SlideShare a Scribd company logo
1 of 15
Download to read offline
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592
RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Expected Time To Recruitment In A Two Grade Manpower
System
J.SRIDHARAN, K.PARAMESWARI, A.SRINIVASAN
*Assistant Professor in Mathematics, Government Arts college (Autonomous), Kumbakonam- 612 020(T.N)
**Lecturer in Mathematics, St. Joseph’s college of Engineering & Technology, Thanjavur-613 005(T.N)
***Associate Professor in Mathematics, Bishop Heber College (Autonomous), Thiruchirappalli- 620 017 (T.N)

Abstract
In this paper a two graded organization is considered in which depletion of manpower occurs due to its policy
decisions. Three mathematical models are constructed by assuming the loss of man-hours and the inter-decision
times form an order statistics. Mean and variance of time to recruitment are obtained using an univariate
recruitment policy based on shock model approach and the analytical results are numerically illustrated by
assuming different distributions for the thresholds. The influence of the nodal parameters on the system
characteristics is studied and relevant conclusions are presented.
Key words : Man power planning, Univariate recruitment policy, Mean and variance of the time for
recruitment, Order statistics, Shock model.

I.

Introduction

Exits of personnel which is in other words
known as wastage, is an important aspect in the study
of manpower planning. Many models have been
discussed using different kinds of wastages and also
different types of distributions for the loss of manhours, the threshold and the inter-decision times.
Such models could be seen in [1] and [2]. Expected
time to recruitment in a two graded system is
obtained under different conditions for several
models in [3],[4],[5],[6],[7],[8] and [9] according as
the inter-decision times are independent and
identically distributed exponential random variables
or exchangeable and constantly correlated
exponential random variables. Recently in [10] the
author has obtained system characteristic for a single
grade man-power system when the inter-decision
times form an order statistics. The present paper
extend the results of [10] for a two grade manpower
system when the loss of man-hours and the inter
decision times form an order statistics. The mean and
variance of the time to recruitment of the system
characteristic are obtained by taking the distribution
of loss of man-hours as first order (minimum) and kth
order (maximum) statistics respectively. This paper is
organized as follows: In sections 2, 3 and 4 models I,
II and III are described and analytical expressions for
mean and variance of the time to recruitment are
derived . Model I, II and III differ from each other in
the following sense: While in model-I transfer of
personnel between the two grades is permitted, in
model-II this transfer is not permitted. In model-III
the thresholds for the number of exits in the two
grades are combined in order to provide a better
allowable loss of manpower in the organization
www.ijera.com

compared to models I and II. In section 5, the
analytical results are numerically illustrated and
relevant conclusions are given.

II.

Model description and analysis for
Model-I

Consider an organization having two grades
in which decisions are taken at random epochs in
[0, ) and at every decision making epoch a random
number of persons quit the organization. There is an
associated loss of man-hour to the organization, if a
person quits and it is linear and cumulative. Let Xi be
the loss of man-hours due to the ith decision epoch,
i=1,2,3…k. Let X i , i  1,2,3...k are independent
and identically distributed exponential random
variables with density function g(.) and mean
1/c,(c>0). . Let

X (1) , X ( 2 ) ,... X ( k ) be the order

statistics selected from the sample
with

respective

density

X 1 , X 2 ,... X k
functions

g x (1) (.), g x ( 2 ) (.).... g x ( k ) (.). Let U i , i  1,2,3...k
are independent and identically distributed
exponential random variables with density function
f(.).

Let

U (1) , U ( 2 ) ,...U ( k ) be the

order

statistics selected from the sample
U 1 , U 2 ,...U k with respective density functions

f u (1) (.), f u ( 2 ) (.).... f u ( k ) (.). Let T be a continuous
random variable denoting the time for recruitment in
the organization with probability density function
(distribution
function)
Let
l (.)( L(.)).
578 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

l * (.), f * (.), f u*(1) (.) and f u*( k ) (.)
transform

of

be the Laplace

l (.), f (.), f u (1) (.)and f u ( k ) (.)

respectively. Let YA and YB be independent random
variables denoting the threshold levels for the loss of
man-hours in grades A and B with parameters αA and
αB respectively (αA,αB>0). In this model the threshold
Y for the loss of man-hours in the organization is
taken as max (YA,YB). The loss of manpower process
and the inter-decision time process are statistically

III.

www.ijera.com

independent. The univariate recruitment policy
employed in this paper is as follows: Recruitment is
done as and when the cumulative loss of man-hours
in the organization exceeds Y. Let Vk(t) be the
probability that there are exactly k-decision epochs in
(0,t]. Since the number of decisions made in (0,t]
form a renewal process we note that Vk(t)= Fk(t) Fk+1(t), where F0(t)=1. Let E(T) and V(T) be the
mean and variance of
time for
recruitment
respectively.

Main results

The survival function of T is given by


k

P (T  t )  Vk (t ) P ( X i  Y )
k 0

i 1





k 0

0

  Vk (t )  p( y  x) g k ( x)dx

(1)

Case 1:
YA and YB follow exponential distribution with parameters αA and αB respectively. In this case it is shown
that








p(Y  x)  Vk (t )  e  A x  e  B x  e ( A  B ) x g k ( x) dx
k 0

(2)

0

From (1) and (2) we get





*
*
*
P(T  t )   Fk (t )  Fk 1 (t ) g k ( A )  g k ( B )  g k ( A   B )



(3)

k 0

Since

L(t )  1  P(T  t ) and l (t ) 

d
l (t )
dt

(4)

from (3) and (4) it is found that




l (t )  [1  g * ( A )] f k (t )( g * ( A )) k 1  [1  g * ( B )] f k (t )( g * ( B )) k 1 
k 1

k 1



[1  g * ( A   B )] f k (t )( g * ( A   B )) k 1

(5)

k 1

Taking Laplace transform on both sides of (5) it is found that

l * ( s) 

1  g ( ) f









(s) 1  g * ( B ) f * (s) 1  g * ( A   B ) f * (s)


1  f * (s) g * ( A ) 1  f * (s) g * ( B ) 1  f * (s) g * ( A   B )
*

*

A

(6)

The probability density function of rth order statistics is given by

f u ( r ) (t )  r kcr [F (t )]r 1 f (t )[1  F (t )]k r , r  1,2,3..k

(7)

If f(t)=fu(1)(t)
then

f * (s)  f u*(1) (s)

(8)

From (7) it is found that

f u (1) (t )  k f (t ) 1  f (t )

k 1

Since by hypothesis f (t )
from (9) and (10) we get
www.ijera.com

  e  t

(9)
(10)

579 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

k
k  s

f u*(1) ( s) 

www.ijera.com

(11)

It is known that

d (l * ( s))
d 2 (l * ( s)
, E (T 2 ) 
and V (T )  E (T 2 )  ( E (T ))2
2
ds s 0
ds
s 0

E (T )  

(12)

Therefore from (6), (11) and (12) we get

E (T ) 

1



E (T 2 ) 

V1  V2  V3 

V

2



Where V1 

 V22  V32

2
1

2

(13)



(14)

1
1
1
,V2 
and V3 
*
*
*
1  g ( A )
1  g ( B )
1  g ( A   B )

(15 )

If f(t)=fu(k)(t)

f * (s)  f u*( k ) (s)

In this case

From (7) it is found that

f u ( k ) (t )  F (t )

k 1

f (t )

(16)

From(10) , (16) and on simplification we get

f u*( k ) ( s ) 

k!k
( s   )( s  2 )...( s  k )

(17 )

Therefore from (6),(17) and (12) we get
k

E (T ) 

 1n
n 1



V1  V2  V3 

 k

2  1 
n
E (T 2 )   n1 2



(18)

2

k

V

2
1

 

 



 V1  V22  V2  V32  V3 

 1n
n 1

2

2

V1  V2  V3 

(19)

In (18) & (19) V1,V2 and V3 are given by (15).
The probability density function of nth order statistics is given by

g x( n) ( x)  n kcn [G( x)]n1 g ( x)[1  G( x)]k n , n  1,2,3..k
If g(x)=gx(1)(x)
then in(13),(14),(18) and (19)

(20)

g * ( )  g *(1) ( ) for   A ,  B and  A   B
x

From (20) it is found that

g x(1) ( x)  k g ( x) 1  g ( x)

k 1

Since by hypothesis g ( x )
from (21) and (22) we get

 ce  cx

kc
,   A , B and  A   B
kc  
*
*
*
In (13),(14),(18) and (19) g ( A ), g ( B ) & g ( A   B ) are given by (23) when s=1.
g *(1) ( ) 
x

and V (T )  E (T
If g(x)=gx(k)(x)
then g

*

2

(21)
(22)
(23)

)  ( E (T )) 2

( )  g *( k ) ( ) for   A ,  B and  A   B
x

www.ijera.com

580 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

From (20) it is found that

g x( k ) ( x)  G( x) g ( x)
k 1

(24)

From(22),(24) and on simplification we get

g

*
x(k )

k!c k
( ) 
for    A , B and  A   B
(c   )( 2c   )(3c   ).......( kc   )

In (13),(14),(18) and (19)

(25 )

g * ( A ), g * ( B ) & g * ( A   B ) are given by (25) when s=k and

V (T )  E (T 2 )  ( E (T )) 2
Case 2:
YA and YB follow extended exponential distribution with scale parameters α A and αB respectively and
shape parameter 2. In this case it can be shown that
If f(t)=fu(1)(t)

E (T ) 

1



E (T 2 ) 

2V1  2V2  4V3  2V4  2V5  V6  V7  V8 
2



2

2V

2
1

(26)

 2V22  4V32  2V42  2V52  V62  V72  V82



(27)

1
2
1
,V5 
,V6 
,
*
*
1  g (2 A   B )
1  g ( A  2 B )
1  g (2 A  2 B )
1
1
V7
and V8 
*
*
1  g (2 A )
1  g (2 B )
whereV4 

*

(28 )

when n=1,in (26)&(27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and (23).
when n=k,in (26)&(27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and(25).
If f(t)=fu(k)(t)
Proceeding as in case(i) it can be found that
k

E (T ) 

 1n
n 1



2V1  2V2  4V3  2V4  2V5  V6  V7  V8 



(29)



2

1
 k

E (T )  2 2V  2V  4V  2V  2V  V  V  V   1   2
n 

 n1
2
k
 k

 1    1 2 
2V1  2V2  4V3  2V4  2V5  V6  V7  V8 
 

n
n 
  n1   n1

2

2

2
1

2
2

2
3

2
4

2
5

2
6

2
7

2
8

(30)

when n=1,in (26)&(27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and (23).
when n=kin (26) (27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and (25).
Case 3:
YA follows extended exponential distribution with scale parameters α A and shape parameter 2 and YB
follows exponential distribution with parameter αB.
If f(t)=fu(1)(t)

www.ijera.com

581 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

Proceeding as in case 1 it can be shown that

E (T ) 

1



2V1  V2  V4  2V3  V7 

2V

2

E (T 2 ) 

2
1

2

 V22  V42  2V32  V72

(31)



(32)

when n=1, in (31) & (32) V1,V2,V3,V4 and V7 are given by (15),(28) and (23).
when n=k, in (31) & (32) V1,V2,V3,V4 and V7 are given by (15),(28) and (25).
If f(t)=fu(k)(t)
Proceeding as in case (i) it can be shown that
k

E (T ) 

 1n
n 1

2V

 V  2V  V  V



(33)

1
2
3
4
7

2
k
2
2
2
2
2
2
2 
1  
E (T )  2 2V1  V2  2V3  V4  V7   

 n1 n 
2
k
 k

1
1   1 2
2V1  V2  2V3  V4  V7   n 
2
 n1  n1 n 







(34)

when n=1, in (33) & (34) V1,V2,V3,V4 and V7 are given by (15),(28) and (23).
when n=k, in (33) & (34) V1,V2,V3,V4 and V7 are given by (15),(28) and (25).
Case 4:
The distributions of YA has SCBZ property with parameters αA,µ1 & µ2, and the distribution of YB has
SCBZ property with parameters αB,µ3 & µ4. In this case it can be shown that
If f(t)=fu(1)(t)

E (T ) 

1



E (T 2 ) 

 p1V9  p2V10  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  q1V11  q2V12 
2



2

p V

2
1 9

2
2
2
2
2
2
2
 p2V10  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  q1V11  q2V12

(35)



(36)

where

1

1
1
,V12 
*
1  g ( A  1 )
1  g ( B   3 )
1  g ( 2 )
1  g * ( 4 )
1
1
1
V13
,V14 
,V15 
*
*
*
1  g ( A   B  1   3 )
1  g ( A  1   4 )
1  g ( B  1   3 )
1
and V16 
*
1  g ( 2   4 )
V9 

,V10 

*

2

*

,V11 

(37)

when n=1,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (23).
when n=k,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (25).
If f(t)=fu(k)(t)
Proceeding as in case (i) it can be shown that
k

E (T ) 

 1n
n 1



 p1V9  p2V10  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  q1V11  q2V12 

www.ijera.com

(38)
582 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

and





2

2

2 k
 k


E (T )  2 p V  p V  p1 p V  p q V  p q V   1   2   1 
n    n1 n 

 n1
2
k
 k

1
2
2
2
1   1 2
q1V11  q 2V12  q1q 2V16  2 q1V11  q2V12  q1q2V16   

 n1 n  n1 n 


2

2

2
1 9

2
2 10



2
2 13

2
1 2 14

2
2 1 15



2
k
 k

1   1 2

- 2  p1 M 9  p 2 M 10  p1 p 2 M 13  p1q 2 M 14  p 2 q1 M 15  

 n1 n  n1 n 



1

(39)

when n=1,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (23).
when n=k,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (25).

IV.

Model description and analysis for Model-II
For this model Y  min( YA , YB ) . All the other assumptions and notations are

as in model-I. Then the values of E (T ) & E (T
case 1:
If f(t)=fu(1)(t)
Proceeding as in case 1 it can be shown that

E (T ) 

1



E (T 2 ) 

2

) when r  1and r  k are given by

V3 
2



2

(40)

V 

(41)

2
3

when n=1,in (40) & (41) V3 is given by (15) and (23).
when n=k,in (40) & (41) V3 is given by (15) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n
n 1



V3 

(42)
2

2

k
 k

 k 1 
2  1 
 n   1 2
n
n
V3 
E (T 2 )   n1 2  V32   n1  2 n1



 



(43)

when n=1,in (42) & (43) V3 is given by (15) and (23).
when n=k,in (42) & (43) V3 is given by (15) and (25).

and V (T )  E (T 2 )  ( E (T )) 2
Case 2:
If f(t)=fu(1)(t)
Proceeding as in case 1 it can be shown that

1
4V3  V6  2V4  2V5 
k
2
E (T 2 )  2 2 4V32  V62  2V42  2V52
k 

E (T ) 



(44)



(45)

when n=1,in (44) & (45) V3,V4,V5 and V6 are given by (15),(28) and (23).
www.ijera.com

583 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

when n=k,in (44) & (45) V3,V4,V5 and V6 are given by (15),(28) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n
n 1



4V3  V6  2V4  2V5 

4V



(46)
2

 k

 V62  2V42  2V52   1  
2
n

 n1
2
k
 k

1
 1  
4V3  V6  2V4  2V5    n   1 n 2 

2
  n1  n1

2

E (T 2 ) 

2
3

(47 )

when n=1,in (46) & (47) V3,V4,V5 and V6 are given by (15),(28) and (23).
when n=k,in (46) & (47) V3,V4,V5 and V6 are given by (15),(28) and (25).
Case 3:
If f(t)=fu(1)(t)
Proceeding as in case 1 it can be shown that

1
2V3  V4 
k
2
E (T 2 )  2 2 2V32  V42
k 

E (T ) 



(48)



(49)

when n=1,in (48) & (49) V3 and V4 are given by (15),(28) and (23).
when n=k,in (48) & (49) V3 and V4 are given by (15),(28) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n
n 1



2V3  V4 

2
k

2 
2
2 
1   1
E (T )  2 2V3  V4    
2
 
 n1 n   


2

(50)
2
k


 k 1 
2V3  V4   n    1 2 
n 
n 1
 n1





(51)

when n=1,in (50) & (51) V3 and V4 are given by (15),(28) and (23).
when n=k,in (50) & (51) V3 and V4 are given by (15),(28) and (25).

and V (T )  E (T 2 )  ( E (T )) 2
Case 4:
If f(t)=fu(1)(t)
Proceeding as in case 1 it can be shown that

1
 p1 p2V13  p1q2V14  p2 q1V15  q1q2V16 
k
2
2
2
2
2
E (T 2 )  2 2 p1 p2 M 13  p1q2 M 14  p2 q1M 15  q1q2 M 16
k 
E (T ) 



(52)



(53)

when n=1,in (52) & (53) V13,V14,V15 and V16 are given by (37) and (23).
when n=k,in (52) & (53) V13,V14,V15 and V16 are given by (37) and (25).
If f(t)=fu(1)(t)
www.ijera.com

584 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n
n 1



 p1 p2V13  p1q2V14  p2 q1V15  q1q2V16 

(54)

2
2
k

 k 1   k 1 
E (T )  2  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16          1 2 

 n1 n   n1 n  n1 n 


1
2
2
2
2
p1 p2V13  p1q2V14  p2 q1V15  q1q2V16
(55)
2

2

2







when n=1,in (54) & (55) V13,V14,V15 and V16 are given by (37) and (23).
when n=k,in (54) & (55) V13,V14,V15 and V16 are given by (37) and (25).

V.

Model description and analysis for Model-III
For this model Y  YA  YB . All the other assumptions and notations are as in model-I. Then the values

of E (T ) & E (T ) when n  1and n  k are given by
case 1:
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
2

E (T ) 

 B  
1   A 

    V2      V1 



  A
B 
B 
 A


E (T 2 ) 

(56)

2   A  2   B  2 
V2  

    V1 

2   A   B 
B 


 A


(57)

when n=1,in (56) & (57) V1 and V2 are given by (15) and (23).
when n=k,in (56) & (57) V1 and V2 are given by (15) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n 
n 1



 B  
A 

    V2      V1 



B 
B 
 A
 A

2

(58)
2

k
 k

 k 1 
2  1 
    1 2
n  
 2   B  2   n1 n  n1 n
A
E (T 2 )   n1 2  
    V2      V1  




2
B 
B 
 A
 A

  A 
 B  

    V2      V1 



B 
B 
 A
 A


(59)

when n=1,in (58) & (59) V1 and V2 are given by (15) and (23).
when n=k,in (58) & (59) V1 and V2 are given by (15) and (25).
Case 2:
If f(t)=fu(1)(t)
Proceeding as in case 1 it can be shown that

www.ijera.com

585 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

E (T ) 

www.ijera.com

  4 A   4 A   
1   4 B   4 B  

 V1   
 

 
        2    V2  
k    A  2 B    A   B  
B  
A
B 

 

 A
 

   A   2 A   
1   2 B    B  

 V7   
 

 
          2  V8 
k   2 A   B    A   B  
B  
A
B 


 

 A




(60)

2   4 B   4 B   2   4 A   4 A   2 

 V1   
 

 
        2    V2  
k 2 2    A  2 B    A   B  
B  
A
B 

 

 A
 

2   2 B    B   2    A   2 A   2 

 V7   
 

(61)
 
          2  V8 
k 2 2   2 A   B    A   B  
B  
A
B 

 

 A
 


E (T 2 ) 

when n=1,in (60) & (61) V1,V2,V7 and V8 are given by (15),(28) and (23).
when n=k,in (60) & (61) V1,V2,V7 and V8 are given by (15),(28) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n  

4 B
 
    2
  A
B


n 1



  4 B

   
B
  A

  4 A

 V1   

  
B

 A

  4 A

  2  
B
  A

 
 V2  

 


  B

   
B
  A

  A

 V7   

  
B

 A

  2 A

    2
B
  A

 
 V8 

 


k

 1n  
n 1



2 B
 
  2  
  A
B


(62)

2

 k

2  1 
n   4
B
E (T 2 )   n1 2   
    2

  A
B


  4 B

   
B
  A

  2   4 A
 V1   

  
B

 A

  4 A

  2  
B
  A

 2 
 V2  

 


2

 k

2  1 
 n1 n    2 B
 

2
  2 A   B


 2   A
 V7   

  
B

 A

  2 A

    2
B
  A

 2 
 V8  

 


  4 B

   
B
  A

  4 A

 V1   

  
B

 A

  4 A

  2  
B
  A

 
 V2  

 


  B

   
B
  A

  A

 V7   

  
B

 A

  2 A

    2
B
  A

 
 V8  (63)

 


  B

   
B
  A

2

k
 k 1 
 n   1 2
 n1  n1 n   4 B
 

2

   A  2 B
2

k
 k 1 
 n   1 2
 n1  n1 n   2 B
 

2

  2 A   B

when n=1,in (62) & (63) V1,V2,V7 and V8 are given by (15),(28) and (23).
when n=k,in (62) & (63) V1,V2,V7 and V8 are given by (15),(28) and (25).
Case 3:
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
www.ijera.com

586 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

E (T ) 

1   B

k  2 A   B


E (T 2 ) 


 2 B
V7  

  
B

 A

2   2 A
 
k 2 2    A   B
 

  2 A

V1   

  
B

 A

  2 A

  2  
B
  A

  2 A

  2  
B
  A

 2   B
 V2  

 2  
B

 A

www.ijera.com

 
 V2 

 


 2  2 B
V7  

  
B

 A

(64 )
 2
V1 

 


(65 )

when n=1,in (64) & (65) V1,V2,V7 and V8 are given by (15),(28) and (23).
when n=k,in (64) & (65) V1,V2,V7 and V8 are given by (15),(28) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that
k

E (T ) 

 1n  
n 1



2 A
 
  
  A
B


  2 A

  2  
B
  A


 B
 V2  

 2  
B

 A


 2 B
M 7  

  
B

 A

 
V1 

 


(66)

and
2
 2  2 B  2  k 1 
2   2 A   2 A   2   B

 V2  
E (T )  2  
 2   V7      V1   n  



    A   B   2 A   B  
B 
B 
 n1 
 

 A
 A



2
k
 k

 B

 2 B  
1   2 A   2 A  
1    1 2 (67)

 V2  
V7  
V1    
 
 2   
    
n  n1 n 
2    A   B   2 A   B  
B 
B    n 1
 

 A
 A
 


2

when n=1,in (66) & (67) V1,V2,V7 and V8 are given by (15),(28) and (23).
when n=k,in (66) & (67) V1,V2,V7 and V8 are given by (15),(28) and (25).
Case 4:
If f(t)=fu(1)(t)
Proceeding as in case 1 it can be shown that

E (T ) 



 p1q2  A  1  q1q2  2  
q1 p2  2 
1  p1 p2  A  1 



              V10            V12 

k  A
B
1
3
2
B
3 
1
4
2
4 
 A


 p q    3  q1q2  4  
p1q2  4 
1  p1 p2  B   3 
V9   2 1 B


          V11 

k   A   B  1   3  A  1   4 
3
B
2
4 


 2


and

E (T 2 ) 



(68)

q1 p2  2  2  p1q2  A  1  q1q2  2  2 
2  p1 p2  A  1 

V10  

2 
          V12 

k    A   B  1   3  2   B   3 
1
4
2
4 
 A


2

p1q2  4  2  p2 q1  B   3  q1q2  4  2 
2  p1 p2  B   3 

V9  

2 
          V11 

k    A   B  1   3  A  1   4 
3
B
2
4 

 2

2

(69)

when n=1,in (68) & (69) V9,V10,V11 and V12 are given by (28) and (23).
when n=k,in (68) & (69) V9,V10,V11 and V12 are given by (28) and (25).
If f(t)=fu(k)(t)
Proceeding as in case 1 it can be shown that

www.ijera.com

587 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

k

E (T ) 

 1n 
n 1



 p1q2  A  1  q1q2  2  
p1 p2  A  1 
q1 p2  2 



              V10            V12 

B
1
3
2
B
3 
1
4
2
4 
 A
 A


k



 1n 
n 1



 p q   3  q1q2  4  
p1 p2  B  3 
p1q2  4 
V9   2 1 B


            
          V11 

A
B
1
3
A
1
4 
3
B
2
4 
 2



(70)

and
2

 k

2  1 
n  p p    
q1 p2  2  2  p1q 2  A  1  q1q 2  2  2 
1 2
A
1
V10  
E (T 2 )   n 1 2  

          V12 

      
 2   B  3 

B
1
3
1
4
2
4 
 A
 A



2

 k

2 1 / n 
 p p    3 
p1q 2  4  2  p 2 q1  B   3  q1q 2  4  2 
  n1 2   1 2 B
              V9            V11  




B
1
3
A
1
4 
3
B
2
4 
 2
 A

2
k
 k

  1    1 2 

  n1 n  n1 n   p p    
 p q   1  q1q2  2  
q1 p2  2 

  1 2 A
1
V10   1 2 A


2
          V12 



1
4
2
4 
 A
  A   B  1   3  2   B   3 


2
k
 k

 1    1 2 

  n1 n  n1 n   p p    
p1q2  4  
  1 2 B
3
V9  




2
  A   B  1   3  A  1   4  
2
k
 k

 1  
 n   1n 2  
  n1  n1
  p q     q q   

  2 1 B
3
 1 2 4 V11 
(71)

2


  2   3   B  2   4  

when n=1,in (70) & (71) V9,V10,V11 and V12 are given by (28) and (23).
when n=k,in (70) & (71) V9,V10,V11 and V12 are given by (28) and (25).

and V (T )  E (T 2 )  ( E (T )) 2
VI.

Numerical illustration

The influence of nodal parameters on the performance measures namely mean and variance of the time to
recruitment is studied numerically. In the following tables these performance measures are calculated by varying
the parameter ‘ρ’ at a time and keeping the other parameters fixed as αA=0.1, αB=0.3,λ=0.5, µ1=0.4, µ2=0.8,
µ3=0.6 , µ4=0.7 .

www.ijera.com

588 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

Table 1: Effect of ‘c’ and ‘k’ on E(T) for Model-I

1

1.5

2

1

1

1

k

3

3

3

4

5

6

n=1

22.3333

33.1667

44

22.1667

22.0667

22

n=k

4.4089

6.3780

8.3474

2.9331

2.1549

1.6829

n=1

122.8333

182.41

242

184.7222

251.9278

323.4

n=k

24.4290

35.0788

45.9108

24.4423

24.6020

24.7386

n=1

31.8810

47.4881

63.0952

31.7143

31.6143

31.5476

n=k

6.1437

8.9813

11.8190

4.0777

2.9902

2.3315

n=1

175.3452

261.1845

347.0238

264.2857

360.9298

463.75

n=k

33.7902

49.3971

65.0042

33.9811

34.1387

34.2731

n=1

31.3333

46.6667

62

31.1667

31.0667

31

n=k

6.0442

8.8319

11.6198

4.0121

2.9423

2.2943

n=1

172.3333

256.6667

341

259.7222

354.6778

455.7000

n=k

33.2429

48.5754

63.9090

33.4338

33.5915

33.7262

n=1

6.4309

9.3130

12.1951

6.2642

6.1642

6.0976

n=k

1.5244

2.0444

2.5668

1.0312

0.7680

0.6066

n=1

35.3700

51.2216

67.0733

52.2020

70.3751

89.6343

n=k

Case 1

c

8.3840

11.2440

14.1171

8.5932

8.7677

8.9171

r=1
E(T)

Case 3

Case 2

r=k

r=1
E(T)
r=k

r=1
E(T)
r=k

Case 4

r=1
E(T)
r=k

www.ijera.com

589 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

Table 2: Effect of ‘c’ and ‘k’ on E(T) for Model-II

1

1.5

2

1

1

1

k

3

3

3

4

5

6

n=1

5.6667

8.1667

10.6667

5.5

5.4

5.3333

n=k

1.4041

1.8505

2.3001

0.9569

0.7170

0.5693

n=1

31.1667

44.9167

58.6667

45.8333

61.65

78.40

n=k

7.7227

10.1776

12.6536

7.9739

8.1853

8.3682

n=1

9.4524

13.8452

18.2381

9.2857

9.1857

9.1190

n=k

2.0694

2.8662

3.6641

1.3897

1.0288

0.8086

n=1

51.9881

76.1488

100.3095

77.3810

104.8702

134.05

n=k

11.3820

15.7642

20.1528

11.5808

11.7454

11.8864

n=1

6.6667

9.6667

12.6667

6.5

6.4

6.3333

n=k

1.5819

2.1190

2.6610

1.0715

0.9996

0.6327

n=1

36.6667

53.1667

69.6667

54.1667

73.0667

93.1

n=k

8.6910

11.6546

14.6355

8.9291

9.1287

9.3012

n=1

2.5770

3.5322

4.4874

2.4104

2.3104

2.2437

n=k

0.8733

1.0311

1.1957

0.6149

0.4728

0.3834

n=1

14.1737

19.4272

24.6807

20.0864

26.3767

32.9824

n=k

Case 1

c

4.8031

5.6710

6.5765

5.1244

5.3976

5.6365

r=1
E(T)

Case 3

Case 2

r=k

r=1
E(T)
r=1

r=1
E(T)
r=k

Case 4

r=1
E(T)
r=k

www.ijera.com

590 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

Table 3: Effect of ‘c’ and ‘k’ on E(T) for Model-III

Findings
From the above tables it is found that
1. When the probability density function of inter decision time is same as the probability density
function of first order statistics, as ‘k’ increases the mean time to recruitment decreases for the first and
kth order statistics for the loss of manhours but it is increases when the probability density function of
inter decision time is same as the kth order statistics.
2. When the probability density function of inter decision time is same as the probability density
function of first order statistics or the kth order statistics, as ‘c’ increases the mean time to recruitment
increases for the first and kth order statistics for the loss of manhours .

Conclusion
Since the time to recruitment is more elongated in model-III than the first two models, model-III is
preferable from the organization point of view.

References:
[1]
[2]
[3]

[4]

Barthlomew.D.J,
and
Forbes.A.F,
Statitical
techniques
for
man
power
planning,
JohnWiley&Sons,(1979).
Grinold.R.C, and Marshall.K.J,Man Power Planning, NorthHolland,Newyork (1977).
Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time torecruitment in a two grade
manpower system based on order statistics, International Journal of Mathematical Sciences and
Engineering Applications 6(5) (2012):23-30.
Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time to recruitment in a two grade
manpower system involving exdended exponential threshold based on order statistics, Bessel Journal of
Mathematics3(1) (2013):39-49.

www.ijera.com

591 | P a g e
K.PARAMESWARI et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592

www.ijera.com

[5]

Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time to recruitment in a two grade
manpower system involving exdended exponential and exponential threshold based on order statistics,
Archimedes Journal of Mathematics3(1) (2013):41-50
[6] Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time to recruitment in a two grade
manpower system based on order statistics when the threshold distribution having SCBZ property,
Cayley Journal of Mathematics 1(2) (2012 ): 101-112.
[7] Parameswari.K , Sridharan.J, and Srinivasan.A, Time to recruitment in a two grade manpower system
based on order statistics , Antartica Journal of Mathematics 10(2) (2013 ):169-181.
[8] Srinivasan.A, and Kasturri.K, Expected time for recruitment in a two graded manpower system with
geometric threshold and correlated inter-decision times,Acta Ciencia Indica 34(3) (2008): 1359-1364.
[9] Srinivasan.A, and Vidhya.S, A stochastic model for the expected time to recruitment in a two grade
manpower system having correlated inter-decision times and constant combined thresholds, Applied
mathematical sciences 4(54) (2010):2653-2661.
[10] Muthaiyan.A, A study on stochastic models in manpower planning , Ph.D thesis, Bharathidasan
university (2010).

www.ijera.com

592 | P a g e

More Related Content

Viewers also liked

Redditch 3
Redditch 3Redditch 3
Redditch 3obertome
 
Diario Resumen 20141125
Diario Resumen 20141125Diario Resumen 20141125
Diario Resumen 20141125Diario Resumen
 
Cultura & Cultura organizacional
Cultura & Cultura organizacionalCultura & Cultura organizacional
Cultura & Cultura organizacionalddarlyssena
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (7)

Chiste Graficos
Chiste GraficosChiste Graficos
Chiste Graficos
 
Redditch 3
Redditch 3Redditch 3
Redditch 3
 
Diario Resumen 20141125
Diario Resumen 20141125Diario Resumen 20141125
Diario Resumen 20141125
 
Cultura & Cultura organizacional
Cultura & Cultura organizacionalCultura & Cultura organizacional
Cultura & Cultura organizacional
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Ck4201578592

Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
 
Measures of different reliability parameters for a complex redundant system u...
Measures of different reliability parameters for a complex redundant system u...Measures of different reliability parameters for a complex redundant system u...
Measures of different reliability parameters for a complex redundant system u...Alexander Decker
 
Research on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with ApplicationResearch on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with ApplicationTELKOMNIKA JOURNAL
 
A common random fixed point theorem for rational ineqality in hilbert space ...
 A common random fixed point theorem for rational ineqality in hilbert space ... A common random fixed point theorem for rational ineqality in hilbert space ...
A common random fixed point theorem for rational ineqality in hilbert space ...Alexander Decker
 
Stereographic Circular Normal Moment Distribution
Stereographic Circular Normal Moment DistributionStereographic Circular Normal Moment Distribution
Stereographic Circular Normal Moment Distributionmathsjournal
 
10.1.1.474.2861
10.1.1.474.286110.1.1.474.2861
10.1.1.474.2861pkavitha
 
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...IOSR Journals
 
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIRMATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIREditor IJMTER
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
 
An investigation of inference of the generalized extreme value distribution b...
An investigation of inference of the generalized extreme value distribution b...An investigation of inference of the generalized extreme value distribution b...
An investigation of inference of the generalized extreme value distribution b...Alexander Decker
 
A new non symmetric information divergence of
A new non symmetric information divergence ofA new non symmetric information divergence of
A new non symmetric information divergence ofeSAT Publishing House
 
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,aTheta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,aijcsa
 
Series representation of solistics lectr19.ppt
Series representation of solistics lectr19.pptSeries representation of solistics lectr19.ppt
Series representation of solistics lectr19.pptsadafshahbaz7777
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
 

Similar to Ck4201578592 (20)

Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
 
Measures of different reliability parameters for a complex redundant system u...
Measures of different reliability parameters for a complex redundant system u...Measures of different reliability parameters for a complex redundant system u...
Measures of different reliability parameters for a complex redundant system u...
 
Research on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with ApplicationResearch on 4-dimensional Systems without Equilibria with Application
Research on 4-dimensional Systems without Equilibria with Application
 
20320130406030
2032013040603020320130406030
20320130406030
 
A common random fixed point theorem for rational ineqality in hilbert space ...
 A common random fixed point theorem for rational ineqality in hilbert space ... A common random fixed point theorem for rational ineqality in hilbert space ...
A common random fixed point theorem for rational ineqality in hilbert space ...
 
A0212010109
A0212010109A0212010109
A0212010109
 
Stereographic Circular Normal Moment Distribution
Stereographic Circular Normal Moment DistributionStereographic Circular Normal Moment Distribution
Stereographic Circular Normal Moment Distribution
 
10.1.1.474.2861
10.1.1.474.286110.1.1.474.2861
10.1.1.474.2861
 
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
A Convergence Theorem Associated With a Pair of Second Order Differential Equ...
 
Master's thesis
Master's thesisMaster's thesis
Master's thesis
 
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIRMATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
MATHEMATICAL MODELING OF COMPLEX REDUNDANT SYSTEM UNDER HEAD-OF-LINE REPAIR
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
 
An investigation of inference of the generalized extreme value distribution b...
An investigation of inference of the generalized extreme value distribution b...An investigation of inference of the generalized extreme value distribution b...
An investigation of inference of the generalized extreme value distribution b...
 
A new non symmetric information divergence of
A new non symmetric information divergence ofA new non symmetric information divergence of
A new non symmetric information divergence of
 
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,aTheta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
 
F023064072
F023064072F023064072
F023064072
 
F023064072
F023064072F023064072
F023064072
 
Series representation of solistics lectr19.ppt
Series representation of solistics lectr19.pptSeries representation of solistics lectr19.ppt
Series representation of solistics lectr19.ppt
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Ck4201578592

  • 1. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Expected Time To Recruitment In A Two Grade Manpower System J.SRIDHARAN, K.PARAMESWARI, A.SRINIVASAN *Assistant Professor in Mathematics, Government Arts college (Autonomous), Kumbakonam- 612 020(T.N) **Lecturer in Mathematics, St. Joseph’s college of Engineering & Technology, Thanjavur-613 005(T.N) ***Associate Professor in Mathematics, Bishop Heber College (Autonomous), Thiruchirappalli- 620 017 (T.N) Abstract In this paper a two graded organization is considered in which depletion of manpower occurs due to its policy decisions. Three mathematical models are constructed by assuming the loss of man-hours and the inter-decision times form an order statistics. Mean and variance of time to recruitment are obtained using an univariate recruitment policy based on shock model approach and the analytical results are numerically illustrated by assuming different distributions for the thresholds. The influence of the nodal parameters on the system characteristics is studied and relevant conclusions are presented. Key words : Man power planning, Univariate recruitment policy, Mean and variance of the time for recruitment, Order statistics, Shock model. I. Introduction Exits of personnel which is in other words known as wastage, is an important aspect in the study of manpower planning. Many models have been discussed using different kinds of wastages and also different types of distributions for the loss of manhours, the threshold and the inter-decision times. Such models could be seen in [1] and [2]. Expected time to recruitment in a two graded system is obtained under different conditions for several models in [3],[4],[5],[6],[7],[8] and [9] according as the inter-decision times are independent and identically distributed exponential random variables or exchangeable and constantly correlated exponential random variables. Recently in [10] the author has obtained system characteristic for a single grade man-power system when the inter-decision times form an order statistics. The present paper extend the results of [10] for a two grade manpower system when the loss of man-hours and the inter decision times form an order statistics. The mean and variance of the time to recruitment of the system characteristic are obtained by taking the distribution of loss of man-hours as first order (minimum) and kth order (maximum) statistics respectively. This paper is organized as follows: In sections 2, 3 and 4 models I, II and III are described and analytical expressions for mean and variance of the time to recruitment are derived . Model I, II and III differ from each other in the following sense: While in model-I transfer of personnel between the two grades is permitted, in model-II this transfer is not permitted. In model-III the thresholds for the number of exits in the two grades are combined in order to provide a better allowable loss of manpower in the organization www.ijera.com compared to models I and II. In section 5, the analytical results are numerically illustrated and relevant conclusions are given. II. Model description and analysis for Model-I Consider an organization having two grades in which decisions are taken at random epochs in [0, ) and at every decision making epoch a random number of persons quit the organization. There is an associated loss of man-hour to the organization, if a person quits and it is linear and cumulative. Let Xi be the loss of man-hours due to the ith decision epoch, i=1,2,3…k. Let X i , i  1,2,3...k are independent and identically distributed exponential random variables with density function g(.) and mean 1/c,(c>0). . Let X (1) , X ( 2 ) ,... X ( k ) be the order statistics selected from the sample with respective density X 1 , X 2 ,... X k functions g x (1) (.), g x ( 2 ) (.).... g x ( k ) (.). Let U i , i  1,2,3...k are independent and identically distributed exponential random variables with density function f(.). Let U (1) , U ( 2 ) ,...U ( k ) be the order statistics selected from the sample U 1 , U 2 ,...U k with respective density functions f u (1) (.), f u ( 2 ) (.).... f u ( k ) (.). Let T be a continuous random variable denoting the time for recruitment in the organization with probability density function (distribution function) Let l (.)( L(.)). 578 | P a g e
  • 2. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 l * (.), f * (.), f u*(1) (.) and f u*( k ) (.) transform of be the Laplace l (.), f (.), f u (1) (.)and f u ( k ) (.) respectively. Let YA and YB be independent random variables denoting the threshold levels for the loss of man-hours in grades A and B with parameters αA and αB respectively (αA,αB>0). In this model the threshold Y for the loss of man-hours in the organization is taken as max (YA,YB). The loss of manpower process and the inter-decision time process are statistically III. www.ijera.com independent. The univariate recruitment policy employed in this paper is as follows: Recruitment is done as and when the cumulative loss of man-hours in the organization exceeds Y. Let Vk(t) be the probability that there are exactly k-decision epochs in (0,t]. Since the number of decisions made in (0,t] form a renewal process we note that Vk(t)= Fk(t) Fk+1(t), where F0(t)=1. Let E(T) and V(T) be the mean and variance of time for recruitment respectively. Main results The survival function of T is given by  k P (T  t )  Vk (t ) P ( X i  Y ) k 0 i 1   k 0 0   Vk (t )  p( y  x) g k ( x)dx (1) Case 1: YA and YB follow exponential distribution with parameters αA and αB respectively. In this case it is shown that     p(Y  x)  Vk (t )  e  A x  e  B x  e ( A  B ) x g k ( x) dx k 0 (2) 0 From (1) and (2) we get   * * * P(T  t )   Fk (t )  Fk 1 (t ) g k ( A )  g k ( B )  g k ( A   B )  (3) k 0 Since L(t )  1  P(T  t ) and l (t )  d l (t ) dt (4) from (3) and (4) it is found that   l (t )  [1  g * ( A )] f k (t )( g * ( A )) k 1  [1  g * ( B )] f k (t )( g * ( B )) k 1  k 1 k 1  [1  g * ( A   B )] f k (t )( g * ( A   B )) k 1 (5) k 1 Taking Laplace transform on both sides of (5) it is found that l * ( s)  1  g ( ) f     (s) 1  g * ( B ) f * (s) 1  g * ( A   B ) f * (s)   1  f * (s) g * ( A ) 1  f * (s) g * ( B ) 1  f * (s) g * ( A   B ) * * A (6) The probability density function of rth order statistics is given by f u ( r ) (t )  r kcr [F (t )]r 1 f (t )[1  F (t )]k r , r  1,2,3..k (7) If f(t)=fu(1)(t) then f * (s)  f u*(1) (s) (8) From (7) it is found that f u (1) (t )  k f (t ) 1  f (t ) k 1 Since by hypothesis f (t ) from (9) and (10) we get www.ijera.com   e  t (9) (10) 579 | P a g e
  • 3. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 k k  s f u*(1) ( s)  www.ijera.com (11) It is known that d (l * ( s)) d 2 (l * ( s) , E (T 2 )  and V (T )  E (T 2 )  ( E (T ))2 2 ds s 0 ds s 0 E (T )   (12) Therefore from (6), (11) and (12) we get E (T )  1  E (T 2 )  V1  V2  V3  V 2  Where V1   V22  V32 2 1 2 (13)  (14) 1 1 1 ,V2  and V3  * * * 1  g ( A ) 1  g ( B ) 1  g ( A   B ) (15 ) If f(t)=fu(k)(t) f * (s)  f u*( k ) (s) In this case From (7) it is found that f u ( k ) (t )  F (t ) k 1 f (t ) (16) From(10) , (16) and on simplification we get f u*( k ) ( s )  k!k ( s   )( s  2 )...( s  k ) (17 ) Therefore from (6),(17) and (12) we get k E (T )   1n n 1  V1  V2  V3   k  2  1  n E (T 2 )   n1 2  (18) 2 k V 2 1       V1  V22  V2  V32  V3   1n n 1 2 2 V1  V2  V3  (19) In (18) & (19) V1,V2 and V3 are given by (15). The probability density function of nth order statistics is given by g x( n) ( x)  n kcn [G( x)]n1 g ( x)[1  G( x)]k n , n  1,2,3..k If g(x)=gx(1)(x) then in(13),(14),(18) and (19) (20) g * ( )  g *(1) ( ) for   A ,  B and  A   B x From (20) it is found that g x(1) ( x)  k g ( x) 1  g ( x) k 1 Since by hypothesis g ( x ) from (21) and (22) we get  ce  cx kc ,   A , B and  A   B kc   * * * In (13),(14),(18) and (19) g ( A ), g ( B ) & g ( A   B ) are given by (23) when s=1. g *(1) ( )  x and V (T )  E (T If g(x)=gx(k)(x) then g * 2 (21) (22) (23) )  ( E (T )) 2 ( )  g *( k ) ( ) for   A ,  B and  A   B x www.ijera.com 580 | P a g e
  • 4. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com From (20) it is found that g x( k ) ( x)  G( x) g ( x) k 1 (24) From(22),(24) and on simplification we get g * x(k ) k!c k ( )  for    A , B and  A   B (c   )( 2c   )(3c   ).......( kc   ) In (13),(14),(18) and (19) (25 ) g * ( A ), g * ( B ) & g * ( A   B ) are given by (25) when s=k and V (T )  E (T 2 )  ( E (T )) 2 Case 2: YA and YB follow extended exponential distribution with scale parameters α A and αB respectively and shape parameter 2. In this case it can be shown that If f(t)=fu(1)(t) E (T )  1  E (T 2 )  2V1  2V2  4V3  2V4  2V5  V6  V7  V8  2  2 2V 2 1 (26)  2V22  4V32  2V42  2V52  V62  V72  V82  (27) 1 2 1 ,V5  ,V6  , * * 1  g (2 A   B ) 1  g ( A  2 B ) 1  g (2 A  2 B ) 1 1 V7 and V8  * * 1  g (2 A ) 1  g (2 B ) whereV4  * (28 ) when n=1,in (26)&(27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and (23). when n=k,in (26)&(27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and(25). If f(t)=fu(k)(t) Proceeding as in case(i) it can be found that k E (T )   1n n 1  2V1  2V2  4V3  2V4  2V5  V6  V7  V8   (29)  2 1  k  E (T )  2 2V  2V  4V  2V  2V  V  V  V   1   2 n    n1 2 k  k   1    1 2  2V1  2V2  4V3  2V4  2V5  V6  V7  V8     n n    n1   n1  2 2 2 1 2 2 2 3 2 4 2 5 2 6 2 7 2 8 (30) when n=1,in (26)&(27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and (23). when n=kin (26) (27) V1,V2,V3,V4,V5,V6,V7 and V8 are given by (15),(28) and (25). Case 3: YA follows extended exponential distribution with scale parameters α A and shape parameter 2 and YB follows exponential distribution with parameter αB. If f(t)=fu(1)(t) www.ijera.com 581 | P a g e
  • 5. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com Proceeding as in case 1 it can be shown that E (T )  1  2V1  V2  V4  2V3  V7  2V 2 E (T 2 )  2 1 2  V22  V42  2V32  V72 (31)  (32) when n=1, in (31) & (32) V1,V2,V3,V4 and V7 are given by (15),(28) and (23). when n=k, in (31) & (32) V1,V2,V3,V4 and V7 are given by (15),(28) and (25). If f(t)=fu(k)(t) Proceeding as in case (i) it can be shown that k E (T )   1n n 1 2V  V  2V  V  V  (33) 1 2 3 4 7  2 k 2 2 2 2 2 2 2  1   E (T )  2 2V1  V2  2V3  V4  V7      n1 n  2 k  k  1 1   1 2 2V1  V2  2V3  V4  V7   n  2  n1  n1 n      (34) when n=1, in (33) & (34) V1,V2,V3,V4 and V7 are given by (15),(28) and (23). when n=k, in (33) & (34) V1,V2,V3,V4 and V7 are given by (15),(28) and (25). Case 4: The distributions of YA has SCBZ property with parameters αA,µ1 & µ2, and the distribution of YB has SCBZ property with parameters αB,µ3 & µ4. In this case it can be shown that If f(t)=fu(1)(t) E (T )  1  E (T 2 )   p1V9  p2V10  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  q1V11  q2V12  2  2 p V 2 1 9 2 2 2 2 2 2 2  p2V10  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  q1V11  q2V12 (35)  (36) where 1 1 1 ,V12  * 1  g ( A  1 ) 1  g ( B   3 ) 1  g ( 2 ) 1  g * ( 4 ) 1 1 1 V13 ,V14  ,V15  * * * 1  g ( A   B  1   3 ) 1  g ( A  1   4 ) 1  g ( B  1   3 ) 1 and V16  * 1  g ( 2   4 ) V9  ,V10  * 2 * ,V11  (37) when n=1,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (23). when n=k,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (25). If f(t)=fu(k)(t) Proceeding as in case (i) it can be shown that k E (T )   1n n 1   p1V9  p2V10  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  q1V11  q2V12  www.ijera.com (38) 582 | P a g e
  • 6. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com and   2 2 2 k  k   E (T )  2 p V  p V  p1 p V  p q V  p q V   1   2   1  n    n1 n    n1 2 k  k  1 2 2 2 1   1 2 q1V11  q 2V12  q1q 2V16  2 q1V11  q2V12  q1q2V16      n1 n  n1 n    2 2 2 1 9 2 2 10  2 2 13 2 1 2 14 2 2 1 15  2 k  k  1   1 2  - 2  p1 M 9  p 2 M 10  p1 p 2 M 13  p1q 2 M 14  p 2 q1 M 15     n1 n  n1 n    1 (39) when n=1,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (23). when n=k,in(35)&(36)V9,V10,V11,V12 ,V13,V14,V15 and V16 are given by (37) and (25). IV. Model description and analysis for Model-II For this model Y  min( YA , YB ) . All the other assumptions and notations are as in model-I. Then the values of E (T ) & E (T case 1: If f(t)=fu(1)(t) Proceeding as in case 1 it can be shown that E (T )  1  E (T 2 )  2 ) when r  1and r  k are given by V3  2  2 (40) V  (41) 2 3 when n=1,in (40) & (41) V3 is given by (15) and (23). when n=k,in (40) & (41) V3 is given by (15) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that k E (T )   1n n 1  V3  (42) 2 2 k  k   k 1  2  1   n   1 2 n n V3  E (T 2 )   n1 2  V32   n1  2 n1     (43) when n=1,in (42) & (43) V3 is given by (15) and (23). when n=k,in (42) & (43) V3 is given by (15) and (25). and V (T )  E (T 2 )  ( E (T )) 2 Case 2: If f(t)=fu(1)(t) Proceeding as in case 1 it can be shown that 1 4V3  V6  2V4  2V5  k 2 E (T 2 )  2 2 4V32  V62  2V42  2V52 k  E (T )   (44)  (45) when n=1,in (44) & (45) V3,V4,V5 and V6 are given by (15),(28) and (23). www.ijera.com 583 | P a g e
  • 7. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com when n=k,in (44) & (45) V3,V4,V5 and V6 are given by (15),(28) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that k E (T )   1n n 1  4V3  V6  2V4  2V5  4V  (46) 2  k   V62  2V42  2V52   1   2 n   n1 2 k  k  1  1   4V3  V6  2V4  2V5    n   1 n 2   2   n1  n1  2 E (T 2 )  2 3 (47 ) when n=1,in (46) & (47) V3,V4,V5 and V6 are given by (15),(28) and (23). when n=k,in (46) & (47) V3,V4,V5 and V6 are given by (15),(28) and (25). Case 3: If f(t)=fu(1)(t) Proceeding as in case 1 it can be shown that 1 2V3  V4  k 2 E (T 2 )  2 2 2V32  V42 k  E (T )   (48)  (49) when n=1,in (48) & (49) V3 and V4 are given by (15),(28) and (23). when n=k,in (48) & (49) V3 and V4 are given by (15),(28) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that k E (T )   1n n 1  2V3  V4  2 k  2  2 2  1   1 E (T )  2 2V3  V4     2    n1 n      2 (50) 2 k    k 1  2V3  V4   n    1 2  n  n 1  n1     (51) when n=1,in (50) & (51) V3 and V4 are given by (15),(28) and (23). when n=k,in (50) & (51) V3 and V4 are given by (15),(28) and (25). and V (T )  E (T 2 )  ( E (T )) 2 Case 4: If f(t)=fu(1)(t) Proceeding as in case 1 it can be shown that 1  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  k 2 2 2 2 2 E (T 2 )  2 2 p1 p2 M 13  p1q2 M 14  p2 q1M 15  q1q2 M 16 k  E (T )   (52)  (53) when n=1,in (52) & (53) V13,V14,V15 and V16 are given by (37) and (23). when n=k,in (52) & (53) V13,V14,V15 and V16 are given by (37) and (25). If f(t)=fu(1)(t) www.ijera.com 584 | P a g e
  • 8. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com Proceeding as in case 1 it can be shown that k E (T )   1n n 1   p1 p2V13  p1q2V14  p2 q1V15  q1q2V16  (54) 2 2 k   k 1   k 1  E (T )  2  p1 p2V13  p1q2V14  p2 q1V15  q1q2V16          1 2    n1 n   n1 n  n1 n    1 2 2 2 2 p1 p2V13  p1q2V14  p2 q1V15  q1q2V16 (55) 2 2 2    when n=1,in (54) & (55) V13,V14,V15 and V16 are given by (37) and (23). when n=k,in (54) & (55) V13,V14,V15 and V16 are given by (37) and (25). V. Model description and analysis for Model-III For this model Y  YA  YB . All the other assumptions and notations are as in model-I. Then the values of E (T ) & E (T ) when n  1and n  k are given by case 1: If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that 2 E (T )   B   1   A       V2      V1       A B  B   A  E (T 2 )  (56) 2   A  2   B  2  V2        V1   2   A   B  B     A  (57) when n=1,in (56) & (57) V1 and V2 are given by (15) and (23). when n=k,in (56) & (57) V1 and V2 are given by (15) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that k E (T )   1n  n 1   B   A       V2      V1     B  B   A  A  2 (58) 2 k  k   k 1  2  1      1 2 n    2   B  2   n1 n  n1 n A E (T 2 )   n1 2       V2      V1       2 B  B   A  A    A   B        V2      V1     B  B   A  A  (59) when n=1,in (58) & (59) V1 and V2 are given by (15) and (23). when n=k,in (58) & (59) V1 and V2 are given by (15) and (25). Case 2: If f(t)=fu(1)(t) Proceeding as in case 1 it can be shown that www.ijera.com 585 | P a g e
  • 9. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 E (T )  www.ijera.com   4 A   4 A    1   4 B   4 B     V1                 2    V2   k    A  2 B    A   B   B   A B       A       A   2 A    1   2 B    B     V7                   2  V8  k   2 A   B    A   B   B   A B        A    (60) 2   4 B   4 B   2   4 A   4 A   2    V1                 2    V2   k 2 2    A  2 B    A   B   B   A B       A    2   2 B    B   2    A   2 A   2    V7       (61)             2  V8  k 2 2   2 A   B    A   B   B   A B       A    E (T 2 )  when n=1,in (60) & (61) V1,V2,V7 and V8 are given by (15),(28) and (23). when n=k,in (60) & (61) V1,V2,V7 and V8 are given by (15),(28) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that k E (T )   1n   4 B       2   A B  n 1    4 B      B   A   4 A   V1        B   A   4 A    2   B   A    V2         B      B   A   A   V7        B   A   2 A      2 B   A    V8      k  1n   n 1  2 B     2     A B  (62) 2  k  2  1  n   4 B E (T 2 )   n1 2        2    A B    4 B      B   A   2   4 A  V1        B   A   4 A    2   B   A  2   V2       2  k  2  1   n1 n    2 B    2   2 A   B   2   A  V7        B   A   2 A      2 B   A  2   V8         4 B      B   A   4 A   V1        B   A   4 A    2   B   A    V2         B      B   A   A   V7        B   A   2 A      2 B   A    V8  (63)       B      B   A 2 k  k 1   n   1 2  n1  n1 n   4 B    2     A  2 B 2 k  k 1   n   1 2  n1  n1 n   2 B    2    2 A   B when n=1,in (62) & (63) V1,V2,V7 and V8 are given by (15),(28) and (23). when n=k,in (62) & (63) V1,V2,V7 and V8 are given by (15),(28) and (25). Case 3: If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that www.ijera.com 586 | P a g e
  • 10. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 E (T )  1   B  k  2 A   B  E (T 2 )    2 B V7       B   A 2   2 A   k 2 2    A   B     2 A  V1        B   A   2 A    2   B   A   2 A    2   B   A  2   B  V2     2   B   A www.ijera.com    V2       2  2 B V7       B   A (64 )  2 V1      (65 ) when n=1,in (64) & (65) V1,V2,V7 and V8 are given by (15),(28) and (23). when n=k,in (64) & (65) V1,V2,V7 and V8 are given by (15),(28) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that k E (T )   1n   n 1  2 A        A B    2 A    2   B   A   B  V2     2   B   A   2 B M 7       B   A   V1      (66) and 2  2  2 B  2  k 1  2   2 A   2 A   2   B   V2   E (T )  2    2   V7      V1   n          A   B   2 A   B   B  B   n1      A  A    2 k  k   B   2 B   1   2 A   2 A   1    1 2 (67)   V2   V7   V1        2         n  n1 n  2    A   B   2 A   B   B  B    n 1     A  A     2 when n=1,in (66) & (67) V1,V2,V7 and V8 are given by (15),(28) and (23). when n=k,in (66) & (67) V1,V2,V7 and V8 are given by (15),(28) and (25). Case 4: If f(t)=fu(1)(t) Proceeding as in case 1 it can be shown that E (T )    p1q2  A  1  q1q2  2   q1 p2  2  1  p1 p2  A  1                   V10            V12   k  A B 1 3 2 B 3  1 4 2 4   A   p q    3  q1q2  4   p1q2  4  1  p1 p2  B   3  V9   2 1 B             V11   k   A   B  1   3  A  1   4  3 B 2 4     2  and E (T 2 )   (68) q1 p2  2  2  p1q2  A  1  q1q2  2  2  2  p1 p2  A  1   V10    2            V12   k    A   B  1   3  2   B   3  1 4 2 4   A   2 p1q2  4  2  p2 q1  B   3  q1q2  4  2  2  p1 p2  B   3   V9    2            V11   k    A   B  1   3  A  1   4  3 B 2 4    2  2 (69) when n=1,in (68) & (69) V9,V10,V11 and V12 are given by (28) and (23). when n=k,in (68) & (69) V9,V10,V11 and V12 are given by (28) and (25). If f(t)=fu(k)(t) Proceeding as in case 1 it can be shown that www.ijera.com 587 | P a g e
  • 11. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com k E (T )   1n  n 1   p1q2  A  1  q1q2  2   p1 p2  A  1  q1 p2  2                   V10            V12   B 1 3 2 B 3  1 4 2 4   A  A  k   1n  n 1   p q   3  q1q2  4   p1 p2  B  3  p1q2  4  V9   2 1 B                          V11   A B 1 3 A 1 4  3 B 2 4   2   (70) and 2  k  2  1  n  p p     q1 p2  2  2  p1q 2  A  1  q1q 2  2  2  1 2 A 1 V10   E (T 2 )   n 1 2              V12           2   B  3   B 1 3 1 4 2 4   A  A    2  k  2 1 / n   p p    3  p1q 2  4  2  p 2 q1  B   3  q1q 2  4  2    n1 2   1 2 B               V9            V11       B 1 3 A 1 4  3 B 2 4   2  A  2 k  k    1    1 2     n1 n  n1 n   p p      p q   1  q1q2  2   q1 p2  2     1 2 A 1 V10   1 2 A   2           V12     1 4 2 4   A   A   B  1   3  2   B   3    2 k  k   1    1 2     n1 n  n1 n   p p     p1q2  4     1 2 B 3 V9       2   A   B  1   3  A  1   4   2 k  k   1    n   1n 2     n1  n1   p q     q q       2 1 B 3  1 2 4 V11  (71)  2     2   3   B  2   4   when n=1,in (70) & (71) V9,V10,V11 and V12 are given by (28) and (23). when n=k,in (70) & (71) V9,V10,V11 and V12 are given by (28) and (25). and V (T )  E (T 2 )  ( E (T )) 2 VI. Numerical illustration The influence of nodal parameters on the performance measures namely mean and variance of the time to recruitment is studied numerically. In the following tables these performance measures are calculated by varying the parameter ‘ρ’ at a time and keeping the other parameters fixed as αA=0.1, αB=0.3,λ=0.5, µ1=0.4, µ2=0.8, µ3=0.6 , µ4=0.7 . www.ijera.com 588 | P a g e
  • 12. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com Table 1: Effect of ‘c’ and ‘k’ on E(T) for Model-I 1 1.5 2 1 1 1 k 3 3 3 4 5 6 n=1 22.3333 33.1667 44 22.1667 22.0667 22 n=k 4.4089 6.3780 8.3474 2.9331 2.1549 1.6829 n=1 122.8333 182.41 242 184.7222 251.9278 323.4 n=k 24.4290 35.0788 45.9108 24.4423 24.6020 24.7386 n=1 31.8810 47.4881 63.0952 31.7143 31.6143 31.5476 n=k 6.1437 8.9813 11.8190 4.0777 2.9902 2.3315 n=1 175.3452 261.1845 347.0238 264.2857 360.9298 463.75 n=k 33.7902 49.3971 65.0042 33.9811 34.1387 34.2731 n=1 31.3333 46.6667 62 31.1667 31.0667 31 n=k 6.0442 8.8319 11.6198 4.0121 2.9423 2.2943 n=1 172.3333 256.6667 341 259.7222 354.6778 455.7000 n=k 33.2429 48.5754 63.9090 33.4338 33.5915 33.7262 n=1 6.4309 9.3130 12.1951 6.2642 6.1642 6.0976 n=k 1.5244 2.0444 2.5668 1.0312 0.7680 0.6066 n=1 35.3700 51.2216 67.0733 52.2020 70.3751 89.6343 n=k Case 1 c 8.3840 11.2440 14.1171 8.5932 8.7677 8.9171 r=1 E(T) Case 3 Case 2 r=k r=1 E(T) r=k r=1 E(T) r=k Case 4 r=1 E(T) r=k www.ijera.com 589 | P a g e
  • 13. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com Table 2: Effect of ‘c’ and ‘k’ on E(T) for Model-II 1 1.5 2 1 1 1 k 3 3 3 4 5 6 n=1 5.6667 8.1667 10.6667 5.5 5.4 5.3333 n=k 1.4041 1.8505 2.3001 0.9569 0.7170 0.5693 n=1 31.1667 44.9167 58.6667 45.8333 61.65 78.40 n=k 7.7227 10.1776 12.6536 7.9739 8.1853 8.3682 n=1 9.4524 13.8452 18.2381 9.2857 9.1857 9.1190 n=k 2.0694 2.8662 3.6641 1.3897 1.0288 0.8086 n=1 51.9881 76.1488 100.3095 77.3810 104.8702 134.05 n=k 11.3820 15.7642 20.1528 11.5808 11.7454 11.8864 n=1 6.6667 9.6667 12.6667 6.5 6.4 6.3333 n=k 1.5819 2.1190 2.6610 1.0715 0.9996 0.6327 n=1 36.6667 53.1667 69.6667 54.1667 73.0667 93.1 n=k 8.6910 11.6546 14.6355 8.9291 9.1287 9.3012 n=1 2.5770 3.5322 4.4874 2.4104 2.3104 2.2437 n=k 0.8733 1.0311 1.1957 0.6149 0.4728 0.3834 n=1 14.1737 19.4272 24.6807 20.0864 26.3767 32.9824 n=k Case 1 c 4.8031 5.6710 6.5765 5.1244 5.3976 5.6365 r=1 E(T) Case 3 Case 2 r=k r=1 E(T) r=1 r=1 E(T) r=k Case 4 r=1 E(T) r=k www.ijera.com 590 | P a g e
  • 14. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com Table 3: Effect of ‘c’ and ‘k’ on E(T) for Model-III Findings From the above tables it is found that 1. When the probability density function of inter decision time is same as the probability density function of first order statistics, as ‘k’ increases the mean time to recruitment decreases for the first and kth order statistics for the loss of manhours but it is increases when the probability density function of inter decision time is same as the kth order statistics. 2. When the probability density function of inter decision time is same as the probability density function of first order statistics or the kth order statistics, as ‘c’ increases the mean time to recruitment increases for the first and kth order statistics for the loss of manhours . Conclusion Since the time to recruitment is more elongated in model-III than the first two models, model-III is preferable from the organization point of view. References: [1] [2] [3] [4] Barthlomew.D.J, and Forbes.A.F, Statitical techniques for man power planning, JohnWiley&Sons,(1979). Grinold.R.C, and Marshall.K.J,Man Power Planning, NorthHolland,Newyork (1977). Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time torecruitment in a two grade manpower system based on order statistics, International Journal of Mathematical Sciences and Engineering Applications 6(5) (2012):23-30. Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time to recruitment in a two grade manpower system involving exdended exponential threshold based on order statistics, Bessel Journal of Mathematics3(1) (2013):39-49. www.ijera.com 591 | P a g e
  • 15. K.PARAMESWARI et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.578-592 www.ijera.com [5] Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time to recruitment in a two grade manpower system involving exdended exponential and exponential threshold based on order statistics, Archimedes Journal of Mathematics3(1) (2013):41-50 [6] Sridharan.J, Parameswari.K and Srinivasan.A, A stochastic model on time to recruitment in a two grade manpower system based on order statistics when the threshold distribution having SCBZ property, Cayley Journal of Mathematics 1(2) (2012 ): 101-112. [7] Parameswari.K , Sridharan.J, and Srinivasan.A, Time to recruitment in a two grade manpower system based on order statistics , Antartica Journal of Mathematics 10(2) (2013 ):169-181. [8] Srinivasan.A, and Kasturri.K, Expected time for recruitment in a two graded manpower system with geometric threshold and correlated inter-decision times,Acta Ciencia Indica 34(3) (2008): 1359-1364. [9] Srinivasan.A, and Vidhya.S, A stochastic model for the expected time to recruitment in a two grade manpower system having correlated inter-decision times and constant combined thresholds, Applied mathematical sciences 4(54) (2010):2653-2661. [10] Muthaiyan.A, A study on stochastic models in manpower planning , Ph.D thesis, Bharathidasan university (2010). www.ijera.com 592 | P a g e