Queuing Strategy Optimization with Restricted Service Resources

Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2018-10, Vol.102 (4), p.2681-2699
Hauptverfasser: Liu, Jiaming, Qi, Xingqun, Xu, Yimeng, Chen, Yanda, Zhang, Chuang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2699
container_issue 4
container_start_page 2681
container_title Wireless personal communications
container_volume 102
creator Liu, Jiaming
Qi, Xingqun
Xu, Yimeng
Chen, Yanda
Zhang, Chuang
description Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.
doi_str_mv 10.1007/s11277-018-5295-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2103763813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2103763813</sourcerecordid><originalsourceid>FETCH-LOGICAL-c268t-4b3a11795acf7c7a1ddf896b41bc8f366ac40286f5c3892a7afb2f41e279df553</originalsourceid><addsrcrecordid>eNp1kNFKwzAUhoMoOKcP4F3B62hO0jbJlcjQKQyGTsG7kKbJzHDtTFJlPr0tFbzy6sDh__5z-BA6B3IJhPCrCEA5xwQELqgsMDtAEyg4xYLlr4doQiSVuKRAj9FJjBtCekrSCbp-7Gznm3W2SkEnu95ny13yW_-tk2-b7Munt-zJxhS8SbbOVjZ8emOHVdsFY-MpOnL6Pdqz3zlFL3e3z7N7vFjOH2Y3C2xoKRLOK6YBuCy0cdxwDXXthCyrHCojHCtLbXJCRekKw4SkmmtXUZeDpVzWrijYFF2MvbvQfnT9Q2rTP9D0JxUFwnjJBLA-BWPKhDbGYJ3aBb_VYa-AqMGTGj2p3pMaPKmBoSMT-2yztuGv-X_oB2Mxazw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2103763813</pqid></control><display><type>article</type><title>Queuing Strategy Optimization with Restricted Service Resources</title><source>SpringerNature Journals</source><creator>Liu, Jiaming ; Qi, Xingqun ; Xu, Yimeng ; Chen, Yanda ; Zhang, Chuang</creator><creatorcontrib>Liu, Jiaming ; Qi, Xingqun ; Xu, Yimeng ; Chen, Yanda ; Zhang, Chuang</creatorcontrib><description>Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-018-5295-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Artificial neural networks ; Communications Engineering ; Computer Communication Networks ; Convolution ; Engineering ; Image classification ; Mathematical models ; Networks ; Optimization ; Poisson distribution ; Queues ; Queuing theory ; Security systems ; Signal,Image and Speech Processing</subject><ispartof>Wireless personal communications, 2018-10, Vol.102 (4), p.2681-2699</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Copyright Springer Science &amp; Business Media 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c268t-4b3a11795acf7c7a1ddf896b41bc8f366ac40286f5c3892a7afb2f41e279df553</cites><orcidid>0000-0002-1115-5580</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-018-5295-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-018-5295-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Liu, Jiaming</creatorcontrib><creatorcontrib>Qi, Xingqun</creatorcontrib><creatorcontrib>Xu, Yimeng</creatorcontrib><creatorcontrib>Chen, Yanda</creatorcontrib><creatorcontrib>Zhang, Chuang</creatorcontrib><title>Queuing Strategy Optimization with Restricted Service Resources</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.</description><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Convolution</subject><subject>Engineering</subject><subject>Image classification</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Optimization</subject><subject>Poisson distribution</subject><subject>Queues</subject><subject>Queuing theory</subject><subject>Security systems</subject><subject>Signal,Image and Speech Processing</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1kNFKwzAUhoMoOKcP4F3B62hO0jbJlcjQKQyGTsG7kKbJzHDtTFJlPr0tFbzy6sDh__5z-BA6B3IJhPCrCEA5xwQELqgsMDtAEyg4xYLlr4doQiSVuKRAj9FJjBtCekrSCbp-7Gznm3W2SkEnu95ny13yW_-tk2-b7Munt-zJxhS8SbbOVjZ8emOHVdsFY-MpOnL6Pdqz3zlFL3e3z7N7vFjOH2Y3C2xoKRLOK6YBuCy0cdxwDXXthCyrHCojHCtLbXJCRekKw4SkmmtXUZeDpVzWrijYFF2MvbvQfnT9Q2rTP9D0JxUFwnjJBLA-BWPKhDbGYJ3aBb_VYa-AqMGTGj2p3pMaPKmBoSMT-2yztuGv-X_oB2Mxazw</recordid><startdate>20181001</startdate><enddate>20181001</enddate><creator>Liu, Jiaming</creator><creator>Qi, Xingqun</creator><creator>Xu, Yimeng</creator><creator>Chen, Yanda</creator><creator>Zhang, Chuang</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-1115-5580</orcidid></search><sort><creationdate>20181001</creationdate><title>Queuing Strategy Optimization with Restricted Service Resources</title><author>Liu, Jiaming ; Qi, Xingqun ; Xu, Yimeng ; Chen, Yanda ; Zhang, Chuang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c268t-4b3a11795acf7c7a1ddf896b41bc8f366ac40286f5c3892a7afb2f41e279df553</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Convolution</topic><topic>Engineering</topic><topic>Image classification</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Optimization</topic><topic>Poisson distribution</topic><topic>Queues</topic><topic>Queuing theory</topic><topic>Security systems</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Jiaming</creatorcontrib><creatorcontrib>Qi, Xingqun</creatorcontrib><creatorcontrib>Xu, Yimeng</creatorcontrib><creatorcontrib>Chen, Yanda</creatorcontrib><creatorcontrib>Zhang, Chuang</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Jiaming</au><au>Qi, Xingqun</au><au>Xu, Yimeng</au><au>Chen, Yanda</au><au>Zhang, Chuang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Queuing Strategy Optimization with Restricted Service Resources</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2018-10-01</date><risdate>2018</risdate><volume>102</volume><issue>4</issue><spage>2681</spage><epage>2699</epage><pages>2681-2699</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-018-5295-3</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-1115-5580</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2018-10, Vol.102 (4), p.2681-2699
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2103763813
source SpringerNature Journals
subjects Algorithms
Artificial neural networks
Communications Engineering
Computer Communication Networks
Convolution
Engineering
Image classification
Mathematical models
Networks
Optimization
Poisson distribution
Queues
Queuing theory
Security systems
Signal,Image and Speech Processing
title Queuing Strategy Optimization with Restricted Service Resources
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A45%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Queuing%20Strategy%20Optimization%20with%20Restricted%20Service%20Resources&rft.jtitle=Wireless%20personal%20communications&rft.au=Liu,%20Jiaming&rft.date=2018-10-01&rft.volume=102&rft.issue=4&rft.spage=2681&rft.epage=2699&rft.pages=2681-2699&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-018-5295-3&rft_dat=%3Cproquest_cross%3E2103763813%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2103763813&rft_id=info:pmid/&rfr_iscdi=true