Skip to main content

elevator design

 How can computer technology be integrated into an elevator system for a hundred story office
building? How do you optimize for availability? How would variation of traffic over a typical
work week, floor, or time of day affect this? How would you test this system?
Implement a model similar to thread scheduling models found in most multitasking OS. Some
points to consider:
Some floor may have higher priorities, like the executive's floor for instance. Calls from
those floors would always be serviced first.
The elevator should only stop at a floor for x number of seconds, to avoid monopolizing the
elevator. This time would be decreased during busy hours and increased during slow hours.
If, for some reason, a floor has an elevator call outstanding for some long period of time,
that floor's priority gets boosted so that it's serviced immediately.
Based on weight (or # of people or some other similar metric) the elevator car could know
when it's full and ignore calls until there is room for at least 2 people. Stopping for just one
person isn't worth it for a full elevator.
When the elevator is idle, it can go to the floor that will need the elevator the most or that
which has the highest priority. This will save on the wait time at that floor (e.g.: the ground
floor).
Since it is a 100 story bldg, it is highly likely that many elevators are servicing it. So there
needs to be coordination between the elevators to service properly. The elevators could be
programmed so that they only serve certain floors or floor ranges. This divide and conquer
strategy can be optimized by reducing the number of floors an elevator serves based on floor
location (e.g.: the higher the floor, the less number of floors an elevator serves).
In front of the entrance door of each floor, there could be placed a BIG poster/caricature
depicting the health benefits of climbing the stairs!! This could reduce the elevator traffic.
An alternative solution could be to optimize for availability using the Poisson statistical model. The
arrival of the people can be modeled as a Poisson distributed random variable with a set of curves
being collected over a period of time (one set of curves for every day of the week) and keep on
optimizing these set of curves using linear regression so as to obtain a single curve that is the "best-
fit" for that day.The elevator would thus stand at the floor where there is a maximum probability of availability of
people. A variation of traffic would mean that the set of points over which the curve fitting is done
would change, and thus the computer system would adapt to that change. This is closer to hard disk
operation: reading the track/sector that is closer to the head position. Then apply the rule to avoid
starvation.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec