243 research outputs found
Implementation of The Open Jackson Queuing Network to Reduce Waiting Time
Waiting for service is a common thing in-hospital services. The more patients are waiting, the service delay increases, so waiting time in the queue gets longer. In health care in a hospital, a patient will queue several times in more than one queue in a hospital outpatient installation. The case study in this research is the queue system in the hospital's outpatient treatment, implementing an open Jackson queueing network to minimize waiting time. The workstations examined in this study were the registration, pre-consultation, and cardiology poly consultation, and pharmacy. The data is carried out for six days, counting the number of arrivals and departures with each point at intervals of 5 minutes. Applying the Jackson open queue network model, a recommendation was obtained for the hospital to increase employees' numbers. The registration workstation must have four servers; a poly cardiology workstation had three nurses and four doctors, while for pharmacy, had seven employees. With this personnel's addition, patients' total waiting time in the queuing system is approximately 12 minutes/patient. So, it can reduce waiting times in the queueing system that was initially 108 minutes/patient
Towards Provably Invisible Network Flow Fingerprints
Network traffic analysis reveals important information even when messages are
encrypted. We consider active traffic analysis via flow fingerprinting by
invisibly embedding information into packet timings of flows. In particular,
assume Alice wishes to embed fingerprints into flows of a set of network input
links, whose packet timings are modeled by Poisson processes, without being
detected by a watchful adversary Willie. Bob, who receives the set of
fingerprinted flows after they pass through the network modeled as a collection
of independent and parallel queues, wishes to extract Alice's embedded
fingerprints to infer the connection between input and output links of the
network. We consider two scenarios: 1) Alice embeds fingerprints in all of the
flows; 2) Alice embeds fingerprints in each flow independently with probability
. Assuming that the flow rates are equal, we calculate the maximum number of
flows in which Alice can invisibly embed fingerprints while having those
fingerprints successfully decoded by Bob. Then, we extend the construction and
analysis to the case where flow rates are distinct, and discuss the extension
of the network model
Addressing performance requirements in the FDT-based design of distributed systems
The development of distributed systems is generally regarded as a complex and costly task, and for this reason formal description techniques such as LOTOS and ESTELLE (both standardized by the ISO) are increasingly used in this process. Our experience is that LOTOS can be exploited at many stages on the design trajectory, from requirements specification to implementation, but that the language elements do not allow direct formalization of performance requirements. To avoid duplication of effort by using two formalisms with distinct approaches, we propose a design method that incorporates performance constraints in an heuristic but effective manner
Stochastic processes in networks of queues with exponential service times and only one class of customers
Two networks of queues models, presented initially by Jackson, in the open case, and Gordon and Newell, in the closed case, stochastic processes are presented and studied in some of their details and problems. The service times are exponentially distributed and there is only one class of customers.info:eu-repo/semantics/publishedVersio
On closed queueing networks with mixed preemptive resume priority servers.
This paper discusses a typical closed queueing network model in which multiple preemptive resume servers are present with different priority structures at each priority node. An algorithm is developed that is applicable for the three-node two-class model and results are compared to point estimates obtained from simulation. The algorithm is partly based on the Delay/MVA algorithm developed by Bondi and Chuang, because of the accuracy with which instant arrival queue lengths at fcfs servers are calculated. Results are also compared with results obtained from the Shadow Approximation.Networks;
- …