Results 31 to 40 of about 328,732 (321)

Functional Large Deviations for Cox Processes and $Cox/G/\infty$ Queues, with a Biological Application [PDF]

open access: yes, 2020
We consider an infinite-server queue into which customers arrive according to a Cox process and have independent service times with a general distribution. We prove a functional large deviations principle for the equilibrium queue length process.
Crane, Edward   +2 more
core   +2 more sources

RANCANG BANGUN SISTEM NOMER ANTRIAN BERBASIS INTERNET OF THINGS (IOT)

open access: yesJurnal Saintekom, 2022
Queuing is a phenomenon that we can encounter anywhere and anytime, such as queuing to get food orders, ticketing services, and so on. However, unfortunately not everyone likes to queue, especially queuing for public agency services.
I Made Agus Chandra Wijaya   +1 more
doaj   +1 more source

Analysis and Computation of the Joint Queue Length Distribution in a FIFO Single-Server Queue with Multiple Batch Markovian Arrival Streams [PDF]

open access: yes, 2014
This paper considers a work-conserving FIFO single-server queue with multiple batch Markovian arrival streams governed by a continuous-time finite-state Markov chain.
Masuyama, Hiroyuki, Takine, Tetsuya
core   +1 more source

When queueing is better than push and shove [PDF]

open access: yes, 2006
We address the scheduling problem of reordering an existing queue into its efficient order through trade. To that end, we consider individually rational and balanced budget direct and indirect mechanisms.
Gershkov, Alex, Schweinzer, Paul
core   +3 more sources

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Standing Still and Cutting in Line

open access: yesSouth Asia Multidisciplinary Academic Journal, 2013
The queue, or the line, is a defining feature of modern life. This paper examines this ubiquitous form in India as a species of comportment. It offers an ethnographic assessment of queues in Delhi.
Ajay Gandhi
doaj   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Assessment and Comparative Study of Free and Commercial Numerical Software Packages for Lithium‐Ion Battery Modeling

open access: yesAdvanced Theory and Simulations, EarlyView.
This study evaluates the simulation capabilities of lithium‐ion battery (LIB) electrochemical simulation software packages. The benchmark simulation results reveal the impacts of parameter sensitivity to solver performance and stability. The guidelines to troubleshooting common solver failures at high current rates lowers the steep learning curve to ...
Kenneth C. Nwanoro   +2 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy