Open Networks of Exponential Queues

Author(s):  
Moshe Haviv
Keyword(s):  
2019 ◽  
Vol 957 ◽  
pp. 247-254
Author(s):  
Markus Moritz ◽  
Daniel Fuchs ◽  
Marian Gheorghe

In general, networks in companies or between companies play a significant role for monetary as well as non-monetary enhancement through cooperation. The aim is a positive effect for reducing innovation cycles, reducing costs and establishing a well-balanced time to market strategy. Besides open networks, where every actor is known, the existence of hidden networks, internal as well as external, have a substantial impact on strategic and operational activities meaning either a contribution or threat for the actors outside the hidden network. With the new models introduced in this publication, actors in various environments are able to identify hidden networks in order to be able to push contributions or eliminate risks leading from profit cuts to illegal knowledge transfer.


2017 ◽  
Vol 31 (4) ◽  
pp. 420-435 ◽  
Author(s):  
J.-M. Fourneau ◽  
Y. Ait El Majhoub

We consider open networks of queues with Processor-Sharing discipline and signals. The signals deletes all the customers present in the queues and vanish instantaneously. The customers may be usual customers or inert customers. Inert customers do not receive service but the servers still try to share the service capacity between all the customers (inert or usual). Thus a part of the service capacity is wasted. We prove that such a model has a product-form steady-state distribution when the signal arrival rates are positive.


Expansion of internet connectivity and its usage globally has increased various demands of providing security for the data transmission. Telemedicine is a modern way of medical care that can be extended to any remote place across the globe. This medical care practice is a result of the deployment of communication systems and information technology into healthcare system. With this technology the diagnosed data can be shared with physician and take his consultation remarks and also physicians can access to diagnostic archive and share for medical practice and learning. However, this exchange of information is confined with several risks of data theft when they are shared in open networks and hence they are to be protected with high security algorithms. This paper provides a high capacitive security algorithm for protecting the images with hidden confidential information. The approach provides a two-way security by encrypting the clinical information initially and embedding it imperceptibly in the concerned image so that the user on other can obtain both the visual and text data at same instance


2018 ◽  
Vol 22 (S1) ◽  
pp. 565-571 ◽  
Author(s):  
Bin Zhao ◽  
Chuangbai Xiao ◽  
Yu Zhang ◽  
Peng Zhai ◽  
Zhi Wang
Keyword(s):  

1997 ◽  
pp. 113-119
Author(s):  
U. Faltin ◽  
P. Glöckner ◽  
U. Viebeg ◽  
A. Berger ◽  
H. Giehl ◽  
...  
Keyword(s):  

Author(s):  
W. K. Hamoudi ◽  
Nadia M. G. Al-Saidi

Information security can provide confidentiality, integrity, and availability for society to benefit efficiently from data storage and open networks. Free space communication networks suffer from adversaries who interfere with data on networked computers. Inventing new protection techniques has arisen to ensure integrity and authenticity of digital information. This chapter introduces Nano and Bio techniques in cryptography to enhance the information security systems. Tasks unfeasible on a classical computer can now be performed by quantum computers, yielding a big impact on online security. Threats of exponentially fast quantum algorithms on business transactions could be overcome by this new technology. Based on biological observations, the exploration of biometric cryptography and authentication to determine individuals' authenticity can be done through numeric measurements. This provides very reliable automated verification and strong protection against biometric system attacks.


Sign in / Sign up

Export Citation Format

Share Document