• Title/Summary/Keyword: Line priority

Search Result 189, Processing Time 0.028 seconds

A discrete Time Priority Queueing Model with Bursty Arrivals (돌발적인 도착이 있는 우선순위 이산 큐잉 모델)

  • 이미정
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.10
    • /
    • pp.2014-2027
    • /
    • 1994
  • A queueing model with two input streams of different service priorities is studied. Specifically, IBP+BP/D/1 with head-of-line priority is analyzed. IBP and BP stand for Interrupted Bernoulli Process and Bernoulli Process respectively. The BP-stream customers have the higher service priority over the IBP-stream customers. An exact analysis of this priority queue is presented to derive the distributions of the state of the system at steady state, the waiting time distributions for each class of customers, and the interdeparture time distributions. The numerical results of the analysis are presented to show how the various parameters of the low and high priority arrival processes affect the performance of the system.

  • PDF

An Evolutionary Algorithm for Goal Programming: Application to two-sided Assembly Line Balancing Problems (목표계획법을 위한 진화알고리즘: 양면조립라인 밸런싱 문제에 적용)

  • Song, Won-Seop;Kim, Yeo-Geun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.191-196
    • /
    • 2008
  • This paper presents an evolutionary algorithm for goal programming with preemptive priority. To do this, an evolutionary strategy is suggested which search for the solution satisfying the goals in the order of the priority. Two-sided assembly line balancing problems with multiple goals are used to validate the applicability of the algorithm. In the problems, three goals are considered in the following priority order: minimizing the number of mated-stations, achieving the goal level of workload smoothness, and maximizing the work relatedness. The proper evolutionary components such as encoding and decoding method, evaluation scheme, and genetic operators, which are specific to the problem being solved, are designed in order to improve the algorithm's performance. The computational result is reported.

  • PDF

Comparative Analyses of Social Media on Its Impacts on Consumer Behavior in On-line Markets (온라인 시장에서 소셜미디어가 소비자 행동에 미치는 영향 비교분석)

  • Shin, Young-Ho;Kim, Sun-Geun
    • Journal of Distribution Science
    • /
    • v.15 no.10
    • /
    • pp.81-92
    • /
    • 2017
  • Purpose - One of the main objectives of this paper is to identify the most effective type of social media and to analyze the priority of blogs by their informational attributes in the aspect of their impacts on word-of-mouth intention(WOM) in on-line markets. Research design, data, and methodology - We set 'attitude' variable in the middle to see if there is mediating effects between blog information and word-of-mouth intention. We conducted a survey by questionnaire and received 206 answers. Employing the OLS statistical methods through the SPSS package, we tested our hypotheses. Results - Some of the main results are the followings. First, blog, micro-blog, and profile-based services showed significant effects on WOM, while Internet community and mini-homepages are not significant. Second, blog has positive impacts on WOM. Third, attitude has perfect mediating effects between blog and WOM. Fourth, in terms of effects on WOM, interactivity shows the first priority and reliability and usability follows. Finally, attitude has a more significant effect for users of 3 types of blog compared with those of 2 types. Conclusions - In this paper, we analyzed the effects of social network services by type and identified the priority among various attributes of information contained in blogs. It would provide businesses with viable strategic options to establish public relations in their sales promotion.

A Study on a Tram Signal Priority Strategy for Commercialization of the On-Board Oriented Train Control System (차상중심 열차제어시스템 실용화를 위한 트램 우선신호 전략 연구)

  • Baek, Jong-Hyen;Sung, Yu-Suk;Kim, Gonyop;Choi, Hyeon Yeong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.10
    • /
    • pp.1493-1500
    • /
    • 2015
  • For efficient and economical train operation in low-density railway line, on-board oriented train control system, which reduces expensive wayside equipment, is being developed. In this paper, we discuss a tram signal priority strategy which enables efficient and safe train operation when the developing system is applied to train-tram railway environment. Based on the well-known transit signal priority strategies, we develop a tram signal priority algorithm and conduct simulations by using model-based systems engineering (MBSE) tool. Various considerations such as operation procedure, linkage to existing road traffic system, applicability with respect to crossroad types, and so on, are also dealt with.

An Analysis of Femme Fatale Image's Costume Form in Paintings viewed from DeLong's Theory (DeLong 이론에 의한 회화속 팜므 파탈 이미지의 복식 형태 분석)

  • Kim, Bok-Hee;Nam, Yoon-Sook
    • Fashion & Textile Research Journal
    • /
    • v.13 no.2
    • /
    • pp.155-161
    • /
    • 2011
  • This thesis, concerning Femme Fatale Images Costume Form in paintings viewed from DeLong's Theory, analyzed frequency and traits on the basis of DeLong's Form Observation Theory and drew out the result as followings. First, Costume Form was mostly open, whole, planer integration, rounded, and indeterminate. The styles were similar each other. Second, surface structure was expressed by line & shape, color, texture, and pattern of which color had the highest priority. Next, line & shape and texture had the priority in order. They were expressed through intereaction. Third, the traits of Costume Form were a similar color harmony or large light and darkness contrast+soft quality+interaction by ambiguous line & shape. So, Femme Fatale Image in paintings was expressed by soft and pure images and erotic images.

A Study on the Transition Probability Matrix set from a Transfer Line Model (자동 생산라인 모형에서의 Transition Probability Matrix에 관한 연구)

  • No, Hyeong-Min
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.11 no.2
    • /
    • pp.1-9
    • /
    • 1985
  • In this study, two stage transfer line with limited repair capability is modeled to formulate optimal dynamic repair priority policy. The method of Markov Chains is used to analyze the analytical model of this line. An efficient algorithm is developed, utilizing the block tridiagonal structure of the transition probability matrix, to obtain the steady state probabilities and system performance measures, such as the steady state production rate of the line and the average in-process inventory in the interstage buffer.

  • PDF

Priority-based Scheduling Methods for Real-time Tasks of Massively Multiplayer On-line Game Systems (대규모 다중사용자용 온라인 게임 시스템의 실시간 태스크를 위한우선순위 스케쥴링 기법)

  • Kim, Jinhwan
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.493-501
    • /
    • 2013
  • A key challenge in massively multiplayer on-line game(MMOG) systems is providing real-time response latencies to the large number of concurrent game players. MMOG systems are a kind of soft real-time systems because requests from many players should be responded within specified time constraints. Client events have different timeliness and consistency requirements according to their nature in the game world. These requirements lead to tasks with different priorities on CPU processing. In order to meet their timing constraints, we propose priority scheduling methods that attempt to allocate preferentially more CPU bandwidth to serve an task with the higher priority level in the presence of transient overloading. The proposed scheduling methods are capable of enhancing real-time performance of MMOG system by maximizing the number of tasks with higher priority completed successfully within their deadlines while minimizing total average latency of tasks finished after given deadlines. The performance of these scheduling methods is evaluated through extensive simulation experiments.

The Study of Danger Rate for Improvement of Traffic Facilities (교통시설개선을 위한 위험도 도출에 관한 연구)

  • Sohn, Jin-hyeon
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.9 no.4
    • /
    • pp.285-291
    • /
    • 2006
  • A traffic accident is occurred by unbalance of reciprocal action of driver, vehicle and road conditions. To prevent the traffic accident, rapid and perfect road improvement is needed. But most of road improvement plans have insufficient budget. So decision maker has to determine the priority to invest. A model in this study, analyzing the effect of road conditions to the traffic accident, helps to decide the priority in road improvement. This study considered five danger indices ; 1) traffic volume, 2) speed variance, 3) vehicle mixing rate, 4) curved line radius, and 5) difference between design speed and running speed. Danger rate composed by five indices can be a scale of priority of improvement. The model in this study didn't consider all of factors about traffic accident. But this study can propose the methodology for traffic safety policy. For deriving the model, this study used data from highways in Korea and United States. Therefore the model has to apply the highways only.

  • PDF

QUEUEING ANALYSIS OF THE HOL PRIORITY LEAKY BUCKET SCHEME

  • Choi, Doo-Il
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.7 no.1
    • /
    • pp.15-23
    • /
    • 2003
  • ATM networks provide the various kinds of service which require the different Quality of Services(QoS) such as loss and delay. By statistically multiplexing of traffics and the uncertainty and fluctuation of source traffic pattern, the congestion may occur. The leaky bucket scheme is a representative policing mechanism for preventive congestion control. In this paper, we analyze the HOL(Head-of-Line) priority leaky bucket scheme. That is, traffics are classified into real-time and nonreal-time traffic. The real-time traffic has priority over nonreal-time traffic for transmission. For proposed mechanism, we obtain the system state distribution, finally the loss probability and the mean waiting time of real-time and nonreal-time traffic. The simple numerical examples also are presented.

  • PDF

Analysis of Threat Information Priorities for Effective Security Monitoring & Control (효과적인 보안관제를 위한 위협정보 우선순위 도출)

  • Kang, DaYeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real time situation, focusing on events and logs generated by security protection programs. The security monitoring task derives priority by dividing threat information into reputation information and analysis information. Reputation information consisted of Hash, URL, IP, and Domain, while, analysis information consisted of E-mail, CMD-Line, CVE, and attack trend information. As a result, the priority of reputation information was relatively high, and it is meaningful to increase accuracy and responsiveness to the threat information.