Skip to main content
Log in

Queuing Strategy Optimization with Restricted Service Resources

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the audience is an effective way to explore new solutions of security issues, and use mathematical models to develop the most efficient and effective security screening system. In this paper, the security system of Luzhniki stadium in 2018 is instance model. The queuing theory is used to construct the model (MMS), while according to the Poisson distribution and network science to analyze bottlenecks, models and results. Both practical and cultural factors are considered in the model optimization process. In this way, the target loop checkpoint system is designed, and the convolution neural network algorithm is added to the system to classify and dispose the captured images. The purpose is to improve security efficiency by increasing the flow of people in best use of space.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Zeng, Y. (2015). Review of studies on applications of queuing theory in library management. Information Research, 02, 5–9.

    Google Scholar 

  2. Zhang, J. (1986). Quantitative analysis of library lending system—Application of “queuing theory” in library lending system. Journal of Library Science, 03, 34–38.

    Google Scholar 

  3. Erlang, A. K. (1909). The theory of probabilities and telephone conversations. NytTidsskrift for Matematik B, 20(6), 87–98.

    Google Scholar 

  4. Xiang, H. (2012). Talking about Poisson distribution and its application. Learning Weekly, 10, 205.

    Google Scholar 

  5. Wang, K. (1997). Moscow is a sports city. Sports World (Scholarly), 5, 15.

    Google Scholar 

  6. Qiu, W. (2017). Research on improving the ability of security check specialty in popular sports halls. Science & Technology Information, 13, 242–243.

    Google Scholar 

  7. Zhou, F. Y., Jin, L. P., & Dong, J. (2017). Review of convolutional neural network. Chinese Journal of Computers.

  8. Girshick, R., Donahue, J., Darrell, T., & Malik, J. (2014). Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 580–587.

  9. Ren, S., He, K., Girshick, R., & Sun, J. (2015). Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems, pp. 91–99.

  10. Baccouche, M., Mamalet, F., Wolf, C., Garcia, C., & Baskurt, A. (2011, November). Sequential deep learning for human action recognition. In International workshop on human behavior understanding (pp. 29–39). Berlin, Heidelberg: Springer.

Download references

Acknowledgements

This paper is supported by Major Program of the National Social Science Foundation of China under Grant No. 15ZDB154, National Basic Research Program of China (973 Program) under Grant No. 2012CB315805, and National Natural Science Foundation of China under Grant No. 71172135.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuang Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, J., Qi, X., Xu, Y. et al. Queuing Strategy Optimization with Restricted Service Resources. Wireless Pers Commun 102, 2681–2699 (2018). https://doi.org/10.1007/s11277-018-5295-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5295-3

Keywords

Navigation