DYNAMIC VISIT-ORDER RULES FOR BATCH-SERVICE POLLING

2003 ◽  
Vol 17 (3) ◽  
pp. 351-367 ◽  
Author(s):  
Jan van der Wal ◽  
Uri Yechiali

We explore visit-order policies in nonsymmetric polling systems with switch-in and switch-out times, where service is in batches of unlimited size. We concentrate on so-called “Hamiltonian tour” policies in which, in order to give a fair treatment to the various users, the server attends every nonempty queue exactly once during each round of visits (cycle). The server dynamically generates a new visit schedule at the start of each round, depending on the current state of the system (number of jobs in each queue) and on the various nonhomogeneous system parameters. We consider three service regimes, globally gated, (locally) gated, and exhaustive, and study three different performance measures: (1) minimizing the expected weighted sum of all sojourn times of jobs within a cycle; (2) minimizing the expected length of the next cycle, and (3) maximizing the expected weighted throughput in a cycle. For each combination of performance measure and service regime, we derive characteristics of the optimal Hamiltonian tour. Some of the resulting optimal policies are shown to be elegant index-type rules. Others are the solutions of deterministic NP-hard problems. Special cases are reduced to assignment problems with specific cost matrices. The index-type rules can further be used to construct fixed-order, cyclic-type polling tables in cases where dynamic control is not applicable.

Author(s):  
Thomas Yew Sing Lee

The author presents performance analysis of a single buffer multiple-queue system. Four different types of service disciplines (i.e., non-preemptive, pre-emptive repeat different, state dependent random polling and globally gated) are analyzed. His model includes correlated input process and three different types of non-productive time (i.e., switchover, vacation and idle time). Special cases of the model includes server with mixed multiple and single vacations, stopping server with delayed vacation and stopping server with alternating vacation and idle time. For each of the four service disciplines the key performance measures such as average customer waiting time, loss probability, and throughput are computed. The results permit a detailed discussion of how these performance measures depends on the customer arrival rate, the customer service time, the switchover time, the vacation time, and the idle time. Moreover, extensive numerical results are presented and the four service disciplines are compared with respect to the performance measure. Previous studies of the single buffer multiple-queue systems tend to provide separate analysis for the two cases of zero and nonzero switchover time. The author is able to provide a unified analysis for the two cases. His results generalize and improve a number of known results on single buffer multiple-queue systems. Furthermore, this method does not require differentiation while it is needed if one uses the probability generating function approach. Lastly, the author's approach works for all single buffer multiple-queue systems in which the next queue to be served is determines solely on the basis of the occupancy states at the end of the cycle time.


2009 ◽  
Vol 61 (2) ◽  
pp. 264-281 ◽  
Author(s):  
J. P. Bell ◽  
K. G. Hare

Abstract. Let q be an algebraic integer of degree d ≥ 2. Consider the rank of the multiplicative subgroup of ℂ* generated by the conjugates of q. We say q is of full rank if either the rank is d − 1 and q has norm ±1, or the rank is d. In this paper we study some properties of ℤ[q] where q is an algebraic integer of full rank. The special cases of when q is a Pisot number and when q is a Pisot-cyclotomic number are also studied. There are four main results.(1)If q is an algebraic integer of full rank and n is a fixed positive integer, then there are only finitely many m such that disc `ℤ[qm]´ = disc `ℤ[qn]´.(2)If q and r are algebraic integers of degree d of full rank and ℤ[qn] = ℤ[rn] for infinitely many n, then either q = ωr′ or q = Norm(r)2/dω/r′ , where r ′ is some conjugate of r and ω is some root of unity.(3)Let r be an algebraic integer of degree at most 3. Then there are at most 40 Pisot numbers q such that ℤ[q] = ℤ[r].(4)There are only finitely many Pisot-cyclotomic numbers of any fixed order.


1999 ◽  
Vol 121 (4) ◽  
pp. 557-564 ◽  
Author(s):  
J. Tu ◽  
K. K. Choi ◽  
Y. H. Park

This paper presents a general approach for probabilistic constraint evaluation in the reliability-based design optimization (RBDO). Different perspectives of the general approach are consistent in prescribing the probabilistic constraint, where the conventional reliability index approach (RIA) and the proposed performance measure approach (PMA) are identified as two special cases. PMA is shown to be inherently robust and more efficient in evaluating inactive probabilistic constraints, while RIA is more efficient for violated probabilistic constraints. Moreover, RBDO often yields a higher rate of convergence by using PMA, while RIA yields singularity in some cases.


2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
Myoung-Ju Park ◽  
Byung-Cheon Choi

We consider a single-machine scheduling problem with an outsourcing option in an environment where the processing time and outsourcing cost are uncertain. The performance measure is the total cost of processing some jobs in-house and outsourcing the rest. The cost of processing in-house jobs is measured as the total weighted completion time, which can be considered the operating cost. The uncertainty is described through either an interval or a discrete scenario. The objective is to minimize the maximum deviation from the optimal cost of each scenario. Since the deterministic version is known to be NP-hard, we focus on two special cases, one in which all jobs have identical weights and the other in which all jobs have identical processing times. We analyze the computational complexity of each case and present the conditions that make them polynomially solvable.


Author(s):  
Srimat T. Chakradhar ◽  
Vishwani D. Agrawal ◽  
Michael L. Bushneil
Keyword(s):  

1999 ◽  
Vol 6 (49) ◽  
Author(s):  
Alexander A. Ageev ◽  
Maxim I. Sviridenko

<p>Probably most of the recent striking breakthroughs in designing approximation algorithms with provable performance guarantees are due to using novel methods of rounding polynomially solvable fractional relaxations. Applicability of the known rounding methods is highly dependent on the type of the constraints in such relaxations. In [1] the authors presented a new rounding ( pipage) method especially oriented to tackle some NP-hard problems which can be equivalently reformulated as integer programs with cardinality or a bit more general constraints. The paper [1] contains four results demonstrating<br />the strength of the pipage rounding. One of them is an 1/2-approximation algorithm for Max k-Cut with given sizes of parts. An instance of this problem consists of an undirected graph G = (V,E), a collection of nonnegative weights w_e associated with its edges and k positive integers p1, p2, . . . , pk such that Sum pi = |V|. It is required to find a partition of V into k parts V1, V2, . . . , Vk with each part Vi having size pi so as to maximize the total weight of edges whose ends lie in different parts of the partition. The Max<br />Cut and Max k-Cut problems are classical in combinatorial optimization and<br />have been extensively studied in the absence of cardinality constraints. The<br />best known approximation algorithm for Max Cut is due to Goemans and<br />Williamson [8] and has performance guarantee of 0.878. Frieze and Jerrum<br />[7] extended the technique of Goemans and Williamson to Max k-Cut and<br />designed a (1−1/k+2 ln k/k^2)-approximation algorithm. Few approximation<br />algorithms are known for some special cases of Max k-Cut with given sizes<br />of parts. In particular, Frieze and Jerrum [7] present an 0.65-approximation<br />algorithm for Max Bisection (in this problem k = 2 and p1 = p2 = |V|/2).<br />Very recently, Ye [9] announced an algorithm with a better performance guarantee<br />of 0.699. The best known approximation algorithm for Max k-Section<br />(in this problem p1 = ... = pk = |V|/k) is due to Andersson [2] and has<br />performance guarantee of 1 − 1/k + Theta(1/k^3). In this paper we consider a<br />natural hypergraph generalization of Max k-Cut with given sizes of parts<br />| - Hypergraph Max k-Cut with given sizes of parts (HMkC for short). An<br />instance of HMkC consists of a hypergraph H = (V,E), a collection of nonnegative<br />weights wS on its edges S, and k positive integers p1, . . . , pk such<br />that Sum pi = |V|. It is required to partition the vertex set V into k parts<br />(X1, . . . , Xk) with |Xi| = pi for each i, so as to maximize the total weight<br />of edges of H not lying wholly in any part of the partition (that is, to maximize<br />the total weight of edges S such that S \ Xi 6 |= 0 for each i). Several<br />closely related versions of Hypergraph Max k-Cut were studied in the literature<br />but very few results have been obtained. Andersson and Engebretsen<br />[3] presented an 0.72-approximation algorithm for the ordinary Hypergraph<br />Max Cut problem. Arora, Karger and Karpinski [4] designed a PTAS for<br />dense instances of this problem (i.e. in the case of hypergraphs H having<br />Theta(|V (H)|^d) edges) under the condition that |S| <= d for each edge S and<br />some constant d.<br />In this paper by applying the pipage rounding method we prove that<br />HMkC can be approximated within a factor of minfjSj : S 2 Eg of the<br />optimum where r = 1−(1−1=r)r−(1=r)r. By direct calculations it easy to<br />get some specic values of r: 2 = 1=2, 3 = 2=3 0:666, 4 = 87=128 <br />0:679, 5 = 84=125 = 0:672, 6 0:665 and so on. It is clear that r tendsto 1 − e−1 0:632 as r ! 1. A less trivial fact is that r &gt; 1 − e−1 for each r 3 (Lemma 2 in this paper). Adding up we arrive at the following conclusions: our algorithm nds a feasible cut of weight within a factor of 1=2 on general hypergraphs (we assume that each edge in a hypergraph has size at least 2), and within a factor of 1 − e−1 in the case when each edge has size at least 3. Note that the rst bound coincides with that we obtained in [1] for the case of graphs. In this paper we also show that in the case of hypergraphs without two-vertex edges the bound of 1 − e−1 cannot be improved unless P=NP.</p>


Author(s):  
G. Ayyappan ◽  
R. Supraja

This paper deals with a batch arrival that customers arrive to the system according to a compound Poisson process. The customer’s behavior is incorporated according to which loss with a certain probability and the server begins to provide a service only when a queue size minimum say ‘a’ and maximum service capacity is ‘b’. Once the server completes the service, the unsatisfied customers may get the same service under Bernoulli schedule is termed as instantaneous Bernoulli feedback. The occurrence of negative customer cause the server to fail and removes a group of customers or an amount of work if present upon its arrival. As soon as the failure instant, the service channel send to the two delays of verification, the first verification delay starts before the repair process and the second verification delay begins after the repair process. We use the generating function method to derive the stationary queue size distribution. Some important performance measures such as different states of the system and the expected length of the queue explicitly. Some important special cases and numerical examples are determined.


Mathematics ◽  
2022 ◽  
Vol 10 (2) ◽  
pp. 182
Author(s):  
Fan-Qi Ma ◽  
Rui-Na Fan

In recent years, the use of consensus mechanism to maintain the security of blockchain system has become a considerable concern of the community. Delegated proof of stake (DPoS) and practical Byzantine fault tolerant (PBFT) consensus mechanisms are key technologies in maintaining the security of blockchain system. First, this study proposes a consensus mechanism combining DPoS and PBFT, which can rapidly deal with malicious witness nodes and shorten the time of block verification. Second, the M/PH/1 queuing model is used to analyze the performance of the proposed consensus mechanism, and the performance of the improved practical Byzantine fault tolerant consensus mechanism is evaluated from steady-state conditions and key performance measure of the system. Third, the current study uses the theoretical method of open (Jackson) queuing network, combined with the blockchain consensus process, and provides theoretical analysis with special cases. Lastly, this research utilizes numerical examples to verify the computability of the theoretical results. The analytic method is expected to open a series of potentially promising research in queueing theory of blockchain systems.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012110
Author(s):  
V F Filaretov ◽  
A S Gubankov ◽  
I V Gornostaev

Abstract The paper is devoted to preservation of dynamic control accuracy of working tools of multilink manipulators when they move along arbitrary spatial trajectories, taking into account the design limits in all degrees of freedom and special cases of position of their links. Preservation of control accuracy is proposed to be ensured by eliminating reach of all degrees of freedom of the manipulators to the limits and to indicated special positions, characterized by ambiguity in solving the inverse kinematic problems of the manipulators, as well as excluding the reach of their working tools to boundaries of working area due to use of a redundant degree of freedom when approaching indicated undesirable positions. The performed simulation has confirmed efficiency of the proposed method.


Author(s):  
Wassim M. Haddad ◽  
Sergey G. Nersesov

This chapter introduces a novel class of fixed-order, energy- and entropy-based hybrid decentralized controllers for achieving enhanced energy dissipation in large-scale vector lossless and vector dissipative systems based on subsystem decomposition. These dynamic decentralized controllers combine a logical switching architecture with continuous dynamics to guarantee that the system plant energy is strictly decreasing across switchings. The general framework leads to hybrid closed-loop systems described by impulsive differential equations. The chapter also constructs hybrid dynamic controllers that guarantee that each subsystem-subcontroller pair of the hybrid closed-loop system is consistent with basic thermodynamic principles. Special cases of energy-based hybrid controllers involving state-dependent switching are described, and several illustrative examples are given and an experimental test bed is designed to demonstrate the efficacy of the proposed approach.


Sign in / Sign up

Export Citation Format

Share Document