Pooling,unpooling/specialization,and discretionary task completion are typical operational strategies in queueing systems that arise in healthcare,call centers,and online sales.These strategies may have advantages and...Pooling,unpooling/specialization,and discretionary task completion are typical operational strategies in queueing systems that arise in healthcare,call centers,and online sales.These strategies may have advantages and disadvantages in different operational environments.This paper uses the M/M/1 and M/M/2 queues to study the impact of pooling,specialization,and discretionary task completion on the average queue length.Closed-form solutions for the average M/M/2 queue length are derived.Computational examples illustrate how the average queue length changes with the strength of pooling,specialization,and discretionary task completion.Finally,several conjectures are made in the paper.展开更多
We consider a single server constant retrial queue,in which a state-dependent service policy is used to control the service rate.Customer arrival follows Poisson process,while service time and retrial time are exponen...We consider a single server constant retrial queue,in which a state-dependent service policy is used to control the service rate.Customer arrival follows Poisson process,while service time and retrial time are exponential distributions.Whenever the server is available,it admits the retrial customers into service based on a first-come first-served rule.The service rate adjusts in real-time based on the retrial queue length.An iterative algorithm is proposed to numerically solve the personal optimal problem in the fully observable scenario.Furthermore,we investigate the impact of parameters on the social optimal threshold.The effectiveness of the results is illustrated by two examples.展开更多
We develop a gradient-based simulation optimization algorithm,dabbed KWiQ-H,for joint pricing and staffing problems in single-server queues with heavy-tailed service time distributions.Our algorithm is designed based ...We develop a gradient-based simulation optimization algorithm,dabbed KWiQ-H,for joint pricing and staffing problems in single-server queues with heavy-tailed service time distributions.Our algorithm is designed based on the well-known Kiefer–Wolfowitz algorithm so that it is applicable to more general and practical settings where customer’s behavior is unknown to service providers in prior.We first establish a convergence result for KWiQ-H when the service times have a finite fifth moment.Then,we show that under a stronger condition with a finite seventh moment,KWiQ-H could achieve sample complexity with the same asymptotic order as in the case when service times are light-tailed in Chen et al.(Oper Res,2023).Complementing the theoretic results,we carry out comprehensive numerical experiments to test the efficiency and robustness of KWiQ-H in a variety of model settings.展开更多
In this paper,we introduce a qualitative analysis in order to study the monotonicity and comparability properties of a single-server retrial queueing model with Bernoulli feedback and negative customers,relative to st...In this paper,we introduce a qualitative analysis in order to study the monotonicity and comparability properties of a single-server retrial queueing model with Bernoulli feedback and negative customers,relative to stochastic orderings.Performance measures of such a system are available explicitly,while their forms are cumbersome(these formulas include integrals of Laplace transform,solutions of functional equations,etc.).Therefore,they are not exploitable from the application point of view.To overcome these difficulties,we present stochastic comparison methods in order to get qualitative estimates of these measures.In particular,we prove the monotonicity of the transition operator of the embedded Markov chain.In addition,we establish conditions for which transition operators as well as stationary probabilities,associated with two embedded Markov chains,having the same structure but with different parameters,are comparable relative to the given stochastic orderings.Further,numerical examples are carried out to illustrate the theoretical results.展开更多
In this paper, the Geometry/G/1 queueing model with inter-arrival times generated by a geometric(parameter p) distribution according to a late arrival system with delayed access and service times independently distr...In this paper, the Geometry/G/1 queueing model with inter-arrival times generated by a geometric(parameter p) distribution according to a late arrival system with delayed access and service times independently distributed with distribution {gj }, j≥ 1 is studied. By a simple method (techniques of probability decomposition, renewal process theory) that is different from the techniques used by Hunter(1983), the transient property of the queue with initial state i(i ≥ 0) is discussed. The recursion expression for u -transform of transient queue-length distribution at any time point n^+ is obtained, and the recursion expression of the limiting queue length distribution is also obtained.展开更多
In this paper, using the stochastic decomposition and renewal theory we provide the direct method for analysis the departure process of single sever M/G/1 queueing system, and further discuss the departure process of ...In this paper, using the stochastic decomposition and renewal theory we provide the direct method for analysis the departure process of single sever M/G/1 queueing system, and further discuss the departure process of GI/G/1 queueing system. The method provided in this paper is new and concise, which make us see dearly the structure of the departure process of a single server queueing system.展开更多
This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of...This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems.展开更多
By studying the spectral properties of the underlying operator corresponding to the M/G/1 queueing model with optional second service we obtain that the time-dependent solution of the model strongly converges to its s...By studying the spectral properties of the underlying operator corresponding to the M/G/1 queueing model with optional second service we obtain that the time-dependent solution of the model strongly converges to its steady-state solution. We also show that the time-dependent queueing size at the departure point converges to the corresponding steady-state queueing size at the departure point.展开更多
In order to meet people’s demand for various types of network services,researchers have conducted extensive research on authentication schemes for multi-server architecture.Although various schemes have been proposed...In order to meet people’s demand for various types of network services,researchers have conducted extensive research on authentication schemes for multi-server architecture.Although various schemes have been proposed,most of them still have safety defects and fail to meet safety requirements.Recently,Haq et al presented an efficient Hash-based authenticated key agreement scheme for multi-server scheme and claimed that their scheme can withstand all well-known attacks.However,we find that their scheme is vulnerable to replay attack,tracking attack and malicious server impersonation user attack.Then we propose an improved scheme.We also analyze the security of the improved scheme and compare with Haq et al’s scheme in security and computational efficiency.Furthermore,we use the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool to verify the security of the improved scheme.展开更多
We construct the membership functions of the fuzzy objective values of a controllable queueing model,in which cost elements,arrival rate and service rate are all fuzzy numbers. Based on Zadeh's extension principle...We construct the membership functions of the fuzzy objective values of a controllable queueing model,in which cost elements,arrival rate and service rate are all fuzzy numbers. Based on Zadeh's extension principle,a set of parametric nonlinear programs is developed to find the upper and lower bounds of the minimal average total cost per unit time at the possibility level. The membership functions of the minimal average total cost are further constructed using different values of the possibility level. A numerical example is solved successfully to illustrate the validity of the proposed approach. Because the object value is expressed and governed by the membership functions,the optimization problem in a fuzzy environment for the controllable queueing models is represented more accurately and analytical results are more useful for system designers and practitioners.展开更多
Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment ar...Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service.Moreover,it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party.In order to overcome these difficulties,we designed a secure three-factor multi-server authenticated key agreement protocol based on elliptic curve cryptography,which needs the user to register only once at the registration center in order to access all semi-trusted servers.The proposed scheme can not only against various known attacks but also provides high computational efficiency.Besides,we have proved our scheme fulfills mutual authentication by using the authentication test method.展开更多
During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure ...During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.展开更多
We consider a single-server vacation queueing system that operates in the following manner. When the server returns from a vacation, it observes the following rule. If there is at least one customer in the system, the...We consider a single-server vacation queueing system that operates in the following manner. When the server returns from a vacation, it observes the following rule. If there is at least one customer in the system, the server commences service and serves exhaustively before taking another vacation. If the server finds the system empty, it waits a fixed time c. At the expiration of this time, the server commences another vacation if no customer has arrived;otherwise, it serves exhaustively before commencing another vacation. Analytical results are derived for the mean waiting time in the system. The timeout scheme is shown to be a generalized scheme of which both the single vacation and multiple vacations schemes are special cases, with c=∞and c=0, respectively. The model is extended to the N-policy vacation queueing system.展开更多
This article examines the effects of reneging, server breakdown and server vacation on the various states of the batch arrivals queueing system with single server providing service to customers in three fluctuating mo...This article examines the effects of reneging, server breakdown and server vacation on the various states of the batch arrivals queueing system with single server providing service to customers in three fluctuating modes. In this queueing system, any batch arrival joins the queue if the server is busy or on vacation or under repair. However, if the server is free, one customer from the arriving batch joins the service immediately while others join the queue. In case of server breakdown, the customer whose service is interrupted returns back to the head of the queue. As soon as the server has is repaired, the server attends to the customer in mode 1. For this queueing system, customers that are impatient due to breakdown and server vacation may renege (leave the queue without getting service). Due to fluctuating modes of service delivery, the system may provide service with complete or reduced efficiency. Consequently, we construct the mathematical model and derive the probability generating functions of the steady state probabilities of several states of the system including the steady state queue size distribution. Further, we discuss some particular cases of the proposed queueing model. We present numerical examples in order to demonstrate the effects of server vacation and reneging on the various states of the system. The study revealed that an increase in reneging and a decrease in server vacation results in a decrease in server utilization and an increase in server’s idle time provided rates of server breakdown and repair completion are constant. In addition, the probability of server vacation, the probability of system is under repair and the probabilities that the server provides service in three fluctuating modes decreases due to an increase in reneging and a decrease in vacation completion rates.展开更多
The impaction of aggregated network traffic on queueing system is studied in this paper. It shows that the network traffic stayed in buffer has different impaction on queueing performance when it is aggregated at diff...The impaction of aggregated network traffic on queueing system is studied in this paper. It shows that the network traffic stayed in buffer has different impaction on queueing performance when it is aggregated at different scales. And its influence is related not only to traffic parameters but also to system parameter, such as buffer size. The increased buffer size can absorb the effect of short-range dependence (SRD) in network traffic and only the effect of long-range dependence (LRD) is expressed. The queueing length is asymptotic Weibull distribution with increasing buffer size, which is irrespective with the effect of short-range dependence character. Monte-Carlo based simulation confirmed the validity of these results.展开更多
We study a vacation queueing system with a single server simultaneously dealing with an M/G/1 and an M/D/1 queue. Two classes of units, priority and non-priority, arrive at the system in two independent Poisson stream...We study a vacation queueing system with a single server simultaneously dealing with an M/G/1 and an M/D/1 queue. Two classes of units, priority and non-priority, arrive at the system in two independent Poisson streams. Under a non-preemptive priority rule, the server provides a general service to the priority units and a deterministic service to the non-priority units. We further assume that the server may take a vacation of random length just after serving the last priority unit present in the system. We obtain steady state queue size distribution at a random epoch. Corresponding results for some special cases, including the known results of the M/G/1 and the M/D/1 queues, have been derived.展开更多
In real life, in different industries, we often deal with systems designed for multiple use for performing single-type tasks. Processes taking place at this time are called service of requirements, and the systems the...In real life, in different industries, we often deal with systems designed for multiple use for performing single-type tasks. Processes taking place at this time are called service of requirements, and the systems themselves—Queueing Systems. This article is dedicated to computer software modelling of processes taking place in the systems in question, Markov processes in particular. In this article, by means of Matlab environment, software realization of one of the typical models of queueing service theory-multichannel QS with unreliable recoverable servers and limited number of requirements in the system, is fulfilled. The results of this research are important because it gives the possibility to use received results to determine optimality degree of some real queueing systems that possess Markov property.展开更多
In this paper,the concept of the infinitesimal realization factor is extended to the parameter dependent performance functions in closed queueing networks.Then the concepts of realization matrix (its elements are cal...In this paper,the concept of the infinitesimal realization factor is extended to the parameter dependent performance functions in closed queueing networks.Then the concepts of realization matrix (its elements are called realization factors) and performance potential are introduced,and the relations between infinitesimal realization factors and these two quantities are discussed.This provides a united framework for both IPA and non IPA approaches.Finally,another physical meaning of the service rate is given.展开更多
Weighted priority queueing is a modification of priority queueing that eliminates the possibility of blocking lower priority traffic. The weights assigned to priority classes determine the fractions of the bandwith th...Weighted priority queueing is a modification of priority queueing that eliminates the possibility of blocking lower priority traffic. The weights assigned to priority classes determine the fractions of the bandwith that are guaranteed for individual traffic classes, similarly as in weighted fair queueing. The paper describes a timed Petri net model of weighted priority queueing and uses discrete-event simulation of this model to obtain performance characteristics of simple queueing systems. The model is also used to analyze the effects of finite queue capacity on the performance of queueing systems.展开更多
文摘Pooling,unpooling/specialization,and discretionary task completion are typical operational strategies in queueing systems that arise in healthcare,call centers,and online sales.These strategies may have advantages and disadvantages in different operational environments.This paper uses the M/M/1 and M/M/2 queues to study the impact of pooling,specialization,and discretionary task completion on the average queue length.Closed-form solutions for the average M/M/2 queue length are derived.Computational examples illustrate how the average queue length changes with the strength of pooling,specialization,and discretionary task completion.Finally,several conjectures are made in the paper.
基金supported by the National Natural Science Foundation of China(Grant No.11971486)。
文摘We consider a single server constant retrial queue,in which a state-dependent service policy is used to control the service rate.Customer arrival follows Poisson process,while service time and retrial time are exponential distributions.Whenever the server is available,it admits the retrial customers into service based on a first-come first-served rule.The service rate adjusts in real-time based on the retrial queue length.An iterative algorithm is proposed to numerically solve the personal optimal problem in the fully observable scenario.Furthermore,we investigate the impact of parameters on the social optimal threshold.The effectiveness of the results is illustrated by two examples.
基金funded by Science,Technology and Innovation Commission of Shenzhen Munici pality(No.RCYX20210609103124047)the National Natural Science Foundation of China(Nos.72171205 and 72394361)Guangdong Provincial Key Laboratory of Mathematical Foundations for Artificial Intelligence(No.2023B1212010001).
文摘We develop a gradient-based simulation optimization algorithm,dabbed KWiQ-H,for joint pricing and staffing problems in single-server queues with heavy-tailed service time distributions.Our algorithm is designed based on the well-known Kiefer–Wolfowitz algorithm so that it is applicable to more general and practical settings where customer’s behavior is unknown to service providers in prior.We first establish a convergence result for KWiQ-H when the service times have a finite fifth moment.Then,we show that under a stronger condition with a finite seventh moment,KWiQ-H could achieve sample complexity with the same asymptotic order as in the case when service times are light-tailed in Chen et al.(Oper Res,2023).Complementing the theoretic results,we carry out comprehensive numerical experiments to test the efficiency and robustness of KWiQ-H in a variety of model settings.
文摘In this paper,we introduce a qualitative analysis in order to study the monotonicity and comparability properties of a single-server retrial queueing model with Bernoulli feedback and negative customers,relative to stochastic orderings.Performance measures of such a system are available explicitly,while their forms are cumbersome(these formulas include integrals of Laplace transform,solutions of functional equations,etc.).Therefore,they are not exploitable from the application point of view.To overcome these difficulties,we present stochastic comparison methods in order to get qualitative estimates of these measures.In particular,we prove the monotonicity of the transition operator of the embedded Markov chain.In addition,we establish conditions for which transition operators as well as stationary probabilities,associated with two embedded Markov chains,having the same structure but with different parameters,are comparable relative to the given stochastic orderings.Further,numerical examples are carried out to illustrate the theoretical results.
基金This work was supported by the Scientific Research Fund of Southwestern University of Finance and Economics and the Science Foundation of Sichuan Normal University.
文摘In this paper, the Geometry/G/1 queueing model with inter-arrival times generated by a geometric(parameter p) distribution according to a late arrival system with delayed access and service times independently distributed with distribution {gj }, j≥ 1 is studied. By a simple method (techniques of probability decomposition, renewal process theory) that is different from the techniques used by Hunter(1983), the transient property of the queue with initial state i(i ≥ 0) is discussed. The recursion expression for u -transform of transient queue-length distribution at any time point n^+ is obtained, and the recursion expression of the limiting queue length distribution is also obtained.
文摘In this paper, using the stochastic decomposition and renewal theory we provide the direct method for analysis the departure process of single sever M/G/1 queueing system, and further discuss the departure process of GI/G/1 queueing system. The method provided in this paper is new and concise, which make us see dearly the structure of the departure process of a single server queueing system.
基金Project supported by National Fundamental Research Program of China (Grant No 2006CB921900)National Natural Science Foundation of China (Grant Nos 60537020 and 60621064)Knowledge Innovation Project of Chinese Academy of Sciences
文摘This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems.
基金supported by the National Natural Science Foundation of China(11371303)Natural Science Foundation of Xinjiang(2012211A023)Science Foundation of Xinjiang University(XY110101)
文摘By studying the spectral properties of the underlying operator corresponding to the M/G/1 queueing model with optional second service we obtain that the time-dependent solution of the model strongly converges to its steady-state solution. We also show that the time-dependent queueing size at the departure point converges to the corresponding steady-state queueing size at the departure point.
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)。
文摘In order to meet people’s demand for various types of network services,researchers have conducted extensive research on authentication schemes for multi-server architecture.Although various schemes have been proposed,most of them still have safety defects and fail to meet safety requirements.Recently,Haq et al presented an efficient Hash-based authenticated key agreement scheme for multi-server scheme and claimed that their scheme can withstand all well-known attacks.However,we find that their scheme is vulnerable to replay attack,tracking attack and malicious server impersonation user attack.Then we propose an improved scheme.We also analyze the security of the improved scheme and compare with Haq et al’s scheme in security and computational efficiency.Furthermore,we use the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool to verify the security of the improved scheme.
文摘We construct the membership functions of the fuzzy objective values of a controllable queueing model,in which cost elements,arrival rate and service rate are all fuzzy numbers. Based on Zadeh's extension principle,a set of parametric nonlinear programs is developed to find the upper and lower bounds of the minimal average total cost per unit time at the possibility level. The membership functions of the minimal average total cost are further constructed using different values of the possibility level. A numerical example is solved successfully to illustrate the validity of the proposed approach. Because the object value is expressed and governed by the membership functions,the optimization problem in a fuzzy environment for the controllable queueing models is represented more accurately and analytical results are more useful for system designers and practitioners.
基金This work is supported by the Sichuan education department research project(No.16226483)Sichuan Science and Technology Program(No.2018GZDZX0008)+1 种基金Chengdu Science and Technology Program(No.2018-YF08-00007-GX)the National Natural Science Foundation of China(No.61872087).
文摘Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service.Moreover,it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party.In order to overcome these difficulties,we designed a secure three-factor multi-server authenticated key agreement protocol based on elliptic curve cryptography,which needs the user to register only once at the registration center in order to access all semi-trusted servers.The proposed scheme can not only against various known attacks but also provides high computational efficiency.Besides,we have proved our scheme fulfills mutual authentication by using the authentication test method.
文摘During the past decade,rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices.Service providers have hosted multiple servers to ensure seamless online services to end-users.To ensure the security of this online communication,researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives.Due to the low power and computational capacities of mobile devices,the hash-based multi-server authenticated key agreement schemes with offline Registration Server(RS)are the most efficient choice.Recently,Kumar-Om presented such a scheme and proved its security against all renowned attacks.However,we find that their scheme bears an incorrect login phase,and is unsafe to the trace attack,the Session-Specific Temporary Information Attack(SSTIA),and the Key Compromise Impersonation Attack(KCIA).In fact,all of the existing multi-server authentication schemes(hash-based with offline RS)do not withstand KCLA.To deal with this situation,we propose an improved hash-based multi-server authentication scheme(with offline RS).We analyze the security of the proposed scheme under the random oracle model and use the t4Automated Validation of Internet Security Protocols and Applications''(AVISPA)tool.The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme.
文摘We consider a single-server vacation queueing system that operates in the following manner. When the server returns from a vacation, it observes the following rule. If there is at least one customer in the system, the server commences service and serves exhaustively before taking another vacation. If the server finds the system empty, it waits a fixed time c. At the expiration of this time, the server commences another vacation if no customer has arrived;otherwise, it serves exhaustively before commencing another vacation. Analytical results are derived for the mean waiting time in the system. The timeout scheme is shown to be a generalized scheme of which both the single vacation and multiple vacations schemes are special cases, with c=∞and c=0, respectively. The model is extended to the N-policy vacation queueing system.
文摘This article examines the effects of reneging, server breakdown and server vacation on the various states of the batch arrivals queueing system with single server providing service to customers in three fluctuating modes. In this queueing system, any batch arrival joins the queue if the server is busy or on vacation or under repair. However, if the server is free, one customer from the arriving batch joins the service immediately while others join the queue. In case of server breakdown, the customer whose service is interrupted returns back to the head of the queue. As soon as the server has is repaired, the server attends to the customer in mode 1. For this queueing system, customers that are impatient due to breakdown and server vacation may renege (leave the queue without getting service). Due to fluctuating modes of service delivery, the system may provide service with complete or reduced efficiency. Consequently, we construct the mathematical model and derive the probability generating functions of the steady state probabilities of several states of the system including the steady state queue size distribution. Further, we discuss some particular cases of the proposed queueing model. We present numerical examples in order to demonstrate the effects of server vacation and reneging on the various states of the system. The study revealed that an increase in reneging and a decrease in server vacation results in a decrease in server utilization and an increase in server’s idle time provided rates of server breakdown and repair completion are constant. In addition, the probability of server vacation, the probability of system is under repair and the probabilities that the server provides service in three fluctuating modes decreases due to an increase in reneging and a decrease in vacation completion rates.
基金Supported by the National High Technology Research and Development Program of China(2004AA639690)the Ph. D.Programs Foundation of Ministry of Education of China(20040486049)the Wuhan Chenguang Project (20055003059-27)
文摘The impaction of aggregated network traffic on queueing system is studied in this paper. It shows that the network traffic stayed in buffer has different impaction on queueing performance when it is aggregated at different scales. And its influence is related not only to traffic parameters but also to system parameter, such as buffer size. The increased buffer size can absorb the effect of short-range dependence (SRD) in network traffic and only the effect of long-range dependence (LRD) is expressed. The queueing length is asymptotic Weibull distribution with increasing buffer size, which is irrespective with the effect of short-range dependence character. Monte-Carlo based simulation confirmed the validity of these results.
文摘We study a vacation queueing system with a single server simultaneously dealing with an M/G/1 and an M/D/1 queue. Two classes of units, priority and non-priority, arrive at the system in two independent Poisson streams. Under a non-preemptive priority rule, the server provides a general service to the priority units and a deterministic service to the non-priority units. We further assume that the server may take a vacation of random length just after serving the last priority unit present in the system. We obtain steady state queue size distribution at a random epoch. Corresponding results for some special cases, including the known results of the M/G/1 and the M/D/1 queues, have been derived.
文摘In real life, in different industries, we often deal with systems designed for multiple use for performing single-type tasks. Processes taking place at this time are called service of requirements, and the systems themselves—Queueing Systems. This article is dedicated to computer software modelling of processes taking place in the systems in question, Markov processes in particular. In this article, by means of Matlab environment, software realization of one of the typical models of queueing service theory-multichannel QS with unreliable recoverable servers and limited number of requirements in the system, is fulfilled. The results of this research are important because it gives the possibility to use received results to determine optimality degree of some real queueing systems that possess Markov property.
基金the National Natural Science Foundation of China(699740 37) the National HighPerformance Computing Foundation of China (0 0 2 12 )
文摘In this paper,the concept of the infinitesimal realization factor is extended to the parameter dependent performance functions in closed queueing networks.Then the concepts of realization matrix (its elements are called realization factors) and performance potential are introduced,and the relations between infinitesimal realization factors and these two quantities are discussed.This provides a united framework for both IPA and non IPA approaches.Finally,another physical meaning of the service rate is given.
文摘Weighted priority queueing is a modification of priority queueing that eliminates the possibility of blocking lower priority traffic. The weights assigned to priority classes determine the fractions of the bandwith that are guaranteed for individual traffic classes, similarly as in weighted fair queueing. The paper describes a timed Petri net model of weighted priority queueing and uses discrete-event simulation of this model to obtain performance characteristics of simple queueing systems. The model is also used to analyze the effects of finite queue capacity on the performance of queueing systems.