SlideShare a Scribd company logo
1 of 75
誰想計算等候時間? Computing Waiting Time! Who Cares? 政治大學 應用數學系 陸 行  Hsing Luh  Department of Mathematical Sciences
[object Object],[object Object]
多線排隊
單線排隊  多人服務
等候時間的計算與應用 ,[object Object],[object Object]
如何描述等候時間 ,[object Object],[object Object],[object Object],Agner Krarup Erlang (1878-1929)
到達時間是隨機變數
服務時間是隨機變數
等候時間是隨機變數
An M/M/1 Queueing system ,[object Object],[object Object],[object Object],[object Object],[object Object],Courtesy to Internet Information
狀態平衡方程式 Courtesy to Internet Information
n-1 n n+1         Courtesy to Internet Information 狀態平衡方程式
長時間的觀察值 Courtesy to Internet Information n-1 n n+1        
基本假設條件 ,[object Object],[object Object],[object Object],Courtesy to Internet Information
區域狀態平衡方程式 ,[object Object],[object Object],[object Object],[object Object],[object Object],Courtesy to Internet Information 0 1 2 3 n-1 n n+1                
機率分配 ,[object Object],[object Object],[object Object],[object Object],Courtesy to Internet Information
Little’s Law ,[object Object],[object Object],Courtesy to Internet Information
Example of Little Law ,[object Object],[object Object],Courtesy to Internet Information
State dependent M/M/1  Queueing Systems 0 1 2 3 n-1 n n+1  (0)  (1)  (2)  (3)  (n-2)  (n-1)  (n)  (n+1)  (1)  (2)  (3)  (4)  (n-1)  (n)  (n+1)  (n+2) Courtesy to Internet Information
Performance Measure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Courtesy to Internet Information
Example 1 Suppose interarrival time is 12 min and service time is 10 minutes per job. . M/M/1:
M/M/1/N Queueing System The Finite Buffer Case ,[object Object],Courtesy to Internet Information  0 1 2 3 N-1 N           
Example 2 Suppose interarrival time is 12 min and service time is 10 minutes per job. . M/M/2:
比比看 Two M/M/1  One M/M/2
平均等候時間 平均服務率 M/M/1  平均到達率 P{idle time}  E(waiting  time)  × 2
平均等候時間 平均服務率 M/M/2   平均到達率 P{idle   time} }  E(waiting   time}
Example 3 Suppose interarrival time is 12 min and service time is 10 minutes per job. . Two M/M/1: One M/M/2: × 2
M/M/2 與 M/M/1  的比較 < < < × 2 × 2 in queue) <
等候時間的機率分配函數
 
佇列的等候機率
時間延誤問題 系統模擬
系統模擬  (1)
系統模擬  (2)
系統模擬  (3)
交通號誌
匝道管制
通訊問題
通訊服務
An optimization model Minimize  Penalty made by unsatisfied traffic aggregates Subject to Fixed resource (Limited Short Path bandwidth) Traffic aggregate QDF budget must be satisfied Allocate resource to traffic aggregates Trading off QDF with bandwidth in each Short Path  最佳化模型
Introduction ,[object Object],[object Object],.
Utility Functions ,[object Object],[object Object],[object Object],,
Utility Functions ,[object Object]
A Network Optimization Model
A Network Optimization Model ,[object Object]
Network Constraints ,[object Object],[object Object]
Network Constraints ,[object Object]
Network Constraints ,[object Object],[object Object]
Network Constraints ,[object Object]
An Illustrative Example ,[object Object]
An Illustrative Example ,[object Object]
An Illustrative Example ,[object Object]
Numerical Results
Numerical Results
Numerical Results
Numerical Results
Numerical Results
參考文獻 Hsing Luh, Chia-Hung Wang, and Chih-Chin Liang, “Measuring the Cost of Links of a Disaster-Avoided Content-Delivering Service within a Large-scaled Company,” Proc. of the Fourth International Conference on Queueing Theory and Network Applications (QTNA2009), Fusionopolis, Singapore, July 29-31, 2009. ,[object Object],[object Object],[object Object],[object Object],[object Object]
作業研究 ,[object Object],例如:一個企業管理者必須將原料、半成品、成品、存貨、勞動力、資金、時間,做最佳的調度與組合,期使成本降到最低,利潤增到最大 。 資源 最佳值 有效調度 配置 目標
運籌科學與相關領域  OR and Related Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
運 OR 籌 資 訊  Information 管 理  Management 科  學  Science
By Bertrand Mareschal 1. Introduction History. Methodology. Models. 2. Linear programming Applications. Simplex algorithm. Sensitivity analysis. Integer programming. 3. Network analysis Transportation problems. Maximum flow problems. CPM and PERT – Project management. 4. Inventory management Deterministic EOQ models. Probabilistic models. Production management 5. Multicriteria decision aid Methods. Multicriteria decision support systems. Group decision systems. Applications.
模式與方法  Models and Methodologies Models deterministic  probabilistic -------------------------------------------------- optimization /  OR OR solutions     Methodologies simulation --------------------------------------------------    
By Bertrand Mareschal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
供應鏈  Supply Chain Management The Goal: A Process of Ongoing Improvement  by  Eliyahu M. Goldratt
推銷員問題  Traveling Salesman Problem TSP http://www.ing.unlp.edu.ar/cetad/mos/TSPBIB_home.html O(2^n) 2^50 ~10^15 3*10^7* 10^6 ~ 30 years
BIOINFORMATICS  生物資訊 http:// motif.stanford.edu/index.html
CRYTOGRAPHY  密碼學 Elliptic Curve http:// www.certicom.ca
資源  Resource 最佳值  Optimum 有效調度  Adjustment 配置  Allocation 目標 Objective 動態系統
最佳解 改進 最佳解 可行解
No interac- tion allowed 2 1 Individual sampling model (ISM): Simulated patient-level Markov model (SPLMM) (variations as in quadrant below for patient level models with interaction)  Simulated Markov model (SMM)  Markov model (evaluated deterministically) Timed Individual sampling model  (ISM): Simulated patient-level  decision tree (SPLDT) Simulated decision tree (SDT) Decision tree rollback Untimed Non-Markovian, discrete-state, individuals  Markovian, discrete state, individuals  Markovian, discrete state, stochastic Expected value, continuous state, deterministic Individual level  Cohort/aggregate level/counts D C B A
Discrete event simulation (CT, DES)  Discrete individual simulation  (DT, DES) Interaction allowed 4 3 Continuous time Individual event history model (CT, IEH)  Continuous time Markov chain model (CTMC)  System dynamics (ordinary differential equations, ODE) Continu-ous time Discrete-time individual event history model (DT, IEH)  Discrete time Markov chain model (DTMC) System dynamics (finite difference equations, FDE) Discrete time Non-Markovian, discrete-state, individuals  Markovian, discrete state, individuals  Markovian, discrete state, stochastic Expected value, continuous state, deterministic Individual level  Cohort/aggregate level/counts D C B A
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
謝 謝 大 家

More Related Content

What's hot

IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...ijcseit
 
Parallel WaveGAN review
Parallel WaveGAN reviewParallel WaveGAN review
Parallel WaveGAN reviewJune-Woo Kim
 
A general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresA general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresMehran Mesbahzadeh
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationTELKOMNIKA JOURNAL
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...gerogepatton
 
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Eswar Publications
 
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMPacket Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMTELKOMNIKA JOURNAL
 
Data collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collectorData collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collectorijwmn
 
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencleSAT Publishing House
 
Monotonic Multihead Attention review
Monotonic Multihead Attention reviewMonotonic Multihead Attention review
Monotonic Multihead Attention reviewJune-Woo Kim
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksijwmn
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 

What's hot (18)

IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...
 
Parallel WaveGAN review
Parallel WaveGAN reviewParallel WaveGAN review
Parallel WaveGAN review
 
A general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresA general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measures
 
Selective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device CommunicationSelective Green Device Discovery for Device to Device Communication
Selective Green Device Discovery for Device to Device Communication
 
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
PERCEPTUAL COPYRIGHT PROTECTION USING MULTIRESOLUTION WAVELET-BASED WATERMARK...
 
Conformer review
Conformer reviewConformer review
Conformer review
 
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)
 
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMPacket Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Data collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collectorData collection scheme for wireless sensor network with mobile collector
Data collection scheme for wireless sensor network with mobile collector
 
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencl
 
Monotonic Multihead Attention review
Monotonic Multihead Attention reviewMonotonic Multihead Attention review
Monotonic Multihead Attention review
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networks
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 

Similar to C:\Documents And Settings\User\桌面\Sciece Talk投影片\Science Talk 100111 陸行

Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestionijwmn
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
Queing theory and delay analysis
Queing theory and delay analysisQueing theory and delay analysis
Queing theory and delay analysisPriyanka Negi
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor NetworksOscar Corcho
 
Project
Project Project
Project J M
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...ijwmn
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...IJCNCJournal
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Jaipal Dhobale
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 

Similar to C:\Documents And Settings\User\桌面\Sciece Talk投影片\Science Talk 100111 陸行 (20)

Comparative analysis of congestion
Comparative analysis of congestionComparative analysis of congestion
Comparative analysis of congestion
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Queuing Theory
Queuing TheoryQueuing Theory
Queuing Theory
 
DTN
DTNDTN
DTN
 
Queing theory and delay analysis
Queing theory and delay analysisQueing theory and delay analysis
Queing theory and delay analysis
 
Tps04
Tps04Tps04
Tps04
 
Queue
QueueQueue
Queue
 
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor Networks
 
Project
Project Project
Project
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
RESPONSE SURFACE METHODOLOGY FOR PERFORMANCE ANALYSIS AND MODELING OF MANET R...
 
Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...Computer Network Performance Evaluation Based on Different Data Packet Size U...
Computer Network Performance Evaluation Based on Different Data Packet Size U...
 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

C:\Documents And Settings\User\桌面\Sciece Talk投影片\Science Talk 100111 陸行

Editor's Notes

  1. queueing 為了達某件事的延誤
  2. 如何計算
  3. 第n個人進系統 等候時間 從系統的角度,完全使用,但idle
  4. 不等,但閒置時間
  5. 數學性質 假設 不存在
  6. 郵局只有一個服務員 你可以看到排隊的人潮
  7. 顧客的平均區隔到達時間 12 服務時間 10
  8. 美容院只有一小姐服務
  9. 顧客的平均區隔到達時間 12 服務時間 10
  10. 你是麥當勞經理,等候時間的差異有多大, p{ 等 &gt;5min}
  11. M/M/1 1-rho W=(1/mu)/(1-rho)
  12. 顧客的平均區隔到達時間 12 服務時間 10
  13. 生產 存貨 水庫
  14. 路由器 smart mobil agent
  15. 運籌帷幃 華羅庚 數學函數
  16. IE, OR, MS/OR, Fuzzy logic 財務、計算 規劃技術 問題的性質 效率與時間 資源 演算法 使用電腦
  17. 最廣泛使用的領域 資策會 - 運籌管理學會 黎漢林 - 運籌資訊實驗室 運籌科學研究所
  18. 問題性質 數學假設 數學模式 解題技術、方法 Fuzzy logic
  19. N=50 cities 大約10︿15
  20. 配對 pattern stochastic samuel karlin
  21. RSA 1986 代數群
  22. 應用數學