• Title/Summary/Keyword: Blocking-Before-Service

Search Result 11, Processing Time 0.023 seconds

Spreadsheet Model Approach for Buffer-Sharing Fork-Join Production Systems with General Processing Times and Structure (일반 공정시간과 구조를 갖는 버퍼 공유 분기-접합 생산시스템의 스프레드시트 모형 분석)

  • Seo, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.3
    • /
    • pp.65-74
    • /
    • 2019
  • For many years, it has been widely studied on fork-join production systems but there is not much literature focusing on the finite buffer(s) of either individuals or shared, and generally distributed processing times. Usually, it is difficult to handle finite buffer(s) through a standard queueing theoretical approach. In this study, by using the max-plus algebraic approach we studied buffer-shared fork-join production systems with general processing times. However, because it cannot provide proper computational ways for performance measures, we developed simulation models using @RISK software and the expressions derived from max-plus algebra. From the simulation experiments, we compared some properties on waiting time with respect to a buffer capacity under two blocking policies: BBS (Blocking Before Service) and BAS (Blocking After Service).

Stationary Waiting Times in m-node Tandem Queues with Communication Blocking

  • Seo, Dong-Won;Lee, Ho-Chang;Ko, Sung-Seok
    • Management Science and Financial Engineering
    • /
    • v.14 no.1
    • /
    • pp.23-34
    • /
    • 2008
  • In this study, we consider stationary waiting times in a Poisson driven single-server m-node queues in series. We assume that service times at nodes are independent, and are either deterministic or non-overlapped. Each node excluding the first node has a finite waiting line and every node is operated under a FIFO service discipline and a communication blocking policy (blocking before service). By applying (max, +)-algebra to a corresponding stochastic event graph, a special case of timed Petri nets, we derive the explicit expressions for stationary waiting times at all areas, which are functions of finite buffer capacities. These expressions allow us to compute the performance measures of interest such as mean, higher moments, or tail probability of waiting time. Moreover, as applications of these results, we introduce optimization problems which determine either the biggest arrival rate or the smallest buffer capacities satisfying probabilistic constraints on waiting times. These results can be also applied to bounds of waiting times in more general systems. Numerical examples are also provided.

Spreadsheet Model Approach for Buffer-Sharing Line Production Systems with General Processing Times (일반 공정시간을 갖는 버퍼 공유 라인 생산시스템의 스프레드시트 모형 분석)

  • Seo, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.119-129
    • /
    • 2019
  • Although line production systems with finite buffers have been studied over several decades, except for some special cases there are no explicit expressions for system performances such as waiting times(or response time) and blocking probability. Recently, a max-plus algebraic approach for buffer-sharing systems with constant processing times was introduced and it can lead to analytic expressions for (higher) moment and tail probability of stationary waiting. Theoretically this approach can be applied to general processing times, but it cannot give a proper way for computing performance measures. To this end, in this study we developed simulation models using @RISK software and the expressions derived from max-plus algebra, and computed and compared blocking probability, waiting time (or response time) with respect to two blocking policies: communication(BBS: Blocking Before Service) and production(BAS: Blocking After Service). Moreover, an optimization problem which determines the minimum shared-buffer capacity satisfying a predetermined QoS(quality of service) is also considered.

YouTube Users' Awareness of Online Advertisements and Advertising Regulation Plan (유튜브 이용자들의 온라인광고에 대한 인식 및 광고규제 방안)

  • Kim, Sora
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.528-542
    • /
    • 2021
  • This study aims to examine the attitudes toward online advertisement targeting YouTube content users and to present implications for the direction and regulation of personal media broadcasting advertisement. The study used the data from 'Awareness of On-line Ads and Blocking Tools' conducted by the Korea Press Foundation in 2020. For the statistical analysis, correspondent analysis was employed. The main results followed as: women tended to perceive more discomfort about the ads before the start of the content compared to men, and women in twenties perceived the highest discomfort with intermediate advertisement. Second, respondents who watch more YouTube contents tended to accept more ads to use contents for free. Third, respondents who are willing to use the advertisement blocking service were most aware of the inconvenience of advertisements before starting of YouTube contents. Although users are aware of the inconvenience, the use of advertisement blocking service has not yet been found to be generalized. However, the use of ad blocking service is expected to increase gradually. It would be expected that efforts to regulate advertisement to reduce discomfort about advertisement among users are also required.

A study on Development of method for Train Schedule Simulation (철도 차량운행계획 시뮬레이션 방법론 개발에 대한 연구)

  • Shin, Dae-Sup;Park, Eun-Kyung;Lee, Jin-Sun;Lee, Seon-Ha
    • Journal of the Korean Society for Railway
    • /
    • v.15 no.1
    • /
    • pp.88-95
    • /
    • 2012
  • Presently, because making process of train service plan consist of various constraint condition, for example structure of track, structure of track in station, train maintenance time and others for considering to be necessary of train management, it has been had extremely complex structure problems. For these reasons, it has big problems to compare analysis for various train service time-table. A study suggest methodology to choice service the most effective schedule and plan of train put before comparative analysis on making train diamond picture's expected effect of established possible various train time-table in making process of train service schedule for improving effectiveness and organization of train service schedule establishment. A study uses Line-Blocking theory for analyzing train service time-table and analyze example for regional train Sadang to Ansan section in 4line.

Performance Analysis on Link Quality of Handover Mechanism based on the Terminal Mobility in Wired and Wireless Integrated Networks (유무선 복합망에서 이동 단말 기반 핸드오버의 링크 품질에 관한 성능 분석)

  • Park, Nam-Hun;Gwon, O-Jun;Kim, Yeong-Seon;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2608-2619
    • /
    • 2000
  • This paper proposes the Handover Scheme for the mobile and describes the result of the performance analysis. In the conventional scheme of handover request, the withdrawal of terminal may occur because handover request is performed based on fixed signal level without considering network load and terminal mobility. The proposed scheme offers the minimization of withdrawal and handover blocking probability by means of the handover request of terminal based on the network load and terminal mobility. Conventional handover scheme has the sequential procedure that network performs resource check and path rerouting on the handover by MT(Mobile Terminal). Proposed handover scheme pre-processes the resource check before the handover request by predicting the handover request timo so that handover latency can be reduced. Moreover, path optimization is executed after the completion of handover in order to reduce handover latency. The rdduction of handover latency prevents the dropping of service by minimizing backward handover blocking. In summary, we propose the prediction of handover request time and decision method based on terminal, validating the performance of proposed scheme considering various cases of simulation.

  • PDF

Noise Improvement Countermeasure by Noise Pattern Analysis for Electrical and Electronic Equipment (전기전자 기기의 노이즈 패턴 분석에 의한 노이즈 개선 대책)

  • Cho, Dae-Hoon;Lee, Ki-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.1
    • /
    • pp.194-202
    • /
    • 2017
  • In this study, we measured and analyzed electrical noise signals present in devices and systems operated in industrial facilities. Based on the analytic findings, we studied the most effective improvement measures for eliminating such noise signals. Leakage current and ground current generate data interferences in communication systems, and therefore we measured leakage current and ground current. We also measured and analyzed electrical noises in power systems to predict noise pathways and interference routes. Furthermore, we proposed the most effective and reliable improvement measures for blocking off various noise signals and safely eliminating them by improving the internal wiring of the facilities and grounding systems. As a final step, we conducted the proposed improvement measures and confirmed that they helped to improve the operations of the device sand systems in service by re-measuring electrical noise signals and comparing them with those measured before the proposed improvement measures were implemented.

Lattice-based Threshold Ring Signature with Message Block Sharing

  • CHEN, Jiangshan;HU, Yupu;GAO, Wen;Liang, Hongmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1003-1019
    • /
    • 2019
  • Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously. The verifier is convinced that the signature is indeed generated by at least t users from the claimed group, but he cannot tell them apart. Threshold ring signatures are significant for ad-hoc groups such as mobile ad-hoc networks. Based on the lattice-based ring signature proposed by Melchor et al. at AFRICRYPT'13, this work presents a lattice-based threshold ring signature scheme, employing the technique of message block sharing proposed by Choi and Kim. Besides, in order to avoid the system parameter setup problems, we proposed a message processing technique called "pad-then-permute", to pre-process the message before blocking the message, thus making the threshold ring signature scheme more flexible. Our threshold ring signature scheme has several advantages: inherits the quantum immunity from the lattice structure; has considerably short signature and almost no signature size increase with the threshold value; provable to be correct, efficient, indistinguishable source hiding, and unforgeable.

A New Channel Reservation Scheme for Soft Handoff Algorithms in Wireless Networks (무선망에서 소프트 핸드오프 알고리즘을 위한 새로운 대역폭 예약 기법)

  • Kwon Se-Dong;Park Hyun-Min
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.701-708
    • /
    • 2005
  • The mobility prediction algorithm and the channel reservation scheme have been reported as an effective means to provide QoS guarantees and the efficient resource reservation in wireless networks. Among these prediction algorithms, the recently proposed Detailed-ZMHB algorithm makes use of the history of the user's positions within the current cell to predict the next cell, which provides the better prediction accuracy than the others. The handoff prioritizing schemes are proposed to provide improved performance at the expense of an increase in the blocking probability of new calls. In the soft handoff of the CDMA systems, a mobile can communicate via two adjacent cells simultaneously for a while before the actual handoff takes place. In this paper, we propose a new channel reservation scheme making use of the user mobility pattern information in order to reduce the call dropping probability. Our results show that the proposed scheme gives about 67.5-71.1$\%$ lower call dropping probability, compared to the existing scheme.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.