134 research outputs found

    Busy period analysis of the level dependent PH/PH/1/K queue

    Get PDF
    In this paper, we study the transient behavior of a level dependent single server queuing system with a waiting room of finite size during the busy period. The focus is on the level dependent PH/PH/1/K queue. We derive in closed form the joint transform of the length of the busy period, the number of customers served during the busy period, and the number of losses during the busy period. We differentiate between two types of losses: the overflow losses that are due to a full queue and the losses due to an admission controller. For the M/PH/1/K, M/PH/1/K under a threshold policy, and PH/M/1/K queues, we determine simple expressions for their joint transforms

    Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version)

    Get PDF
    We consider a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing. This type of routing takes advantage of the mobility and the storage capacity of the nodes, called the relay nodes, in order to route packets between a source and a destination. Packets at relay nodes are assumed to have a limited lifetime in the network. Nodes are moving inside a bounded region according to some random mobility model. Closed-form expressions and asymptotic results when the number of nodes is large are provided for the packet delivery delay and for the energy needed to transmit a packet from the source to its destination. We also introduce and evaluate a variant of the two-hop relay protocol that limits the number of generated copies in the network. Our model is validated through simulations for two mobility models (random waypoint and random direction mobility models), and the performance of the two-hop routing and of the epidemic routing protocols are compared.\ud \u

    Appointments for Care Pathway Patients

    Get PDF

    Time-Limited and k-Limited Polling Systems: A Matrix Analytic Solution

    Get PDF
    In this paper, we will develop a tool to analyze polling systems with the autonomous-server, the time-limited, and the k-limited service discipline. It is known that these disciplines do not satisfy the well-known branching property in polling system, therefore, hardly any exact result exists in the literature for them. Our strategy is to apply an iterative scheme that is based on relating in closed-form the joint queue-length at the beginning and the end of a server visit to a queue. These kernel relations are derived using the theory of absorbing Markov chains. Finally, we will show that our tool works also in the case of a tandem queueing network with a single server that can serve one queue at a time

    A transient analysis of polling systems operating under exponential time-limited service disciplines

    Get PDF
    In the present article, we analyze a class of time-limited polling systems. In particular, we will derive a direct relation for the evolution of the joint queue-length during the course of a server visit. This will be done both for the pure and the exhaustive exponential time-limited discipline for general service time requirements and preemptive service. More specifically, service of individual customers is according to the preemptive-repeat-random strategy, i.e., if a service is interrupted, then at the next server visit a new service time will be drawn from the original service-time distribution. Moreover, we incorporate customer routing in our analysis, such that it may be applied to a large variety of queueing networks with a single server operating under one of the before-mentioned time-limited service disciplines. We study the time-limited disciplines by performing a transient analysis for the queue length at the served queue. The analysis of the pure time-limited discipline builds on several known results for the transient analysis of the M/G/1 queue. Besides, for the analysis of the exhaustive discipline, we will derive several new results for the transient analysis of an M/G/1 during a busy period. The final expressions (both for the exhaustive and pure case) that we obtain for the key relations generalize previous results by incorporating customer routing or by relaxing the exponentiality assumption on the service times. Finally, based on the interpretation of these key relations, we formulate a conjecture for the key relation for any branching-type service discipline operating under an exponential time-limit

    Decision Support Procedure for Medical Equipment Maintenance Management

    Get PDF
    Hospitals outsource several activities of the service support in order to focus on the core healthcare production as maintenance service. Recently, faced to the sophistication and the costs of medical equipment that continue to escalate, governments have implemented new reforms to control costs and improve the efficiency and the quality. Hospitals become interested in minimizing the total operational cost, by optimizing healthcare production planning and their support activities. Reorganizing the medical equipment maintenance service becomes a priority for the hospital managers to reduce the cost and the dependency on external parties while ensuring that the medical devices are safe, accurate, and operating at the required level of performance. In this article, we propose an efficient procedure to take the appropriate decisions for medical equipment maintenance such as the selection of maintenance strategy, the insourcing/outsourcing, and the selection of contractsā€™ type and content. A practical application of this procedure in the Tunisian context is considered. Nevertheless, our procedure is general and can be tailored to hospitals in both developed and developing countries

    A Survey of TCP over Mobile Ad Hoc Networks

    Get PDF
    The Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. In practice, most TCP deployments have been carefully optimized in the context of wired networks. Ignoring the properties of wireless Mobile Ad Hoc Networks (MANETs) can lead to TCP implementations with poor performance. In order to adapt TCP to MANET environment, improvements have been proposed in the literature to help TCP to differentiate between the different types of losses. Indeed, in MANETs losses are not always due to network congestion, as it is mostly the case in wired networks. In this report, we present an overview of this issue and a detailed analysis of the major factors involved. In particular, we show how TCP can be affected by mobility and lower layers protocols. In addition, we review the main proposals which aim at adapting TCP to MANET environment

    A successive censoring algorithm for a system of connected QBD-processes

    Get PDF
    We consider a Markov Chain in which the state space is partitioned into sets where both transitions within sets and between sets have a special structure. Transitions within each set constitute a finite Quasi-Birth-and-Death-process, and transitions between sets are restricted to four types of transitions. We present a successive censoring algorithm, based on Matrix Analytic Methods, to obtain the stationary distribution of this system of connected QBD-processes
    • ā€¦
    corecore