Results 41 to 50 of about 22,809,596 (368)

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Density profiles of the exclusive queueing process

open access: yes, 2012
The exclusive queueing process (EQP) incorporates the exclusion principle into classic queueing models. It can be interpreted as an exclusion process of variable system length. Here we extend previous studies of its phase diagram by identifying subphases
Arita, Chikashi, Schadschneider, Andreas
core   +1 more source

Queueing system topologies with limited flexibility

open access: yesMeasurement and Modeling of Computer Systems, 2013
We study a multi-server model with n flexible servers and rn queues, connected through a fixed bipartite graph, where the level of flexibility is captured by the average degree, d(n), of the queues.
J. Tsitsiklis, Kuang Xu
semanticscholar   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

From Exhaustive Vacation Queues to Preemptive Priority Queues with General Interarrival Times

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2018
We consider the discrete-time G/GI/1 queueing system with multiple exhaustive vacations. By a transform approach, we obtain an expression for the probability generating function of the waiting time of customers in such a system.
Fiems Dieter, De Vuyst Stijn
doaj   +1 more source

Continuous-Service M/M/1 Queuing Systems

open access: yesApplied System Innovation, 2019
In this paper, we look into a novel notion of the standard M/M/1 queueing system. In our study, we assume that there is a single server and that there are two types of customers: real and imaginary customers. Real customers are regular customers arriving
Song Chew
doaj   +1 more source

Application of Queueing Theory to the Analysis of Changes in Outpatients' Waiting Times in Hospitals Introducing EMR [PDF]

open access: yesHealthcare Informatics Research, 2017
ObjectivesThis research used queueing theory to analyze changes in outpatients' waiting times before and after the introduction of Electronic Medical Record (EMR) systems.MethodsWe focused on the exact drawing of two fundamental parameters for queueing ...
Kyoung Won Cho   +3 more
doaj   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

FAST TCP: Motivation, Architecture, Algorithms, Performance [PDF]

open access: yes, 2006
We describe FAST TCP, a new TCP congestion control algorithm for high-speed long-latency networks, from design to implementation. We highlight the approach taken by FAST TCP to address the four difficulties which the current TCP implementation has at ...
Hegde, Sanjay   +3 more
core   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy