Question

In: Statistics and Probability

When things are operating​ properly, a certain Internet bank can process a maximum of 28 electronic...

When things are operating​ properly, a certain Internet bank can process a maximum of 28 electronic transfers every minute during the busiest periods of the day. If it receives more transfer requests than​ this, then the​ bank's computer system will become so overburdened that it will slow to the point that no electronic transfers can be handled. If during the busiest periods of the day requests for electronic transfers arrive at the rate of 180 per​ 10-minute period on​ average, what is the probability that the system will be overwhelmed by​ requests? Assume that the process can be described using a Poisson distribution.

The probability that the system will be overwhelmed by requests is ?

Solutions

Expert Solution

Solution :

Let X ba a random variable which represents the arrivals of electronic transfers.

The arrival rate of electronic transfers = 180 per 10-minute

System will be overwhelmed if it will have more than 28 electronic transfer requests in one minute. And we have to find the probability that the system will be overwhelmed by requests.

It means we have to find P(X > 28) in t = 1 minute

P(X > 28) = 1 - P(X ≤ 28)

P(X > 28) = 1 - [P(X = 0) + P(X = 1)+................+P(X = 28)]

According to poisson process, the probability of occurrence of exactly x events in time t is given by,

Where, λ is rate of occurrence of the event.

We have,  λ = 180 per 10-minute = 18 per minute

t = 1 minute

Using "POISSON.DIST" function of excel we get,

Hence, the probability the system will be overwhelmed by requests is 0.0103.


Related Solutions

QUESTION 2: When a manufacturing process is operating properly, maximum length of a certain part must...
QUESTION 2: When a manufacturing process is operating properly, maximum length of a certain part must be 25cm. The lengths which are more than 25cm are scrap. If the proportion of scrap is more than 0.171255, then a modification of the process is needed to reduce this amount. On one production run, a random sample of 50 consecutive parts are selected and the following lengths are observed. 19.52 23.15 23.17 18.33 25.68 18.51 20.63 25.68 21.21 26.58 19.85 19.63 20.58...
An automatic machine in a manufacturing process is operating properly if the lengths of an important...
An automatic machine in a manufacturing process is operating properly if the lengths of an important subcomponent are normally distributed with a mean of 111 cm and a standard deviation of 5.5 cm. A. Using Excel, find the probability that one selected subcomponent is longer than 113 cm. Probability = B. Using Excel, find the probability that if 3 subcomponents are randomly selected, their mean length exceeds 113 cm. Probability =
An automatic machine in a manufacturing process is operating properly if the lengths of an important...
An automatic machine in a manufacturing process is operating properly if the lengths of an important component are normally distributed with a mean of 110 cm and a standard deviation of 4.8 cm. a) Find the probability that a selected component is longer than 112 cm. b) Find the probability that if 3 are randomly selected, all have lengths less than 112 cm. c) Which length marks the longest 15% of the subcomponents?
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your...
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your IT infrastrucutre. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
2. If a process is deemed to be functioning properly when it is in fact out...
2. If a process is deemed to be functioning properly when it is in fact out of control, which of the following is true? a. A Type I error has occurred which is the producer's risk. b. A Type II error has occurred which is the producer's risk. c. A Type I error has occurred which is the consumer's risk. d. A Type II error has occurred which is the consumer's risk. e. None of the above. 3. A control...
Research on the Internet and find Five (5) companies (not banks) that process electronic payments in...
Research on the Internet and find Five (5) companies (not banks) that process electronic payments in your community. 2.   Prepare a table including : Company Name: Year that the company began the business: Fare or Rates: Sales and Gross Profit for the past two (2) Years. 3.   Rank the companies and write two paragraphs about your findings. 4.   Present graphs that support your findings.
hacking Embedded Operating Systems: The Hidden Threat EXPLAIN WINDOWS IoT (INTERNET OF THINGS) AND OTHER EMBEDDED...
hacking Embedded Operating Systems: The Hidden Threat EXPLAIN WINDOWS IoT (INTERNET OF THINGS) AND OTHER EMBEDDED SYSTEMS. WHAT ARE NIX EMBEDDED OPERATING SYSTEMS? HOW DO YOU PATCH EMBEDDED OPERATING SYSTEMS?.
A certain dealer owns a warehouse that can store a maximum of 600 units of a...
A certain dealer owns a warehouse that can store a maximum of 600 units of a given commodity. He has on hand 100 units of the commodity and knows the buying and selling price for the next 5 time periods. They are: PERIOD BUYING PRICE SELLING PRICE 1 15 16 2 17 17 3 21 20 4 19 19 5 16 20 He is permitted to sell up to the amount that he has in his warehouse at the beginning...
The quantity demanded of a certain electronic device is 1000 units when the price is $665....
The quantity demanded of a certain electronic device is 1000 units when the price is $665. At a unit price of $640, demand increases to 1200 units. The manufacturer will not market any of the device at a price of $90 or less. However for each $50 increase in price above $100, the manufacturer will market an additional 1000 units. Assume that both the supply equation and the demand equation are linear. (a) Find the supply equation. (b) Find the...
Q1. What is Internet of Things (IoT)? Can you describe one IoT application you know of...
Q1. What is Internet of Things (IoT)? Can you describe one IoT application you know of and explain the techniques behind such IoT application? Q2. Now you might have known some advantages of IoT but what about disadvantages? What are the possible issues of IoT and why? Please reference the information
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT