The document summarizes a queueing model with two component mixture of doubly truncated exponential service times. The service time distribution is a two component mixture of doubly truncated exponential distributions, which can characterize heterogeneous and finite range service times. Assuming Poisson arrivals, the embedded Markov chain technique is used to analyze the system. Explicit expressions are derived for performance measures like average number of customers, average waiting time, throughput, and probability of idleness. Numerical analysis studies the sensitivity of performance measures to parameter changes. The model includes two component mixture of exponential, doubly truncated exponential, and exponential service time models as special cases.
Study of average losses caused by ill processing in a production line with im...Alexander Decker
This academic article analyzes average losses caused by ill-processing in a production line with immediate feedback and multi-server facilities at each processing unit. The authors model the production line as a queuing network with an arbitrary number of processing units in series, where each unit has multi-server capacity. They analyze the stationary behavior and find the solution in product form. Considering processing costs, the average loss to the system due to rejection of items from ill-processing is obtained.
SchNet: A continuous-filter convolutional neural network for modeling quantum...Kazuki Fujikawa
The document summarizes a paper about modeling quantum interactions using a continuous-filter convolutional neural network called SchNet. Some key points:
1) SchNet performs convolution using distances between nodes in 3D space rather than graph connectivity, allowing it to model interactions between arbitrarily positioned nodes.
2) This is useful for cases where graphs have different configurations that impact properties, or where graph and physical distances differ.
3) The paper proposes a continuous-filter convolutional layer and interaction block to incorporate distance information into graph convolutions performed by the SchNet model.
The document summarizes key aspects of simple queueing models:
[1] It describes the M/M/1 queue where arrivals and service times are exponentially distributed and there is a single server. The queue length over time is a Markov process.
[2] When arrival rate is less than service rate (ρ < 1), the queue is stable and has a stationary distribution with mean queue length of ρ/(1-ρ). When arrival rate exceeds service rate (ρ ≥ 1), the queue is unstable.
[3] The mean waiting time of a customer is 1/(μ-λ), showing it increases as the load approaches the critical value of ρ = 1.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document presents a study on the steady state and partial generating function of a single server retrial queue with exponential service times. It derives explicit expressions for the stationary distribution and factorial moments. The queue is modeled as an M/M/1 system with customers who find the server busy joining a retrial pool with exponential retrial rate. Using Foster's criterion and Burke's theorem, it is shown the system is ergodic if the traffic intensity is less than 1. Expressions for the partial generating functions and limiting probabilities are obtained. Factorial moments are also derived.
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier AnalysisAmr E. Mohamed
This document discusses the discrete-time Fourier transform (DTFT) and its properties. It provides examples of calculating the DTFT of sequences and using it to analyze linear time-invariant (LTI) systems. The key points are:
1. The DTFT represents a discrete-time signal as a complex-valued continuous function of digital frequency. It has periodicity and symmetry properties useful for analysis.
2. LTI systems can be analyzed in the frequency domain using their frequency response, which is the DTFT of the system's impulse response.
3. The steady-state response of an LTI system to an input signal can be computed from the system's frequency response evaluated at the input signal's
The document discusses correctness of algorithms and time complexity analysis. It covers using loop invariants and mathematical induction to prove correctness. Loop invariants must be true before and after each loop iteration. They help reason about algorithm behavior and establish correctness. The document provides an example of designing a max finding algorithm and establishing an appropriate loop invariant. It also briefly discusses using class invariants in object-oriented programming.
The theory of concurrent programming for a seasoned programmerRoman Elizarov
The document discusses concurrent programming theory and models. It begins with basic definitions of processes, threads, and shared memory models. It then covers formal models of computation including shared objects and registers. Key concepts discussed include linearizability, happens-before relations, mutual exclusion, and non-blocking algorithms.
Study of average losses caused by ill processing in a production line with im...Alexander Decker
This academic article analyzes average losses caused by ill-processing in a production line with immediate feedback and multi-server facilities at each processing unit. The authors model the production line as a queuing network with an arbitrary number of processing units in series, where each unit has multi-server capacity. They analyze the stationary behavior and find the solution in product form. Considering processing costs, the average loss to the system due to rejection of items from ill-processing is obtained.
SchNet: A continuous-filter convolutional neural network for modeling quantum...Kazuki Fujikawa
The document summarizes a paper about modeling quantum interactions using a continuous-filter convolutional neural network called SchNet. Some key points:
1) SchNet performs convolution using distances between nodes in 3D space rather than graph connectivity, allowing it to model interactions between arbitrarily positioned nodes.
2) This is useful for cases where graphs have different configurations that impact properties, or where graph and physical distances differ.
3) The paper proposes a continuous-filter convolutional layer and interaction block to incorporate distance information into graph convolutions performed by the SchNet model.
The document summarizes key aspects of simple queueing models:
[1] It describes the M/M/1 queue where arrivals and service times are exponentially distributed and there is a single server. The queue length over time is a Markov process.
[2] When arrival rate is less than service rate (ρ < 1), the queue is stable and has a stationary distribution with mean queue length of ρ/(1-ρ). When arrival rate exceeds service rate (ρ ≥ 1), the queue is unstable.
[3] The mean waiting time of a customer is 1/(μ-λ), showing it increases as the load approaches the critical value of ρ = 1.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document presents a study on the steady state and partial generating function of a single server retrial queue with exponential service times. It derives explicit expressions for the stationary distribution and factorial moments. The queue is modeled as an M/M/1 system with customers who find the server busy joining a retrial pool with exponential retrial rate. Using Foster's criterion and Burke's theorem, it is shown the system is ergodic if the traffic intensity is less than 1. Expressions for the partial generating functions and limiting probabilities are obtained. Factorial moments are also derived.
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier AnalysisAmr E. Mohamed
This document discusses the discrete-time Fourier transform (DTFT) and its properties. It provides examples of calculating the DTFT of sequences and using it to analyze linear time-invariant (LTI) systems. The key points are:
1. The DTFT represents a discrete-time signal as a complex-valued continuous function of digital frequency. It has periodicity and symmetry properties useful for analysis.
2. LTI systems can be analyzed in the frequency domain using their frequency response, which is the DTFT of the system's impulse response.
3. The steady-state response of an LTI system to an input signal can be computed from the system's frequency response evaluated at the input signal's
The document discusses correctness of algorithms and time complexity analysis. It covers using loop invariants and mathematical induction to prove correctness. Loop invariants must be true before and after each loop iteration. They help reason about algorithm behavior and establish correctness. The document provides an example of designing a max finding algorithm and establishing an appropriate loop invariant. It also briefly discusses using class invariants in object-oriented programming.
The theory of concurrent programming for a seasoned programmerRoman Elizarov
The document discusses concurrent programming theory and models. It begins with basic definitions of processes, threads, and shared memory models. It then covers formal models of computation including shared objects and registers. Key concepts discussed include linearizability, happens-before relations, mutual exclusion, and non-blocking algorithms.
M sc it_modelling_biological_systems2005Aafaq Malik
This document discusses modelling biological systems using differential equations. It begins by outlining why modelling is important given that biological systems contain dozens of interacting components in nonlinear ways. It then covers the statistical physics behind modelling, showing how simple chemical reactions can be described by ordinary differential equations. It provides examples of modelling kinetics, probabilities, and spatial heterogeneity. Finally, it demonstrates how to translate a biological description into a mathematical model using differential equations, providing the example of the Raf-1/RKIP/ERK pathway.
I am Ahmed M. I am a Signals and Systems Assignment Expert at matlabassignmentexperts.com. I hold a Master's in Matlab, from New York University, Abu Dhabi. I have been helping students with their assignments for the past 10 years. I solve assignments related to Signals and Systems.
Visit matlabassignmentexperts.com or email info@matlabassignmentexperts.com.
You can also call on +1 678 648 4277 for any assistance with Signals and Systems Assignment.
The document contains 8 questions pertaining to signals and systems. It covers topics like Fourier series, Fourier transforms, Laplace transforms, Z-transforms, continuous and discrete time linear time-invariant systems, sampling, and more. Students are required to answer any 5 out of the 8 questions, with all questions carrying equal marks. The questions involve theoretical concepts as well as mathematical problems to test the understanding of fundamental signals and systems concepts.
The document discusses digital image processing and two-dimensional transforms. It provides an agenda that covers two-dimensional mathematical preliminaries and two transforms: the discrete Fourier transform (DFT) and discrete cosine transform (DCT). It then discusses the DFT and DCT in more detail over several pages, covering properties, examples, and applications such as image compression.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document introduces the concept of random processes and provides examples to illustrate them. It defines a random process as a probability system composed of a sample space, an ensemble of time functions, and a probability measure. Random processes extend the concept of a random variable to incorporate the time parameter. Examples given include coin tossing, throwing a die, and thermal noise voltages across resistors. A random process is said to be stationary if its joint probability distribution is invariant to time shifts. Stationary processes have the property that the probability of waveforms passing through time-shifted windows remains the same. An example of a non-stationary process is also provided.
The slides for the equation deviation of recurrent neural network (RNN), back-propagation through time and Sequence-to-sequence (Seq2Seq) models in image/video captioning tasks. Used in group paper reading in University of Sydney.
The document discusses modeling service compositions and orchestrations using dynamic simulation. It aims to predict the behavior of service provisioning over time by modeling workflows as continuous-time Petri nets. This allows simulating how varying input request rates map to outputs while considering the structure and characteristics of the composition. The approach converts Petri nets into systems of ordinary differential equations to capture the dynamics and derive models for activities, places, and asynchronous messaging between components.
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Behzad Samadi
This document outlines a method for synthesizing backstepping controllers for piecewise polynomial (PWP) systems using sum of squares (SOS) optimization. It introduces PWP systems in strict feedback form and formulates controller synthesis as a convex feasibility problem by constructing SOS Lyapunov functions. An example application to a single-link flexible-joint robot partitions variables to create regions and designs a stabilizing PWP controller.
A Proposition for Business Process ModelingAng Chen
The document proposes a graphical notation called BPMN+ for modeling business processes. It aims to be graphical and easy to use while also having formal semantics and being operational/executable. Key goals include being expressive, capable of distributed programming, and compatible with the existing BPMN standard. The notation is based on a Service Component Model and uses concepts like services, properties, and concurrent data objects. It also defines synchronization patterns like simultaneous, sequence, and alternative to model relationships between process steps.
Supervised Hidden Markov Chains.
Here, we used the paper by Rabiner as a base for the presentation. Thus, we have the following three problems:
1.- How efficiently compute the probability given a model.
2.- Given an observation to which class it belongs
3.- How to find the parameters given data for training.
The first two follow Rabiner's explanation, but in the third one I used the Lagrange Multiplier Optimization because Rabiner lacks a clear explanation about how solving the issue.
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and SystemsAmr E. Mohamed
The document discusses discrete-time signals and systems. It defines discrete-time signals as sequences represented by x[n] and discusses important sequences like the unit sample, unit step, and periodic sequences. It then defines discrete-time systems as devices that take a discrete-time signal x(n) as input and produce another discrete-time signal y(n) as output. The document classifies systems as static vs. dynamic, time-invariant vs. time-varying, linear vs. nonlinear, and causal vs. noncausal. It provides examples to illustrate each classification.
This document discusses the discrete-time Fourier transform (DTFT). It begins by introducing the DTFT and how it can be used to represent aperiodic signals as the sum of complex exponentials. Several properties of the DTFT are then discussed, including linearity, time/frequency shifting, periodicity, and conjugate symmetry. Examples are provided to illustrate how to compute the DTFT of simple signals. The document also discusses how the DTFT can be used to represent periodic signals and impulse trains.
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSieijjournal
This paper investigates the usage of some sophisticated and advanced nonlinear control algorithms in order to control a nonlinear Coupled Tanks System. The first control procedure is called the Feedback linearisation control (FLC), this type of control has been found a successful in achieving a global exponential asymptotic stability, with very short time response, no significant overshooting is recorded and with a negligible norm of the error. The second control procedure is the approaches of Back stepping control (BC) which is a recursive procedure that interlaces the choice of a Lyapunov function with the design of feedback control, from simulation results it shown that this method preserves tracking, robust control and it can often solve stabilization problems with less restrictive conditions may been countered in other methods. Finally both of the proposed control schemes guarantee the asymptoticstability of the closed loop system meeting trajectory tracking objectives.
This document provides definitions and explanations of key concepts in algorithm design and analysis including:
- Performance measurement is concerned with obtaining the space and time requirements of algorithms.
- An algorithm is a finite set of instructions that accomplishes a task given certain inputs and criteria.
- Time complexity refers to the amount of computer time needed for an algorithm to complete, while space complexity refers to the memory required.
- Common asymptotic notations like Big-O, Omega, and Theta are used to describe an algorithm's scalability.
- Divide-and-conquer and greedy algorithms are important design techniques that break problems into subproblems.
The document discusses several brute-force algorithms including bubble sort, selection sort, string matching, closest pair of points, convex hulls, traveling salesman problem, knapsack problem, and assignment problem. It analyzes the runtime of each algorithm, which are often quadratic or exponential time due to considering all possible combinations in a systematic way.
This document summarizes a research paper that develops a mathematical model of a queueing system with batch arrivals, two optional phases of service, optional re-service, and Bernoulli vacations. The server provides an essential first phase of service, after which customers may optionally repeat that service or proceed to an optional second phase of service. After each service, the server may take a vacation. Differential equations describing the time-dependent behavior of the system are presented. The long-term properties of the queue are also analyzed.
fourier representation of signal and systemsSugeng Widodo
This document provides an overview of Fourier analysis concepts including:
- The Fourier transform decomposes a signal into its constituent frequencies.
- Properties of the Fourier transform like linearity, time/frequency shifting, and modulation are discussed.
- The Fourier transform of a time derivative or integral is related to the original Fourier transform.
- Convolution and correlation theorems explain how time domain operations translate to the frequency domain.
1. A giant python swallowed an alligator in Everglades National Park, Florida, according to an article in yesterday's New York Times.
2. The article was titled "Invasion of the Giant Pythons" from PBS Nature.
3. The document provided a brief news item about an incident of a giant python eating an alligator in Florida's Everglades National Park.
This document summarizes key concepts related to martingales and stopping times in probability theory. It begins with an introduction to martingales and their properties. A martingale is a stochastic process where the expected future value is equal to the present value. The document then discusses stopping times, which are random variables that determine when a stochastic process will stop. A key theorem discussed is Doob's Optional Stopping Theorem, which establishes conditions under which a martingale that is stopped at a random time remains a martingale. The document concludes by defining stochastic processes and stopped processes, which are processes that are stopped at a specified stopping time.
The document provides instructions for cropping photos using Adobe Fireworks in 7 steps: 1) Open an image in Fireworks, 2) Select the image using the white selection tool, 3) Cut around the image using the pen tool, 4) Connect the pen tool path, 5) Select the pen tool path, 6) Convert the path to a marquee, 7) Copy and paste the cropped image into a new file.
M sc it_modelling_biological_systems2005Aafaq Malik
This document discusses modelling biological systems using differential equations. It begins by outlining why modelling is important given that biological systems contain dozens of interacting components in nonlinear ways. It then covers the statistical physics behind modelling, showing how simple chemical reactions can be described by ordinary differential equations. It provides examples of modelling kinetics, probabilities, and spatial heterogeneity. Finally, it demonstrates how to translate a biological description into a mathematical model using differential equations, providing the example of the Raf-1/RKIP/ERK pathway.
I am Ahmed M. I am a Signals and Systems Assignment Expert at matlabassignmentexperts.com. I hold a Master's in Matlab, from New York University, Abu Dhabi. I have been helping students with their assignments for the past 10 years. I solve assignments related to Signals and Systems.
Visit matlabassignmentexperts.com or email info@matlabassignmentexperts.com.
You can also call on +1 678 648 4277 for any assistance with Signals and Systems Assignment.
The document contains 8 questions pertaining to signals and systems. It covers topics like Fourier series, Fourier transforms, Laplace transforms, Z-transforms, continuous and discrete time linear time-invariant systems, sampling, and more. Students are required to answer any 5 out of the 8 questions, with all questions carrying equal marks. The questions involve theoretical concepts as well as mathematical problems to test the understanding of fundamental signals and systems concepts.
The document discusses digital image processing and two-dimensional transforms. It provides an agenda that covers two-dimensional mathematical preliminaries and two transforms: the discrete Fourier transform (DFT) and discrete cosine transform (DCT). It then discusses the DFT and DCT in more detail over several pages, covering properties, examples, and applications such as image compression.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document introduces the concept of random processes and provides examples to illustrate them. It defines a random process as a probability system composed of a sample space, an ensemble of time functions, and a probability measure. Random processes extend the concept of a random variable to incorporate the time parameter. Examples given include coin tossing, throwing a die, and thermal noise voltages across resistors. A random process is said to be stationary if its joint probability distribution is invariant to time shifts. Stationary processes have the property that the probability of waveforms passing through time-shifted windows remains the same. An example of a non-stationary process is also provided.
The slides for the equation deviation of recurrent neural network (RNN), back-propagation through time and Sequence-to-sequence (Seq2Seq) models in image/video captioning tasks. Used in group paper reading in University of Sydney.
The document discusses modeling service compositions and orchestrations using dynamic simulation. It aims to predict the behavior of service provisioning over time by modeling workflows as continuous-time Petri nets. This allows simulating how varying input request rates map to outputs while considering the structure and characteristics of the composition. The approach converts Petri nets into systems of ordinary differential equations to capture the dynamics and derive models for activities, places, and asynchronous messaging between components.
Backstepping Controller Synthesis for Piecewise Polynomial Systems: A Sum of ...Behzad Samadi
This document outlines a method for synthesizing backstepping controllers for piecewise polynomial (PWP) systems using sum of squares (SOS) optimization. It introduces PWP systems in strict feedback form and formulates controller synthesis as a convex feasibility problem by constructing SOS Lyapunov functions. An example application to a single-link flexible-joint robot partitions variables to create regions and designs a stabilizing PWP controller.
A Proposition for Business Process ModelingAng Chen
The document proposes a graphical notation called BPMN+ for modeling business processes. It aims to be graphical and easy to use while also having formal semantics and being operational/executable. Key goals include being expressive, capable of distributed programming, and compatible with the existing BPMN standard. The notation is based on a Service Component Model and uses concepts like services, properties, and concurrent data objects. It also defines synchronization patterns like simultaneous, sequence, and alternative to model relationships between process steps.
Supervised Hidden Markov Chains.
Here, we used the paper by Rabiner as a base for the presentation. Thus, we have the following three problems:
1.- How efficiently compute the probability given a model.
2.- Given an observation to which class it belongs
3.- How to find the parameters given data for training.
The first two follow Rabiner's explanation, but in the third one I used the Lagrange Multiplier Optimization because Rabiner lacks a clear explanation about how solving the issue.
DSP_2018_FOEHU - Lec 03 - Discrete-Time Signals and SystemsAmr E. Mohamed
The document discusses discrete-time signals and systems. It defines discrete-time signals as sequences represented by x[n] and discusses important sequences like the unit sample, unit step, and periodic sequences. It then defines discrete-time systems as devices that take a discrete-time signal x(n) as input and produce another discrete-time signal y(n) as output. The document classifies systems as static vs. dynamic, time-invariant vs. time-varying, linear vs. nonlinear, and causal vs. noncausal. It provides examples to illustrate each classification.
This document discusses the discrete-time Fourier transform (DTFT). It begins by introducing the DTFT and how it can be used to represent aperiodic signals as the sum of complex exponentials. Several properties of the DTFT are then discussed, including linearity, time/frequency shifting, periodicity, and conjugate symmetry. Examples are provided to illustrate how to compute the DTFT of simple signals. The document also discusses how the DTFT can be used to represent periodic signals and impulse trains.
FEEDBACK LINEARIZATION AND BACKSTEPPING CONTROLLERS FOR COUPLED TANKSieijjournal
This paper investigates the usage of some sophisticated and advanced nonlinear control algorithms in order to control a nonlinear Coupled Tanks System. The first control procedure is called the Feedback linearisation control (FLC), this type of control has been found a successful in achieving a global exponential asymptotic stability, with very short time response, no significant overshooting is recorded and with a negligible norm of the error. The second control procedure is the approaches of Back stepping control (BC) which is a recursive procedure that interlaces the choice of a Lyapunov function with the design of feedback control, from simulation results it shown that this method preserves tracking, robust control and it can often solve stabilization problems with less restrictive conditions may been countered in other methods. Finally both of the proposed control schemes guarantee the asymptoticstability of the closed loop system meeting trajectory tracking objectives.
This document provides definitions and explanations of key concepts in algorithm design and analysis including:
- Performance measurement is concerned with obtaining the space and time requirements of algorithms.
- An algorithm is a finite set of instructions that accomplishes a task given certain inputs and criteria.
- Time complexity refers to the amount of computer time needed for an algorithm to complete, while space complexity refers to the memory required.
- Common asymptotic notations like Big-O, Omega, and Theta are used to describe an algorithm's scalability.
- Divide-and-conquer and greedy algorithms are important design techniques that break problems into subproblems.
The document discusses several brute-force algorithms including bubble sort, selection sort, string matching, closest pair of points, convex hulls, traveling salesman problem, knapsack problem, and assignment problem. It analyzes the runtime of each algorithm, which are often quadratic or exponential time due to considering all possible combinations in a systematic way.
This document summarizes a research paper that develops a mathematical model of a queueing system with batch arrivals, two optional phases of service, optional re-service, and Bernoulli vacations. The server provides an essential first phase of service, after which customers may optionally repeat that service or proceed to an optional second phase of service. After each service, the server may take a vacation. Differential equations describing the time-dependent behavior of the system are presented. The long-term properties of the queue are also analyzed.
fourier representation of signal and systemsSugeng Widodo
This document provides an overview of Fourier analysis concepts including:
- The Fourier transform decomposes a signal into its constituent frequencies.
- Properties of the Fourier transform like linearity, time/frequency shifting, and modulation are discussed.
- The Fourier transform of a time derivative or integral is related to the original Fourier transform.
- Convolution and correlation theorems explain how time domain operations translate to the frequency domain.
1. A giant python swallowed an alligator in Everglades National Park, Florida, according to an article in yesterday's New York Times.
2. The article was titled "Invasion of the Giant Pythons" from PBS Nature.
3. The document provided a brief news item about an incident of a giant python eating an alligator in Florida's Everglades National Park.
This document summarizes key concepts related to martingales and stopping times in probability theory. It begins with an introduction to martingales and their properties. A martingale is a stochastic process where the expected future value is equal to the present value. The document then discusses stopping times, which are random variables that determine when a stochastic process will stop. A key theorem discussed is Doob's Optional Stopping Theorem, which establishes conditions under which a martingale that is stopped at a random time remains a martingale. The document concludes by defining stochastic processes and stopped processes, which are processes that are stopped at a specified stopping time.
The document provides instructions for cropping photos using Adobe Fireworks in 7 steps: 1) Open an image in Fireworks, 2) Select the image using the white selection tool, 3) Cut around the image using the pen tool, 4) Connect the pen tool path, 5) Select the pen tool path, 6) Convert the path to a marquee, 7) Copy and paste the cropped image into a new file.
Dashaun Joseph is a Marine Corps veteran with strong skills in communication, problem solving, customer service, and SOPs. He has experience in IT roles providing technical support, troubleshooting networks, and maintaining systems and firewalls. His most recent roles include volunteering at the Salvation Army providing IT support and working as a network operator at Starfone monitoring service quality and troubleshooting phone systems worldwide.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
This book provides a 10-week plan for women to enjoy food while losing weight and feeling great. The plan aims to help readers develop a more natural and pleasurable relationship with food. Following the plan and fun assignments, readers will rediscover nourishment from food while supercharging their body and life. The book leaves readers slimmer, healthier and better able to savor delicious bites without compromising their figure. It offers recipes and tips for balancing health and enjoyment of food.
Leveraging Low-Cost FPGA Prototyping for Validation of Highly Threaded Server...DVClub
The document discusses leveraging low-cost FPGA prototyping to validate a highly threaded server-on-chip design. It outlines the increasing verification challenges of such designs and how FPGA prototyping can supplement expensive emulation approaches. Guidelines are provided for FPGA design mapping and debugging challenges. Results showed an OpenSPARC T2 model running on an FPGA prototype built for under $100k using just 1 engineer over 3 months.
The document discusses the Lifetime Income Model, which is designed to analyze and implement a strategic retirement distribution plan to help increase income, minimize risk, and provide tax efficiency and asset preservation. It does this by allocating assets into time-sensitive distribution phases to efficiently organize income needs throughout one's lifetime. The model considers factors like inflation, longevity, taxes, and risk tolerance to illustrate how long savings may last and help plan an appropriate lifestyle. It aims to diversify assets across classes, tax strategies, and income needs to reduce portfolio volatility and meet current and future income needs.
Obafunso Rebecca Obasade is seeking a challenging career in management where she can utilize her skills and bring innovation. She has a bachelor's degree in business administration in progress and higher national diplomas in secretarial studies. Her experience includes customer service at Guaranty Trust Bank, personnel work with NYSC, and ICT training. She has strong communication, presentation, and organizational skills and is highly analytic and innovative.
This document discusses using assertions in analog mixed-signal (AMS) verification. It describes how assertions can be used to check interface assumptions, power mode transitions, and timing relationships for AMS blocks. Assertions provide compact and precise checks that can be reused across different verification methodologies. The document also provides an example of using Verilog-AMS monitors to digitize continuous signals from an AMS model so they can be checked using SystemVerilog assertions.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Predicting organic reaction outcomes with weisfeiler lehman networkKazuki Fujikawa
This document discusses neural message passing networks for modeling quantum chemistry. It defines message passing networks as having message functions that update node states based on neighboring node states, vertex update functions that update node states based to accumulated messages, and a readout function that produces an output for the full graph. It provides examples of specific message, update, and readout functions used in existing message passing models like interaction networks and molecular graph convolutions.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...ijtsrd
In this paper, a class of generalized chaotic systems with exponential nonlinearity is studied and the state observation problem of such systems is explored. Using differential inequality with time domain analysis, a practical state observer for such generalized chaotic systems is constructed to ensure the global exponential stability of the resulting error system. Besides, the guaranteed exponential decay rate can be correctly estimated. Finally, several numerical simulations are given to demonstrate the validity, effectiveness, and correctness of the obtained result. Yeong-Jeu Sun "An Exponential Observer Design for a Class of Chaotic Systems with Exponential Nonlinearity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38233.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/38233/an-exponential-observer-design-for-a-class-of-chaotic-systems-with-exponential-nonlinearity/yeongjeu-sun
This paper proposes modeling and identification of dynamical systems in delta
domain using neural network. The properties of delta operator are used such as greater
numerical robustness in computation and superior coefficients representation in finite word
length in implementation and well ensured numerical conditioning at high sampling
frequency. To formulate the identification scheme delta operator model is recasted into a
realizable neural network structure using the properties of inverse delta operator.
The document presents a new encryption method for elliptic curve cryptography based on matrices. It begins by generating an addition table containing all possible point combinations on the elliptic curve. The plaintext is then converted to multiple points on the curve. These points are arranged in a matrix and encrypted using matrix multiplication with a non-singular matrix. The resulting cipher matrix undergoes circular shifting. The decryption process recovers the points from the cipher and performs the inverse operations to obtain the original plaintext. An example is provided to demonstrate the encryption of the word "cipher" using this method.
In these two lectures, we’re looking at basic discrete time representations of linear, time invariant plants and models and seeing how their parameters can be estimated using the normal equations.
The key example is the first order, linear, stable RC electrical circuit which we met last week, and which has an exponential response.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Markov chains can be used for economic modeling. A Markov chain is characterized by: (1) possible states of a system, (2) a transition matrix showing the probability of moving between states, and (3) initial state probabilities. The transition matrix specifies the one-step probabilities between each pair of states. Markov chains can converge to a stationary distribution over time. Recurrent states will be revisited, while transient states will not. Markov chains can model topics like industry investment, consumption/saving over a lifecycle, and regime-switching in economic time series.
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Implementing 3D SPHARM Surfaces Registration on Cell B.E. ProcessorPTIHPA
This document describes implementing 3D SPHARM surface registration on a Cell processor. It discusses SPHARM expansion and registration, calculating rotation coefficients, root mean square distance, and implementations in Matlab and on the Cell processor. The Cell implementation uses loop fusion, lookup tables, and optimizations for the Cell architecture like vectorization and data alignment. Performance analysis shows a dramatic increase in speed on the Cell due to its architecture and algorithm optimizations. Care is needed for data placement and transfer due to limited local store.
Analysis of single server queueing system with batch serviceAlexander Decker
This document analyzes a single server queueing system with fixed batch service under multiple vacations with loss and feedback. Customers arrive according to a Poisson process and service times are exponential. The server provides batch service to k customers at a time. After service, batches may rejoin the queue with probability q (feedback) or leave. If fewer than k customers are present, the server takes a vacation. Customers may join the queue upon arrival with probability p or leave (loss). The generating functions for number of customers in the queue during busy and vacation periods are derived. Closed form solutions are obtained for the steady state probabilities and mean number of customers. Numerical studies are conducted to analyze the impact of parameters on mean and variance
Analysis of single server queueing system with batch serviceAlexander Decker
This document analyzes a single server queueing system with fixed batch service under multiple vacations with loss and feedback. Customers arrive following a Poisson process and service times are exponential. The server provides batch service to k customers at a time. If fewer than k customers are present after service, the server takes a vacation with exponential length. The model incorporates feedback, where dissatisfied customers may rejoin the queue, and loss, where impatient arriving customers may leave without service. The generating functions for the number of customers in the queue during busy and vacation periods are derived. Closed form solutions are obtained for the steady state probabilities and mean number of customers in the system.
11.generalized and subset integrated autoregressive moving average bilinear t...Alexander Decker
This document proposes generalized integrated autoregressive moving average bilinear (GBL) time series models and subset generalized integrated autoregressive moving average bilinear (GSBL) models to achieve stationary for all nonlinear time series. It presents the models' formulations and discusses their properties including stationary, convergence, and parameter estimation. An algorithm is provided to fit the one-dimensional models. The generalized models are applied to Wolfer sunspot numbers and the GBL model is found to perform better than the GSBL model.
This document describes an RFID anti-collision algorithm based on a bi-directional binary exponential index. The algorithm uses stochastic methods to resolve tag collisions. It defines intervals, request commands, and tag states. Tags adjust their response probability based on reader commands, forming a Markov chain model. Mathematical analysis and simulations show the algorithm has high efficiency, stability, and self-adaptability even as tag numbers and entrance rates vary dynamically. The algorithm outperforms ALOHA methods and is more impartial than tree-searching algorithms.
Second Genetic algorithm and Job-shop scheduling presentationAccenture
This document describes a genetic algorithm approach for solving job shop scheduling problems. It proposes new crossover and mutation operators designed based on the characteristics of job shop problems. The crossover operator combines operation orders from different machines in the parents. The mutation operator permutes successive operations on the same machine if they are on the critical path, to potentially reduce makespan. Experimental results using the new operators show improved convergence speed over a simple genetic algorithm.
This document presents the mathematical analysis of the steady state behavior of a complex queuing network model. The model consists of two subsystems - one with two bi-serial channels and the other with three parallel channels - that are both linked to a common server. The arrivals follow a Poisson distribution and service times are exponentially distributed. Generating function techniques are used to derive differential difference equations and steady state equations to determine various queue characteristics like mean queue size and average waiting time. A computer program and numerical example are provided to validate the model, which has applications in industries, administrative systems, and other areas involving decision making.
Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 8 (April 2013), PP. 71-80
Performance Evaluation of a Queueing Model with Two
Component Mixture of Doubly Truncated Exponential
Service Times
K.SrinivasRao1,G.Ramesh2, M.Seshashayee3
1
Dept of Statistics, Andhra University,Visakhapatnam
2
Dept of BSH,MVGRCollege,Vizianagaram
3
Dept of CS, GITAM University,Visakhapatnam
Abstract:-In this paper, we introduce and analyze a new queueing model with the assumption that the
service time of the customer follows a two component mixture of doubly truncated exponential
distribution. The doubly truncated two component mixture distribution is capable of characterizing the
heterogeneous and finite range nature of the service time. This service time distributions also includes
two component mixture of exponential service time, doubly truncated exponential time and
exponential service time queuing models as limiting/particularcases. Assuming the arrival process
follows a Poison process and using the embedded markov chain technique the system behaviour is
analyzed. Explicit expressions for the system performance like average number of customers in the
system and in the queue, average waiting time of a customer in the queue, the throughput of the service
station, the probability of the idleness of the service etc,. are derived. Through numerical illustration,
the sensitivity of the model performance measures with respect to the changes in the model parameter
is also studied.
Keywords:-Queueing,Truncated,Exponential Service times,Poisson Model
I. INTRODUCTION
Queueing models create lot of interest due to their ready applicability in wide varity of situations
prevailing at places like, transportation, communication networks, production processes, reliability analysis,
computer performance evaluations studies, etc,.(Boxima O.J.,(1988), Bunday.B.D.(1996)).A queue is a waiting
line of units demanding service at a service facility (Andreas Brandt,2008). Congestion is a natural phenomenon
in everyday life. Queueing is a mechanism that is used to handle congestion. A system consisting of service
facility process of a service and a process of arrival of customer is called a queueingsystem(Burke. P.J. (1975)).
In queueing models it is customary to assume that the arrival and service processes follow Poisson processes
such that the inter arrival times and the inter service times follow exponential
distributions.(Haviv.M(2007),Guy.L.Curry(2008),K.Srinivasa Raoet.al,2008). This assumption of inter-service
times being follow an exponential distribution is valid only when the service time required by a customer is
having infinite range and long upper tail. (Hiroyuki Masuyama, Tetsuya Takine (2003)).However, in many
practical situations arising at places like communication systems the service time required by the customer is
finite. Hence, to have an approximate model for this sort of situations, the service time of the customer is to be
approximated with truncated distributions. (Altiok,T.(1982), Patrick,M.,(1999), Guodong Pan (2010)). Very
little work has been reported regarding queueing models with truncated service time distribution. Hence in this
paper, in order to have efficient congestion control we developed and analyzed a queueing model with the
assumption that the service time required by the packet follows a two component mixture of a doubly truncated
exponential distribution. Some practical situations at places, like telecommunications, the service time required
by the packet may not be homogeneous. Theheterogeneity of service times can be modeled by considering two
component mixture of distribution.Here, it is assumed that the arrival of packets follows a Poisson process.
Using the imbedded Markovchain technique, the probability generating function of the number of packets in the
system is derived. The system characteristics like, the probability of emptiness of the system, the mean number
of packets in the queue,theLaplace transformation of the waiting time distribution of a packet, the average
waiting time of apacket, the variance of the number of packet in the queue, the variance of the waiting time of a
packetetc,. are obtained. The sensitivity of the model with respect to the parameters is also studied. This model
also includes some of the earlier models as particular casesfor specific or limiting values of the parameters.
71
2. Performance Evaluation of a Queueing Model with Two Component Mixture of …
II.POISSON QUEUEING MODEL WITH TWO COMPONENT MIXTURE OF
DOUBLY TRUNCATED EXPONENTIAL SERVICE TIMES
Weconsider a single server Poisson Queueing system in which the arrival of packets follows a Poisson
process with parameter λ.It is also assumed that theinter-service times follow a two component mixture of
doubly truncated exponential distribution with parameters µ1 , µ2, p, a and b and having differences. This
assumption is made since the service time required for completing any activity is finite and is bound by finite
values of a and b.
The probability density function of the inter service times is,
p 1 t (1 p) 2 t ;𝑎 < 𝑡 < 𝑏(1)
b(t) = e
e- 1a -e- 1b e 1
e- 2 a -e- 2 b
2
The mean service time is,
p 1 a1 e a 1 b1 e b
1
1
E (T )
1 (e- 1a -e- 1b )
(1 p) 1 a2 e 2a 1 b2 e 2b (2)
2 (e- 2a -e- 2b )
Following the heauristic argument given by Gross and Harris (1974) the steady state behavior of the
model is studied. The imbedded stochastic process𝑋(𝑡 𝑖 ), where, X denotes the number in the system and
𝑡1, 𝑡2, 𝑡3, . .,are the successive times of completion of service.
Since,𝑡 𝑖 is the completion time of the 𝑖th packet, then X(𝑡 𝑖 ) is the number of packets the 𝑖th
packet leaves behind as he departs. Since, the state space is discrete, 𝑋 𝑖 represents the number of packets
remaining in the system as the 𝑖thpacket departs. Then forall n>0 one can have
𝑋 𝑛 − 1 + 𝐴 𝑛+1 ; 𝑋𝑛 ≥ 1
𝑋 𝑛+1 = (3)
𝐴 𝑛+1 ; 𝑋𝑛 = 0
where,𝑋 𝑛 is the number in the system at the nth departure point and 𝐴 𝑛+1 is the number of packets who
arrived during the service time,𝑆 (𝑛+1) , of the (n+1)st packet.
The random variable 𝑆 (𝑛+1) by assumption is independent of previous service times and the length of
the queue. Since arrivals are Poissonian, the random variable 𝐴 𝑛+1 depends only on S and not on the queue are
on the time of service initiation. Then
t
Pr A a e (t )
j i 1
dB(t ) , ( j i 1, i 1)
0 ( j i 1)!
0 (4) , ( j i 1, i 1)
Let𝑝 𝑖𝑗 denote the probability that the system size immediately after a departure point is j given that the
system size after previous departure was 𝑖. 𝑘 𝑛 is the probability that there are n arrivals during a service time
t.Then
𝑝 𝑖𝑗 = 𝑃𝑟 {System size immediately after a departure point is j| system size after previousDeparturewas }
=𝑃𝑟 {𝑋 𝑛+1 =𝑗|𝑋 𝑛 =𝑖}
where,
b
t ( t )
n
p1 (1 p) 2 t ( 5)
t
pij e e 1
e 2
dt
a
n ! e 1a e 1b e 2 a e 2b
This implies that 𝑝 𝑖𝑗 is equals to𝑘 𝑗 −𝑖+1 and
P pij
Assuming that the system is in steady state, and 𝑝 𝑖𝑗 = 𝜋 𝑗
Then,
i 1
pi 0 ki j ki j 1 i 0,1, 2,... (6)
j 1
where, 𝜋 𝑗 is the probability that there arejpackets in the system at a departure point after steady state is reached.
i
Let P( z ) z i
i 0
𝑧 ≤1 (7)
K ( z ) ki z i are the generating functions of n and k n respectively
i 0
Hence,
t (8)
b n
p (1 p) 2
K ( z) e
n 0 a
t
n!
z n 1a 1 1b e 1t 2 a 2b e 2t dt
e e e e
After simplification, we get
72
3. Performance Evaluation of a Queueing Model with Two Component Mixture of …
p 1 e (1 z ) a e (1 z ) b
1 1
K ( z) 1a 1b
e e 1 (1 z )
(1 p ) 2 e
(1 z ) a
e
(1 z ) b
2 2
2 a 2 b 9
e e 2 (1 z )
p (1 a1 )e a (1 b1 )e b
1 1
K '(1)
1 (e a e b )
1 1
1 p (1 a2 )e a (1 b2 )e b (10)
2 2
2 a 2b
2 (e e )
p (1 a1 )e 1a (1 b1 )e 1b (1 p) (1 a2 )e 2a (1 b2 )e 2b
P( z ) 1
1 (e 1a e 1b ) 2 (e 2 a e 2 b )
p e[ (1 z ) 1 ]a e[ (1 z ) 1 ]b (1 p) 2 e[ (1 z ) 2 ]a e[ (1 z ) 2 ]b
(1 z ) 1a 1 1b
e e 2 a 2b
1 (1 z ) e e 2 (1 z )
1
p1 e[ (1 z ) 1 ]a e[ (1 z ) 1 ]b (1 p) 2 e[ (1 z ) 2 ]a e[ (1 z ) 2 ]b
1a 1b
2 a 2b z (11)
e e
1 (1 z ) e e 2 (1 z )
III.SYSTEM CHARACTERISTICS
The performance measures of the model are developed by Expanding the above equation (11) and
collecting the constant terms we get the
Probability that the system size is emptyas
p (1 a1 )e 1a (1 b1 )e 1b
P0 = 1
1 (e 1a e 1b )
(1 p) (1 a2 )e 2a (1 b2 )e 2b (12)
2 (e 2 a e 2 b )
The average number of packets in system can be obtained as,
(1 a1 )e a (1 b1 )e b
1
1
( a 1 2a 1 2)e
2 2 2 1 a
(b 1 2b1 2)e
2 2 1b
L P
2 1 1 (e e ) (1 a1 )e
1 a 1b 1 a 1b 1 a 1b
1 (e e ) (1 b1 )e
(1 a 2 )e a (1 b 2 )e b
2
2
( a 2 2a 2 2)e
2 2 2 2 a
(b 2 2b 2 2)e
2 2 2b
(13)
(1 P )
2 2 2 (e e ) (1 a 2 )e
2 a 2b 2 a 2 b 2 a 2 b
2 (e e ) (1 b 2 )e
The average number of packets in the system is,
2 (a 2 2 2a 2)e 1a (b2 2 2b 2)e 1b
1
Lq P
1 1 1
21 1 (e 1a e 1b ) (1 a1 )e 1a (1 b1 )e 1b
2 (a 2 2 2a 2)e 2a (b 2 2 2b 2)e 2b
(14)
(1 P)
2 2 2 2
22 2 (e e ) (1 a2 )e (1 b2 )e
2 a 2b 2 a 2b
73
4. Performance Evaluation of a Queueing Model with Two Component Mixture of …
The variance of the number of packets in the system is,
(1 a1 )e 1a (1 b1 )e 1b 1 (e 1a e 1b ) - (1 a1 )e 1a (1 b1 )e 1b
Var ( N ) P
1 (e 1a e 1b ) 1 (e 1a e 1b )
2 a 2 2 2a 2 e 1a b 2 2 2b 2 e 1b
+
1 1 1 1
21 1 (e e ) - (1 a1 )e (1 b1 )e
1a 1b 1a 1b
3 (e 1a e 1b ) 2 (1 a )e 1a (1 b )e 1b 2 a 2 2 2a 2 e 1a b 2 2 2b 2 e 1b
1 1 1 1 1 1 1
1 (e 1a e 1b ) 21 1 (e 1a e 1b ) - (1 a1 )e 1a (1 b1 )e 1b
3 3 a 2 12 21a 2)e 1a (b 2 12 21b 2)e 1b 13 3 (a 3e 1a b3e 1b )
312 1 (e 1a e 1b ) - (1 a1 )e 1a (1 b1 )e 1b
(1 a2 )e 2 (1 b2 )e 2 2 (e 2 e 2 )- (1 a2 )e 2 (1 b2 )e 2
a b a b a b
(1 P)
2 (e 2 a e 2b ) 2 (e 2 a e 2b )
a 2 2a2 2 e b 2 2b2 2 e
2 2 2 2 a 2 2 2b
+
2 2 (e 2a e 2b ) - (1 a2 )e 2a (1 b2 )e 2b
2
a 2 2a2 2 e b 2 2b2 2 e
3 (e 2a e 2b ) 2 (1 a )e 2a (1 b )e 2b 2
2 2 2 a 2 2 2b
2 2 2
2 (e 2 a e 2b ) 2 2 2 (e 2a e 2b ) - (1 a2 )e 2a (1 b2 )e 2b
3 3 a 2 2 2 a 2)e 2a (b 2 2 2 b 2)e 2b 3 3 (a 3e 2a b3e 2b )
2 2 2 2 2
32 2 2 (e 2a e 2b ) - (1 a2 )e 2a (1 b2 )e 2b
(15)
IV. WAITING TIME DISTRIBUTION OF THE MODEL
We derive the waiting time distribution of the single server Poisson arrival queueingmodel with two
component mixture ofdoublytruncated exponential service times. Consider the queueing discipline of the system
as first in first out.
Let 𝐵 ∗ (𝑠) be theLaplace transformation of the inter-service time distribution and 𝑊 ∗ (𝑠) be the
Laplace transform of the waiting time distribution. Then we have
p
e ( s 1 ) a e ( s 1 ) b
B* ( s )
1
1 s e 1a e 1b
(1 p )
e ( s 2 ) a e ( s 2 ) b (16)
2
2 s e 2 a e 2b
The Laplace transformation of waiting time distributionis
[1 K '(1)](1 z ) B*[ (1 z )]
W *[ (1 z )]
B*[ (1 z )] z (17)
writing (1 z ) , we get z 1
Therefore,
[1 K '(1)] B* ( )
W * ( ) (18)
[1 B* ( )]
[1 K '(1)]s
W *q ( s )
s [1 B* ( s )] (19)
where, B * ( s ) is the Laplace transformation of the service time distribution and K '(1)
is as given in equation (10).
74
5. Performance Evaluation of a Queueing Model with Two Component Mixture of …
The mean waiting time of the packet in queue is,
(a 2 2 2 a 2)e 1a (b 2 2 2 b 2)e 1b
(20)
Wq p
1 1 1 1
21 1 (e e 1b ) (1 a1 )e 1a (1 b1 )e 1b
1a
(a 2 2 2 a 2)e 2 a (b 2 2 2 b 2)e 2b
(1 p)
2 2 2 2
22 2 (e e 2b ) (1 a2 )e 2a (1 b2 )e 2b
2 a
The variance of the waiting time of a packetin the queue is,
(1 a1 )e 1a (1 b1 )e 1b
V (Tq ) p 4 1-
12 1 (e 1a e 1b )
3(a 2 12 21a 2)e 1a (b 2 12 21b 2)e 1b 3 (a 3e 1a b3e 1b )
13 (e 1a e 1b )
(a 2 12 21a 2)e 1a (b 2 12 2 1b 2)e 1b
2
3
12 (e 1a e 1b )
2
1 (e 1a e 1b ) (1 a1 )e 1a (1 b1 )e 1b
1 (e 1a e 1b )
(1 a2 )e 2a (1 b2 )e 2b
(1 p) 4 1-
12 2 (e 2 a e 2b )
3(a 2 2 2 22 a 2)e 2a (b 2 2 2 22b 2)e 2b 3 (a 3e 2a b3e 2b )
2 3 (e 2 a e 2 b )
2b 2
(a 2 22 a 2)e (b 2 2 2b 2)e
2 2 2 a 2 2
3
2 2 (e 2 a e 2b )
2
2 (e 2a e 2b ) 2(1 a 2 )e 2a (1 b2 )e 2b
(21)
2 (e 2 a e 2b )
The waiting time of apacket in the system is,
(a 2 2 2 a 2)e 1a (b 2 2 2 b 2)e 1b
Ws p
1 1 1 1
21 1 (e e 1b ) (1 a1 )e 1a (1 b1 )e 1b
1a
(a 2 2 2 a 2)e 2a (b 2 2 2 b 2)e 2b
(1 p)
2 2 2 2
22 2 (e e 2b ) (1 a2 )e 2a (1 b2 )e 2b
2 a
p (1 a1 )e 1a (1 b1 )e 1b (1 p) (1 a 2 )e 2a (1 b2 )e 2b
(22)
1 (e 1a e 1b ) 2 (e 2 a e 2b )
V.NUMERICALILLUSTRATION
The performance of the queueing model is discussed through a numerical illustration. Different values
of the parameter are considered for arrival rate and service time parametersµ1 , µ2, p, a and b.For given values
of = 1,2,3,4,5;µ1 = 5,7,9,11, µ2 = 7,8,9,10, p = 0.1,0.2,0.3,0.4, a = 0.1,0.2,0.3,0.4 and b = 0.1, 0.2, 0.3, 0.4,the
probability that the system is empty and the probability that the server is busy are computed and presented in
table 1.The relationship between the parameters and the probability of the idealness are shown in figure 1.
From table 1 it is observed that the probability of emptiness is highly influenced by the model
parameters. As the mean arrival rate varies from 1 to 5. The probability of emptiness in the system is
decreasing from 0.858 to 0.289 when other parameter are fixed at µ1 = 10,µ2 = 8, p = 0.8, a = 0.1 and b = 0.2.
75
6. Performance Evaluation of a Queueing Model with Two Component Mixture of …
Table 1: VALUES OF Po AND 1-PoFORDIFFERENT VALUESOF, µ, a AND b
Figure 1:Relationship between probability of Emptinessand
input parameters
We have observed that when the service time parameter µ1 increases from 5 to 11 the probability of emptiness is
increasing from 0.564 to 0.576, for fixed values of = 3, a = 0.1,b = 0.2, p = 0.8 andµ2 = 8.
When the service time parameter µ2 increases from 7 to 10 the probability of emptiness is increasing
from 0.408 to 0.422, for fixed values of = 3, a = 0.1, b = 0.5, p = 0.8 and µ1 =10.
As the truncation parameter of the service time distribution „ a ‟ increases from 0.1 to 0.4 the
probability of emptiness is increases from 0.1 to 0.4 and the probability of emptiness is increasing from 0.804 to
0.558 for fixed values of the other parameters.
As the truncation parameter of the service time distribution „b‟increases from 0.1 to 0.4 the probability
of emptiness is increasing from 0.1 to 0.4 and the probability of emptiness is increasing from 0.800 to 0.530 for
given values of the other parameters.
As the truncation parameter of the service time distribution „p ‟increases from 0.1 to 0.4 the probability
of emptiness is increasing from 0.1 to 0.4 and the probability of emptiness is increasing from 0.381 to 0.395 for
given values of the other parameters.
76
7. Performance Evaluation of a Queueing Model with Two Component Mixture of …
For different values of the parameters the average number of packets in the system, the average number
of packets in the queue and the variance of the number of packets in the system are computed and presented in
table2. The relationship between the parameters and the performance measures is shown in figure 2.
Table 2: VALUES OF L ANDLqANDVar (N)
a b p λ µ1 µ2 L Lq Var(N)
0.1 0.2 0.8 1 10 8 0.154 0.012 0.159
0.1 0.2 0.8 2 10 8 0.343 0.059 0.387
0.1 0.2 0.8 3 10 8 0.592 0.165 0.783
0.1 0.2 0.8 4 10 8 0.958 0.389 1.618
0.1 0.2 0.8 5 10 8 1.618 0.907 3.906
0.1 0.2 0.8 3 5 8 0.611 0.175 0.985
0.1 0.2 0.8 3 7 8 0.603 0.171 0.872
0.1 0.2 0.8 3 9 8 0.591 0.165 0.783
0.1 0.2 0.8 3 11 8 0.587 0.163 0.762
0.1 0.5 0.8 1 10 8 0.224 0.028 0.239
0.2 0.5 0.8 1 10 8 0.348 0.061 0.369
0.3 0.5 0.8 1 10 8 0.481 0.111 0.514
0.4 0.5 0.8 1 10 8 0.618 0.176 0.671
0.6 0.1 0.8 1 10 8 0.231 0.031 0.248
0.6 0.2 0.8 1 10 8 0.363 0.067 0.387
0.6 0.3 0.8 1 10 8 0.512 0.126 0.552
0.6 0.4 0.8 1 10 8 0.681 0.211 0.749
0.1 0.5 0.1 3 10 8 1.224 0.605 2.209
0.1 0.5 0.2 3 10 8 1.205 0.590 2.146
0.1 0.5 0.3 3 10 8 1.185 0.575 2.082
0.1 0.5 0.4 3 10 8 1.165 0.560 2.019
Figure 2: Relationship between parameters L,
0.1 0.5 0.8 3 10 7 1.113 0.521 1.870 LqandVar (N)
0.1 0.5 0.8 3 10 8 1.086 0.499 1.766
0.1 0.5 0.8 3 10 9 1.064 0.482 1.692
0.1 0.5 0.8 3 10 10 1.047 0.469 1.639
From table 2 it is observed that the performance measures of the queueing model are significantly
influenced by the parameters of the model. As the arrival rate increases the average number of packets in the
77
8. Performance Evaluation of a Queueing Model with Two Component Mixture of …
system is increasing. Same phenomenon is observed with respective the average number of packets in the
queue for the given values of the other parameters.
When the parameter µ1 increases from 5 to 11 the average number of packet in the system is
decreasing from 0.611 to 0.587 for fixed values of = 3, µ2 = 8, b = 0.2, a = 0.1 and p = 0.8 Similarly the
value of average number of packet in the queue is decreasing from 0.175 to 0.163 for the same changes in
µ1 when other parameters remain fixed.
When the parameter µ2 increases from 7 to 10 the average number of packet in the system is
decreasing from 1.113 to 1.047 for fixed values of = 3, µ1 = 10, b = 0.5, a = 0.1 and p = 0.8 Similarly the
value of average number of packet in the queue is decreasing from 0.521 to 0.469 for the same changes in µ2
for fixed values of the other parameters.
As the truncation parameter „ a ‟ is increasing from 0.1 to 0.4 then the average number of packets in the
system and the average number of packets in the queue are increasing from 0.224 to 0.618 and 0.028 to 0.176
respectively for fixed values of the other parameters.
As the truncation parameter „b‟ is increasing from 0.1 to 0.4 then the average number of packets in the
system and the average numbers of packets in the queue are increasing from 0.231 to 0.681 and 0.031 to 0.211
respectively.
As the truncation parameter „p‟ is increasing from 0.1 to 0.4 then the average number of packet in the
system and the average number of packet in the queue are increasing from 1.224 to 1.165 and 0.605 to 0.560
respectively for fixed values of the other parameters.
It is observed that as increases the variance of the number of packets in the system is increasing for
given values of the other parameters. When µ1 is increasing the variance of the number of packets in the system
is decreasing for fixed values of the other parameters. When the truncation parameters b is increasing the
variance of the number of packets in the system is increasing. When µ2 is increasing the variance of the number
of packets in the system is decreasing for fixed values of the other parameters.
For different values of the parameterstheaverage waiting time of a packet in the system, the average
waiting time of a packet in the queue and the variance of the waiting time of a packet in the queue are computed
and given in the table 3. The relationship between parameters and the waiting time is shown in figure 3.
From table 3 it is observed that the model parameters have a significant influence on the waiting time of a
packet in the system and in the queue. As the mean arrival rate is increasing then the average waiting time of
a packet in the queue and the average waiting time of a packet in the system are increasing when the other
parameters remain fixed.
It is also observed that as the parameterµ1 is increasing from 5 to 11 the average waiting time of a packet in the
system and the average waiting time of a packet in the queue are decreasing from 0.204 to 0.196 and 0.058 to
0.054 respectively for fixed values of the other parameters.
It is also observed that as the parameter µ2 is increasing from 7 to 10 the average waiting time of a packet in the
system and the average waiting time of a packet in the queue are decreasing from 0.371 to 0.349 and 0.174 to
0.156 respectively for fixed values of the other parameters.
It is further observed that when the mean arrival rate increases the variance of the waiting time of a
packet in the system is increasing when other parameters remain fixed. Similarly when the truncation
parameters a and b are increasing the variance of the waiting time of the packet in the system is also increasing
for fixed values of the other parameters.
It is also observed that as the parameter p is increasing from 0.1 to 0.4 the average waiting time of a packet in
the system and the average waiting time of a packet in the queue are decreasing from 0.408 to 0.388 and 0.202
to 0.187respectively for fixed values of the other parameters.
V1. CONCLUSION
This paper deals with a novel queuing model with two component mixture of doubly truncated
exponentially distributed service time having poison arrivals. This queuing model is much useful for analyzing
and designing the communication networks arising at places like data voice transmission, telecommunications,
satellite communications, ATM Scheduling etc,. The traditional assumption of having infinite range service
times is modified through doubly truncated nature of the random variable. Since, in reality no customer/ unit
requires infinite service time. In addition to this finite range of the service time this model also includes
heterogeneous nature of customer service times by considering mixture distribution. Through numerical studies
it is established that the truncation as well as mixture distribution parameters have significant influence on
system performance measures. This model also includes several of the earlier existing queuing models as
78
9. Performance Evaluation of a Queueing Model with Two Component Mixture of …
particular cases for limiting/specific values of the parameters. This model can also be extended for non-Poison
arrivals and servers vacation models.
Table 3:VALUES OF Ws AND Wq AND Var (Tq)
a Var(T
b p λ µ𝟏 µ 𝟐 Ws Wq
q)
0.1 0.2 0.8 1 10 8 0.154 0.012 0.004
0.1 0.2 0.8 2 10 8 0.171 0.029 0.010
0.1 0.2 0.8 3 10 8 0.197 0.055 0.020
0.1 0.2 0.8 4 10 8 0.239 0.097 0.040
0.1 0.2 0.8 5 10 8 0.324 0.181 0.091
0.1 0.2 0.8 3 5 8 0.204 0.058 0.041
0.1 0.2 0.8 3 7 8 0.201 0.057 0.029
0.1 0.2 0.8 3 9 8 0.197 0.055 0.020
0.1 0.2 0.8 3 11 8 0.196 0.054 0.079
0.1 0.5 0.8 1 10 8 0.224 0.028 0.008
0.2 0.5 0.8 1 10 8 0.348 0.061 0.016
0.3 0.5 0.8 1 10 8 0.481 0.111 0.030
0.4 0.5 0.8 1 10 8 0.618 0.176 0.053
0.6 0.1 0.8 1 10 8 0.231 0.031 0.008
0.6 0.2 0.8 1 10 8 0.363 0.067 0.017
0.6 0.3 0.8 1 10 8 0.512 0.126 0.034
0.6 0.4 0.8 1 10 8 0.681 0.211 0.065
0.1 0.5 0.1 3 10 8 0.408 0.202 0.101
0.1 0.5 0.2 3 10 8 0.402 0.197 0.096
0.1 0.5 0.3 3 10 8 0.395 0.192 0.092
0.1 0.5 0.4 3 10 8 0.388 0.187 0.087
0.1 0.5 0.8 3 10 7 0.371 0.174 0.077
0.1 0.5 0.8 3 10 8 0.362 0.166 0.068 Figure 3:Relationship between the parameters and
Ws, Wq and Var(Tq)
0.1 0.5 0.8 3 10 9 0.355 0.161 0.063
0.1 0.5 0.8 3 10 10 0.349 0.156 0.059
REFERENCES
[1] Gross, D.And Harris, C. M. (1974) “Fundamentals of Queuing Theory.” John Wiley, New York.
[2] Kleinrock,L.(1975) „Queueing Systems‟, Vol. 1, Wiley, New York.
[3] Boxima O.J. And Groenendijk W.P. (1988) „Waiting time in discrete time cyclic -service systems‟,
IEEE Transactions on Communications, 36, no.2, 164 -170.
79
10. Performance Evaluation of a Queueing Model with Two Component Mixture of …
[4] Boxma,O.J., And J.W. Cohen (1998) „The M/G/1 queue with heavy-tailed service time distribution‟,
IEEE J. Selected Areas Commun. 16, 749–763.
[5] Boxma, O.J,G.M.Koole,I.Mitrani (1995)„Polling models with Threshold Switching Quantative
methods in parallel systems‟, 129-140.
[6] Srinivasa Rao,P.,K.SrinivasaRao and J.Lakshminarayana (2003) „Single server Poisson Queueing
model with mixture of exponential service time distribution‟.Vol-15(2)M,199-204.
[7] Bunday.B.D.(1996) "An Introduction to queuing theory" John Wiley, New York.
[8] Burke. P.J. (1975) „Delays in single server queues with batch input‟, Oper.Res, 23, 830-833.
[9] Guy L.Curry, NatarajanGautam (2008) „Characterizing the departure process from a two server
Markovian Queue: A Non-Renewal approach.‟ Winter Simulation Conference.
[10] Haviv, M. And Vander Wal,J. (2007) “Waiting times in queues with relative priorities,” Operations
Research Letters, 35, 591-594.
[11] Hiroyuki Masuyama, Tetsuya Takine (2003)„Stationary queue length in a FIFO single server queue
with service interruptions and multiple batch Markovian arrival streams‟. J.O.R.S.J, Vol-46, no.3,319-
341
[12] JewgeniH.Dshalalow (1991) „A Single server queue with random accumulation level‟.J.A.M.S.A, Vol-
4, No.3, 203-210.
[13] Johnson,Kotz and Balakrishnan (2004)„Continuous univeriate distributions‟ vol-1 and 2,second
edition.
[14] Levy, Y. And Yechiali, U. (1975) „Utilization of idle time in an M/G/1 queueingsystem‟., Management
Science 22, 202–211.
[15] Ramaswamy, R. and L.D. Servi .(1988) „The busy period of M/G/1 vacation model with Bernoulli
schedule.” stochastic models, 4, 507-521.
[16] Takine T and Hesegawa T.(1992) „On M/G/1 queue with multiple vacations and gated service
discipline‟, j.o.r.soc.japan-35,no.3,217-235
[17] Parthasarathy,P.R.,andK.V.Vijayashree (2002)„Fluid queues driven by a discouraged arrivals queue‟.
IJMMS, Vol-24, 1509-1528
[18] MessaoudBoaunkhel,LotfiTadj (2007) „Optimal design of a bulk service queue‟, Investigacao
Operacional,vol.27,131-138.
[19] K.SRINIVASA RAO, P.SURESH VARMA and Y.SRINIVAS-(2008), Interdependent Queuing Model
with startup delay, Journal of Statistical Theory and Applications, Vol. 7, No. 2 pp. 219-228.
[20] Zhanyou Ma, WuyiYue, NaishuoTian (2008) „Analysis of a Geom/G/1 Queue with General Limited
Service and MAVs‟.November,3,ISORA‟08, 359-368.
[21] Andreas Brandt, Manfred Brandt (2008) „Waiting times for M/systems under state-dependent processor
sharing‟ Queueing Systems, Vol.59, No.3, 297-319.
[22] Ward Whitt (2006) „Fluid Models for Multiserver Queues with Abandonments‟, Operations Research,
Vol.54, no.1,37-54.
[23] K.SRINIVASA RAO, G.RAMESH, and J.L.NARAYANA, (2011)- Single server Poisson queueing
model with truncated exponential service times, accepted in Journal of Mathematics and Mathematical
Sciences, Vol. 2.
[24] K.SRINIVASA RAO, M.GovindaRao and G.V.S.Rajkumar (2011)- Transient analysis of
interdependent queueing model with state dependent service rates, accepted in International Journal of
Ultra Scientist of Physical sciences, Vol.23,no.3.
80