Sort by
Analysis of M/M/1 Model with Complete Breakdown during Busy Period, Optional Server with Limited Service, Complete Vacation and Delay in Repair

In this paper we have analyzed a single server Markovian queueing model with an optional server for limited-service time, complete breakdown during busy period, complete vacation with some delay in repair. Customers arrival follow Poisson’s distribution with rate λ. Service time during busy period is exponentially distributed with rate. The server goes under complete breakdown during busy period and hence sent for repairing. During breakdown an optional server with limited-service time is available for serving customers rather than stopping service. This optional server after completing busy period moves to working vacation for limited time period, where service time during this period is slower than busy period service time as server has some prior commitments or work to finish. As the limited-service time finishes, the server goes for a complete vacation and will not serve any customer during this period. If main server gets repaired, it immediately resumes busy period but if some delay occurs in repairing of main server, then optional server after completing vacation, will act as main server and resumes busy period until main server get repaired. The closed form expression of various system probabilities is derived. Various system performance measures like waiting time, queue length have been evaluated. Finally, some numerical and graphical results have been shown to model the impact of some parameters on different performance measures.

Relevant
Data Science: A Novel Analytical Structure in Public Mental Health

Applying data science to public mental health concerns and devising remedies based on research findings can be challenging and call for sophisticated methods. In contrast to traditional data analysis initiatives. It's critical to possess an extensive project management procedure to guarantee that Project associates are capable and knowledgeable enough to Implement the data science process. As a result, this essay offers a fresh paradigm that mental health practitioners might apply to address issues people encounter when applying data science. Even so, a sizable portion of Many studies on the mental health of the public have been published, not many have talked about data science's application to public mental health. Data science has recently transformed how the healthcare business manages, analyses, and uses data. Because of the scientific methodology employed in data science initiatives, they differ from traditional data analysis. Motivating medical practitioners to use "Data Science" to mental health issues is one of the goals of launching this new framework. It's usually advantageous to have a strong data analysis framework and precise instructions for a thorough examination. Estimating the time and resources required early on in the process can also be helpful in gaining a clear understanding of the problem that needs to be solved.

Relevant
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascaded-looking composition of F-functions in a quadrate architecture. The proposed F-function architecture is a three-input, three-output Type-3 AES-Feistel network with additional integer parameters representing the subkeys in use. The suggested system makes use of the AES block cipher as a function on a Type-3 AES-Feistel network. Blocks in the proposed system are 896 bits in length, whereas keys are 128 bits. The production of subkeys is encrypted using a chain of E8- algorithms. The necessary subkeys are then generated with a recursion. The results are reviewed to verify that the new layout improves the security of the AES block cipher when used to encrypt medical images in a computer system.

Relevant