud computing system center, a cloud computing center system analysis model based on queuing theory is proposed. First, to describe the characteristics of user’s service changes request arrived at center by using Poisson distribution, the batch arrival system model was established based on queuing theory, then solve the st...

Journal: :CoRR 2010
Neetu Singh Satya Prakash Ghrera Pranay Chaudhuri

Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the ...

Journal: :Perform. Eval. 1996
Stephan Robert Jean-Yves Le Boudec

Recent papers have pointed out that data traac exhibits self-similarity, but self-similarity is observed only on a nite timescale. In order to account for that, we introduce the concept of pseudo long-range dependences. In this paper, we describe a Modulated Markov process producing self-similarity on a nite timescale; the process is quite easy to manipulate and depends only on three parameters...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید