{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:09:32Z","timestamp":1745989772051,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T00:00:00Z","timestamp":1709337600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T00:00:00Z","timestamp":1709337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s13198-024-02276-0","type":"journal-article","created":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T12:02:07Z","timestamp":1709380927000},"page":"2554-2570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modelling of blockchain based queuing theory implementing preemptive and non-preemptive algorithms"],"prefix":"10.1007","volume":"15","author":[{"given":"Meenakshi","family":"Kandpal","sequence":"first","affiliation":[]},{"given":"Niharika","family":"Keshari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0241-3661","authenticated-orcid":false,"given":"Amrendra Singh","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Rabindra Kumar","family":"Barik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,2]]},"reference":[{"issue":"10","key":"2276_CR1","doi-asserted-by":"publisher","first-page":"299","DOI":"10.3390\/fi14100299","volume":"14","author":"Y Adou","year":"2022","unstructured":"Adou Y, Markova E, Gaidamaka Y (2022) Modeling and analyzing preemption-based service prioritization in 5g networks slicing framework. Future Internet 14(10):299","journal-title":"Future Internet"},{"key":"2276_CR2","doi-asserted-by":"crossref","unstructured":"Arsalan SMAJ, Fahad FBN, Qazi SHQ, Khan BMK (2022) Queueing theory based performance analysis of cloud based blockchain as a Service (BaaS)","DOI":"10.21203\/rs.3.rs-1832922\/v1"},{"key":"2276_CR3","unstructured":"Ekblaw A, Azaria A, Halamka JD, Lippman A (2016) ACase Study for Blockchain in Healthcare:\u201dMedRec\u201d prototype for electronic health records and medical research data. In: Proceedings of IEEE open & big data conference 2016"},{"key":"2276_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.3390\/fi12040068","volume":"12","author":"V Elagin","year":"2020","unstructured":"Elagin V, Spirkina A, Levakov A, Belozertsev I (2020) Blockchain behavioral traffic model as a tool to influence service IT security. Future Internet 12:68","journal-title":"Future Internet"},{"key":"2276_CR6","doi-asserted-by":"crossref","unstructured":"Gilad Y, Hemo R, Micali S, Vlachos G, Zeldovich N (2017) Algorand: scaling Byzantine agreements for cryptocurrencies. In: Proceedings ofthe 26th Symposium on Operating Systems Principles. ACM, pp 51\u201368","DOI":"10.1145\/3132747.3132757"},{"key":"2276_CR7","doi-asserted-by":"publisher","first-page":"86573","DOI":"10.1109\/ACCESS.2020.2989303","volume":"8","author":"C Hu","year":"2020","unstructured":"Hu C, Luo H, Tang M (2020) Leveraging N-1 queues to improve the energy efficiency of scalable computing. IEEE Access 8:86573\u201386584","journal-title":"IEEE Access"},{"key":"2276_CR11","doi-asserted-by":"publisher","first-page":"113311","DOI":"10.1109\/ACCESS.2019.2934632","volume":"7","author":"S Kumar","year":"2019","unstructured":"Kumar S, Singh K, Kumar S, Kaiwartya O, Cao Y, Zhou H (2019) Delimitated anti jammer scheme for internet of vehicle: machine learning based security approach. IEEE Access 7:113311\u2013113323","journal-title":"IEEE Access"},{"issue":"1","key":"2276_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-019-0066-1","volume":"6","author":"QL Li","year":"2019","unstructured":"Li QL, Ma JY, Chang YX, Ma FQ, Yu HB (2019) Markov processes in blockchain systems. Comput Soc Netw 6(1):1\u201328","journal-title":"Comput Soc Netw"},{"issue":"5","key":"2276_CR13","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.32604\/iasc.2020.012531","volume":"26","author":"T Li","year":"2020","unstructured":"Li T, Ren Y, Xia J (2020) Blockchain queuing model with non-preemptive limited-priority. Intell Autom Soft Comput 26(5):1111\u20131122","journal-title":"Intell Autom Soft Comput"},{"key":"2276_CR15","doi-asserted-by":"crossref","unstructured":"Li QL, Ma JY, Chang YX (2018b) Blockchain queue theory. In: Computational Data and Social Networks: 7th International Conference, CSoNet 2018, Shanghai, China, December 18\u201320, 2018, Proceedings 7, pp 25\u201340. Springer International Publishing","DOI":"10.1007\/978-3-030-04648-4_3"},{"key":"2276_CR16","first-page":"1","volume":"2020","author":"W Lian","year":"2020","unstructured":"Lian W, Fan Q, Jia B, Liang Y (2020) A blockchain prediction model on time, value, and purchase based on Markov chain and queuing theory in Stock trade. Math Probl Eng 2020:1\u201313","journal-title":"Math Probl Eng"},{"issue":"2","key":"2276_CR17","doi-asserted-by":"publisher","first-page":"182","DOI":"10.3390\/math10020182","volume":"10","author":"FQ Ma","year":"2022","unstructured":"Ma FQ, Fan RN (2022) Queuing theory of improved practical Byzantine fault tolerant consensus. Mathematics 10(2):182","journal-title":"Mathematics"},{"issue":"2","key":"2276_CR18","doi-asserted-by":"publisher","first-page":"234","DOI":"10.3390\/electronics8020234","volume":"8","author":"RA Memon","year":"2019","unstructured":"Memon RA, Li JP, Ahmed J (2019) Simulation model for blockchain systems using queuing theory. Electronics 8(2):234","journal-title":"Electronics"},{"key":"2276_CR19","doi-asserted-by":"crossref","unstructured":"Memon RA, Li J, Ahmed J, Khan A, Nazir MI, Mangrio MI (2018) Modeling of blockchain based systems using queuing theory simulation. In: 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp 107\u2013111. IEEE","DOI":"10.1109\/ICCWAMTIP.2018.8632560"},{"key":"2276_CR20","unstructured":"Performance analysis of blockchain for civil aviation business data based on M\/G\/1 queuing theory"},{"issue":"3","key":"2276_CR21","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1145\/3308897.3308952","volume":"46","author":"S Ricci","year":"2019","unstructured":"Ricci S, Ferreira E, Menasche DS, Ziviani A, Souza JE, Vieira AB (2019) Learning blockchain delays: a queueing theory approach. ACM SIGMETRICS Perform Evaluat Rev 46(3):122\u2013125","journal-title":"ACM SIGMETRICS Perform Evaluat Rev"},{"issue":"12","key":"2276_CR23","doi-asserted-by":"publisher","first-page":"3358","DOI":"10.3390\/s20123358","volume":"20","author":"S Smetanin","year":"2020","unstructured":"Smetanin S, Ometov A, Komarov M, Masek P, Koucheryavy Y (2020) Blockchain evaluation approaches: state-of-the-art and future perspective. Sensors 20(12):3358","journal-title":"Sensors"},{"issue":"1","key":"2276_CR24","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1504\/IJBC.2019.101851","volume":"1","author":"R Srivastava","year":"2019","unstructured":"Srivastava R (2019) Mathematical assessment of blocks acceptance in blockchain using Markov model. Int J Blockchains Cryptocurrencies 1(1):42\u201353","journal-title":"Int J Blockchains Cryptocurrencies"},{"key":"2276_CR26","unstructured":"Vesely P, Skoda S, Kolomiiets I, St\u00f6berl B, Klynina T (2021) Bitcoin: A queuing analytical approach. In: CEUR workshop proceedings, 2824, p 2021"},{"key":"2276_CR27","unstructured":"Vesely P, Skoda S, Kolomiiets I, St\u00f6berl B, Klynina T (2021b) Bitcoin: A Queuing Analytical Approach. In: CEUR Workshop Proceedings, 2824, p 2021"},{"key":"2276_CR28","unstructured":"WinterGreenResearc, Inc (2018) Blockchain Market Shares, Market Strategies, and Market Forecasts, 2018 to 2024; Industry Survey: Lexington, MA, USA"},{"issue":"6","key":"2276_CR29","doi-asserted-by":"publisher","first-page":"3540","DOI":"10.1007\/s12083-021-01207-1","volume":"14","author":"AS Yadav","year":"2021","unstructured":"Yadav AS, Kushwaha DS (2021a) Blockchain-based digitization of land record through trust value-based consensus algorithm. Peer-to-Peer Netw Appl 14(6):3540\u20133558","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"8","key":"2276_CR30","first-page":"6414","volume":"34","author":"AS Yadav","year":"2022","unstructured":"Yadav AS, Agrawal S, Kushwaha DS (2022a) Distributed wbased land transaction system with trusted nodes consensus mechanism. J King Saud Univ Comput Inf Sci 34(8):6414\u20136424","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"2276_CR31","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s13198-021-01335-0","volume":"13","author":"AS Yadav","year":"2022","unstructured":"Yadav AS, Singh N, Kushwaha DS (2022b) A scalable trust based consensus mechanism for secure and tamper free property transaction mechanism using DLT. Int J Syst Assur Eng Manag 13(2):735\u2013751","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2276_CR32","doi-asserted-by":"crossref","unstructured":"Yadav AS, Kushwaha DS (2021b) Digitization of land record through blockchain-based consensus algorithm. IETE Techn Rev:1\u201318","DOI":"10.1080\/02564602.2021.1908859"},{"key":"2276_CR33","doi-asserted-by":"crossref","unstructured":"Yadav AS, Kushwaha DS (2021c) Query optimization in a blockchain-based land registry management system. J Homepage. 26.1: 13\u201321","DOI":"10.18280\/isi.260102"},{"key":"2276_CR34","doi-asserted-by":"crossref","unstructured":"Yadav AS, Singh N, Kushwaha DS (2022c) Sidechain: storage land registry data using blockchain improve performance of search records. Cluster Comput:1\u201321","DOI":"10.1007\/s10586-022-03535-0"},{"issue":"8","key":"2276_CR35","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.3390\/e23081055","volume":"23","author":"T Zhang","year":"2021","unstructured":"Zhang T, Chen S, Chen Z (2021) Internet of Things: the optimal generation rates under preemption strategy in a multi-source queuing system. Entropy 23(8):1055","journal-title":"Entropy"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02276-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-024-02276-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02276-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:23:02Z","timestamp":1718382182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-024-02276-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,2]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2276"],"URL":"https:\/\/doi.org\/10.1007\/s13198-024-02276-0","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2024,3,2]]},"assertion":[{"value":"7 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}