SlideShare a Scribd company logo
1 of 22
Download to read offline
1




            How to distinguish between A and B?




call center · single server · examples of call sequences (A & B)
  • two call types (call blending): incoming (↓) or outgoing (↑)
  • sequences generated by different Markov chains (A vs. B)
  • according to some blending balance: 2 time scales
      1 long-term: overall frequency (↓ vs. ↑)
      2 short-term: call type correlation (γ)
2




          γ enables to study short-term balance




• coefficient of correlation γ ∈ [−1, 1] captures correlation in
  call sequence, from one call to the next (definition see further)
• γ in [0, 1]: call type likely repeated (↓↓ & ↑↑ prevail)
• γ in [−1, 0]: call type likely swapped (↓↑ & ↑↓ prevail)
• the larger |γ|, the stronger the correlation
3




      Quantifying the call blending balance
   in two way communication retrial queues:
             analysis of correlation

             based on joint work while at Kyoto University


             Wouter Rogiestb,∗ & Tuan Phung-Duca,c
          a Graduate   School of Informatics · Kyoto University · Japan
   b Dept.   of Telecomm. & Inf. Processing · Ghent University · Belgium
c Dept.   of Math. & Comp. Sciences · Tokyo Institute of Technology · Japan

                                   ∗ presenting



              QTNA 2012 · Kyoto · 1–3 August 2012
4




                                                 Outline


1 Introduction


2 Model & Analysis


3 Numerical examples for constant retrial rate


4 Conclusion
5




                                                 Outline


1 Introduction


2 Model & Analysis


3 Numerical examples for constant retrial rate


4 Conclusion
6




       Context: retrial queue with call blending



• retrial queue, well-known model
     • customers not served upon arrival enter orbit and request for
        retrial after some random time
• applied to call center with single server
• retrial queue for incoming calls (↓)
     • typically assigned by the Automatic Call Distributor (ACD)
• no queue for outgoing calls (↑)
     • initiated after some idle time by the ACD, or by operator
7




                             Call blending: A vs. B



earlier/ongoing work
[A] for classical retrial rate
    → J. R. Artalejo & T. Phung-Duc, QTNA 2011.
[B] for constant retrial rate
    → T. Phung-Duc & W. Rogiest, ASMTA 2012.
findings on blending balance
  • long-term: identical for A and B
  • short-term: (to be studied!) (no answer from steady-state
    expressions alone) (intuitive: should be quite different)
8




                                                 Outline


1 Introduction


2 Model & Analysis


3 Numerical examples for constant retrial rate


4 Conclusion
9




                        Assumptions: {α, λ, µ, ν1 , ν2 }

all: rates of exponential distributions
   α outgoing call rate
       • when server turns idle, outgoing call after exp. distr. time
  λ primary incoming call rate (Poisson arrivals)
       • finding idle server: receive service immediately
       • finding busy server: enter orbit
  µ retrial rate (within orbit)
       A classical: nµ,
       B constant: µ(1 − δ0,n ), with
         n : number of customers in orbit
         δ0,n : Kronecker delta
 ν1 service rate incoming call
 ν2 service rate outgoing call
10




                                            Markov chain


• S(t): server state at time t,
        
        0 if the server is idle,
        
  S(t) = 1 if the server is providing an incoming service,
        
         2 if the server is providing an outgoing service,
        

• N(t): number of calls in orbit at time t
• {(S(t), N(t)); t ≥ 0} forms a Markov chain
    • state space {0, 1, 2} × Z+
    • steady-state distribution obtained ([A] & [B])
    • input for calculation of γ
11




                              Correlation coefficient γ

• numbering consecutive events Sk with k
• Sk : incoming (Sk = s1 ) (↓) or outgoing (Sk = s2 ) (↑)
• assuming steady-state

                      E[Sk Sk+m ] − (E[Sk ])2
               γm =                           ; m ∈ Z+
                             Var[Sk ]
• −1 ≤ γm ≤ 1
• main interest γ1 , or γ
• main challenges
   1 extracting distrib. (Sk , Nk ) from distrib. (S(t), N(t))
   2 determining E[Sk Sk+1 ]
12




From S(t) to Sk : 2 steps

               original Markov chain




         censor: remove idle periods




discretize: “compensate” for ν1 = ν2
13




     In general: from (S(t), N(t)) to (Sk , Nk )
• original Markov chain: under conditions, unique stochastic
  equilibrium, with limt→∞ :

         πi,j = Pr[S(t) = i , N(t) = j], (i, j) ∈ {0, 1, 2} × Z+

• censor, with limt→∞ :

  πi,j = Pr[S(t) = i, N(t) = j|S(t) ∈ {1, 2}], (i, j) ∈ {1, 2}×Z+
  ˜

• discretize, with limk→∞ :

              ηi = Pr[Sk = i] , ηi,j = Pr[Sk = i, Nk = j] ,

  with
                          (i, j) ∈ {1, 2} × Z+
14




     In general: from (S(t), N(t)) to (Sk , Nk )


• censor and discretize: expressions

                T1 = 1/ν1 , T2 = 1/ν2 ,
                σi = Pr[S(t) = si ] ,
                              1
                T =                  ,
                      σ1 ν1 + σ2 ν2
                           T
               ηi,j = πi,j     , i ∈ {1, 2} , j ∈ Z+ ,
                           Ti
                         T
                ηi = σi       , i ∈ {1, 2} .
                         Ti
15




                       Determining E[Sk Sk+1 ] and γ

Choosing
                        {s1 , s2 } = {1, 0} ,
leads to

                          E[Sk ] = η1 ,
                        Var[Sk ] = η1 (1 − η1 ) ,
                                     ∞
                     E[Sk Sk+1 ] =         η1,j χj ,
                                     j=0

where
  A classical: χj different for each j (infinite sum)
  B constant: χj = χ1 for j ≥ 1 (finite sum)
16




                                                 Outline


1 Introduction


2 Model & Analysis


3 Numerical examples for constant retrial rate


4 Conclusion
17




          correlation positive when outgoing activity limited


                                γ                               λν

                                                           µ
      µ            µ
              µ                                    µ

                                     µ


                                 µ


outgoing call rate limited (α = 0.1),
primary incoming call rate varying (λ ∈ [0, λmax )),
call durations matched (ν1 = ν2 = 1)
18




            correlation positive when time share matched


                             γ                              λν


                        µ
                   µ
             µ
       µ




outgoing rate (α) increasing with incoming (λ) such that time
share incoming/outgoing is matched,
call durations matched (ν1 = ν2 = 1)
19




                correlation strictly negative in some cases


                                γ                           λ


        µ


                         µ


                                        µ


outgoing call rate fixed (α = 1),
primary incoming call rate varying (λ ∈ [0, λmax )),
call durations strongly differing (ν1 = 100, ν2 = 1) (and thus,
ρ = λ/ν1 always < 0.01 in the figure)
20




                                                 Outline


1 Introduction


2 Model & Analysis


3 Numerical examples for constant retrial rate


4 Conclusion
21




                                                Conclusion




• distinguishing A from B with correlation coefficient γ
• focus: retrial queue model for call center with call blending
• from continuous-time result to discrete sequence:
  censor and discretize
• numerical results constant retrial rate (B)
  illustrate variability of γ
• currently working on comparison with classical retrial rate (A)
22




Questions?

More Related Content

What's hot

WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR SPARSE IMPULSE RESPONSE IDENTIFI...
WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR  SPARSE IMPULSE RESPONSE IDENTIFI...WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR  SPARSE IMPULSE RESPONSE IDENTIFI...
WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR SPARSE IMPULSE RESPONSE IDENTIFI...bermudez_jcm
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
Lec03 04-time complexity
Lec03 04-time complexityLec03 04-time complexity
Lec03 04-time complexityAbbas Ali
 
Nonlinear Stochastic Programming by the Monte-Carlo method
Nonlinear Stochastic Programming by the Monte-Carlo methodNonlinear Stochastic Programming by the Monte-Carlo method
Nonlinear Stochastic Programming by the Monte-Carlo methodSSA KPI
 
Algorithm chapter 2
Algorithm chapter 2Algorithm chapter 2
Algorithm chapter 2chidabdu
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier TransformShahryar Ali
 
2 chapter2 algorithm_analysispart1
2 chapter2 algorithm_analysispart12 chapter2 algorithm_analysispart1
2 chapter2 algorithm_analysispart1SSE_AndyLi
 
Numerical analysis convexity, concavity
Numerical analysis  convexity, concavityNumerical analysis  convexity, concavity
Numerical analysis convexity, concavitySHAMJITH KM
 
Nonlinear Stochastic Optimization by the Monte-Carlo Method
Nonlinear Stochastic Optimization by the Monte-Carlo MethodNonlinear Stochastic Optimization by the Monte-Carlo Method
Nonlinear Stochastic Optimization by the Monte-Carlo MethodSSA KPI
 
Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.mohanrathod18
 
Time Series Analysis
Time Series AnalysisTime Series Analysis
Time Series AnalysisAmit Ghosh
 
Divide and Conquer - Part 1
Divide and Conquer - Part 1Divide and Conquer - Part 1
Divide and Conquer - Part 1Amrinder Arora
 
Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and ComplexityRajandeep Gill
 
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...Dagmar Monett
 
Chapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformChapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformAttaporn Ninsuwan
 
Stochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated AnnealingStochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated AnnealingSSA KPI
 

What's hot (20)

WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR SPARSE IMPULSE RESPONSE IDENTIFI...
WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR  SPARSE IMPULSE RESPONSE IDENTIFI...WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR  SPARSE IMPULSE RESPONSE IDENTIFI...
WAVELET-PACKET-BASED ADAPTIVE ALGORITHM FOR SPARSE IMPULSE RESPONSE IDENTIFI...
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Lec03 04-time complexity
Lec03 04-time complexityLec03 04-time complexity
Lec03 04-time complexity
 
Nonlinear Stochastic Programming by the Monte-Carlo method
Nonlinear Stochastic Programming by the Monte-Carlo methodNonlinear Stochastic Programming by the Monte-Carlo method
Nonlinear Stochastic Programming by the Monte-Carlo method
 
Algorithm chapter 2
Algorithm chapter 2Algorithm chapter 2
Algorithm chapter 2
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier Transform
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
2 chapter2 algorithm_analysispart1
2 chapter2 algorithm_analysispart12 chapter2 algorithm_analysispart1
2 chapter2 algorithm_analysispart1
 
Numerical analysis convexity, concavity
Numerical analysis  convexity, concavityNumerical analysis  convexity, concavity
Numerical analysis convexity, concavity
 
Nonlinear Stochastic Optimization by the Monte-Carlo Method
Nonlinear Stochastic Optimization by the Monte-Carlo MethodNonlinear Stochastic Optimization by the Monte-Carlo Method
Nonlinear Stochastic Optimization by the Monte-Carlo Method
 
Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.
 
Time Series Analysis
Time Series AnalysisTime Series Analysis
Time Series Analysis
 
Divide and Conquer - Part 1
Divide and Conquer - Part 1Divide and Conquer - Part 1
Divide and Conquer - Part 1
 
Asymptotic Notation and Complexity
Asymptotic Notation and ComplexityAsymptotic Notation and Complexity
Asymptotic Notation and Complexity
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
Index Determination in DAEs using the Library indexdet and the ADOL-C Package...
 
Chapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier TransformChapter5 - The Discrete-Time Fourier Transform
Chapter5 - The Discrete-Time Fourier Transform
 
Time complexity
Time complexityTime complexity
Time complexity
 
jammer_placement
jammer_placementjammer_placement
jammer_placement
 
Stochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated AnnealingStochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated Annealing
 

Similar to Quantifying the call blending balance in two way communication retrial queues: analysis of correlation

1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptx1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptxpallavidhade2
 
The convenience yield implied by quadratic volatility smiles presentation [...
The convenience yield implied by quadratic volatility smiles   presentation [...The convenience yield implied by quadratic volatility smiles   presentation [...
The convenience yield implied by quadratic volatility smiles presentation [...yigalbt
 
Coherent feedback formulation of a continuous quantum error correction protocol
Coherent feedback formulation of a continuous quantum error correction protocolCoherent feedback formulation of a continuous quantum error correction protocol
Coherent feedback formulation of a continuous quantum error correction protocolhendrai
 
Introduction
IntroductionIntroduction
Introductionpilavare
 
Algorithm Design and Analysis
Algorithm Design and AnalysisAlgorithm Design and Analysis
Algorithm Design and AnalysisReetesh Gupta
 
Waveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxKIRUTHIKAAR2
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFTtaha25
 
Waveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxKIRUTHIKAAR2
 
Dr hasany 2467_16649_1_lec-2-zabist
Dr hasany 2467_16649_1_lec-2-zabistDr hasany 2467_16649_1_lec-2-zabist
Dr hasany 2467_16649_1_lec-2-zabistGatewayggg Testeru
 
Case Study (All)
Case Study (All)Case Study (All)
Case Study (All)gudeyi
 
Differential Distributed Space-Time Coding with Imperfect Synchronization in ...
Differential Distributed Space-Time Coding with Imperfect Synchronization in ...Differential Distributed Space-Time Coding with Imperfect Synchronization in ...
Differential Distributed Space-Time Coding with Imperfect Synchronization in ...mravendi
 

Similar to Quantifying the call blending balance in two way communication retrial queues: analysis of correlation (20)

1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptx1_Asymptotic_Notation_pptx.pptx
1_Asymptotic_Notation_pptx.pptx
 
36
3636
36
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
The convenience yield implied by quadratic volatility smiles presentation [...
The convenience yield implied by quadratic volatility smiles   presentation [...The convenience yield implied by quadratic volatility smiles   presentation [...
The convenience yield implied by quadratic volatility smiles presentation [...
 
Coherent feedback formulation of a continuous quantum error correction protocol
Coherent feedback formulation of a continuous quantum error correction protocolCoherent feedback formulation of a continuous quantum error correction protocol
Coherent feedback formulation of a continuous quantum error correction protocol
 
Asymptotic notation
Asymptotic notationAsymptotic notation
Asymptotic notation
 
Introduction
IntroductionIntroduction
Introduction
 
Algorithm Design and Analysis
Algorithm Design and AnalysisAlgorithm Design and Analysis
Algorithm Design and Analysis
 
Waveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptx
 
Mcqmc talk
Mcqmc talkMcqmc talk
Mcqmc talk
 
DAA_LECT_2.pdf
DAA_LECT_2.pdfDAA_LECT_2.pdf
DAA_LECT_2.pdf
 
quantization
quantizationquantization
quantization
 
quantization
quantizationquantization
quantization
 
quantization
quantizationquantization
quantization
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFT
 
Waveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptx
 
lec07_DFT.pdf
lec07_DFT.pdflec07_DFT.pdf
lec07_DFT.pdf
 
Dr hasany 2467_16649_1_lec-2-zabist
Dr hasany 2467_16649_1_lec-2-zabistDr hasany 2467_16649_1_lec-2-zabist
Dr hasany 2467_16649_1_lec-2-zabist
 
Case Study (All)
Case Study (All)Case Study (All)
Case Study (All)
 
Differential Distributed Space-Time Coding with Imperfect Synchronization in ...
Differential Distributed Space-Time Coding with Imperfect Synchronization in ...Differential Distributed Space-Time Coding with Imperfect Synchronization in ...
Differential Distributed Space-Time Coding with Imperfect Synchronization in ...
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Quantifying the call blending balance in two way communication retrial queues: analysis of correlation

  • 1. 1 How to distinguish between A and B? call center · single server · examples of call sequences (A & B) • two call types (call blending): incoming (↓) or outgoing (↑) • sequences generated by different Markov chains (A vs. B) • according to some blending balance: 2 time scales 1 long-term: overall frequency (↓ vs. ↑) 2 short-term: call type correlation (γ)
  • 2. 2 γ enables to study short-term balance • coefficient of correlation γ ∈ [−1, 1] captures correlation in call sequence, from one call to the next (definition see further) • γ in [0, 1]: call type likely repeated (↓↓ & ↑↑ prevail) • γ in [−1, 0]: call type likely swapped (↓↑ & ↑↓ prevail) • the larger |γ|, the stronger the correlation
  • 3. 3 Quantifying the call blending balance in two way communication retrial queues: analysis of correlation based on joint work while at Kyoto University Wouter Rogiestb,∗ & Tuan Phung-Duca,c a Graduate School of Informatics · Kyoto University · Japan b Dept. of Telecomm. & Inf. Processing · Ghent University · Belgium c Dept. of Math. & Comp. Sciences · Tokyo Institute of Technology · Japan ∗ presenting QTNA 2012 · Kyoto · 1–3 August 2012
  • 4. 4 Outline 1 Introduction 2 Model & Analysis 3 Numerical examples for constant retrial rate 4 Conclusion
  • 5. 5 Outline 1 Introduction 2 Model & Analysis 3 Numerical examples for constant retrial rate 4 Conclusion
  • 6. 6 Context: retrial queue with call blending • retrial queue, well-known model • customers not served upon arrival enter orbit and request for retrial after some random time • applied to call center with single server • retrial queue for incoming calls (↓) • typically assigned by the Automatic Call Distributor (ACD) • no queue for outgoing calls (↑) • initiated after some idle time by the ACD, or by operator
  • 7. 7 Call blending: A vs. B earlier/ongoing work [A] for classical retrial rate → J. R. Artalejo & T. Phung-Duc, QTNA 2011. [B] for constant retrial rate → T. Phung-Duc & W. Rogiest, ASMTA 2012. findings on blending balance • long-term: identical for A and B • short-term: (to be studied!) (no answer from steady-state expressions alone) (intuitive: should be quite different)
  • 8. 8 Outline 1 Introduction 2 Model & Analysis 3 Numerical examples for constant retrial rate 4 Conclusion
  • 9. 9 Assumptions: {α, λ, µ, ν1 , ν2 } all: rates of exponential distributions α outgoing call rate • when server turns idle, outgoing call after exp. distr. time λ primary incoming call rate (Poisson arrivals) • finding idle server: receive service immediately • finding busy server: enter orbit µ retrial rate (within orbit) A classical: nµ, B constant: µ(1 − δ0,n ), with n : number of customers in orbit δ0,n : Kronecker delta ν1 service rate incoming call ν2 service rate outgoing call
  • 10. 10 Markov chain • S(t): server state at time t,  0 if the server is idle,  S(t) = 1 if the server is providing an incoming service,  2 if the server is providing an outgoing service,  • N(t): number of calls in orbit at time t • {(S(t), N(t)); t ≥ 0} forms a Markov chain • state space {0, 1, 2} × Z+ • steady-state distribution obtained ([A] & [B]) • input for calculation of γ
  • 11. 11 Correlation coefficient γ • numbering consecutive events Sk with k • Sk : incoming (Sk = s1 ) (↓) or outgoing (Sk = s2 ) (↑) • assuming steady-state E[Sk Sk+m ] − (E[Sk ])2 γm = ; m ∈ Z+ Var[Sk ] • −1 ≤ γm ≤ 1 • main interest γ1 , or γ • main challenges 1 extracting distrib. (Sk , Nk ) from distrib. (S(t), N(t)) 2 determining E[Sk Sk+1 ]
  • 12. 12 From S(t) to Sk : 2 steps original Markov chain censor: remove idle periods discretize: “compensate” for ν1 = ν2
  • 13. 13 In general: from (S(t), N(t)) to (Sk , Nk ) • original Markov chain: under conditions, unique stochastic equilibrium, with limt→∞ : πi,j = Pr[S(t) = i , N(t) = j], (i, j) ∈ {0, 1, 2} × Z+ • censor, with limt→∞ : πi,j = Pr[S(t) = i, N(t) = j|S(t) ∈ {1, 2}], (i, j) ∈ {1, 2}×Z+ ˜ • discretize, with limk→∞ : ηi = Pr[Sk = i] , ηi,j = Pr[Sk = i, Nk = j] , with (i, j) ∈ {1, 2} × Z+
  • 14. 14 In general: from (S(t), N(t)) to (Sk , Nk ) • censor and discretize: expressions T1 = 1/ν1 , T2 = 1/ν2 , σi = Pr[S(t) = si ] , 1 T = , σ1 ν1 + σ2 ν2 T ηi,j = πi,j , i ∈ {1, 2} , j ∈ Z+ , Ti T ηi = σi , i ∈ {1, 2} . Ti
  • 15. 15 Determining E[Sk Sk+1 ] and γ Choosing {s1 , s2 } = {1, 0} , leads to E[Sk ] = η1 , Var[Sk ] = η1 (1 − η1 ) , ∞ E[Sk Sk+1 ] = η1,j χj , j=0 where A classical: χj different for each j (infinite sum) B constant: χj = χ1 for j ≥ 1 (finite sum)
  • 16. 16 Outline 1 Introduction 2 Model & Analysis 3 Numerical examples for constant retrial rate 4 Conclusion
  • 17. 17 correlation positive when outgoing activity limited γ λν µ µ µ µ µ µ µ outgoing call rate limited (α = 0.1), primary incoming call rate varying (λ ∈ [0, λmax )), call durations matched (ν1 = ν2 = 1)
  • 18. 18 correlation positive when time share matched γ λν µ µ µ µ outgoing rate (α) increasing with incoming (λ) such that time share incoming/outgoing is matched, call durations matched (ν1 = ν2 = 1)
  • 19. 19 correlation strictly negative in some cases γ λ µ µ µ outgoing call rate fixed (α = 1), primary incoming call rate varying (λ ∈ [0, λmax )), call durations strongly differing (ν1 = 100, ν2 = 1) (and thus, ρ = λ/ν1 always < 0.01 in the figure)
  • 20. 20 Outline 1 Introduction 2 Model & Analysis 3 Numerical examples for constant retrial rate 4 Conclusion
  • 21. 21 Conclusion • distinguishing A from B with correlation coefficient γ • focus: retrial queue model for call center with call blending • from continuous-time result to discrete sequence: censor and discretize • numerical results constant retrial rate (B) illustrate variability of γ • currently working on comparison with classical retrial rate (A)