Queuing Strategy Optimization with Restricted Service Resources
Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutio...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2018-10, Vol.102 (4), p.2681-2699 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2699 |
---|---|
container_issue | 4 |
container_start_page | 2681 |
container_title | Wireless personal communications |
container_volume | 102 |
creator | Liu, Jiaming Qi, Xingqun Xu, Yimeng Chen, Yanda Zhang, Chuang |
description | Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space. |
doi_str_mv | 10.1007/s11277-018-5295-3 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2103763813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2103763813</sourcerecordid><originalsourceid>FETCH-LOGICAL-c268t-4b3a11795acf7c7a1ddf896b41bc8f366ac40286f5c3892a7afb2f41e279df553</originalsourceid><addsrcrecordid>eNp1kNFKwzAUhoMoOKcP4F3B62hO0jbJlcjQKQyGTsG7kKbJzHDtTFJlPr0tFbzy6sDh__5z-BA6B3IJhPCrCEA5xwQELqgsMDtAEyg4xYLlr4doQiSVuKRAj9FJjBtCekrSCbp-7Gznm3W2SkEnu95ny13yW_-tk2-b7Munt-zJxhS8SbbOVjZ8emOHVdsFY-MpOnL6Pdqz3zlFL3e3z7N7vFjOH2Y3C2xoKRLOK6YBuCy0cdxwDXXthCyrHCojHCtLbXJCRekKw4SkmmtXUZeDpVzWrijYFF2MvbvQfnT9Q2rTP9D0JxUFwnjJBLA-BWPKhDbGYJ3aBb_VYa-AqMGTGj2p3pMaPKmBoSMT-2yztuGv-X_oB2Mxazw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2103763813</pqid></control><display><type>article</type><title>Queuing Strategy Optimization with Restricted Service Resources</title><source>SpringerNature Journals</source><creator>Liu, Jiaming ; Qi, Xingqun ; Xu, Yimeng ; Chen, Yanda ; Zhang, Chuang</creator><creatorcontrib>Liu, Jiaming ; Qi, Xingqun ; Xu, Yimeng ; Chen, Yanda ; Zhang, Chuang</creatorcontrib><description>Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-018-5295-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Artificial neural networks ; Communications Engineering ; Computer Communication Networks ; Convolution ; Engineering ; Image classification ; Mathematical models ; Networks ; Optimization ; Poisson distribution ; Queues ; Queuing theory ; Security systems ; Signal,Image and Speech Processing</subject><ispartof>Wireless personal communications, 2018-10, Vol.102 (4), p.2681-2699</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Copyright Springer Science & Business Media 2018</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c268t-4b3a11795acf7c7a1ddf896b41bc8f366ac40286f5c3892a7afb2f41e279df553</cites><orcidid>0000-0002-1115-5580</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-018-5295-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-018-5295-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Liu, Jiaming</creatorcontrib><creatorcontrib>Qi, Xingqun</creatorcontrib><creatorcontrib>Xu, Yimeng</creatorcontrib><creatorcontrib>Chen, Yanda</creatorcontrib><creatorcontrib>Zhang, Chuang</creatorcontrib><title>Queuing Strategy Optimization with Restricted Service Resources</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.</description><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Convolution</subject><subject>Engineering</subject><subject>Image classification</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Optimization</subject><subject>Poisson distribution</subject><subject>Queues</subject><subject>Queuing theory</subject><subject>Security systems</subject><subject>Signal,Image and Speech Processing</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1kNFKwzAUhoMoOKcP4F3B62hO0jbJlcjQKQyGTsG7kKbJzHDtTFJlPr0tFbzy6sDh__5z-BA6B3IJhPCrCEA5xwQELqgsMDtAEyg4xYLlr4doQiSVuKRAj9FJjBtCekrSCbp-7Gznm3W2SkEnu95ny13yW_-tk2-b7Munt-zJxhS8SbbOVjZ8emOHVdsFY-MpOnL6Pdqz3zlFL3e3z7N7vFjOH2Y3C2xoKRLOK6YBuCy0cdxwDXXthCyrHCojHCtLbXJCRekKw4SkmmtXUZeDpVzWrijYFF2MvbvQfnT9Q2rTP9D0JxUFwnjJBLA-BWPKhDbGYJ3aBb_VYa-AqMGTGj2p3pMaPKmBoSMT-2yztuGv-X_oB2Mxazw</recordid><startdate>20181001</startdate><enddate>20181001</enddate><creator>Liu, Jiaming</creator><creator>Qi, Xingqun</creator><creator>Xu, Yimeng</creator><creator>Chen, Yanda</creator><creator>Zhang, Chuang</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-1115-5580</orcidid></search><sort><creationdate>20181001</creationdate><title>Queuing Strategy Optimization with Restricted Service Resources</title><author>Liu, Jiaming ; Qi, Xingqun ; Xu, Yimeng ; Chen, Yanda ; Zhang, Chuang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c268t-4b3a11795acf7c7a1ddf896b41bc8f366ac40286f5c3892a7afb2f41e279df553</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Convolution</topic><topic>Engineering</topic><topic>Image classification</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Optimization</topic><topic>Poisson distribution</topic><topic>Queues</topic><topic>Queuing theory</topic><topic>Security systems</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Jiaming</creatorcontrib><creatorcontrib>Qi, Xingqun</creatorcontrib><creatorcontrib>Xu, Yimeng</creatorcontrib><creatorcontrib>Chen, Yanda</creatorcontrib><creatorcontrib>Zhang, Chuang</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Jiaming</au><au>Qi, Xingqun</au><au>Xu, Yimeng</au><au>Chen, Yanda</au><au>Zhang, Chuang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Queuing Strategy Optimization with Restricted Service Resources</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2018-10-01</date><risdate>2018</risdate><volume>102</volume><issue>4</issue><spage>2681</spage><epage>2699</epage><pages>2681-2699</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-018-5295-3</doi><tpages>19</tpages><orcidid>https://orcid.org/0000-0002-1115-5580</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2018-10, Vol.102 (4), p.2681-2699 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2103763813 |
source | SpringerNature Journals |
subjects | Algorithms Artificial neural networks Communications Engineering Computer Communication Networks Convolution Engineering Image classification Mathematical models Networks Optimization Poisson distribution Queues Queuing theory Security systems Signal,Image and Speech Processing |
title | Queuing Strategy Optimization with Restricted Service Resources |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A45%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Queuing%20Strategy%20Optimization%20with%20Restricted%20Service%20Resources&rft.jtitle=Wireless%20personal%20communications&rft.au=Liu,%20Jiaming&rft.date=2018-10-01&rft.volume=102&rft.issue=4&rft.spage=2681&rft.epage=2699&rft.pages=2681-2699&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-018-5295-3&rft_dat=%3Cproquest_cross%3E2103763813%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2103763813&rft_id=info:pmid/&rfr_iscdi=true |