243 research outputs found

    Implementation of The Open Jackson Queuing Network to Reduce Waiting Time

    Get PDF
    Waiting for service is a common thing in-hospital services. The more patients are waiting, the service delay increases, so waiting time in the queue gets longer. In health care in a hospital, a patient will queue several times in more than one queue in a hospital outpatient installation. The case study in this research is the queue system in the hospital's outpatient treatment, implementing an open Jackson queueing network to minimize waiting time. The workstations examined in this study were the registration, pre-consultation, and cardiology poly consultation, and pharmacy. The data is carried out for six days, counting the number of arrivals and departures with each point at intervals of 5 minutes. Applying the Jackson open queue network model, a recommendation was obtained for the hospital to increase employees' numbers. The registration workstation must have four servers; a poly cardiology workstation had three nurses and four doctors, while for pharmacy, had seven employees. With this personnel's addition, patients' total waiting time in the queuing system is approximately 12 minutes/patient. So, it can reduce waiting times in the queueing system that was initially 108 minutes/patient

    Towards Provably Invisible Network Flow Fingerprints

    Full text link
    Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a watchful adversary Willie. Bob, who receives the set of fingerprinted flows after they pass through the network modeled as a collection of independent and parallel M/M/1M/M/1 queues, wishes to extract Alice's embedded fingerprints to infer the connection between input and output links of the network. We consider two scenarios: 1) Alice embeds fingerprints in all of the flows; 2) Alice embeds fingerprints in each flow independently with probability pp. Assuming that the flow rates are equal, we calculate the maximum number of flows in which Alice can invisibly embed fingerprints while having those fingerprints successfully decoded by Bob. Then, we extend the construction and analysis to the case where flow rates are distinct, and discuss the extension of the network model

    Addressing performance requirements in the FDT-based design of distributed systems

    Get PDF
    The development of distributed systems is generally regarded as a complex and costly task, and for this reason formal description techniques such as LOTOS and ESTELLE (both standardized by the ISO) are increasingly used in this process. Our experience is that LOTOS can be exploited at many stages on the design trajectory, from requirements specification to implementation, but that the language elements do not allow direct formalization of performance requirements. To avoid duplication of effort by using two formalisms with distinct approaches, we propose a design method that incorporates performance constraints in an heuristic but effective manner

    Stochastic processes in networks of queues with exponential service times and only one class of customers

    Get PDF
    Two networks of queues models, presented initially by Jackson, in the open case, and Gordon and Newell, in the closed case, stochastic processes are presented and studied in some of their details and problems. The service times are exponentially distributed and there is only one class of customers.info:eu-repo/semantics/publishedVersio

    On closed queueing networks with mixed preemptive resume priority servers.

    Get PDF
    This paper discusses a typical closed queueing network model in which multiple preemptive resume servers are present with different priority structures at each priority node. An algorithm is developed that is applicable for the three-node two-class model and results are compared to point estimates obtained from simulation. The algorithm is partly based on the Delay/MVA algorithm developed by Bondi and Chuang, because of the accuracy with which instant arrival queue lengths at fcfs servers are calculated. Results are also compared with results obtained from the Shadow Approximation.Networks;
    • …
    corecore