SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013

Time Dependent Solution of Batch Arrival Queue
with Second Optional Service, Optional Re-Service
and Bernoulli Vacation
G. Ayyappan1* K. Sathiya2

1. Department of Mathematics, Pondicherry Engineering College, Pondicherry, India
2. Research Scholar, Pondicherry Engineering College, Pondicherry, India
* E-mail of the corresponding author: ayyappan@pec.edu
Abstract
[ x]

This paper deals with an M /G/1 queues with second optional service, optional re-service and Bernoulli
vacations. Each customer undergoes first phase of service after completion of service, customer has the option to
repeat or not to repeat the first phase of service and leave the system without taking the second phase or take the
second phase service. Similarly after the second phase service he has yet another option to repeat or not to repeat
the second phase service. After each service completion, the server may take a vacation with probability  or
may continue staying in the system with probability 1   . The service and vacation periods are assumed to be
general. The time dependent probability generating functions have been obtained in terms of their Laplace
transforms and the corresponding steady state results have been obtained explicitly. Also the average number of
customers in the queue and the waiting time are also derived.
Keywords: Batch arrival, Second optional service, Optional re-service, Average queue size, Average
waiting time.

1. Introduction
For the first time the concept of Bernoulli vacation were studied by Keilson and Servi [6]. In many
applications such as hospital services, production systems, bank services, computer and communication
networks; there is two phase of services such that the first phase is essential for all customers, but as soon
as the essential services completed, it may leave the system or may immediately go for the second phase of
service.
Recently, Madan [8] and Medhi [10] investigated an M/G/1 queueing system with a second
optional service in which some of arrivals may require a second optional service immediately after
completion of the first essential service.
[ x]
Ke [5] studied an M /G/1 system with startup server and J additional options for service. Choudhury
and Paul [3,4] studied a batch arrival queue with an additional service channel under N-policy.
At present, however most of the studies are devoted to batch arrival vacation models under
different vacation policies because of its interdisciplinary character. Numerous researchers including Baba
[1], Choudhury [2], Lee et al. [7], Madan and Choudhury [9] and many other have studied batch arrival
queue under different vacation policies.
In this paper we consider batch arrival queue with second optional service in which the first phase
of service is compulsory whereas the second phase is optional. Each customer undergoes first phase of
service after completion of which customer has the option to repeat or not to repeat the first phase of
service and leave the system without taking the second phase or take the second phase service. Similarly
after the second phase service he has yet another option to repeat or not to repeat the second phase service.
Further, we assume that this option of repeating the first phase or the second phase service can be availed
only once.
The outline of the paper is as follows. The model description is given in section 2. Definitions and
equations governing the system are given in section 3. The time dependent solution have been obtained in
section 4 and corresponding steady state results have been derived explicitly in section 5. Average queue
size and average waiting time are computed in section 6.

2. Model description
We assume the following to describe the queueing model of our study.
a) Customers arrive at the system in batches of variable size in a compound Poisson process and they

1
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013

are provided one by one service on a first come - first served basis. Let

ci dt ( i  1 ) be the first order

probability that a batch of i customers arrives at the system during a short interval of time (t , t  dt ] ,
where 0  ci  1 and



c

i

= 1 and  > 0 is the arrival rate of batches.

i =1

b) There is a single server who provides the first phase service for all customers, as soon as the first
service of a customer is completed, he may opt to repeat the first service with probability r1 or may not
repeat with probability 1  r1 . After completing the first service, the customer may opt to take the second
optional service with probability p or may leave the system without taking the second service with
probability 1  p . Similarly after taking the second phase service he may demand repetation of second
phase service with probability r2 or may leave the system without repeating the second phase service with
probability 1- r2 . Further, we assume that this option of repeating the first phase or the second phase
service can be availed only once.
c) The service time follows a general (arbitrary) distribution with distribution function Bi (s) and density
function bi (s ) . Let

i ( x)dx be the conditional probability density of service completion during the

interval ( x, x  dx] , given that the elapsed time is x , so that

i ( x) =

bi ( x)
, i = 1,2,
1  Bi ( x)

and therefore,
s



 i ( x ) dx

bi ( s) = i ( s)e

0

, i = 1,2.

d) After each service completion, the server may take a vacation with probability  or may continue
staying in the system with probability 1   .
e) The server’s vacation time follows a general (arbitrary) distribution with distribution function V (t )
and density function v(t ) . Let

 ( x)dx be the conditional probability of a completion of a vacation during

the interval ( x, x  dx] given that the elapsed vacation time is x , so that

 ( x) =

v( x)
,
1  V ( x)

and therefore,
t



  ( x ) dx

v(t ) =  (t )e

0

f) Various stochastic processes involved in the system are assumed to be independent of each other.

3. Definitions and Equations governing the system
(i )

We define Pn ( x, t ) = Probability that at time t , the server is active providing i th phase service and there
are n ( n  0 ) customers in the queue excluding the one being served and the elapsed service time for this

(i )
n



customer is x . Consequently P (t ) = Pn( i ) ( x, t )dx denotes the probability that at time t there are n
0

customers in the queue excluding one customer in the i th phase service irrespective of the value of x for
(
i =1, 2. Rni ) ( x, t ) = Probability that at time t , the server is active providing i th phase repeating service
and there are n ( n  0 ) customers in the queue excluding one customer who is repeating i th phase

2
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013


service and the elapsed service time for this customer is x Consequently

(
(
Rni ) (t ) = Rni ) ( x, t )dx denotes
0

the probability that at time t there are n customers in the queue excluding one customer who is repeating
i th phase service irrespective of the value of x for i =1, 2.
Vn ( x, t ) = Probability that at time t, the server is under vacation with elapsed vacation time x and there




are n ( n  0 ) customers in the queue. Accordingly Vn (t ) = Vn ( x, t )dx denotes the probability that at
0

time t there are n customers in the queue and the server is under vacation irrespective of the value of x .
Q(t) = Probability that at time t , there are no customers in the queue and the server is idle
but available in the system.
The system is then governed by the following set of differential-difference equations:

 (1)

P0 ( x, t )  P0(1) ( x, t )  [  1 ( x)]P0(1) ( x, t ) = 0
x
t
n
 (1)

Pn ( x, t )  Pn(1) ( x, t )  [  1 ( x)]Pn(1) ( x, t ) =  ck Pn(1) ( x, t ),
k
x
t
k =1
n 1
 (2)

P0 ( x, t )  P0(2) ( x, t )  [  2 ( x)]P0(2) ( x, t ) = 0
x
t
n
 (2)

Pn ( x, t )  Pn(2) ( x, t )  [  2 ( x)]Pn(2) ( x, t ) =  ck Pn(2) ( x, t ),
k
x
t
k =1
n 1
 (1)
 (1)
(1)
R0 ( x, t )  R0 ( x, t )  [  1 ( x)]R0 ( x, t ) = 0
x
t
n
 (1)
 (1)
(1)
(1)
Rn ( x, t )  Rn ( x, t )  [  1 ( x)]Rn ( x, t ) =  ck Rnk ( x, t ),
x
t
k =1
n 1
 (2)
 (2)
(2)
R0 ( x, t )  R0 ( x, t )  [  2 ( x)]R0 ( x, t ) = 0
x
t
n
 (2)

(2)
(2)
Rn ( x, t )  Vn(2) ( x, t )  [  2 ( x)]Rn ( x, t ) =  ck Rnk ( x, t ),
x
t
k =1
n 1


V0 ( x, t )  V0 ( x, t ) = [   ( x)]V0 ( x, t )
x
t
n


Vn ( x, t )  Vn ( x, t ) = [   ( x)]Vn ( x, t )   ckVnk ( x, t ), n  1
x
t
k =1

d
Q(t )  Q(t ) = (1   )(1  r2 )  P0(2) ( x, t ) 2 ( x)dx
0
dt


(1)

(2)
(3)

(4)
(5)

(6)
(7)

(8)
(9)
(10)



(2)
(1)
 (1   )  R0 ( x, t ) 2 ( x)dx  (1   )(1  p) R0 ( x, t ) 1 ( x)dx
0



0


 (1   )(1  p)(1  r1 )  P ( x, t )1 ( x)dx   V0 ( x, t ) ( x)dx
0

(1)
0

0

The above equations are to be solved subject to the following boundary conditions


Pn(1) (0, t ) = cn1Q(t )  (1   )(1  p)(1  r1 )  Pn(1) ( x, t )1 ( x)dx
1
0

3

(11)
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013




0


0

 (1   )(1  r2 )  Pn(2) ( x, t )2 ( x)dx   Vn1 ( x, t ) ( x)dx
1


(1)
(2)
 (1   )(1  p)  Rn1 ( x, t )1 ( x)dx  (1   ) Rn1 ( x, t ) 2 ( x)dx
0

0

n0



0

0

(12)



(1)
Pn(2) (0, t ) = p(1  r1 )  Pn(1) ( x, t ) 1 ( x)dx  p  Rn ( x, t )1 ( x)dx,

n0

(13)



(1)
Rn (0, t ) = r1  Pn(1) ( x, t ) 1 ( x)dx, n  0

(14)

(2)
Rn (0, t ) = r2  Pn(2) ( x, t )2 ( x)dx, n  0

(15)

0

0



Vn (0, t ) = (1  p) (1  r1 )  Pn(1) ( x, t )1 ( x)dx
0





0

0

(1)
  (1  r2 )  Pn(2) ( x, t ) 2 ( x)dx  (1  p)  Rn ( x, t ) 1 ( x)dx



(2)
   Rn ( x, t ) 2 ( x)dx, n  0

(16)

0

We assume that initially there are no customers in the system and the server is idle. So the initial
conditions are
(
Pn(i ) (0) = Rni ) (0) = 0 for n  0 and Q(0) = 1.
(17)

4. Probability generating functions of the queue length:
the time - dependent solution
We define the probability generating functions ,






n=0

n =1

P (i ) ( x, z, t ) = z n Pn(i ) ( x, t ); P (i ) ( z, t ) = z n Pn(i ) (t ), C ( z ) = cn z n ,
n=0





n=0


n=0

n

(
(
R (i ) ( x, z, t ) = z n Rni ) ( x, t ); R (i ) ( z, t ) = z n Rni ) (t ) for i = 1,2.

V ( x, z, t ) = z nVn ( x, t ); V ( z, t ) = z Vn (t ), x > 0
n=0

(18)
(19)

n=0

which are convergent inside the circle given by z  1 and define the Laplace transform of a function
f (t ) as


f ( s) = e  st f (t )dt , ( s) > 0.

(20)

0

We take the Laplace transform of equations (1) - (16) and use (17) to obtain

 (1)
P0 ( x, s)  ( s    1 ( x)) P0(1) ( x, s) = 0
x

n
 (1)
Pn ( x, s)  ( s    1 ( x)) Pn(1) ( x, s) =  ck Pn(1) ( x, s), n  1
k
x
k =1
 (2)
P0 ( x, s)  ( s    2 ( x)) P0(2) ( x, s) = 0
x
n
 (2)
(2)
Pn ( x, s)  ( s    2 ( x)) Pn ( x, s) =  ck Pn(2) ( x, s), n  1
k
x
k =1

4

(21)
(22)
(23)
(24)
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013

 (1)
R0 ( x, s)  ( s    1 ( x)) R0(1) ( x, s) = 0
x
n
 (1)
Rn ( x, s)  ( s    1 ( x)) Rn(1) ( x, s) =  ck Rn(1)k ( x, s), n  1

x
k =1
 (2)
R0 ( x, s)  ( s    2 ( x)) R0(2) ( x, s) = 0
x
n
 (2)
Rn ( x, s)  ( s    2 ( x)) Rn(2) ( x, s) =  ck Rn(2)k ( x, s), n  1

x
k =1

V0 ( x, s)  [ s     ( x)]V0 ( x, s) = 0
x
n

Vn ( x, s)  [ s     ( x)]Vn ( x, s) =  ckVnk ( x, s), n  1
x
k =1

(25)
(26)
(27)
(28)
(29)
(30)



( s   )Q ( s) = 1  (1  p)(1  r1 )(1   ) P0(1) ( x, s) 1 ( x)dx
0





 (1  r2 )(1   )  P02 ( x, s)2 ( x)dx  (1   )  R0(2) ( x, s)2 ( x)dx
0


0



 (1   )(1  p)  R ( x, s) 1 ( x)dx   V0 ( x, s) ( x)dx
(1)
0

0

0

(31)



Pn(1) (0, s) = cn1Q ( s)  (1   )(1  p)(1  r1 )  Pn(1) ( x, s)1 ( x)dx
1
0





(1)
 (1   )(1  r2 )  P ( x, s) 2 ( x)dx  (1   )(1  p)  Rn1 ( x, s) 1 ( x)dx
(2)
n 1

0

0





0

0

(2)
 (1   )  Rn1 ( x, s)2 ( x)dx   Vn1 ( x, s) ( x)dx, n  0




0

(32)

0

(1)
Pn(2) (0, s) = p(1  r1 )  Pn(1) ( x, s) 1 ( x)dx  p  Rn ( x, s) 1 ( x)dx,


n0

(33)

R (0, s) = r1  P ( x, s) 1 ( x)dx, n  0

(34)

Rn(2) (0, s) = r2  Pn(2) ( x, s) 2 ( x)dx, n  0

(35)

(1)
n

0


(1)
n

0



Vn (0, s) =  (1  r1 )(1  p)  Pn(1) ( x, s) 1 ( x)dx
0





(1)
  (1  p)  Rn ( x, s) 1 ( x)dx   (1  r2 )  Pn(2) ( x, s)2 ( x)dx
0

0



   R ( x, s)2 ( x)dx, n  0
0

(2)
n

(36)

Now multiplying equations (22), (24), (26) (28) and (30) by z and summing over n from 0 to  ,
adding to equations (21), (23), (25) and (27) using the generating functions defined in (18) and (19) we get
n

 (1)
P ( x, z, s)  [ s    C ( z )  1 ( x)]P (1) ( x, z, s) = 0
x

 (2)
P ( x, z, s)  [ s    C ( z ))  2 ( x)]P (2) ( x, z, s) = 0
x
 (1)
R ( x, z, s)  [ s    C ( z )  1 ( x)]R (1) ( x, z, s) = 0
x

5

(37)
(38)
(39)
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013

 (2)
R ( x, z, s)  [ s    C ( z )  2 ( x)]R (2) ( x, z, s) = 0
x

V ( x, z, s)  [ s    C ( z )   ( x)]V ( x, z, s) = 0
x

(40)
(41)

For the boundary conditions, we multiply both sides of equation (32) by z sum over n from 0 to  , and
use the equation (31), we get
n

zP (1) (0, z, s) = [1  (s   )Q (s)]  C ( z)Q (s)


 (1   )(1  r1 )(1  p)  P (1) ( x, z, s) 1 ( x)dx
0





 (1   )(1  p)  R ( x, z, s)1 ( x)dx  (1   )  R (2) ( x, z, s)2 ( x)dx
(1)

0




0

0

0

 (1   )(1  r2 )  P (2) ( x, z, s) 2 ( x)dx   V ( x, z, s) ( x)dx

(42)

Performing similar operation on equations (33) to (36) we get,




0

0

P (2) (0, z, s) = (1  r1 ) p  P (1) ( x, z, s)1 ( x)dx  p  R (1) ( x, z, s)1 ( x)dx (43)


R (1) (0, z, s) = r1  P (1) ( x, z, s)1 ( x)dx

(44)

0



R (2) (0, z, s) = r2  P (2) ( x, z, s) 2 ( x)dx

(45)

0



V (0, z, s) =  (1  r1 )(1  p) P (1) ( x, z, s)1 ( x)dx
0





  (1  r2 )  P (2) ( x, z, s) 2 ( x)dx   (1  p)  R (1) ( x, z, s) 1 ( x)dx
0

0



   R (2) ( x, z, s) 2 ( x)dx, n  0
0

(46)

Integrating equation (37) between 0 to x , we get
x



[ s    C ( z )] x  1 ( t ) dt

P (1) ( x, z, s) = P (1) (0, z, s)e

0

(47)

(1)

where P (0, z, s) is given by equation (42).
Again integrating equation (47) by parts with respect to x yields,

1  B1 ( s    C ( z )) 
P (1) ( z, s) = P (1) (0, z, s) 
s    C ( z ) 



(48)

where


B1 ( s    C ( z )) = e [ s  C ( z )] x dB1 ( x)
0

is the Laplace-Stieltjes transform of the first phase service time B1 ( x) . Now multiplying both sides of
equation (47) by 1 ( x) and integrating over x we obtain


P

(1)

( x, z, s) 1 ( x)dx = P (1) (0, z, s) B1[ s   (1  c( z ))]

(49)

0

Similarly, on integrating equations (38) to (41) from 0 to x , we get
x



[ s   C ( z )] x   2 ( t ) dt

P (2) ( x, z, s) = P (2) (0, z, s)e

0

(50)

6
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013
x



[ s    C ( z )] x  1 ( t ) dt
(1)

(1)

0

R ( x, z, s) = R (0, z, s)e

(51)

x



[ s   C ( z )] x   2 ( t ) dt
(2)

(2)

0

R ( x, z, s) = R (0, z, s)e

(52)

x



[ s    C ( z )] x   ( t ) dt
0

V ( x, z, s) = V (0, z, s)e
(2)

(1)

(53)

(2)

where P (0, z, s), R (0, z, s) , R (0, z, s) and V (0, z, s) are given by equations (43) to (46).
Again integrating equations (50) to (53) by parts with respect to x yields,

1  B2 ( s    C ( z )) 
P (2) ( z, s) = P (2) (0, z, s) 

s    C ( z )


1  B1 ( s    C ( z )) 
R (1) ( z, s) = R (1) (0, z, s) 
s    C ( z ) 


1  B2 ( s   (1  C ( z ))) 
R (2) ( z, s) = R (2) (0, z, s) 

s    C ( z )


1  V ( s    C ( z )) 
V ( z, s) = V (0, z, s) 

 s    C ( z ) 

(54)

(55)

(56)

(57)

where


B2 ( s    C ( z )) =  e [ s  C ( z )] x dB2 ( x)
0


V ( s    C ( z )) =  e [ s  C ( z )] x dV ( x)
0

are the Laplace-Stieltjes transform of the second phase service time and vacation time. Now multiplying
both sides of equations (50) to (53) by 1 ( x) ,  2 ( x) and  (x) integrating over x , we obtain


P

(2)

( x, z, s)  2 ( x)dx = P (2) (0, z, s) B2 [ s    C ( z )]

(58)

0



R

(1)

( x, z, s) 1 ( x)dx = R (1) (0, z, s) B1[ s    C ( z )]

(59)

(2)

( x, z, s)  2 ( x)dx = R (2) (0, z, s) B2 [ s    C ( z )]

(60)

0


R
0



V ( x, z, s) ( x)dx = V (0, z, s)V [s    C ( z)]

(61)

0

Using equation (58) in (45), we get

R (2) (0, z, s) = r2 B2 (a) P (2) (0, z, s)

(62)

By using equation (49) in (44), we get

R (1) (0, z, s) = r1B1 (a) P (1) (0, z, s)

(63)

Using equations (49), (59) and using (63) in (43), we get

P (2) (0, z, s) = pB1 (a)[1  r1  r1B1 (a)]P (1) (0, z, s)
Using equations (49), (58), (59) and (60) in (46), we get

V (0, z, s) = pB1 (a) B2 (a)[1  r1  r1B1 (a)][1  r2  r2 B2 (a)]P (1) (0, z, s)
7

(64)
Mathematical Theory and Modeling
ISSN 2224-5804 (Paper)

www.iiste.org

ISSN 2225-0522 (Online)

Vol.3, No.13, 2013

  (1  p) B2 (a) P (1) (0, z, s)

(65)

Using equations (49), (58) to (61) in (42), we get

zP (1) (0, z, s) = [1  sQ (s)]   (C ( z)  1)Q (s)
 B1 (a)(1  r1  r1B1 (a))(1    V (a))
[1  p  pB2 (a)(1  r2  r2 B2 (a))]P (1) (0, z, s)

(66)

Similarly using equations (62) to (65), in (66), we get

P (1) (0, z, s) =

 (C ( z )  1)Q ( s)  (1  sQ ( s))
Dr

(67)

where

Dr = z  B1 (a)(1  r1  r1B1 (a))(1    V (a))[1  p  pB2 (a)(1  r2  r2 B2 (a))],
and a = s    C ( z ) .
Substituting (67) into equations (62) to (65), we get

[(1  sQ ( s))   (C ( z )  1)Q ( s)]
(68)
Dr
[(1  sQ ( s))   (C ( z )  1)Q ( s)]
(69)
R (1) (0, z, s) = r1B1 (a)
Dr
[(1  sQ ( s))   (C ( z )  1)Q ( s)]
(70)
R (2) (0, z, s) = r2 pB1 (a) B2 (a)(1  r  rB1 (a))
Dr
P (2) (0, z, s) = pB1 (a)(1  r1  r1B1 (a))

V (0, z, s) =



Dr

B1 (a)(1  r1  r1B1 (a))(1  p  pB2 (a)(1  r2  r2 B2 (a)))

[ (C ( z)  1)Q (s)  (1  sQ (s))]

(71)

Using equations (67) to (71) in (48) and (54) to (57), we get
P (1) ( z, s), P (2) ( z, s), R (1) ( z, s) , R (2) ( z, s) and V ( z, s) . Thus which completes the proof of the
theorem.
5. Conclusion
In this paper we have studied a batch arrival queue with two phases of service and optional re-service with Bernoulli
vacation. This paper clearly analyzes the transient solution, steady state results , Mean number of customer in the queue and
the system of our queueing system.

References
[ x]

[1] Baba,Y. (1986). On the M /G/1 queue with vacation time, Operation Research Letter, 5, 93-98.
[2] Choudhury, G.. (2002). A batch arrival queue with a vacation time under single vacation policy,
Computer Operation Research, 29, 1941-1955.
[3] Choudhury, G.., & Paul, M. (2004). A batch arrival queue with an additional service channel under Npolicy, Appllied Mathematical Computation, 156, 115-130.
[4] Choudhury, G.., & Paul, M. (2006). A batch arrival queue with a second optional service channel under
N-policy, Stochastic Analysis and Applications, 24, 1-22.
[ x]
[5] Ke, J. (2008). An M /G/1 system with startup server and J additional options for service, Appllied
Mathematical Modelling, 32, 443-458.
[6] Keilson, J., & Servi, L. D. (1987). Dynamic of the M/G/1 vacation model, Operation Research, 35(4).
[7] Lee, S.S., et al. (1995). Batch arrival queue with N-policy and single vacation, Computer Operation
Research, 22, 173-189.
[8] Madan, K.C. (2000). An M/G/1 queue with second optional service, Queueing System, 34, 79-98.
[9] Madan, K.C. & Choudhury, G.. (2005). A single server queue with two phases of heterogenous service
under Bernoulli schedule and a general vcation time, Information and Managment Science, 16(2), 1-16.
[10] Medhi, J. (2002). A single server Poisson input queue with a second optional channel, Queueing
System, 42, 239-242.

8
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Weitere ähnliche Inhalte

Was ist angesagt?

Solution of second order nonlinear singular value problems
Solution of second order nonlinear singular value problemsSolution of second order nonlinear singular value problems
Solution of second order nonlinear singular value problemsAlexander Decker
 
Free vibration analysis of laminated composite beams using fem
Free vibration analysis of laminated composite beams using femFree vibration analysis of laminated composite beams using fem
Free vibration analysis of laminated composite beams using femOsama Mohammed Elmardi Suleiman
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...
MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...
MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...antjjournal
 
Free vibration analysis of composite plates with uncertain properties
Free vibration analysis of composite plates  with uncertain propertiesFree vibration analysis of composite plates  with uncertain properties
Free vibration analysis of composite plates with uncertain propertiesUniversity of Glasgow
 
ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...
ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...
ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...antjjournal
 
Paper id 21201488
Paper id 21201488Paper id 21201488
Paper id 21201488IJRAT
 
Paper id 71201906
Paper id 71201906Paper id 71201906
Paper id 71201906IJRAT
 

Was ist angesagt? (9)

Solution of second order nonlinear singular value problems
Solution of second order nonlinear singular value problemsSolution of second order nonlinear singular value problems
Solution of second order nonlinear singular value problems
 
Avg q lenth
Avg q lenthAvg q lenth
Avg q lenth
 
Free vibration analysis of laminated composite beams using fem
Free vibration analysis of laminated composite beams using femFree vibration analysis of laminated composite beams using fem
Free vibration analysis of laminated composite beams using fem
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...
MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...
MODELING OF MANUFACTURING OF A FIELDEFFECT TRANSISTOR TO DETERMINE CONDITIONS...
 
Free vibration analysis of composite plates with uncertain properties
Free vibration analysis of composite plates  with uncertain propertiesFree vibration analysis of composite plates  with uncertain properties
Free vibration analysis of composite plates with uncertain properties
 
ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...
ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...
ON APPROACH TO INCREASE DENSITY OF FIELD- EFFECT TRANSISTORS IN AN INVERTER C...
 
Paper id 21201488
Paper id 21201488Paper id 21201488
Paper id 21201488
 
Paper id 71201906
Paper id 71201906Paper id 71201906
Paper id 71201906
 

Andere mochten auch

The strategy of upland tropical agriculture development
The strategy of upland tropical agriculture developmentThe strategy of upland tropical agriculture development
The strategy of upland tropical agriculture developmentAlexander Decker
 
Theoretical study of the effect of hydroxy subgroup on the electronic and spe...
Theoretical study of the effect of hydroxy subgroup on the electronic and spe...Theoretical study of the effect of hydroxy subgroup on the electronic and spe...
Theoretical study of the effect of hydroxy subgroup on the electronic and spe...Alexander Decker
 
Transition of space technologies and the spin off technologies realised
Transition of space technologies and the spin off technologies realisedTransition of space technologies and the spin off technologies realised
Transition of space technologies and the spin off technologies realisedAlexander Decker
 
Uranium concentration in human blood using fission track etch technique
Uranium concentration in human blood using fission track etch techniqueUranium concentration in human blood using fission track etch technique
Uranium concentration in human blood using fission track etch techniqueAlexander Decker
 
サブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについて
サブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについてサブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについて
サブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについてTsuyoshi Horigome
 
Urban flooding and vulnerability of nigerian cities
Urban flooding and vulnerability of nigerian citiesUrban flooding and vulnerability of nigerian cities
Urban flooding and vulnerability of nigerian citiesAlexander Decker
 
Top it management concerns in kenya
Top it management concerns in kenyaTop it management concerns in kenya
Top it management concerns in kenyaAlexander Decker
 
The relationship between the eps the market stock return
The relationship between the eps the market stock returnThe relationship between the eps the market stock return
The relationship between the eps the market stock returnAlexander Decker
 
Transshipment optimization of potable water to some rural areas in gombe stat...
Transshipment optimization of potable water to some rural areas in gombe stat...Transshipment optimization of potable water to some rural areas in gombe stat...
Transshipment optimization of potable water to some rural areas in gombe stat...Alexander Decker
 
Manejo de estilos, índices, tablas de contenido e ilustraciones
Manejo de estilos, índices, tablas de contenido e ilustracionesManejo de estilos, índices, tablas de contenido e ilustraciones
Manejo de estilos, índices, tablas de contenido e ilustracionesSOLEDADMM
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphonesAlexander Decker
 
Use and satisfaction with online public access catalogue in selected universi...
Use and satisfaction with online public access catalogue in selected universi...Use and satisfaction with online public access catalogue in selected universi...
Use and satisfaction with online public access catalogue in selected universi...Alexander Decker
 
Use of gender exclusive language in secondary school english textbooks in kenya
Use of gender exclusive language in secondary school english textbooks in kenyaUse of gender exclusive language in secondary school english textbooks in kenya
Use of gender exclusive language in secondary school english textbooks in kenyaAlexander Decker
 
The supply side gaps and opportunities of small & medium enterprises (sm es) ...
The supply side gaps and opportunities of small & medium enterprises (sm es) ...The supply side gaps and opportunities of small & medium enterprises (sm es) ...
The supply side gaps and opportunities of small & medium enterprises (sm es) ...Alexander Decker
 
The potency of some brands of anti diabetic medicine- metformin hydrochloride...
The potency of some brands of anti diabetic medicine- metformin hydrochloride...The potency of some brands of anti diabetic medicine- metformin hydrochloride...
The potency of some brands of anti diabetic medicine- metformin hydrochloride...Alexander Decker
 
Urban transformation in 1950’s the case of hacettepe district, ankara
Urban transformation in 1950’s the case of hacettepe district, ankaraUrban transformation in 1950’s the case of hacettepe district, ankara
Urban transformation in 1950’s the case of hacettepe district, ankaraAlexander Decker
 
Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...
Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...
Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...Kabo Mosanga
 
The presentation of the arabic character in shakespeare's othello
The presentation of the arabic character  in  shakespeare's othelloThe presentation of the arabic character  in  shakespeare's othello
The presentation of the arabic character in shakespeare's othelloAlexander Decker
 
The significance analysis of the economic decision of farmer family against t...
The significance analysis of the economic decision of farmer family against t...The significance analysis of the economic decision of farmer family against t...
The significance analysis of the economic decision of farmer family against t...Alexander Decker
 

Andere mochten auch (20)

The strategy of upland tropical agriculture development
The strategy of upland tropical agriculture developmentThe strategy of upland tropical agriculture development
The strategy of upland tropical agriculture development
 
Theoretical study of the effect of hydroxy subgroup on the electronic and spe...
Theoretical study of the effect of hydroxy subgroup on the electronic and spe...Theoretical study of the effect of hydroxy subgroup on the electronic and spe...
Theoretical study of the effect of hydroxy subgroup on the electronic and spe...
 
Transition of space technologies and the spin off technologies realised
Transition of space technologies and the spin off technologies realisedTransition of space technologies and the spin off technologies realised
Transition of space technologies and the spin off technologies realised
 
Uranium concentration in human blood using fission track etch technique
Uranium concentration in human blood using fission track etch techniqueUranium concentration in human blood using fission track etch technique
Uranium concentration in human blood using fission track etch technique
 
サブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについて
サブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについてサブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについて
サブサーキット内のモデルパラメータにおけるモンテカルロシミュレーションについて
 
Urban flooding and vulnerability of nigerian cities
Urban flooding and vulnerability of nigerian citiesUrban flooding and vulnerability of nigerian cities
Urban flooding and vulnerability of nigerian cities
 
Top it management concerns in kenya
Top it management concerns in kenyaTop it management concerns in kenya
Top it management concerns in kenya
 
The relationship between the eps the market stock return
The relationship between the eps the market stock returnThe relationship between the eps the market stock return
The relationship between the eps the market stock return
 
Transshipment optimization of potable water to some rural areas in gombe stat...
Transshipment optimization of potable water to some rural areas in gombe stat...Transshipment optimization of potable water to some rural areas in gombe stat...
Transshipment optimization of potable water to some rural areas in gombe stat...
 
Manejo de estilos, índices, tablas de contenido e ilustraciones
Manejo de estilos, índices, tablas de contenido e ilustracionesManejo de estilos, índices, tablas de contenido e ilustraciones
Manejo de estilos, índices, tablas de contenido e ilustraciones
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphones
 
Use and satisfaction with online public access catalogue in selected universi...
Use and satisfaction with online public access catalogue in selected universi...Use and satisfaction with online public access catalogue in selected universi...
Use and satisfaction with online public access catalogue in selected universi...
 
Use of gender exclusive language in secondary school english textbooks in kenya
Use of gender exclusive language in secondary school english textbooks in kenyaUse of gender exclusive language in secondary school english textbooks in kenya
Use of gender exclusive language in secondary school english textbooks in kenya
 
The supply side gaps and opportunities of small & medium enterprises (sm es) ...
The supply side gaps and opportunities of small & medium enterprises (sm es) ...The supply side gaps and opportunities of small & medium enterprises (sm es) ...
The supply side gaps and opportunities of small & medium enterprises (sm es) ...
 
The potency of some brands of anti diabetic medicine- metformin hydrochloride...
The potency of some brands of anti diabetic medicine- metformin hydrochloride...The potency of some brands of anti diabetic medicine- metformin hydrochloride...
The potency of some brands of anti diabetic medicine- metformin hydrochloride...
 
Canadian Solar
Canadian SolarCanadian Solar
Canadian Solar
 
Urban transformation in 1950’s the case of hacettepe district, ankara
Urban transformation in 1950’s the case of hacettepe district, ankaraUrban transformation in 1950’s the case of hacettepe district, ankara
Urban transformation in 1950’s the case of hacettepe district, ankara
 
Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...
Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...
Kupfermelt_Final Report Upgrading Nickel Ores from Dikoloti BCL and BML 30 Oc...
 
The presentation of the arabic character in shakespeare's othello
The presentation of the arabic character  in  shakespeare's othelloThe presentation of the arabic character  in  shakespeare's othello
The presentation of the arabic character in shakespeare's othello
 
The significance analysis of the economic decision of farmer family against t...
The significance analysis of the economic decision of farmer family against t...The significance analysis of the economic decision of farmer family against t...
The significance analysis of the economic decision of farmer family against t...
 

Ähnlich wie Time dependent solution of batch arrival queue

Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAlexander Decker
 
Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAlexander Decker
 
Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...Alexander Decker
 
25700722037-(HM-HU601).pptx mechanical engineering
25700722037-(HM-HU601).pptx mechanical engineering25700722037-(HM-HU601).pptx mechanical engineering
25700722037-(HM-HU601).pptx mechanical engineeringAnantaKumarNandi
 
25700722037-(HM-HU601).pdf mechanical engineering
25700722037-(HM-HU601).pdf mechanical engineering25700722037-(HM-HU601).pdf mechanical engineering
25700722037-(HM-HU601).pdf mechanical engineeringAnantaKumarNandi
 
𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair
𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair
𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and RepairIJRES Journal
 
Availability of a Redundant System with Two Parallel Active Components
Availability of a Redundant System with Two Parallel Active ComponentsAvailability of a Redundant System with Two Parallel Active Components
Availability of a Redundant System with Two Parallel Active Componentstheijes
 
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...IJERA Editor
 
ON M(M,m)/M/C/N: Interdependent Queueing Model
ON M(M,m)/M/C/N: Interdependent Queueing ModelON M(M,m)/M/C/N: Interdependent Queueing Model
ON M(M,m)/M/C/N: Interdependent Queueing ModelIOSR Journals
 
Paper id 71201933
Paper id 71201933Paper id 71201933
Paper id 71201933IJRAT
 
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...Aminullah Assagaf
 
Balking and Reneging in the Queuing System
Balking and Reneging in the Queuing SystemBalking and Reneging in the Queuing System
Balking and Reneging in the Queuing SystemIOSR Journals
 
Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...
Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...
Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...IRJET Journal
 
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...IRJET Journal
 
IFAC2008art
IFAC2008artIFAC2008art
IFAC2008artYuri Kim
 

Ähnlich wie Time dependent solution of batch arrival queue (20)

Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch service
 
Analysis of single server queueing system with batch service
Analysis of single server queueing system with batch serviceAnalysis of single server queueing system with batch service
Analysis of single server queueing system with batch service
 
Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...Analysis of single server fixed batch service queueing system under multiple ...
Analysis of single server fixed batch service queueing system under multiple ...
 
Ijetr021226
Ijetr021226Ijetr021226
Ijetr021226
 
J42036572
J42036572J42036572
J42036572
 
25700722037-(HM-HU601).pptx mechanical engineering
25700722037-(HM-HU601).pptx mechanical engineering25700722037-(HM-HU601).pptx mechanical engineering
25700722037-(HM-HU601).pptx mechanical engineering
 
25700722037-(HM-HU601).pdf mechanical engineering
25700722037-(HM-HU601).pdf mechanical engineering25700722037-(HM-HU601).pdf mechanical engineering
25700722037-(HM-HU601).pdf mechanical engineering
 
𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair
𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair
𝑴[𝑿]/G/1 with Second Optional Service, Multiple Vacation, Breakdown and Repair
 
Availability of a Redundant System with Two Parallel Active Components
Availability of a Redundant System with Two Parallel Active ComponentsAvailability of a Redundant System with Two Parallel Active Components
Availability of a Redundant System with Two Parallel Active Components
 
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
Discretizing of linear systems with time-delay Using method of Euler’s and Tu...
 
ON M(M,m)/M/C/N: Interdependent Queueing Model
ON M(M,m)/M/C/N: Interdependent Queueing ModelON M(M,m)/M/C/N: Interdependent Queueing Model
ON M(M,m)/M/C/N: Interdependent Queueing Model
 
Paper id 71201933
Paper id 71201933Paper id 71201933
Paper id 71201933
 
Ah4201223230
Ah4201223230Ah4201223230
Ah4201223230
 
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
1 Aminullah Assagaf_Estimation-of-domain-of-attraction-for-the-fract_2021_Non...
 
Balking and Reneging in the Queuing System
Balking and Reneging in the Queuing SystemBalking and Reneging in the Queuing System
Balking and Reneging in the Queuing System
 
Business Logistics Assignment Help
Business Logistics Assignment HelpBusiness Logistics Assignment Help
Business Logistics Assignment Help
 
Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...
Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...
Computation of Simple Robust PI/PID Controller Design for Time-Delay Systems ...
 
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
 
IFAC2008art
IFAC2008artIFAC2008art
IFAC2008art
 
Lecture set 6
Lecture set 6Lecture set 6
Lecture set 6
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Time dependent solution of batch arrival queue

  • 1. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013 Time Dependent Solution of Batch Arrival Queue with Second Optional Service, Optional Re-Service and Bernoulli Vacation G. Ayyappan1* K. Sathiya2 1. Department of Mathematics, Pondicherry Engineering College, Pondicherry, India 2. Research Scholar, Pondicherry Engineering College, Pondicherry, India * E-mail of the corresponding author: ayyappan@pec.edu Abstract [ x] This paper deals with an M /G/1 queues with second optional service, optional re-service and Bernoulli vacations. Each customer undergoes first phase of service after completion of service, customer has the option to repeat or not to repeat the first phase of service and leave the system without taking the second phase or take the second phase service. Similarly after the second phase service he has yet another option to repeat or not to repeat the second phase service. After each service completion, the server may take a vacation with probability  or may continue staying in the system with probability 1   . The service and vacation periods are assumed to be general. The time dependent probability generating functions have been obtained in terms of their Laplace transforms and the corresponding steady state results have been obtained explicitly. Also the average number of customers in the queue and the waiting time are also derived. Keywords: Batch arrival, Second optional service, Optional re-service, Average queue size, Average waiting time. 1. Introduction For the first time the concept of Bernoulli vacation were studied by Keilson and Servi [6]. In many applications such as hospital services, production systems, bank services, computer and communication networks; there is two phase of services such that the first phase is essential for all customers, but as soon as the essential services completed, it may leave the system or may immediately go for the second phase of service. Recently, Madan [8] and Medhi [10] investigated an M/G/1 queueing system with a second optional service in which some of arrivals may require a second optional service immediately after completion of the first essential service. [ x] Ke [5] studied an M /G/1 system with startup server and J additional options for service. Choudhury and Paul [3,4] studied a batch arrival queue with an additional service channel under N-policy. At present, however most of the studies are devoted to batch arrival vacation models under different vacation policies because of its interdisciplinary character. Numerous researchers including Baba [1], Choudhury [2], Lee et al. [7], Madan and Choudhury [9] and many other have studied batch arrival queue under different vacation policies. In this paper we consider batch arrival queue with second optional service in which the first phase of service is compulsory whereas the second phase is optional. Each customer undergoes first phase of service after completion of which customer has the option to repeat or not to repeat the first phase of service and leave the system without taking the second phase or take the second phase service. Similarly after the second phase service he has yet another option to repeat or not to repeat the second phase service. Further, we assume that this option of repeating the first phase or the second phase service can be availed only once. The outline of the paper is as follows. The model description is given in section 2. Definitions and equations governing the system are given in section 3. The time dependent solution have been obtained in section 4 and corresponding steady state results have been derived explicitly in section 5. Average queue size and average waiting time are computed in section 6. 2. Model description We assume the following to describe the queueing model of our study. a) Customers arrive at the system in batches of variable size in a compound Poisson process and they 1
  • 2. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013 are provided one by one service on a first come - first served basis. Let ci dt ( i  1 ) be the first order probability that a batch of i customers arrives at the system during a short interval of time (t , t  dt ] , where 0  ci  1 and  c i = 1 and  > 0 is the arrival rate of batches. i =1 b) There is a single server who provides the first phase service for all customers, as soon as the first service of a customer is completed, he may opt to repeat the first service with probability r1 or may not repeat with probability 1  r1 . After completing the first service, the customer may opt to take the second optional service with probability p or may leave the system without taking the second service with probability 1  p . Similarly after taking the second phase service he may demand repetation of second phase service with probability r2 or may leave the system without repeating the second phase service with probability 1- r2 . Further, we assume that this option of repeating the first phase or the second phase service can be availed only once. c) The service time follows a general (arbitrary) distribution with distribution function Bi (s) and density function bi (s ) . Let i ( x)dx be the conditional probability density of service completion during the interval ( x, x  dx] , given that the elapsed time is x , so that i ( x) = bi ( x) , i = 1,2, 1  Bi ( x) and therefore, s   i ( x ) dx bi ( s) = i ( s)e 0 , i = 1,2. d) After each service completion, the server may take a vacation with probability  or may continue staying in the system with probability 1   . e) The server’s vacation time follows a general (arbitrary) distribution with distribution function V (t ) and density function v(t ) . Let  ( x)dx be the conditional probability of a completion of a vacation during the interval ( x, x  dx] given that the elapsed vacation time is x , so that  ( x) = v( x) , 1  V ( x) and therefore, t    ( x ) dx v(t ) =  (t )e 0 f) Various stochastic processes involved in the system are assumed to be independent of each other. 3. Definitions and Equations governing the system (i ) We define Pn ( x, t ) = Probability that at time t , the server is active providing i th phase service and there are n ( n  0 ) customers in the queue excluding the one being served and the elapsed service time for this  (i ) n  customer is x . Consequently P (t ) = Pn( i ) ( x, t )dx denotes the probability that at time t there are n 0 customers in the queue excluding one customer in the i th phase service irrespective of the value of x for ( i =1, 2. Rni ) ( x, t ) = Probability that at time t , the server is active providing i th phase repeating service and there are n ( n  0 ) customers in the queue excluding one customer who is repeating i th phase 2
  • 3. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013  service and the elapsed service time for this customer is x Consequently ( ( Rni ) (t ) = Rni ) ( x, t )dx denotes 0 the probability that at time t there are n customers in the queue excluding one customer who is repeating i th phase service irrespective of the value of x for i =1, 2. Vn ( x, t ) = Probability that at time t, the server is under vacation with elapsed vacation time x and there   are n ( n  0 ) customers in the queue. Accordingly Vn (t ) = Vn ( x, t )dx denotes the probability that at 0 time t there are n customers in the queue and the server is under vacation irrespective of the value of x . Q(t) = Probability that at time t , there are no customers in the queue and the server is idle but available in the system. The system is then governed by the following set of differential-difference equations:  (1)  P0 ( x, t )  P0(1) ( x, t )  [  1 ( x)]P0(1) ( x, t ) = 0 x t n  (1)  Pn ( x, t )  Pn(1) ( x, t )  [  1 ( x)]Pn(1) ( x, t ) =  ck Pn(1) ( x, t ), k x t k =1 n 1  (2)  P0 ( x, t )  P0(2) ( x, t )  [  2 ( x)]P0(2) ( x, t ) = 0 x t n  (2)  Pn ( x, t )  Pn(2) ( x, t )  [  2 ( x)]Pn(2) ( x, t ) =  ck Pn(2) ( x, t ), k x t k =1 n 1  (1)  (1) (1) R0 ( x, t )  R0 ( x, t )  [  1 ( x)]R0 ( x, t ) = 0 x t n  (1)  (1) (1) (1) Rn ( x, t )  Rn ( x, t )  [  1 ( x)]Rn ( x, t ) =  ck Rnk ( x, t ), x t k =1 n 1  (2)  (2) (2) R0 ( x, t )  R0 ( x, t )  [  2 ( x)]R0 ( x, t ) = 0 x t n  (2)  (2) (2) Rn ( x, t )  Vn(2) ( x, t )  [  2 ( x)]Rn ( x, t ) =  ck Rnk ( x, t ), x t k =1 n 1   V0 ( x, t )  V0 ( x, t ) = [   ( x)]V0 ( x, t ) x t n   Vn ( x, t )  Vn ( x, t ) = [   ( x)]Vn ( x, t )   ckVnk ( x, t ), n  1 x t k =1  d Q(t )  Q(t ) = (1   )(1  r2 )  P0(2) ( x, t ) 2 ( x)dx 0 dt  (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)  (2) (1)  (1   )  R0 ( x, t ) 2 ( x)dx  (1   )(1  p) R0 ( x, t ) 1 ( x)dx 0  0   (1   )(1  p)(1  r1 )  P ( x, t )1 ( x)dx   V0 ( x, t ) ( x)dx 0 (1) 0 0 The above equations are to be solved subject to the following boundary conditions  Pn(1) (0, t ) = cn1Q(t )  (1   )(1  p)(1  r1 )  Pn(1) ( x, t )1 ( x)dx 1 0 3 (11)
  • 4. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013   0  0  (1   )(1  r2 )  Pn(2) ( x, t )2 ( x)dx   Vn1 ( x, t ) ( x)dx 1  (1) (2)  (1   )(1  p)  Rn1 ( x, t )1 ( x)dx  (1   ) Rn1 ( x, t ) 2 ( x)dx 0 0 n0  0 0 (12)  (1) Pn(2) (0, t ) = p(1  r1 )  Pn(1) ( x, t ) 1 ( x)dx  p  Rn ( x, t )1 ( x)dx, n0 (13)  (1) Rn (0, t ) = r1  Pn(1) ( x, t ) 1 ( x)dx, n  0 (14) (2) Rn (0, t ) = r2  Pn(2) ( x, t )2 ( x)dx, n  0 (15) 0  0  Vn (0, t ) = (1  p) (1  r1 )  Pn(1) ( x, t )1 ( x)dx 0   0 0 (1)   (1  r2 )  Pn(2) ( x, t ) 2 ( x)dx  (1  p)  Rn ( x, t ) 1 ( x)dx  (2)    Rn ( x, t ) 2 ( x)dx, n  0 (16) 0 We assume that initially there are no customers in the system and the server is idle. So the initial conditions are ( Pn(i ) (0) = Rni ) (0) = 0 for n  0 and Q(0) = 1. (17) 4. Probability generating functions of the queue length: the time - dependent solution We define the probability generating functions ,    n=0 n =1 P (i ) ( x, z, t ) = z n Pn(i ) ( x, t ); P (i ) ( z, t ) = z n Pn(i ) (t ), C ( z ) = cn z n , n=0   n=0  n=0  n ( ( R (i ) ( x, z, t ) = z n Rni ) ( x, t ); R (i ) ( z, t ) = z n Rni ) (t ) for i = 1,2. V ( x, z, t ) = z nVn ( x, t ); V ( z, t ) = z Vn (t ), x > 0 n=0 (18) (19) n=0 which are convergent inside the circle given by z  1 and define the Laplace transform of a function f (t ) as  f ( s) = e  st f (t )dt , ( s) > 0. (20) 0 We take the Laplace transform of equations (1) - (16) and use (17) to obtain  (1) P0 ( x, s)  ( s    1 ( x)) P0(1) ( x, s) = 0 x n  (1) Pn ( x, s)  ( s    1 ( x)) Pn(1) ( x, s) =  ck Pn(1) ( x, s), n  1 k x k =1  (2) P0 ( x, s)  ( s    2 ( x)) P0(2) ( x, s) = 0 x n  (2) (2) Pn ( x, s)  ( s    2 ( x)) Pn ( x, s) =  ck Pn(2) ( x, s), n  1 k x k =1 4 (21) (22) (23) (24)
  • 5. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013  (1) R0 ( x, s)  ( s    1 ( x)) R0(1) ( x, s) = 0 x n  (1) Rn ( x, s)  ( s    1 ( x)) Rn(1) ( x, s) =  ck Rn(1)k ( x, s), n  1  x k =1  (2) R0 ( x, s)  ( s    2 ( x)) R0(2) ( x, s) = 0 x n  (2) Rn ( x, s)  ( s    2 ( x)) Rn(2) ( x, s) =  ck Rn(2)k ( x, s), n  1  x k =1  V0 ( x, s)  [ s     ( x)]V0 ( x, s) = 0 x n  Vn ( x, s)  [ s     ( x)]Vn ( x, s) =  ckVnk ( x, s), n  1 x k =1 (25) (26) (27) (28) (29) (30)  ( s   )Q ( s) = 1  (1  p)(1  r1 )(1   ) P0(1) ( x, s) 1 ( x)dx 0    (1  r2 )(1   )  P02 ( x, s)2 ( x)dx  (1   )  R0(2) ( x, s)2 ( x)dx 0  0   (1   )(1  p)  R ( x, s) 1 ( x)dx   V0 ( x, s) ( x)dx (1) 0 0 0 (31)  Pn(1) (0, s) = cn1Q ( s)  (1   )(1  p)(1  r1 )  Pn(1) ( x, s)1 ( x)dx 1 0   (1)  (1   )(1  r2 )  P ( x, s) 2 ( x)dx  (1   )(1  p)  Rn1 ( x, s) 1 ( x)dx (2) n 1 0 0   0 0 (2)  (1   )  Rn1 ( x, s)2 ( x)dx   Vn1 ( x, s) ( x)dx, n  0   0 (32) 0 (1) Pn(2) (0, s) = p(1  r1 )  Pn(1) ( x, s) 1 ( x)dx  p  Rn ( x, s) 1 ( x)dx,  n0 (33) R (0, s) = r1  P ( x, s) 1 ( x)dx, n  0 (34) Rn(2) (0, s) = r2  Pn(2) ( x, s) 2 ( x)dx, n  0 (35) (1) n 0  (1) n 0  Vn (0, s) =  (1  r1 )(1  p)  Pn(1) ( x, s) 1 ( x)dx 0   (1)   (1  p)  Rn ( x, s) 1 ( x)dx   (1  r2 )  Pn(2) ( x, s)2 ( x)dx 0 0     R ( x, s)2 ( x)dx, n  0 0 (2) n (36) Now multiplying equations (22), (24), (26) (28) and (30) by z and summing over n from 0 to  , adding to equations (21), (23), (25) and (27) using the generating functions defined in (18) and (19) we get n  (1) P ( x, z, s)  [ s    C ( z )  1 ( x)]P (1) ( x, z, s) = 0 x  (2) P ( x, z, s)  [ s    C ( z ))  2 ( x)]P (2) ( x, z, s) = 0 x  (1) R ( x, z, s)  [ s    C ( z )  1 ( x)]R (1) ( x, z, s) = 0 x 5 (37) (38) (39)
  • 6. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013  (2) R ( x, z, s)  [ s    C ( z )  2 ( x)]R (2) ( x, z, s) = 0 x  V ( x, z, s)  [ s    C ( z )   ( x)]V ( x, z, s) = 0 x (40) (41) For the boundary conditions, we multiply both sides of equation (32) by z sum over n from 0 to  , and use the equation (31), we get n zP (1) (0, z, s) = [1  (s   )Q (s)]  C ( z)Q (s)   (1   )(1  r1 )(1  p)  P (1) ( x, z, s) 1 ( x)dx 0    (1   )(1  p)  R ( x, z, s)1 ( x)dx  (1   )  R (2) ( x, z, s)2 ( x)dx (1) 0   0 0 0  (1   )(1  r2 )  P (2) ( x, z, s) 2 ( x)dx   V ( x, z, s) ( x)dx (42) Performing similar operation on equations (33) to (36) we get,   0 0 P (2) (0, z, s) = (1  r1 ) p  P (1) ( x, z, s)1 ( x)dx  p  R (1) ( x, z, s)1 ( x)dx (43)  R (1) (0, z, s) = r1  P (1) ( x, z, s)1 ( x)dx (44) 0  R (2) (0, z, s) = r2  P (2) ( x, z, s) 2 ( x)dx (45) 0  V (0, z, s) =  (1  r1 )(1  p) P (1) ( x, z, s)1 ( x)dx 0     (1  r2 )  P (2) ( x, z, s) 2 ( x)dx   (1  p)  R (1) ( x, z, s) 1 ( x)dx 0 0     R (2) ( x, z, s) 2 ( x)dx, n  0 0 (46) Integrating equation (37) between 0 to x , we get x  [ s    C ( z )] x  1 ( t ) dt P (1) ( x, z, s) = P (1) (0, z, s)e 0 (47) (1) where P (0, z, s) is given by equation (42). Again integrating equation (47) by parts with respect to x yields, 1  B1 ( s    C ( z ))  P (1) ( z, s) = P (1) (0, z, s)  s    C ( z )    (48) where  B1 ( s    C ( z )) = e [ s  C ( z )] x dB1 ( x) 0 is the Laplace-Stieltjes transform of the first phase service time B1 ( x) . Now multiplying both sides of equation (47) by 1 ( x) and integrating over x we obtain  P (1) ( x, z, s) 1 ( x)dx = P (1) (0, z, s) B1[ s   (1  c( z ))] (49) 0 Similarly, on integrating equations (38) to (41) from 0 to x , we get x  [ s   C ( z )] x   2 ( t ) dt P (2) ( x, z, s) = P (2) (0, z, s)e 0 (50) 6
  • 7. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013 x  [ s    C ( z )] x  1 ( t ) dt (1) (1) 0 R ( x, z, s) = R (0, z, s)e (51) x  [ s   C ( z )] x   2 ( t ) dt (2) (2) 0 R ( x, z, s) = R (0, z, s)e (52) x  [ s    C ( z )] x   ( t ) dt 0 V ( x, z, s) = V (0, z, s)e (2) (1) (53) (2) where P (0, z, s), R (0, z, s) , R (0, z, s) and V (0, z, s) are given by equations (43) to (46). Again integrating equations (50) to (53) by parts with respect to x yields, 1  B2 ( s    C ( z ))  P (2) ( z, s) = P (2) (0, z, s)   s    C ( z )   1  B1 ( s    C ( z ))  R (1) ( z, s) = R (1) (0, z, s)  s    C ( z )    1  B2 ( s   (1  C ( z )))  R (2) ( z, s) = R (2) (0, z, s)   s    C ( z )   1  V ( s    C ( z ))  V ( z, s) = V (0, z, s)    s    C ( z )  (54) (55) (56) (57) where  B2 ( s    C ( z )) =  e [ s  C ( z )] x dB2 ( x) 0  V ( s    C ( z )) =  e [ s  C ( z )] x dV ( x) 0 are the Laplace-Stieltjes transform of the second phase service time and vacation time. Now multiplying both sides of equations (50) to (53) by 1 ( x) ,  2 ( x) and  (x) integrating over x , we obtain  P (2) ( x, z, s)  2 ( x)dx = P (2) (0, z, s) B2 [ s    C ( z )] (58) 0  R (1) ( x, z, s) 1 ( x)dx = R (1) (0, z, s) B1[ s    C ( z )] (59) (2) ( x, z, s)  2 ( x)dx = R (2) (0, z, s) B2 [ s    C ( z )] (60) 0  R 0  V ( x, z, s) ( x)dx = V (0, z, s)V [s    C ( z)] (61) 0 Using equation (58) in (45), we get R (2) (0, z, s) = r2 B2 (a) P (2) (0, z, s) (62) By using equation (49) in (44), we get R (1) (0, z, s) = r1B1 (a) P (1) (0, z, s) (63) Using equations (49), (59) and using (63) in (43), we get P (2) (0, z, s) = pB1 (a)[1  r1  r1B1 (a)]P (1) (0, z, s) Using equations (49), (58), (59) and (60) in (46), we get V (0, z, s) = pB1 (a) B2 (a)[1  r1  r1B1 (a)][1  r2  r2 B2 (a)]P (1) (0, z, s) 7 (64)
  • 8. Mathematical Theory and Modeling ISSN 2224-5804 (Paper) www.iiste.org ISSN 2225-0522 (Online) Vol.3, No.13, 2013   (1  p) B2 (a) P (1) (0, z, s) (65) Using equations (49), (58) to (61) in (42), we get zP (1) (0, z, s) = [1  sQ (s)]   (C ( z)  1)Q (s)  B1 (a)(1  r1  r1B1 (a))(1    V (a)) [1  p  pB2 (a)(1  r2  r2 B2 (a))]P (1) (0, z, s) (66) Similarly using equations (62) to (65), in (66), we get P (1) (0, z, s) =  (C ( z )  1)Q ( s)  (1  sQ ( s)) Dr (67) where Dr = z  B1 (a)(1  r1  r1B1 (a))(1    V (a))[1  p  pB2 (a)(1  r2  r2 B2 (a))], and a = s    C ( z ) . Substituting (67) into equations (62) to (65), we get [(1  sQ ( s))   (C ( z )  1)Q ( s)] (68) Dr [(1  sQ ( s))   (C ( z )  1)Q ( s)] (69) R (1) (0, z, s) = r1B1 (a) Dr [(1  sQ ( s))   (C ( z )  1)Q ( s)] (70) R (2) (0, z, s) = r2 pB1 (a) B2 (a)(1  r  rB1 (a)) Dr P (2) (0, z, s) = pB1 (a)(1  r1  r1B1 (a)) V (0, z, s) =  Dr B1 (a)(1  r1  r1B1 (a))(1  p  pB2 (a)(1  r2  r2 B2 (a))) [ (C ( z)  1)Q (s)  (1  sQ (s))] (71) Using equations (67) to (71) in (48) and (54) to (57), we get P (1) ( z, s), P (2) ( z, s), R (1) ( z, s) , R (2) ( z, s) and V ( z, s) . Thus which completes the proof of the theorem. 5. Conclusion In this paper we have studied a batch arrival queue with two phases of service and optional re-service with Bernoulli vacation. This paper clearly analyzes the transient solution, steady state results , Mean number of customer in the queue and the system of our queueing system. References [ x] [1] Baba,Y. (1986). On the M /G/1 queue with vacation time, Operation Research Letter, 5, 93-98. [2] Choudhury, G.. (2002). A batch arrival queue with a vacation time under single vacation policy, Computer Operation Research, 29, 1941-1955. [3] Choudhury, G.., & Paul, M. (2004). A batch arrival queue with an additional service channel under Npolicy, Appllied Mathematical Computation, 156, 115-130. [4] Choudhury, G.., & Paul, M. (2006). A batch arrival queue with a second optional service channel under N-policy, Stochastic Analysis and Applications, 24, 1-22. [ x] [5] Ke, J. (2008). An M /G/1 system with startup server and J additional options for service, Appllied Mathematical Modelling, 32, 443-458. [6] Keilson, J., & Servi, L. D. (1987). Dynamic of the M/G/1 vacation model, Operation Research, 35(4). [7] Lee, S.S., et al. (1995). Batch arrival queue with N-policy and single vacation, Computer Operation Research, 22, 173-189. [8] Madan, K.C. (2000). An M/G/1 queue with second optional service, Queueing System, 34, 79-98. [9] Madan, K.C. & Choudhury, G.. (2005). A single server queue with two phases of heterogenous service under Bernoulli schedule and a general vcation time, Information and Managment Science, 16(2), 1-16. [10] Medhi, J. (2002). A single server Poisson input queue with a second optional channel, Queueing System, 42, 239-242. 8
  • 9. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar