Rehman Shaik Author
Subjects of specialization
Affiliation
Computer Science, Societies
Principal Cyber Security Engineer at Dun & Bradstreet Hyderabad, Telangana, India Group of NEC Bachelor of Technology (BTech)Computer Science
A content builder for multiple SIEM & SOAR platforms & a threat hunter specialized in Network behavioral anomaly detection tactics & End-Point watchlist query writings. His work on ransomware behavior & End-point based threat hunting enabled him to bag many client appreciations. His ever-lasting enthusiasm towards learning and positive attitude in crises are some of his strengths.
Editorial Open Access
Author(s): Rehman Shaik
Combining the study of queuing with inventory is extremely common and such systems are mentioned as queuing-inventory systems within the literature. These systems occur naturally in practice and are studied extensively within the literature. The inventory systems considered within the literature generally include (s,S)-type. However, during this paper we glance at opportunistic-type inventory replenishment during which there's an independent point process that's wont to model events that are called opportunistic for replenishing inventory. When a chance (to replenish) occurs, a probabilistic rule that depends on the inventory level is employed to work out whether to avail it or not. Assuming that the purchasers arrive consistent with a Markovian arrival process, the stress for i... view moreĀ»