SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 8 (April 2013), PP. 71-80

  Performance Evaluation of a Queueing Model with Two
   Component Mixture of Doubly Truncated Exponential
                     Service Times
                         K.SrinivasRao1,G.Ramesh2, M.Seshashayee3
                             1
                              Dept of Statistics, Andhra University,Visakhapatnam
                                 2
                                  Dept of BSH,MVGRCollege,Vizianagaram
                               3
                                Dept of CS, GITAM University,Visakhapatnam


    Abstract:-In this paper, we introduce and analyze a new queueing model with the assumption that the
    service time of the customer follows a two component mixture of doubly truncated exponential
    distribution. The doubly truncated two component mixture distribution is capable of characterizing the
    heterogeneous and finite range nature of the service time. This service time distributions also includes
    two component mixture of exponential service time, doubly truncated exponential time and
    exponential service time queuing models as limiting/particularcases. Assuming the arrival process
    follows a Poison process and using the embedded markov chain technique the system behaviour is
    analyzed. Explicit expressions for the system performance like average number of customers in the
    system and in the queue, average waiting time of a customer in the queue, the throughput of the service
    station, the probability of the idleness of the service etc,. are derived. Through numerical illustration,
    the sensitivity of the model performance measures with respect to the changes in the model parameter
    is also studied.

    Keywords:-Queueing,Truncated,Exponential Service times,Poisson Model


                                            I. INTRODUCTION
          Queueing models create lot of interest due to their ready applicability in wide varity of situations
prevailing at places like, transportation, communication networks, production processes, reliability analysis,
computer performance evaluations studies, etc,.(Boxima O.J.,(1988), Bunday.B.D.(1996)).A queue is a waiting
line of units demanding service at a service facility (Andreas Brandt,2008). Congestion is a natural phenomenon
in everyday life. Queueing is a mechanism that is used to handle congestion. A system consisting of service
facility process of a service and a process of arrival of customer is called a queueingsystem(Burke. P.J. (1975)).
In queueing models it is customary to assume that the arrival and service processes follow Poisson processes
such that the inter arrival times and the inter service times follow exponential
distributions.(Haviv.M(2007),Guy.L.Curry(2008),K.Srinivasa Raoet.al,2008). This assumption of inter-service
times being follow an exponential distribution is valid only when the service time required by a customer is
having infinite range and long upper tail. (Hiroyuki Masuyama, Tetsuya Takine (2003)).However, in many
practical situations arising at places like communication systems the service time required by the customer is
finite. Hence, to have an approximate model for this sort of situations, the service time of the customer is to be
approximated with truncated distributions. (Altiok,T.(1982), Patrick,M.,(1999), Guodong Pan (2010)). Very
little work has been reported regarding queueing models with truncated service time distribution. Hence in this
paper, in order to have efficient congestion control we developed and analyzed a queueing model with the
assumption that the service time required by the packet follows a two component mixture of a doubly truncated
exponential distribution. Some practical situations at places, like telecommunications, the service time required
by the packet may not be homogeneous. Theheterogeneity of service times can be modeled by considering two
component mixture of distribution.Here, it is assumed that the arrival of packets follows a Poisson process.
Using the imbedded Markovchain technique, the probability generating function of the number of packets in the
system is derived. The system characteristics like, the probability of emptiness of the system, the mean number
of packets in the queue,theLaplace transformation of the waiting time distribution of a packet, the average
waiting time of apacket, the variance of the number of packet in the queue, the variance of the waiting time of a
packetetc,. are obtained. The sensitivity of the model with respect to the parameters is also studied. This model
also includes some of the earlier models as particular casesfor specific or limiting values of the parameters.


                                                       71
Performance Evaluation of a Queueing Model with Two Component Mixture of …

                       II.POISSON QUEUEING MODEL WITH TWO COMPONENT MIXTURE OF
                                                       DOUBLY TRUNCATED EXPONENTIAL SERVICE TIMES
         Weconsider a single server Poisson Queueing system in which the arrival of packets follows a Poisson
process with parameter λ.It is also assumed that theinter-service times follow a two component mixture of
doubly truncated exponential distribution with parameters µ1 , µ2, p, a and b and having differences. This
assumption is made since the service time required for completing any activity is finite and is bound by finite
values of a and b.
The probability density function of the inter service times is,
        p 1    t  (1  p) 2    t ;𝑎 < 𝑡 < 𝑏(1)
b(t) =         e 
         e- 1a -e- 1b           e       1
                                                        e- 2 a -e- 2 b 
                                                                                    2

                                                                       
The mean service time is,
     p 1  a1  e  a  1  b1  e   b 
       
                                        1
                                               
                                                                        1

E (T ) 
                           1 (e- 1a -e- 1b )
                   (1  p) 1  a2  e 2a  1  b2  e 2b  (2)
                                                                 
               
                          2 (e- 2a -e- 2b )
                 Following the heauristic argument given by Gross and Harris (1974) the steady state behavior of the
model is studied. The imbedded stochastic process𝑋(𝑡 𝑖 ), where, X denotes the number in the system and
 𝑡1, 𝑡2, 𝑡3, . .,are the successive times of completion of service.
                           Since,𝑡 𝑖 is the completion time of the 𝑖th packet, then X(𝑡 𝑖 ) is the number of packets the 𝑖th
packet leaves behind as he departs. Since, the state space is discrete, 𝑋 𝑖 represents the number of packets
remaining in the system as the 𝑖thpacket departs. Then forall n>0 one can have
                  𝑋 𝑛 − 1 + 𝐴 𝑛+1 ;             𝑋𝑛 ≥ 1
  𝑋 𝑛+1 =                                              (3)
                  𝐴 𝑛+1                       ; 𝑋𝑛 = 0
                 where,𝑋 𝑛 is the number in the system at the nth departure point and 𝐴 𝑛+1 is the number of packets who
arrived during the service time,𝑆 (𝑛+1) , of the (n+1)st packet.
                 The random variable 𝑆 (𝑛+1) by assumption is independent of previous service times and the length of
the queue. Since arrivals are Poissonian, the random variable 𝐴 𝑛+1 depends only on S and not on the queue are
on the time of service initiation. Then
                t            

Pr  A  a   e (t )
                        j i 1

                                
                                dB(t ) , ( j  i  1, i 1)
                             0 ( j  i  1)!
                            
                            0                         (4)                         , ( j  i  1, i 1)
            Let𝑝 𝑖𝑗 denote the probability that the system size immediately after a departure point is j given that the
system size after previous departure was 𝑖. 𝑘 𝑛 is the probability that there are n arrivals during a service time
t.Then
 𝑝 𝑖𝑗 = 𝑃𝑟 {System size immediately after a departure point is j| system size after previousDeparturewas }
 =𝑃𝑟 {𝑋 𝑛+1 =𝑗|𝑋 𝑛 =𝑖}
where,
       b
           t ( t ) 
                     n
                        p1         (1  p) 2   t  ( 5)
           
                                t
pij  e                                        e                      1
                                                                                                    e   2
                                                                                                              dt
           a
                         n !  e  1a  e  1b                                e  2 a  e  2b           
This implies that 𝑝 𝑖𝑗 is equals to𝑘 𝑗 −𝑖+1 and
P   pij 
Assuming that the system is in steady state, and 𝑝 𝑖𝑗 = 𝜋 𝑗
Then,
                         i 1
 pi   0 ki    j ki  j 1                                                   i  0,1, 2,...             (6)
                         j 1

where, 𝜋 𝑗 is the probability that there arejpackets in the system at a departure point after steady state is reached.
                                                  

                                i
                   Let P( z )   z i
                                                 i 0
                                                                        𝑧 ≤1                                  (7)

                   
K ( z )   ki z i are the generating functions of                                                             n and k n respectively
               i 0

Hence,                      
                                                        t                                                            (8)
                                    b                           n
                                                                              p                  (1  p) 2
               K ( z)      e
                           n 0     a
                                                 t

                                                         n!
                                                                    z n   1a 1  1b e  1t   2 a  2b e  2t  dt
                                                                         e e                   e      e             
After simplification, we get

                                                                                                                        72
Performance Evaluation of a Queueing Model with Two Component Mixture of …

                               p 1                        e  (1 z )   a  e  (1 z )   b 
                                                                                       1                                         1

K ( z)                   1a              1b                                                       
                     e            e                                 1  (1  z )                    


                             (1  p )  2  e 
                                               (1 z )   a
                                                                e 
                                                                    (1 z )   b
                                                                                                2                                            2

                               2 a                   2 b                                                                                                               9
                           e               e                                              2  (1  z )                                        
                   p (1  a1 )e   a  (1  b1 )e   b 
                                                            
                                                                         1                                                   1

K '(1) 
                                                  1 (e  a  e  b )
                                                                     1                      1



                           1  p  (1  a2 )e   a  (1  b2 )e   b  (10)
                                                                           
                                                                                                 2                                                    2

                                                                                  2 a                     2b
                                                                 2 (e                          e                  )

           p (1  a1 )e 1a  (1  b1 )e 1b   (1  p) (1  a2 )e 2a  (1  b2 )e  2b  
P( z )  1                                                                                      
                     1 (e 1a  e 1b )                          2 (e   2 a  e   2 b )        
                                                                                                       

                  p  e[ (1 z ) 1 ]a  e[  (1 z ) 1 ]b  (1  p) 2  e[  (1 z ) 2 ]a  e[  (1 z ) 2 ]b  
        (1  z )   1a 1  1b 
                  e e                                               2 a  2b                                          
                                 1   (1  z )                  e e                   2   (1  z )                  

                                                                                                                                                                           1
          p1  e[ (1 z ) 1 ]a  e[  (1 z ) 1 ]b  (1  p) 2  e[  (1 z ) 2 ]a  e[  (1 z ) 2 ]b   
                                                                                                                               
           1a  1b 
                                                               2 a  2b                                             z  (11)
                                                                                                                          
         e e 
                           1   (1  z )                   e e                   2   (1  z )                       




                                                                                                                 III.SYSTEM CHARACTERISTICS
         The performance measures of the model are developed by Expanding the above equation (11) and
collecting the constant terms we get the

Probability that the system size is emptyas


                    p (1  a1 )e 1a  (1  b1 )e 1b 
                                                           
P0 = 1 
                                                   1 (e 1a  e 1b )
                 (1  p) (1  a2 )e 2a  (1  b2 )e 2b  (12)
                                                              
         
                                                           2 (e   2 a  e   2 b )


The average number of packets in system can be obtained as,

         (1  a1 )e   a  (1  b1 )e   b 
           
                                    1

                                                  
                                                                 1
                                                                                    ( a 1  2a 1  2)e
                                                                                     
                                                                                       2         2      2                             1 a
                                                                                                                                               (b 1  2b1  2)e
                                                                                                                                                  2        2                         1b
                                                                                                                                                                                             
                                                                                                                                                                                            
L P                                                                                                                                                                                          
                                                                                 2 1  1 (e                  e )   (1  a1 )e                                                          
                                  1 a       1b                                                    1 a       1b                                     1 a                      1b
                        1 (e            e )                                                                                                                    (1  b1 )e             


                   (1  a 2 )e   a  (1  b 2 )e   b 
                     
                                                   2

                                                              
                                                                                   2
                                                                                                       ( a  2  2a 2  2)e
                                                                                                       
                                                                                                        2       2        2                         2 a
                                                                                                                                                                (b  2  2b 2  2)e
                                                                                                                                                                     2    2                          2b
                                                                                                                                                                                                             
                                                                                                                                                                                                             (13)
      (1  P )                                                                                                                                                                                               
                                                                                                2  2   2 (e                e )   (1  a  2 )e                                                        
                                                  2 a       2b                                                   2 a        2 b                                   2 a                       2 b
                                        2 (e            e )                                                                                                                   (1  b 2 )e              

The average number of packets in the system is,
         2 (a 2  2  2a  2)e 1a  (b2  2  2b  2)e 1b                                                                                                  
              1                                                                                                                                                   
Lq  P 
                                 1                   1          1
                                                                                                                                                                     
        21  1 (e 1a  e 1b )   (1  a1 )e 1a  (1  b1 )e 1b  
                                                                                                                                                                 
                                                                                                                                                                    


                     2 (a 2  2  2a  2)e 2a  (b 2  2  2b  2)e 2b  
                                                                                (14)
          (1  P) 
                                 2         2                2       2
                                                                                     
                    22  2 (e  e )   (1  a2 )e  (1  b2 )e   
                                 2 a  2b                 2 a           2b
                                                                                




                                                                                                                                                                                                73
Performance Evaluation of a Queueing Model with Two Component Mixture of …

The variance of the number of packets in the system is,
              
              
                   (1  a1 )e 1a  (1  b1 )e  1b   1 (e  1a  e  1b ) -  (1  a1 )e  1a  (1  b1 )e  1b   
                   
Var ( N )  P                                                                                                                   
                                                                                                                                      
                           1 (e 1a  e 1b )                                       1 (e 1a  e 1b )                      
                                                                                                                                   
              
              
                         2  a 2  2  2a  2  e 1a   b 2  2  2b  2  e  1b   
                                                                                           
                      + 
                                       1        1                    1       1
                                                                                                
                        21  1 (e  e ) -  (1  a1 )e  (1  b1 )e   
                                       1a   1b                    1a             1b
                                                                                          


            3 (e 1a  e 1b )  2 (1  a )e 1a  (1  b )e  1b   2  a 2  2  2a  2  e 1a   b 2  2  2b  2  e  1b         
            1                                   1               1                    1          1                    1          1                  
                                                                                                                                                          
                                   1 (e 1a  e 1b )                      21  1 (e 1a  e 1b ) -  (1  a1 )e 1a  (1  b1 )e  1b     
                                                                                                                                                      



              
                                                                                            
                3 3  a 2 12  21a  2)e 1a  (b 2 12  21b  2)e  1b   13  3 (a 3e  1a  b3e  1b ) 
                                                                                                                               
                                                                                                                                   
                                                                                                                                    
                                 312  1 (e 1a  e 1b ) -  (1  a1 )e 1a  (1  b1 )e  1b  
                                                                                                                                
                                                                                                                                   
                                                                                                                                     
                                                                                                                                     
                        
                        
                           (1  a2 )e 2  (1  b2 )e 2   2 (e 2  e 2 )- (1  a2 )e 2  (1  b2 )e 2   
                                             a                     b         a    b                        a    b
                                                                                                                              
               (1  P)                                                                   
                                                                                                                                 
                                     2 (e   2 a  e   2b )                            2 (e   2 a  e   2b )       
                                                                                                                             
                        
                        

                               a 2  2a2  2  e   b 2  2b2  2  e  
                             2 2 2                                 2 a    2 2                2b        
                           +                                                                       
                                                                                                            
                             2    2 (e 2a  e 2b ) -  (1  a2 )e 2a  (1  b2 )e 2b   
                             2                                                                    


                                                                             a 2  2a2  2  e   b 2  2b2  2  e  
         3 (e 2a  e 2b )  2 (1  a )e 2a  (1  b )e  2b       2
                                                                                   2 2                         2 a   2 2                    2b
                                                                                                                                                     
         2                                        2          2
                                                                                                                                                      
                                 2 (e   2 a  e   2b )                2 2  2 (e 2a  e 2b ) -  (1  a2 )e 2a  (1  b2 )e 2b   
                                                                                                                                                   


              3 3  a 2  2  2 a  2)e  2a  (b 2  2  2 b  2)e 2b    3   3 (a 3e 2a  b3e  2b )   
                                                                                                                      
                                                                               
                                                                                                                       
                           2        2                       2       2                    2
                                                                                                                         
                              32 2  2 (e 2a  e 2b ) -  (1  a2 )e 2a  (1  b2 )e  2b  
                                                                                                                                            (15)
                                                                                                                      
                                                                                                                         
                                                                                                                         




                                                            IV. WAITING TIME DISTRIBUTION OF THE MODEL

           We derive the waiting time distribution of the single server Poisson arrival queueingmodel with two
component mixture ofdoublytruncated exponential service times. Consider the queueing discipline of the system
as first in first out.
           Let 𝐵 ∗ (𝑠) be theLaplace transformation of the inter-service time distribution and 𝑊 ∗ (𝑠) be the
Laplace transform of the waiting time distribution. Then we have
            p
                                             e  ( s   1 ) a  e  ( s  1 ) b   
B* ( s )                                                                          
                                                                                         
                 1

            1  s                                   e  1a  e  1b               
                                                                                     
                     (1  p ) 
                                                      e  ( s   2 ) a  e  ( s  2 ) b                             (16)
                                                                                           
                                                                                                  
                                 2

                     2  s                                   e  2 a  e  2b              
                                                                                              
The Laplace transformation of waiting time distributionis
                  [1  K '(1)](1  z ) B*[ (1  z )]
W *[ (1  z )] 
                         B*[ (1  z )]  z           (17)
                                                                                                                              
writing  (1  z )   , we get                                                                        z  1
                                                                                                                              
Therefore,
           [1  K '(1)] B* ( )
W * ( )                                                                                           (18)
              [1  B* ( )]
             [1  K '(1)]s
W *q ( s ) 
          s  [1  B* ( s )] (19)
where, B * ( s ) is the Laplace transformation of the service time distribution and K '(1)
is as given in equation (10).




                                                                                                                                              74
Performance Evaluation of a Queueing Model with Two Component Mixture of …




The mean waiting time of the packet in queue is,
         (a 2  2  2 a  2)e 1a  (b 2  2  2 b  2)e  1b                                               
                                                                                                                            (20)
Wq  p 
                      1        1                     1         1
                                                                                                                    
        21  1 (e        e 1b )   (1  a1 )e 1a  (1  b1 )e 1b  
                      1a
                                                                                                               
                                                                                                                    


                      (a 2  2  2 a  2)e  2 a  (b 2  2  2 b  2)e  2b                                       
                                                                                                                        
           (1  p) 
                                   2        2                      2          2
                                                                                                                           
                     22  2 (e         e 2b )   (1  a2 )e  2a  (1  b2 )e 2b  
                                   2 a
                                                                                                                      
                                                                                                                           



The variance of the waiting time of a packetin the queue is,
                       (1  a1 )e  1a  (1  b1 )e  1b  
                                                               
V (Tq )  p          4 1-
             12                1 (e 1a  e 1b )             
                                                                 
                         3(a 2 12  21a  2)e  1a  (b 2 12  21b  2)e  1b   3 (a 3e  1a  b3e  1b ) 
                                                                                                                    
                                                          13 (e 1a  e 1b )                                    
                          (a 2 12  21a  2)e  1a  (b 2 12  2 1b  2)e  1b  
                                                                                       2
                                                                                         
                     3                                                              
                                           12 (e 1a  e 1b )                     
                                                                                                        
                                                                                                   2

                          1 (e 1a  e 1b )   (1  a1 )e  1a  (1  b1 )e  1b  
                                                                                                    
                                                 1 (e 1a  e 1b )                                
                                                                                                      
                                                                                                        


                          (1  a2 )e  2a  (1  b2 )e  2b  
                                                                  
      (1  p)          4 1-
                12                 2 (e   2 a  e   2b )       
                                                                    
                           3(a 2 2 2  22 a  2)e  2a  (b 2 2 2  22b  2)e  2b   3 (a 3e  2a  b3e  2b ) 
                                                                                                                         
                                                                      2 3 (e   2 a  e  2 b )                       
                                                                                          2b 2 
                     (a 2  22 a  2)e  (b 2  2 2b  2)e  
                        2  2                    2 a       2     2
                3                                                                             
                                        2 2 (e   2 a  e   2b )                             
                                                                                                            
                                                                                                     2

                        2 (e 2a  e  2b )    2(1  a 2 )e  2a  (1  b2 )e  2b  
                                                                                                                   (21)
                                                  2 (e  2 a  e  2b )                                
                                                                                                          
                                                                                                            


The waiting time of apacket in the system is,

         (a 2  2  2 a  2)e  1a  (b 2  2  2 b  2)e  1b                 
                                                                                    
Ws  p 
                      1        1                     1          1
                                                                                       
        21  1 (e        e 1b )   (1  a1 )e  1a  (1  b1 )e  1b  
                      1a
                                                                                  
                                                                                       

                        (a 2  2  2 a  2)e  2a  (b 2  2  2 b  2)e  2b                           
                                                                                                             
             (1  p) 
                                     2        2                      2          2
                                                                                                                
                       22  2 (e         e 2b )   (1  a2 )e  2a  (1  b2 )e 2b  
                                     2 a
                                                                                                           
                                                                                                                


                     p (1  a1 )e  1a  (1  b1 )e  1b  (1  p) (1  a 2 )e  2a  (1  b2 )e  2b  
                    
                                                                                                             (22)
                                                                                                                   
                              1 (e 1a  e 1b )                           2 (e  2 a  e  2b )            
                                                                                                                  




                                                                                    V.NUMERICALILLUSTRATION

         The performance of the queueing model is discussed through a numerical illustration. Different values
of the parameter are considered for arrival rate  and service time parametersµ1 , µ2, p, a and b.For given values
of  = 1,2,3,4,5;µ1 = 5,7,9,11, µ2 = 7,8,9,10, p = 0.1,0.2,0.3,0.4, a = 0.1,0.2,0.3,0.4 and b = 0.1, 0.2, 0.3, 0.4,the
probability that the system is empty and the probability that the server is busy are computed and presented in
table 1.The relationship between the parameters and the probability of the idealness are shown in figure 1.
         From table 1 it is observed that the probability of emptiness is highly influenced by the model
parameters. As the mean arrival rate varies from 1 to 5. The probability of emptiness in the system is
decreasing from 0.858 to 0.289 when other parameter are fixed at µ1 = 10,µ2 = 8, p = 0.8, a = 0.1 and b = 0.2.




                                                                                                                               75
Performance Evaluation of a Queueing Model with Two Component Mixture of …



              Table 1: VALUES OF Po AND 1-PoFORDIFFERENT VALUESOF, µ, a AND b




                                               Figure 1:Relationship between probability of Emptinessand
                                               input parameters

We have observed that when the service time parameter µ1 increases from 5 to 11 the probability of emptiness is
increasing from 0.564 to 0.576, for fixed values of  = 3, a = 0.1,b = 0.2, p = 0.8 andµ2 = 8.
         When the service time parameter µ2 increases from 7 to 10 the probability of emptiness is increasing
from 0.408 to 0.422, for fixed values of  = 3, a = 0.1, b = 0.5, p = 0.8 and µ1 =10.
         As the truncation parameter of the service time distribution „ a ‟ increases from 0.1 to 0.4 the
probability of emptiness is increases from 0.1 to 0.4 and the probability of emptiness is increasing from 0.804 to
0.558 for fixed values of the other parameters.
         As the truncation parameter of the service time distribution „b‟increases from 0.1 to 0.4 the probability
of emptiness is increasing from 0.1 to 0.4 and the probability of emptiness is increasing from 0.800 to 0.530 for
given values of the other parameters.
         As the truncation parameter of the service time distribution „p ‟increases from 0.1 to 0.4 the probability
of emptiness is increasing from 0.1 to 0.4 and the probability of emptiness is increasing from 0.381 to 0.395 for
given values of the other parameters.


                                                        76
Performance Evaluation of a Queueing Model with Two Component Mixture of …

         For different values of the parameters the average number of packets in the system, the average number
of packets in the queue and the variance of the number of packets in the system are computed and presented in
table2. The relationship between the parameters and the performance measures is shown in figure 2.

Table 2: VALUES OF L ANDLqANDVar (N)

a     b      p     λ   µ1   µ2   L       Lq      Var(N)

0.1   0.2    0.8   1   10   8    0.154   0.012   0.159

0.1   0.2    0.8   2   10   8    0.343   0.059   0.387

0.1   0.2    0.8   3   10   8    0.592   0.165   0.783

0.1   0.2    0.8   4   10   8    0.958   0.389   1.618

0.1   0.2    0.8   5   10   8    1.618   0.907   3.906

0.1   0.2    0.8   3   5    8    0.611   0.175   0.985

0.1   0.2    0.8   3   7    8    0.603   0.171   0.872

0.1   0.2    0.8   3   9    8    0.591   0.165   0.783

0.1   0.2    0.8   3   11   8    0.587   0.163   0.762

0.1   0.5    0.8   1   10   8    0.224   0.028   0.239

0.2   0.5    0.8   1   10   8    0.348   0.061   0.369

0.3   0.5    0.8   1   10   8    0.481   0.111   0.514

0.4   0.5    0.8   1   10   8    0.618   0.176   0.671

0.6   0.1    0.8   1   10   8    0.231   0.031   0.248

0.6   0.2    0.8   1   10   8    0.363   0.067   0.387

0.6   0.3    0.8   1   10   8    0.512   0.126   0.552

0.6   0.4    0.8   1   10   8    0.681   0.211   0.749

0.1   0.5    0.1   3   10   8    1.224   0.605   2.209

0.1   0.5    0.2   3   10   8    1.205   0.590   2.146

0.1   0.5    0.3   3   10   8    1.185   0.575   2.082

0.1   0.5    0.4   3   10   8    1.165   0.560   2.019
                                                              Figure 2: Relationship between parameters L,
0.1   0.5    0.8   3   10   7    1.113   0.521   1.870                        LqandVar (N)

0.1   0.5    0.8   3   10   8    1.086   0.499   1.766

0.1   0.5    0.8   3   10   9    1.064   0.482   1.692

0.1   0.5    0.8   3   10   10   1.047   0.469   1.639

         From table 2 it is observed that the performance measures of the queueing model are significantly
influenced by the parameters of the model. As the arrival rate  increases the average number of packets in the

                                                         77
Performance Evaluation of a Queueing Model with Two Component Mixture of …

system is increasing. Same phenomenon is observed with respective the average number of packets in the
queue for the given values of the other parameters.

           When the parameter µ1 increases from 5 to 11 the average number of packet in the system is
decreasing from 0.611 to 0.587 for fixed values of  = 3,         µ2 = 8, b = 0.2, a = 0.1 and p = 0.8 Similarly the
value of average number of packet in the queue is decreasing from 0.175 to 0.163 for the same changes in
µ1 when other parameters remain fixed.
           When the parameter µ2 increases from 7 to 10 the average number of packet in the system is
decreasing from 1.113 to 1.047 for fixed values of  = 3, µ1 = 10, b = 0.5, a = 0.1 and p = 0.8 Similarly the
value of average number of packet in the queue is decreasing from 0.521 to 0.469 for the same changes in µ2
for fixed values of the other parameters.
           As the truncation parameter „ a ‟ is increasing from 0.1 to 0.4 then the average number of packets in the
system and the average number of packets in the queue are increasing from 0.224 to 0.618 and 0.028 to 0.176
respectively for fixed values of the other parameters.
           As the truncation parameter „b‟ is increasing from 0.1 to 0.4 then the average number of packets in the
system and the average numbers of packets in the queue are increasing from 0.231 to 0.681 and 0.031 to 0.211
respectively.
           As the truncation parameter „p‟ is increasing from 0.1 to 0.4 then the average number of packet in the
system and the average number of packet in the queue are increasing from 1.224 to 1.165 and 0.605 to 0.560
respectively for fixed values of the other parameters.
           It is observed that as  increases the variance of the number of packets in the system is increasing for
given values of the other parameters. When µ1 is increasing the variance of the number of packets in the system
is decreasing for fixed values of the other parameters. When the truncation parameters b is increasing the
variance of the number of packets in the system is increasing. When µ2 is increasing the variance of the number
of packets in the system is decreasing for fixed values of the other parameters.
           For different values of the parameterstheaverage waiting time of a packet in the system, the average
waiting time of a packet in the queue and the variance of the waiting time of a packet in the queue are computed
and given in the table 3. The relationship between parameters and the waiting time is shown in figure 3.
From table 3 it is observed that the model parameters have a significant influence on the waiting time of a
packet in the system and in the queue. As the mean arrival rate  is increasing then the average waiting time of
a packet in the queue and the average waiting time of a packet in the system are increasing when the other
parameters remain fixed.
It is also observed that as the parameterµ1 is increasing from 5 to 11 the average waiting time of a packet in the
system and the average waiting time of a packet in the queue are decreasing from 0.204 to 0.196 and 0.058 to
0.054 respectively for fixed values of the other parameters.
It is also observed that as the parameter µ2 is increasing from 7 to 10 the average waiting time of a packet in the
system and the average waiting time of a packet in the queue are decreasing from 0.371 to 0.349 and 0.174 to
0.156 respectively for fixed values of the other parameters.
           It is further observed that when the mean arrival rate  increases the variance of the waiting time of a
packet in the system is increasing when other parameters remain fixed. Similarly when the truncation
parameters a and b are increasing the variance of the waiting time of the packet in the system is also increasing
for fixed values of the other parameters.
It is also observed that as the parameter p is increasing from 0.1 to 0.4 the average waiting time of a packet in
the system and the average waiting time of a packet in the queue are decreasing from 0.408 to 0.388 and 0.202
to 0.187respectively for fixed values of the other parameters.

                                             V1. CONCLUSION
          This paper deals with a novel queuing model with two component mixture of doubly truncated
exponentially distributed service time having poison arrivals. This queuing model is much useful for analyzing
and designing the communication networks arising at places like data voice transmission, telecommunications,
satellite communications, ATM Scheduling etc,. The traditional assumption of having infinite range service
times is modified through doubly truncated nature of the random variable. Since, in reality no customer/ unit
requires infinite service time. In addition to this finite range of the service time this model also includes
heterogeneous nature of customer service times by considering mixture distribution. Through numerical studies
it is established that the truncation as well as mixture distribution parameters have significant influence on
system performance measures. This model also includes several of the earlier existing queuing models as


                                                        78
Performance Evaluation of a Queueing Model with Two Component Mixture of …

particular cases for limiting/specific values of the parameters. This model can also be extended for non-Poison
arrivals and servers vacation models.

                                    Table 3:VALUES OF Ws AND Wq AND Var (Tq)
a                                                 Var(T
          b       p     λ   µ𝟏   µ 𝟐 Ws      Wq
                                                  q)
0.1       0.2     0.8   1   10   8    0.154   0.012   0.004

0.1       0.2     0.8   2   10   8    0.171   0.029   0.010

0.1       0.2     0.8   3   10   8    0.197   0.055   0.020

0.1       0.2     0.8   4   10   8    0.239   0.097   0.040

0.1       0.2     0.8   5   10   8    0.324   0.181   0.091

0.1       0.2     0.8   3   5    8    0.204   0.058   0.041

0.1       0.2     0.8   3   7    8    0.201   0.057   0.029

0.1       0.2     0.8   3   9    8    0.197   0.055   0.020

0.1       0.2     0.8   3   11   8    0.196   0.054   0.079

0.1       0.5     0.8   1   10   8    0.224   0.028   0.008

0.2       0.5     0.8   1   10   8    0.348   0.061   0.016

0.3       0.5     0.8   1   10   8    0.481   0.111   0.030

0.4       0.5     0.8   1   10   8    0.618   0.176   0.053

0.6       0.1     0.8   1   10   8    0.231   0.031   0.008

0.6       0.2     0.8   1   10   8    0.363   0.067   0.017

0.6       0.3     0.8   1   10   8    0.512   0.126   0.034

0.6       0.4     0.8   1   10   8    0.681   0.211   0.065

0.1       0.5     0.1   3   10   8    0.408   0.202   0.101

0.1       0.5     0.2   3   10   8    0.402   0.197   0.096

0.1       0.5     0.3   3   10   8    0.395   0.192   0.092

0.1       0.5     0.4   3   10   8    0.388   0.187   0.087

0.1       0.5     0.8   3   10   7    0.371   0.174   0.077

0.1       0.5     0.8   3   10   8    0.362   0.166   0.068        Figure 3:Relationship between the parameters and
                                                                                 Ws, Wq and Var(Tq)
0.1       0.5     0.8   3   10   9    0.355   0.161   0.063

0.1       0.5     0.8   3   10   10   0.349   0.156   0.059

                                                      REFERENCES
    [1]         Gross, D.And Harris, C. M. (1974) “Fundamentals of Queuing Theory.” John Wiley, New York.
    [2]         Kleinrock,L.(1975) „Queueing Systems‟, Vol. 1, Wiley, New York.
    [3]         Boxima O.J. And Groenendijk W.P. (1988) „Waiting time in discrete time cyclic -service systems‟,
                IEEE Transactions on Communications, 36, no.2, 164 -170.

                                                              79
Performance Evaluation of a Queueing Model with Two Component Mixture of …

[4]    Boxma,O.J., And J.W. Cohen (1998) „The M/G/1 queue with heavy-tailed service time distribution‟,
       IEEE J. Selected Areas Commun. 16, 749–763.
[5]    Boxma, O.J,G.M.Koole,I.Mitrani (1995)„Polling models with Threshold Switching Quantative
       methods in parallel systems‟, 129-140.
[6]    Srinivasa Rao,P.,K.SrinivasaRao and J.Lakshminarayana (2003) „Single server Poisson Queueing
       model with mixture of exponential service time distribution‟.Vol-15(2)M,199-204.
[7]    Bunday.B.D.(1996) "An Introduction to queuing theory" John Wiley, New York.
[8]    Burke. P.J. (1975) „Delays in single server queues with batch input‟, Oper.Res, 23, 830-833.
[9]    Guy L.Curry, NatarajanGautam (2008) „Characterizing the departure process from a two server
       Markovian Queue: A Non-Renewal approach.‟ Winter Simulation Conference.
[10]   Haviv, M. And Vander Wal,J. (2007) “Waiting times in queues with relative priorities,” Operations
       Research Letters, 35, 591-594.
[11]   Hiroyuki Masuyama, Tetsuya Takine (2003)„Stationary queue length in a FIFO single server queue
       with service interruptions and multiple batch Markovian arrival streams‟. J.O.R.S.J, Vol-46, no.3,319-
       341
[12]   JewgeniH.Dshalalow (1991) „A Single server queue with random accumulation level‟.J.A.M.S.A, Vol-
       4, No.3, 203-210.
[13]   Johnson,Kotz and Balakrishnan (2004)„Continuous univeriate distributions‟ vol-1 and 2,second
       edition.
[14]   Levy, Y. And Yechiali, U. (1975) „Utilization of idle time in an M/G/1 queueingsystem‟., Management
       Science 22, 202–211.
[15]   Ramaswamy, R. and L.D. Servi .(1988) „The busy period of M/G/1 vacation model with Bernoulli
       schedule.” stochastic models, 4, 507-521.
[16]   Takine T and Hesegawa T.(1992) „On M/G/1 queue with multiple vacations and gated service
       discipline‟, j.o.r.soc.japan-35,no.3,217-235
[17]   Parthasarathy,P.R.,andK.V.Vijayashree (2002)„Fluid queues driven by a discouraged arrivals queue‟.
       IJMMS, Vol-24, 1509-1528
[18]   MessaoudBoaunkhel,LotfiTadj (2007) „Optimal design of a bulk service queue‟, Investigacao
       Operacional,vol.27,131-138.
[19]   K.SRINIVASA RAO, P.SURESH VARMA and Y.SRINIVAS-(2008), Interdependent Queuing Model
       with startup delay, Journal of Statistical Theory and Applications, Vol. 7, No. 2 pp. 219-228.
[20]   Zhanyou Ma, WuyiYue, NaishuoTian (2008) „Analysis of a Geom/G/1 Queue with General Limited
       Service and MAVs‟.November,3,ISORA‟08, 359-368.
[21]   Andreas Brandt, Manfred Brandt (2008) „Waiting times for M/systems under state-dependent processor
       sharing‟ Queueing Systems, Vol.59, No.3, 297-319.
[22]   Ward Whitt (2006) „Fluid Models for Multiserver Queues with Abandonments‟, Operations Research,
       Vol.54, no.1,37-54.
[23]   K.SRINIVASA RAO, G.RAMESH, and J.L.NARAYANA, (2011)- Single server Poisson queueing
       model with truncated exponential service times, accepted in Journal of Mathematics and Mathematical
       Sciences, Vol. 2.
[24]   K.SRINIVASA RAO, M.GovindaRao and G.V.S.Rajkumar (2011)- Transient analysis of
       interdependent queueing model with state dependent service rates, accepted in International Journal of
       Ultra Scientist of Physical sciences, Vol.23,no.3.




                                                    80

More Related Content

What's hot

M sc it_modelling_biological_systems2005
M sc it_modelling_biological_systems2005M sc it_modelling_biological_systems2005
M sc it_modelling_biological_systems2005
Aafaq Malik
 
Signals and Systems Assignment Help
Signals and Systems Assignment HelpSignals and Systems Assignment Help
Signals and Systems Assignment Help
Matlab Assignment Experts
 
Ss
SsSs
DIGITAL IMAGE PROCESSING - Day 4 Image Transform
DIGITAL IMAGE PROCESSING - Day 4 Image TransformDIGITAL IMAGE PROCESSING - Day 4 Image Transform
DIGITAL IMAGE PROCESSING - Day 4 Image Transform
vijayanand Kandaswamy
 
Iu3515201523
Iu3515201523Iu3515201523
Iu3515201523
IJERA Editor
 
1 6
1 61 6
RNN and sequence-to-sequence processing
RNN and sequence-to-sequence processingRNN and sequence-to-sequence processing
RNN and sequence-to-sequence processing
Dongang (Sean) Wang
 
Upm scube-dynsys-presentation
Upm scube-dynsys-presentationUpm scube-dynsys-presentation
Upm scube-dynsys-presentation
idragan
 
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Behzad Samadi
 
A Proposition for Business Process Modeling
A Proposition for Business Process ModelingA Proposition for Business Process Modeling
A Proposition for Business Process Modeling
Ang Chen
 
12 Machine Learning Supervised Hidden Markov Chains
12 Machine Learning  Supervised Hidden Markov Chains12 Machine Learning  Supervised Hidden Markov Chains
12 Machine Learning Supervised Hidden Markov Chains
Andres Mendez-Vazquez
 
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and Systems
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and SystemsDSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and Systems
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and Systems
Amr E. Mohamed
 
Chapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformChapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier Transform
Attaporn Ninsuwan
 
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSFEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
ieijjournal
 
ALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTESALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTES
suthi
 
Sienna 3 bruteforce
Sienna 3 bruteforceSienna 3 bruteforce
Sienna 3 bruteforce
chidabdu
 
Time dependent solution of batch arrival queue
Time dependent solution of batch arrival queueTime dependent solution of batch arrival queue
Time dependent solution of batch arrival queue
Alexander Decker
 
fourier representation of signal and systems
fourier representation of signal and systemsfourier representation of signal and systems
fourier representation of signal and systems
Sugeng Widodo
 
Class 28: Entropy
Class 28: EntropyClass 28: Entropy
Class 28: Entropy
David Evans
 
Martingales Stopping Time Processes
Martingales Stopping Time ProcessesMartingales Stopping Time Processes
Martingales Stopping Time Processes
IOSR Journals
 

What's hot (20)

M sc it_modelling_biological_systems2005
M sc it_modelling_biological_systems2005M sc it_modelling_biological_systems2005
M sc it_modelling_biological_systems2005
 
Signals and Systems Assignment Help
Signals and Systems Assignment HelpSignals and Systems Assignment Help
Signals and Systems Assignment Help
 
Ss
SsSs
Ss
 
DIGITAL IMAGE PROCESSING - Day 4 Image Transform
DIGITAL IMAGE PROCESSING - Day 4 Image TransformDIGITAL IMAGE PROCESSING - Day 4 Image Transform
DIGITAL IMAGE PROCESSING - Day 4 Image Transform
 
Iu3515201523
Iu3515201523Iu3515201523
Iu3515201523
 
1 6
1 61 6
1 6
 
RNN and sequence-to-sequence processing
RNN and sequence-to-sequence processingRNN and sequence-to-sequence processing
RNN and sequence-to-sequence processing
 
Upm scube-dynsys-presentation
Upm scube-dynsys-presentationUpm scube-dynsys-presentation
Upm scube-dynsys-presentation
 
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...
 
A Proposition for Business Process Modeling
A Proposition for Business Process ModelingA Proposition for Business Process Modeling
A Proposition for Business Process Modeling
 
12 Machine Learning Supervised Hidden Markov Chains
12 Machine Learning  Supervised Hidden Markov Chains12 Machine Learning  Supervised Hidden Markov Chains
12 Machine Learning Supervised Hidden Markov Chains
 
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and Systems
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and SystemsDSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and Systems
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and Systems
 
Chapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformChapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier Transform
 
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSFEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKS
 
ALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTESALGORITHMS - SHORT NOTES
ALGORITHMS - SHORT NOTES
 
Sienna 3 bruteforce
Sienna 3 bruteforceSienna 3 bruteforce
Sienna 3 bruteforce
 
Time dependent solution of batch arrival queue
Time dependent solution of batch arrival queueTime dependent solution of batch arrival queue
Time dependent solution of batch arrival queue
 
fourier representation of signal and systems
fourier representation of signal and systemsfourier representation of signal and systems
fourier representation of signal and systems
 
Class 28: Entropy
Class 28: EntropyClass 28: Entropy
Class 28: Entropy
 
Martingales Stopping Time Processes
Martingales Stopping Time ProcessesMartingales Stopping Time Processes
Martingales Stopping Time Processes
 

Viewers also liked

публикация2
публикация2публикация2
публикация2Alena78
 
Firworks
FirworksFirworks
Firworks
karank3
 
I.T.Resume
I.T.ResumeI.T.Resume
I.T.Resume
dashaun joseph
 
моу сош хгп родительское 2012
моу сош хгп родительское 2012моу сош хгп родительское 2012
моу сош хгп родительское 2012samsung213
 
Leader in you - First Talk - Bilancio di competenze
Leader in you - First Talk - Bilancio di competenzeLeader in you - First Talk - Bilancio di competenze
Leader in you - First Talk - Bilancio di competenze
AIESEC Padova
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
cover art realmoms
cover art realmomscover art realmoms
cover art realmoms
Beth (Emerson) Aldrich
 
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...
DVClub
 
LIM2016
LIM2016LIM2016
OBASADE CV
OBASADE CVOBASADE CV
OBASADE CV
Obasade obafunso
 
Using Assertions in AMS Verification
Using Assertions in AMS VerificationUsing Assertions in AMS Verification
Using Assertions in AMS Verification
DVClub
 

Viewers also liked (12)

публикация2
публикация2публикация2
публикация2
 
Firworks
FirworksFirworks
Firworks
 
I.T.Resume
I.T.ResumeI.T.Resume
I.T.Resume
 
моу сош хгп родительское 2012
моу сош хгп родительское 2012моу сош хгп родительское 2012
моу сош хгп родительское 2012
 
Leader in you - First Talk - Bilancio di competenze
Leader in you - First Talk - Bilancio di competenzeLeader in you - First Talk - Bilancio di competenze
Leader in you - First Talk - Bilancio di competenze
 
Timo Saarelainen 4.4.2013: Puusta öljyä
Timo Saarelainen 4.4.2013: Puusta öljyäTimo Saarelainen 4.4.2013: Puusta öljyä
Timo Saarelainen 4.4.2013: Puusta öljyä
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
cover art realmoms
cover art realmomscover art realmoms
cover art realmoms
 
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...
 
LIM2016
LIM2016LIM2016
LIM2016
 
OBASADE CV
OBASADE CVOBASADE CV
OBASADE CV
 
Using Assertions in AMS Verification
Using Assertions in AMS VerificationUsing Assertions in AMS Verification
Using Assertions in AMS Verification
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD)

A02402001011
A02402001011A02402001011
A02402001011
inventionjournals
 
C023014030
C023014030C023014030
C023014030
inventionjournals
 
C023014030
C023014030C023014030
C023014030
inventionjournals
 
Predicting organic reaction outcomes with weisfeiler lehman network
Predicting organic reaction outcomes with weisfeiler lehman networkPredicting organic reaction outcomes with weisfeiler lehman network
Predicting organic reaction outcomes with weisfeiler lehman network
Kazuki Fujikawa
 
A03401001005
A03401001005A03401001005
A03401001005
theijes
 
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
ijtsrd
 
505 260-266
505 260-266505 260-266
505 260-266
idescitation
 
Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...
Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...
Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...
Simen Li
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions www.ijeijournal.com
 
LeastSquaresParameterEstimation.ppt
LeastSquaresParameterEstimation.pptLeastSquaresParameterEstimation.ppt
LeastSquaresParameterEstimation.ppt
StavrovDule2
 
Ef24836841
Ef24836841Ef24836841
Ef24836841
IJERA Editor
 
Markov chain
Markov chainMarkov chain
Markov chain
Santosh Phad
 
B02404014
B02404014B02404014
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorImplementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
PTIHPA
 
Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch service
Alexander Decker
 
Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch service
Alexander Decker
 
11.generalized and subset integrated autoregressive moving average bilinear t...
11.generalized and subset integrated autoregressive moving average bilinear t...11.generalized and subset integrated autoregressive moving average bilinear t...
11.generalized and subset integrated autoregressive moving average bilinear t...
Alexander Decker
 
Rfid presentation in internet
Rfid presentation in internetRfid presentation in internet
Rfid presentation in internet
Ali Azarnia
 
Second Genetic algorithm and Job-shop scheduling presentation
Second Genetic algorithm and Job-shop scheduling presentationSecond Genetic algorithm and Job-shop scheduling presentation
Second Genetic algorithm and Job-shop scheduling presentation
Accenture
 
Ceis 6
Ceis 6Ceis 6

Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)

A02402001011
A02402001011A02402001011
A02402001011
 
C023014030
C023014030C023014030
C023014030
 
C023014030
C023014030C023014030
C023014030
 
Predicting organic reaction outcomes with weisfeiler lehman network
Predicting organic reaction outcomes with weisfeiler lehman networkPredicting organic reaction outcomes with weisfeiler lehman network
Predicting organic reaction outcomes with weisfeiler lehman network
 
A03401001005
A03401001005A03401001005
A03401001005
 
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
 
505 260-266
505 260-266505 260-266
505 260-266
 
Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...
Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...
Circuit Network Analysis - [Chapter5] Transfer function, frequency response, ...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
LeastSquaresParameterEstimation.ppt
LeastSquaresParameterEstimation.pptLeastSquaresParameterEstimation.ppt
LeastSquaresParameterEstimation.ppt
 
Ef24836841
Ef24836841Ef24836841
Ef24836841
 
Markov chain
Markov chainMarkov chain
Markov chain
 
B02404014
B02404014B02404014
B02404014
 
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorImplementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
Implementing 3D SPHARM Surfaces Registration on Cell B.E. Processor
 
Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch service
 
Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch service
 
11.generalized and subset integrated autoregressive moving average bilinear t...
11.generalized and subset integrated autoregressive moving average bilinear t...11.generalized and subset integrated autoregressive moving average bilinear t...
11.generalized and subset integrated autoregressive moving average bilinear t...
 
Rfid presentation in internet
Rfid presentation in internetRfid presentation in internet
Rfid presentation in internet
 
Second Genetic algorithm and Job-shop scheduling presentation
Second Genetic algorithm and Job-shop scheduling presentationSecond Genetic algorithm and Job-shop scheduling presentation
Second Genetic algorithm and Job-shop scheduling presentation
 
Ceis 6
Ceis 6Ceis 6
Ceis 6
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Welcome to International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 6, Issue 8 (April 2013), PP. 71-80 Performance Evaluation of a Queueing Model with Two Component Mixture of Doubly Truncated Exponential Service Times K.SrinivasRao1,G.Ramesh2, M.Seshashayee3 1 Dept of Statistics, Andhra University,Visakhapatnam 2 Dept of BSH,MVGRCollege,Vizianagaram 3 Dept of CS, GITAM University,Visakhapatnam Abstract:-In this paper, we introduce and analyze a new queueing model with the assumption that the service time of the customer follows a two component mixture of doubly truncated exponential distribution. The doubly truncated two component mixture distribution is capable of characterizing the heterogeneous and finite range nature of the service time. This service time distributions also includes two component mixture of exponential service time, doubly truncated exponential time and exponential service time queuing models as limiting/particularcases. Assuming the arrival process follows a Poison process and using the embedded markov chain technique the system behaviour is analyzed. Explicit expressions for the system performance like average number of customers in the system and in the queue, average waiting time of a customer in the queue, the throughput of the service station, the probability of the idleness of the service etc,. are derived. Through numerical illustration, the sensitivity of the model performance measures with respect to the changes in the model parameter is also studied. Keywords:-Queueing,Truncated,Exponential Service times,Poisson Model I. INTRODUCTION Queueing models create lot of interest due to their ready applicability in wide varity of situations prevailing at places like, transportation, communication networks, production processes, reliability analysis, computer performance evaluations studies, etc,.(Boxima O.J.,(1988), Bunday.B.D.(1996)).A queue is a waiting line of units demanding service at a service facility (Andreas Brandt,2008). Congestion is a natural phenomenon in everyday life. Queueing is a mechanism that is used to handle congestion. A system consisting of service facility process of a service and a process of arrival of customer is called a queueingsystem(Burke. P.J. (1975)). In queueing models it is customary to assume that the arrival and service processes follow Poisson processes such that the inter arrival times and the inter service times follow exponential distributions.(Haviv.M(2007),Guy.L.Curry(2008),K.Srinivasa Raoet.al,2008). This assumption of inter-service times being follow an exponential distribution is valid only when the service time required by a customer is having infinite range and long upper tail. (Hiroyuki Masuyama, Tetsuya Takine (2003)).However, in many practical situations arising at places like communication systems the service time required by the customer is finite. Hence, to have an approximate model for this sort of situations, the service time of the customer is to be approximated with truncated distributions. (Altiok,T.(1982), Patrick,M.,(1999), Guodong Pan (2010)). Very little work has been reported regarding queueing models with truncated service time distribution. Hence in this paper, in order to have efficient congestion control we developed and analyzed a queueing model with the assumption that the service time required by the packet follows a two component mixture of a doubly truncated exponential distribution. Some practical situations at places, like telecommunications, the service time required by the packet may not be homogeneous. Theheterogeneity of service times can be modeled by considering two component mixture of distribution.Here, it is assumed that the arrival of packets follows a Poisson process. Using the imbedded Markovchain technique, the probability generating function of the number of packets in the system is derived. The system characteristics like, the probability of emptiness of the system, the mean number of packets in the queue,theLaplace transformation of the waiting time distribution of a packet, the average waiting time of apacket, the variance of the number of packet in the queue, the variance of the waiting time of a packetetc,. are obtained. The sensitivity of the model with respect to the parameters is also studied. This model also includes some of the earlier models as particular casesfor specific or limiting values of the parameters. 71
  • 2. Performance Evaluation of a Queueing Model with Two Component Mixture of … II.POISSON QUEUEING MODEL WITH TWO COMPONENT MIXTURE OF DOUBLY TRUNCATED EXPONENTIAL SERVICE TIMES Weconsider a single server Poisson Queueing system in which the arrival of packets follows a Poisson process with parameter λ.It is also assumed that theinter-service times follow a two component mixture of doubly truncated exponential distribution with parameters µ1 , µ2, p, a and b and having differences. This assumption is made since the service time required for completing any activity is finite and is bound by finite values of a and b. The probability density function of the inter service times is,  p 1    t  (1  p) 2    t ;𝑎 < 𝑡 < 𝑏(1) b(t) = e   e- 1a -e- 1b  e 1  e- 2 a -e- 2 b  2     The mean service time is, p 1  a1  e  a  1  b1  e   b   1  1 E (T )  1 (e- 1a -e- 1b ) (1  p) 1  a2  e 2a  1  b2  e 2b  (2)    2 (e- 2a -e- 2b ) Following the heauristic argument given by Gross and Harris (1974) the steady state behavior of the model is studied. The imbedded stochastic process𝑋(𝑡 𝑖 ), where, X denotes the number in the system and 𝑡1, 𝑡2, 𝑡3, . .,are the successive times of completion of service. Since,𝑡 𝑖 is the completion time of the 𝑖th packet, then X(𝑡 𝑖 ) is the number of packets the 𝑖th packet leaves behind as he departs. Since, the state space is discrete, 𝑋 𝑖 represents the number of packets remaining in the system as the 𝑖thpacket departs. Then forall n>0 one can have 𝑋 𝑛 − 1 + 𝐴 𝑛+1 ; 𝑋𝑛 ≥ 1 𝑋 𝑛+1 = (3) 𝐴 𝑛+1 ; 𝑋𝑛 = 0 where,𝑋 𝑛 is the number in the system at the nth departure point and 𝐴 𝑛+1 is the number of packets who arrived during the service time,𝑆 (𝑛+1) , of the (n+1)st packet. The random variable 𝑆 (𝑛+1) by assumption is independent of previous service times and the length of the queue. Since arrivals are Poissonian, the random variable 𝐴 𝑛+1 depends only on S and not on the queue are on the time of service initiation. Then   t  Pr  A  a   e (t ) j i 1  dB(t ) , ( j  i  1, i 1)  0 ( j  i  1)!  0 (4) , ( j  i  1, i 1) Let𝑝 𝑖𝑗 denote the probability that the system size immediately after a departure point is j given that the system size after previous departure was 𝑖. 𝑘 𝑛 is the probability that there are n arrivals during a service time t.Then 𝑝 𝑖𝑗 = 𝑃𝑟 {System size immediately after a departure point is j| system size after previousDeparturewas } =𝑃𝑟 {𝑋 𝑛+1 =𝑗|𝑋 𝑛 =𝑖} where, b   t ( t )  n p1 (1  p) 2   t  ( 5)   t pij  e  e 1  e 2  dt a n !  e  1a  e  1b e  2 a  e  2b  This implies that 𝑝 𝑖𝑗 is equals to𝑘 𝑗 −𝑖+1 and P   pij  Assuming that the system is in steady state, and 𝑝 𝑖𝑗 = 𝜋 𝑗 Then, i 1 pi   0 ki    j ki  j 1  i  0,1, 2,... (6) j 1 where, 𝜋 𝑗 is the probability that there arejpackets in the system at a departure point after steady state is reached.   i Let P( z )   z i i 0 𝑧 ≤1 (7)  K ( z )   ki z i are the generating functions of  n and k n respectively i 0 Hence,   t   (8) b n  p (1  p) 2 K ( z)   e n 0 a  t n! z n   1a 1  1b e  1t   2 a  2b e  2t  dt  e e e e  After simplification, we get 72
  • 3. Performance Evaluation of a Queueing Model with Two Component Mixture of … p 1  e  (1 z )   a  e  (1 z )   b  1 1 K ( z)   1a  1b   e e  1  (1  z )  (1  p )  2  e    (1 z )   a e    (1 z )   b  2 2   2 a  2 b   9 e e   2  (1  z )   p (1  a1 )e   a  (1  b1 )e   b    1 1 K '(1)  1 (e  a  e  b ) 1 1  1  p  (1  a2 )e   a  (1  b2 )e   b  (10)   2 2   2 a  2b  2 (e e )   p (1  a1 )e 1a  (1  b1 )e 1b   (1  p) (1  a2 )e 2a  (1  b2 )e  2b   P( z )  1       1 (e 1a  e 1b )  2 (e   2 a  e   2 b )     p  e[ (1 z ) 1 ]a  e[  (1 z ) 1 ]b  (1  p) 2  e[  (1 z ) 2 ]a  e[  (1 z ) 2 ]b   (1  z )   1a 1  1b   e e    2 a  2b     1   (1  z )  e e  2   (1  z )  1   p1  e[ (1 z ) 1 ]a  e[  (1 z ) 1 ]b  (1  p) 2  e[  (1 z ) 2 ]a  e[  (1 z ) 2 ]b         1a  1b      2 a  2b     z  (11)   e e   1   (1  z )  e e  2   (1  z )    III.SYSTEM CHARACTERISTICS The performance measures of the model are developed by Expanding the above equation (11) and collecting the constant terms we get the Probability that the system size is emptyas  p (1  a1 )e 1a  (1  b1 )e 1b    P0 = 1  1 (e 1a  e 1b )  (1  p) (1  a2 )e 2a  (1  b2 )e 2b  (12)     2 (e   2 a  e   2 b ) The average number of packets in system can be obtained as,   (1  a1 )e   a  (1  b1 )e   b   1  1  ( a 1  2a 1  2)e  2 2 2  1 a  (b 1  2b1  2)e 2 2  1b    L P   2 1  1 (e  e )   (1  a1 )e    1 a  1b  1 a  1b  1 a  1b  1 (e e )    (1  b1 )e    (1  a 2 )e   a  (1  b 2 )e   b   2  2   ( a  2  2a 2  2)e  2 2 2  2 a  (b  2  2b 2  2)e 2 2  2b    (13)  (1  P )    2  2   2 (e  e )   (1  a  2 )e   2 a  2b  2 a  2 b  2 a  2 b   2 (e e )    (1  b 2 )e   The average number of packets in the system is,   2 (a 2  2  2a  2)e 1a  (b2  2  2b  2)e 1b     1   Lq  P  1 1 1   21  1 (e 1a  e 1b )   (1  a1 )e 1a  (1  b1 )e 1b           2 (a 2  2  2a  2)e 2a  (b 2  2  2b  2)e 2b       (14)  (1  P)  2 2 2 2   22  2 (e  e )   (1  a2 )e  (1  b2 )e     2 a  2b  2 a  2b      73
  • 4. Performance Evaluation of a Queueing Model with Two Component Mixture of … The variance of the number of packets in the system is,      (1  a1 )e 1a  (1  b1 )e  1b   1 (e  1a  e  1b ) -  (1  a1 )e  1a  (1  b1 )e  1b      Var ( N )  P          1 (e 1a  e 1b )  1 (e 1a  e 1b )         2  a 2  2  2a  2  e 1a   b 2  2  2b  2  e  1b        +  1 1 1 1   21  1 (e  e ) -  (1  a1 )e  (1  b1 )e     1a  1b  1a  1b       3 (e 1a  e 1b )  2 (1  a )e 1a  (1  b )e  1b   2  a 2  2  2a  2  e 1a   b 2  2  2b  2  e  1b     1  1 1    1 1 1 1      1 (e 1a  e 1b ) 21  1 (e 1a  e 1b ) -  (1  a1 )e 1a  (1  b1 )e  1b             3 3  a 2 12  21a  2)e 1a  (b 2 12  21b  2)e  1b   13  3 (a 3e  1a  b3e  1b )            312  1 (e 1a  e 1b ) -  (1  a1 )e 1a  (1  b1 )e  1b                  (1  a2 )e 2  (1  b2 )e 2   2 (e 2  e 2 )- (1  a2 )e 2  (1  b2 )e 2     a  b  a  b  a  b     (1  P)         2 (e   2 a  e   2b )   2 (e   2 a  e   2b )          a 2  2a2  2  e   b 2  2b2  2  e    2 2 2  2 a 2 2   2b  +     2  2 (e 2a  e 2b ) -  (1  a2 )e 2a  (1  b2 )e 2b     2       a 2  2a2  2  e   b 2  2b2  2  e    3 (e 2a  e 2b )  2 (1  a )e 2a  (1  b )e  2b  2  2 2  2 a 2 2   2b    2  2 2     2 (e   2 a  e   2b ) 2 2  2 (e 2a  e 2b ) -  (1  a2 )e 2a  (1  b2 )e 2b         3 3  a 2  2  2 a  2)e  2a  (b 2  2  2 b  2)e 2b    3   3 (a 3e 2a  b3e  2b )          2 2 2 2 2   32 2  2 (e 2a  e 2b ) -  (1  a2 )e 2a  (1  b2 )e  2b       (15)     IV. WAITING TIME DISTRIBUTION OF THE MODEL We derive the waiting time distribution of the single server Poisson arrival queueingmodel with two component mixture ofdoublytruncated exponential service times. Consider the queueing discipline of the system as first in first out. Let 𝐵 ∗ (𝑠) be theLaplace transformation of the inter-service time distribution and 𝑊 ∗ (𝑠) be the Laplace transform of the waiting time distribution. Then we have  p   e  ( s   1 ) a  e  ( s  1 ) b    B* ( s )       1  1  s  e  1a  e  1b      (1  p )     e  ( s   2 ) a  e  ( s  2 ) b    (16)      2  2  s  e  2 a  e  2b     The Laplace transformation of waiting time distributionis [1  K '(1)](1  z ) B*[ (1  z )] W *[ (1  z )]  B*[ (1  z )]  z (17)  writing  (1  z )   , we get z  1  Therefore, [1  K '(1)] B* ( ) W * ( )  (18)   [1  B* ( )] [1  K '(1)]s W *q ( s )  s  [1  B* ( s )] (19) where, B * ( s ) is the Laplace transformation of the service time distribution and K '(1) is as given in equation (10). 74
  • 5. Performance Evaluation of a Queueing Model with Two Component Mixture of … The mean waiting time of the packet in queue is,   (a 2  2  2 a  2)e 1a  (b 2  2  2 b  2)e  1b       (20) Wq  p  1 1 1 1   21  1 (e  e 1b )   (1  a1 )e 1a  (1  b1 )e 1b    1a         (a 2  2  2 a  2)e  2 a  (b 2  2  2 b  2)e  2b        (1  p)  2 2 2 2   22  2 (e  e 2b )   (1  a2 )e  2a  (1  b2 )e 2b    2 a       The variance of the waiting time of a packetin the queue is,     (1  a1 )e  1a  (1  b1 )e  1b       V (Tq )  p   4 1-  12   1 (e 1a  e 1b )       3(a 2 12  21a  2)e  1a  (b 2 12  21b  2)e  1b   3 (a 3e  1a  b3e  1b )     13 (e 1a  e 1b )   (a 2 12  21a  2)e  1a  (b 2 12  2 1b  2)e  1b   2   3     12 (e 1a  e 1b )     2  1 (e 1a  e 1b )   (1  a1 )e  1a  (1  b1 )e  1b        1 (e 1a  e 1b )           (1  a2 )e  2a  (1  b2 )e  2b        (1  p)   4 1-  12    2 (e   2 a  e   2b )       3(a 2 2 2  22 a  2)e  2a  (b 2 2 2  22b  2)e  2b   3 (a 3e  2a  b3e  2b )      2 3 (e   2 a  e  2 b )   2b 2   (a 2  22 a  2)e  (b 2  2 2b  2)e   2 2  2 a 2 2  3      2 2 (e   2 a  e   2b )      2  2 (e 2a  e  2b )    2(1  a 2 )e  2a  (1  b2 )e  2b       (21)   2 (e  2 a  e  2b )       The waiting time of apacket in the system is,   (a 2  2  2 a  2)e  1a  (b 2  2  2 b  2)e  1b       Ws  p  1 1 1 1   21  1 (e  e 1b )   (1  a1 )e  1a  (1  b1 )e  1b    1a         (a 2  2  2 a  2)e  2a  (b 2  2  2 b  2)e  2b        (1  p)  2 2 2 2   22  2 (e  e 2b )   (1  a2 )e  2a  (1  b2 )e 2b    2 a        p (1  a1 )e  1a  (1  b1 )e  1b  (1  p) (1  a 2 )e  2a  (1  b2 )e  2b          (22)   1 (e 1a  e 1b )  2 (e  2 a  e  2b )    V.NUMERICALILLUSTRATION The performance of the queueing model is discussed through a numerical illustration. Different values of the parameter are considered for arrival rate  and service time parametersµ1 , µ2, p, a and b.For given values of  = 1,2,3,4,5;µ1 = 5,7,9,11, µ2 = 7,8,9,10, p = 0.1,0.2,0.3,0.4, a = 0.1,0.2,0.3,0.4 and b = 0.1, 0.2, 0.3, 0.4,the probability that the system is empty and the probability that the server is busy are computed and presented in table 1.The relationship between the parameters and the probability of the idealness are shown in figure 1. From table 1 it is observed that the probability of emptiness is highly influenced by the model parameters. As the mean arrival rate varies from 1 to 5. The probability of emptiness in the system is decreasing from 0.858 to 0.289 when other parameter are fixed at µ1 = 10,µ2 = 8, p = 0.8, a = 0.1 and b = 0.2. 75
  • 6. Performance Evaluation of a Queueing Model with Two Component Mixture of … Table 1: VALUES OF Po AND 1-PoFORDIFFERENT VALUESOF, µ, a AND b Figure 1:Relationship between probability of Emptinessand input parameters We have observed that when the service time parameter µ1 increases from 5 to 11 the probability of emptiness is increasing from 0.564 to 0.576, for fixed values of  = 3, a = 0.1,b = 0.2, p = 0.8 andµ2 = 8. When the service time parameter µ2 increases from 7 to 10 the probability of emptiness is increasing from 0.408 to 0.422, for fixed values of  = 3, a = 0.1, b = 0.5, p = 0.8 and µ1 =10. As the truncation parameter of the service time distribution „ a ‟ increases from 0.1 to 0.4 the probability of emptiness is increases from 0.1 to 0.4 and the probability of emptiness is increasing from 0.804 to 0.558 for fixed values of the other parameters. As the truncation parameter of the service time distribution „b‟increases from 0.1 to 0.4 the probability of emptiness is increasing from 0.1 to 0.4 and the probability of emptiness is increasing from 0.800 to 0.530 for given values of the other parameters. As the truncation parameter of the service time distribution „p ‟increases from 0.1 to 0.4 the probability of emptiness is increasing from 0.1 to 0.4 and the probability of emptiness is increasing from 0.381 to 0.395 for given values of the other parameters. 76
  • 7. Performance Evaluation of a Queueing Model with Two Component Mixture of … For different values of the parameters the average number of packets in the system, the average number of packets in the queue and the variance of the number of packets in the system are computed and presented in table2. The relationship between the parameters and the performance measures is shown in figure 2. Table 2: VALUES OF L ANDLqANDVar (N) a b p λ µ1 µ2 L Lq Var(N) 0.1 0.2 0.8 1 10 8 0.154 0.012 0.159 0.1 0.2 0.8 2 10 8 0.343 0.059 0.387 0.1 0.2 0.8 3 10 8 0.592 0.165 0.783 0.1 0.2 0.8 4 10 8 0.958 0.389 1.618 0.1 0.2 0.8 5 10 8 1.618 0.907 3.906 0.1 0.2 0.8 3 5 8 0.611 0.175 0.985 0.1 0.2 0.8 3 7 8 0.603 0.171 0.872 0.1 0.2 0.8 3 9 8 0.591 0.165 0.783 0.1 0.2 0.8 3 11 8 0.587 0.163 0.762 0.1 0.5 0.8 1 10 8 0.224 0.028 0.239 0.2 0.5 0.8 1 10 8 0.348 0.061 0.369 0.3 0.5 0.8 1 10 8 0.481 0.111 0.514 0.4 0.5 0.8 1 10 8 0.618 0.176 0.671 0.6 0.1 0.8 1 10 8 0.231 0.031 0.248 0.6 0.2 0.8 1 10 8 0.363 0.067 0.387 0.6 0.3 0.8 1 10 8 0.512 0.126 0.552 0.6 0.4 0.8 1 10 8 0.681 0.211 0.749 0.1 0.5 0.1 3 10 8 1.224 0.605 2.209 0.1 0.5 0.2 3 10 8 1.205 0.590 2.146 0.1 0.5 0.3 3 10 8 1.185 0.575 2.082 0.1 0.5 0.4 3 10 8 1.165 0.560 2.019 Figure 2: Relationship between parameters L, 0.1 0.5 0.8 3 10 7 1.113 0.521 1.870 LqandVar (N) 0.1 0.5 0.8 3 10 8 1.086 0.499 1.766 0.1 0.5 0.8 3 10 9 1.064 0.482 1.692 0.1 0.5 0.8 3 10 10 1.047 0.469 1.639 From table 2 it is observed that the performance measures of the queueing model are significantly influenced by the parameters of the model. As the arrival rate  increases the average number of packets in the 77
  • 8. Performance Evaluation of a Queueing Model with Two Component Mixture of … system is increasing. Same phenomenon is observed with respective the average number of packets in the queue for the given values of the other parameters. When the parameter µ1 increases from 5 to 11 the average number of packet in the system is decreasing from 0.611 to 0.587 for fixed values of  = 3, µ2 = 8, b = 0.2, a = 0.1 and p = 0.8 Similarly the value of average number of packet in the queue is decreasing from 0.175 to 0.163 for the same changes in µ1 when other parameters remain fixed. When the parameter µ2 increases from 7 to 10 the average number of packet in the system is decreasing from 1.113 to 1.047 for fixed values of  = 3, µ1 = 10, b = 0.5, a = 0.1 and p = 0.8 Similarly the value of average number of packet in the queue is decreasing from 0.521 to 0.469 for the same changes in µ2 for fixed values of the other parameters. As the truncation parameter „ a ‟ is increasing from 0.1 to 0.4 then the average number of packets in the system and the average number of packets in the queue are increasing from 0.224 to 0.618 and 0.028 to 0.176 respectively for fixed values of the other parameters. As the truncation parameter „b‟ is increasing from 0.1 to 0.4 then the average number of packets in the system and the average numbers of packets in the queue are increasing from 0.231 to 0.681 and 0.031 to 0.211 respectively. As the truncation parameter „p‟ is increasing from 0.1 to 0.4 then the average number of packet in the system and the average number of packet in the queue are increasing from 1.224 to 1.165 and 0.605 to 0.560 respectively for fixed values of the other parameters. It is observed that as  increases the variance of the number of packets in the system is increasing for given values of the other parameters. When µ1 is increasing the variance of the number of packets in the system is decreasing for fixed values of the other parameters. When the truncation parameters b is increasing the variance of the number of packets in the system is increasing. When µ2 is increasing the variance of the number of packets in the system is decreasing for fixed values of the other parameters. For different values of the parameterstheaverage waiting time of a packet in the system, the average waiting time of a packet in the queue and the variance of the waiting time of a packet in the queue are computed and given in the table 3. The relationship between parameters and the waiting time is shown in figure 3. From table 3 it is observed that the model parameters have a significant influence on the waiting time of a packet in the system and in the queue. As the mean arrival rate  is increasing then the average waiting time of a packet in the queue and the average waiting time of a packet in the system are increasing when the other parameters remain fixed. It is also observed that as the parameterµ1 is increasing from 5 to 11 the average waiting time of a packet in the system and the average waiting time of a packet in the queue are decreasing from 0.204 to 0.196 and 0.058 to 0.054 respectively for fixed values of the other parameters. It is also observed that as the parameter µ2 is increasing from 7 to 10 the average waiting time of a packet in the system and the average waiting time of a packet in the queue are decreasing from 0.371 to 0.349 and 0.174 to 0.156 respectively for fixed values of the other parameters. It is further observed that when the mean arrival rate  increases the variance of the waiting time of a packet in the system is increasing when other parameters remain fixed. Similarly when the truncation parameters a and b are increasing the variance of the waiting time of the packet in the system is also increasing for fixed values of the other parameters. It is also observed that as the parameter p is increasing from 0.1 to 0.4 the average waiting time of a packet in the system and the average waiting time of a packet in the queue are decreasing from 0.408 to 0.388 and 0.202 to 0.187respectively for fixed values of the other parameters. V1. CONCLUSION This paper deals with a novel queuing model with two component mixture of doubly truncated exponentially distributed service time having poison arrivals. This queuing model is much useful for analyzing and designing the communication networks arising at places like data voice transmission, telecommunications, satellite communications, ATM Scheduling etc,. The traditional assumption of having infinite range service times is modified through doubly truncated nature of the random variable. Since, in reality no customer/ unit requires infinite service time. In addition to this finite range of the service time this model also includes heterogeneous nature of customer service times by considering mixture distribution. Through numerical studies it is established that the truncation as well as mixture distribution parameters have significant influence on system performance measures. This model also includes several of the earlier existing queuing models as 78
  • 9. Performance Evaluation of a Queueing Model with Two Component Mixture of … particular cases for limiting/specific values of the parameters. This model can also be extended for non-Poison arrivals and servers vacation models. Table 3:VALUES OF Ws AND Wq AND Var (Tq) a Var(T b p λ µ𝟏 µ 𝟐 Ws Wq q) 0.1 0.2 0.8 1 10 8 0.154 0.012 0.004 0.1 0.2 0.8 2 10 8 0.171 0.029 0.010 0.1 0.2 0.8 3 10 8 0.197 0.055 0.020 0.1 0.2 0.8 4 10 8 0.239 0.097 0.040 0.1 0.2 0.8 5 10 8 0.324 0.181 0.091 0.1 0.2 0.8 3 5 8 0.204 0.058 0.041 0.1 0.2 0.8 3 7 8 0.201 0.057 0.029 0.1 0.2 0.8 3 9 8 0.197 0.055 0.020 0.1 0.2 0.8 3 11 8 0.196 0.054 0.079 0.1 0.5 0.8 1 10 8 0.224 0.028 0.008 0.2 0.5 0.8 1 10 8 0.348 0.061 0.016 0.3 0.5 0.8 1 10 8 0.481 0.111 0.030 0.4 0.5 0.8 1 10 8 0.618 0.176 0.053 0.6 0.1 0.8 1 10 8 0.231 0.031 0.008 0.6 0.2 0.8 1 10 8 0.363 0.067 0.017 0.6 0.3 0.8 1 10 8 0.512 0.126 0.034 0.6 0.4 0.8 1 10 8 0.681 0.211 0.065 0.1 0.5 0.1 3 10 8 0.408 0.202 0.101 0.1 0.5 0.2 3 10 8 0.402 0.197 0.096 0.1 0.5 0.3 3 10 8 0.395 0.192 0.092 0.1 0.5 0.4 3 10 8 0.388 0.187 0.087 0.1 0.5 0.8 3 10 7 0.371 0.174 0.077 0.1 0.5 0.8 3 10 8 0.362 0.166 0.068 Figure 3:Relationship between the parameters and Ws, Wq and Var(Tq) 0.1 0.5 0.8 3 10 9 0.355 0.161 0.063 0.1 0.5 0.8 3 10 10 0.349 0.156 0.059 REFERENCES [1] Gross, D.And Harris, C. M. (1974) “Fundamentals of Queuing Theory.” John Wiley, New York. [2] Kleinrock,L.(1975) „Queueing Systems‟, Vol. 1, Wiley, New York. [3] Boxima O.J. And Groenendijk W.P. (1988) „Waiting time in discrete time cyclic -service systems‟, IEEE Transactions on Communications, 36, no.2, 164 -170. 79
  • 10. Performance Evaluation of a Queueing Model with Two Component Mixture of … [4] Boxma,O.J., And J.W. Cohen (1998) „The M/G/1 queue with heavy-tailed service time distribution‟, IEEE J. Selected Areas Commun. 16, 749–763. [5] Boxma, O.J,G.M.Koole,I.Mitrani (1995)„Polling models with Threshold Switching Quantative methods in parallel systems‟, 129-140. [6] Srinivasa Rao,P.,K.SrinivasaRao and J.Lakshminarayana (2003) „Single server Poisson Queueing model with mixture of exponential service time distribution‟.Vol-15(2)M,199-204. [7] Bunday.B.D.(1996) "An Introduction to queuing theory" John Wiley, New York. [8] Burke. P.J. (1975) „Delays in single server queues with batch input‟, Oper.Res, 23, 830-833. [9] Guy L.Curry, NatarajanGautam (2008) „Characterizing the departure process from a two server Markovian Queue: A Non-Renewal approach.‟ Winter Simulation Conference. [10] Haviv, M. And Vander Wal,J. (2007) “Waiting times in queues with relative priorities,” Operations Research Letters, 35, 591-594. [11] Hiroyuki Masuyama, Tetsuya Takine (2003)„Stationary queue length in a FIFO single server queue with service interruptions and multiple batch Markovian arrival streams‟. J.O.R.S.J, Vol-46, no.3,319- 341 [12] JewgeniH.Dshalalow (1991) „A Single server queue with random accumulation level‟.J.A.M.S.A, Vol- 4, No.3, 203-210. [13] Johnson,Kotz and Balakrishnan (2004)„Continuous univeriate distributions‟ vol-1 and 2,second edition. [14] Levy, Y. And Yechiali, U. (1975) „Utilization of idle time in an M/G/1 queueingsystem‟., Management Science 22, 202–211. [15] Ramaswamy, R. and L.D. Servi .(1988) „The busy period of M/G/1 vacation model with Bernoulli schedule.” stochastic models, 4, 507-521. [16] Takine T and Hesegawa T.(1992) „On M/G/1 queue with multiple vacations and gated service discipline‟, j.o.r.soc.japan-35,no.3,217-235 [17] Parthasarathy,P.R.,andK.V.Vijayashree (2002)„Fluid queues driven by a discouraged arrivals queue‟. IJMMS, Vol-24, 1509-1528 [18] MessaoudBoaunkhel,LotfiTadj (2007) „Optimal design of a bulk service queue‟, Investigacao Operacional,vol.27,131-138. [19] K.SRINIVASA RAO, P.SURESH VARMA and Y.SRINIVAS-(2008), Interdependent Queuing Model with startup delay, Journal of Statistical Theory and Applications, Vol. 7, No. 2 pp. 219-228. [20] Zhanyou Ma, WuyiYue, NaishuoTian (2008) „Analysis of a Geom/G/1 Queue with General Limited Service and MAVs‟.November,3,ISORA‟08, 359-368. [21] Andreas Brandt, Manfred Brandt (2008) „Waiting times for M/systems under state-dependent processor sharing‟ Queueing Systems, Vol.59, No.3, 297-319. [22] Ward Whitt (2006) „Fluid Models for Multiserver Queues with Abandonments‟, Operations Research, Vol.54, no.1,37-54. [23] K.SRINIVASA RAO, G.RAMESH, and J.L.NARAYANA, (2011)- Single server Poisson queueing model with truncated exponential service times, accepted in Journal of Mathematics and Mathematical Sciences, Vol. 2. [24] K.SRINIVASA RAO, M.GovindaRao and G.V.S.Rajkumar (2011)- Transient analysis of interdependent queueing model with state dependent service rates, accepted in International Journal of Ultra Scientist of Physical sciences, Vol.23,no.3. 80