Constraint on Repair Resources, Optimal Number of Repairers and Optimal Size of a Serviced System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 2
Abstract
The focus of this paper is the analysis of the constraint on the repair resources caused by breakdowns of components in large systems. The study has been conducted by creating a very efficient discrete-event simulator, based on a min-heap data structure, for determining the probability of constraint on the repair resources. In finding the right balance between the number of repairers and salary costs, an exact optimisation algorithm has been proposed for the first time. The algorithm determines the optimal number of repairers which guarantees that the probability of constraint on the repair resources will not exceed an acceptable tolerable level. In addition, an exact optimisation algorithm has been proposed for the first time, for determining the maximum size of the system that can be serviced by a specified number of repairers so that the probability of constraint on the repair resources remains below a specified tolerable level. Unlike heuristic optimisation algorithms, the proposed algorithms are exact and always guarantee optimal solutions. The presented results are of significant importance to operators of computer networks, production systems, transportation networks, water distribution systems, electrical distribution networks etc. They are a solid basis for management decisions regarding the optimal number of maintenance personnel needed to service the breakdowns in large systems. Increasing the number of repairers beyond the optimal level leads to high salary costs while reducing the number of repairers below the optimal number leads to a poor quality of service.
Authors and Affiliations
Marin Todinov
New Transport Layer Security using Metaheuristics and New Key Exchange Protocol
The easiness of data transmission is one of the information security flaws that needs to be handled rigorously. It makes eavesdropping, tampering and message forgery by malicious more simple. One of the protocols develop...
Robust Image Watermarking using Fractional Sinc Transformation
The increased utilization of internet in sharing and dissemination of digital data makes it is very difficult to maintain copyright and ownership of data. Digital watermarking offers a method for authentication and copyr...
A Framework for Iris Partial Recognition based on Legendre Wavelet Filter
An increasing need for biometrics recognition system has grown substantially to address the issues of recognition and identification especially in highly dense areas such as airport, train stations and for financial tran...
SOM Based Visualization Technique For Detection Of Cancerous Masses In Mammogram
Breast cancer is the most common form of cancer in women. An intelligent computer-aided diagnosis system can be very helpful for radiologist in detecting and diagnosing micro calcifications patterns earlier and faster th...
Novel Intra-Prediction Framework for H.264 Video Compression using Decision and Prediction Mode
With the increasing usage of multimedia contents and advancement of the communication devices (along with services), there is a heavy demand of an effective multimedia compression protocol. In this regards, H.264 has bee...