• Title/Summary/Keyword: Non-preemptive

Search Result 70, Processing Time 0.027 seconds

Online Non-preemptive Deadline Scheduling for Weighted Jobs (가중치 작업들의 온라인 비선점 마감시한 스케줄링)

  • Kim Jae-Hoon;Chang Jung-Hwan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.2
    • /
    • pp.68-74
    • /
    • 2005
  • In deadline scheduling, jobs have deadlines by which they are completed. The scheduling algorithm determines which jobs are executed at each time. Then only the completed jobs contribute to the throughput or gain of the algorithm. The jobs have arbitrary weights and the gain of the algorithm is given as the sum of weights of the completed jobs. The goal of the scheduling algorithm is to maximize its gain. In this paper, we consider online non-preemptive scheduling, where jobs arrive online and the scheduling algorithm has no information about jobs arriving ahead. Also the jobs cannot be preempted or rejected while they are executed. For this problem, we obtain lower bounds for any online algorithms and also we propose an optimal online algorithm meeting the lower bounds.

Performance Analysis of the HIPERLAN Channel Access Control Protocol (고속 무선 근거리 통신망(HIPERLAN) 채널접근제어 프로토콜의 성능분석)

  • Hyun, Young-Guen;Lee, Jong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.22-29
    • /
    • 2000
  • In this paper, we analyzed the performance of EY-NPMA(Elimination Yield-Non-preemptive Priority Multiple Access) protocol-channel access control protocol of HIPERLAN(HIgh PErformance Radio Local Area Network) type 1 specification, adopted as european high speed wireless LAN standard by ETSI(European Telecommunication Standards Institute). We established a system model for EY-NPMA protocol analysis, analyzed success probability in a channel access cycle, and derived expressions for the average length of contention phase. Using a M/G/1 model, we approximated the normalized delay, and throughput, and we evaluated these results by simulations.

  • PDF

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

GENERAL FORMULAS OF SOME VACATION MODELS

  • Lim, Jong-Seul
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.1_2
    • /
    • pp.389-393
    • /
    • 2008
  • This paper describes a single-server queue where the server is unavailable during some intervals of time, which is referred to as vacations. The major contribution of this work is to derive general formulas for the additional delay in the vacation models of the single vacations, head of line priority queues with non-preemptive service, and multiple vacations and idle time.

  • PDF

A start-up class model in multiple-class queues with N-policy and general set-up time (N-정책과 준비기간을 갖는 시동계층모형의 분석)

  • Yoon, Seung-Hyun;Lee, Ho-Woo;Seo, Won-Ju
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.1
    • /
    • pp.141-149
    • /
    • 1999
  • In this paper, we consider multiple-class queueing systems in which the server starts a set-up as soon as the number of customers in the "start-up class" reaches threshold N. After the set-up the server starts his service. We obtain the Laplace-Stieltjes transform and the mean of the waiting times of each class of customers for FCFS and non-preemptive priority disciplines.

  • PDF

A performance analysis of AS/RS with single and dual commands (단일 및 이중명령을 수행하는 자동창고 시스템의 성능분석)

  • Nam Jin Gyu;Jeong Jae Ho;Heo Seon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.244-246
    • /
    • 2003
  • We consider an AS/RS(Automated Storage/ Retrieval System) which performs single and dual commands. In this paper, we also assume that the service times of single and dual commands are differently distributed. We transform the arrival rates of storage and retrieval commands into those of single and dual commands. Using this, we propose a non-preemptive queueing model with priority for the performance analysis of a AS/RS, and obtain approximated means of queue lengths and sojourn times.

  • PDF

Multimedia Traffic Analysis using Markov Chain Model in CDMA Mobile Communication Systems (CDMA 이동통신 시스템에서 멀티미디어 트래픽에 대한 마르코프 체인 해석)

  • 김백현;김철순;곽경섭
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1219-1230
    • /
    • 2003
  • We analyze an integrated voice/data CDMA system, where the whole channels are divided into voice prioritized channels and voice non-prioritized channels. For real-time voice service, a preemptivc priority is granted in the voice prioritized channels. And, for delay-tolerant data service, the employment of buffer is considered. On the other hand, the transmission permission probability in best-effort packet-data service is controlled by estimating the residual capacity available for users. We build a 2-dimensional markov chain about prioritized-voice and stream-data services and accomplish numerical analysis in combination with packet-data traffic based on residual capacity equation.

  • PDF

How to Reinvent Network Services for All (상이한 네트워크 서비스 어떻게 향상시킬까?)

  • Kim, Yong-J.;Lee, Seo-Jun;Lim, Jay-Ick
    • Korean Management Science Review
    • /
    • v.25 no.3
    • /
    • pp.87-99
    • /
    • 2008
  • Besieged by needs for upgrading the current Internet, social pressures, and regulatory concerns, a network operator may be left with few options to Improve his services. Yet he can still consider a transition prioritizing network services. In this paper, we describe a transition from a non-priority system to a prioritized one, using non-preemptive M/G/1 model. After reviewing the constraints and theoretical results from past research, we describe steps making the transition Pareto-improving, which boils down to a multi-goal search for a Pareto-improving state. We use a genetic algorithm that captures actual transition costs along with incentive-compatible and Pareto-Improving constraints. Simulation results demonstrate that the initial post-transition solutions are typically Pareto-improving. for non Pareto-improving solutions, the heuristic quickly generates Pareto-improving and incentive-compatible solutions.

A Study on the Application of Non-destructive (Ultrasonic) Inspection Technique to Detect Defects of Anchor Bolts for Road Facilities (도로시설물 적용 앵커볼트 결함 검출을 위한 비파괴(Ultrasonic) 검사 기법 적용에 대한 연구)

  • Dong-Woo Seo;Jaehwan Kim;Jin-Hyuk Lee;Han-Min Cho;Sangki Park;Min-Soo Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.11-20
    • /
    • 2022
  • The general non-destructive inspection method for anchor bolts in Korea applies visual inspection and hammering inspection, but it is difficult to check corrosion or fatigue cracks of anchor bolts in the part included in the foundation or in the part where the nut and base plate are installed. In reality, objective investigation is difficult because inspection is affected by the surrounding environment and individual differences, so it is necessary to develop non-destructive inspection technology that can quantitatively estimate these defects. Inspection of the anchor bolts of domestic road facilities is carried out by visual inspection, and since the importance of anchor bolts such as bridge bearings and fall prevention facilities is high, the life span of bridges is extended through preventive maintenance by developing non-destructive testing technology along with existing inspection methods. Through the development of this technology, non-destructive testing of anchor bolts is performed and as a technology capable of preemptive/active maintenance of anchor bolts for road facilities, practical use is urgently needed. In this paper, the possibility of detecting defects in anchor bolts such as corrosion and cracks and reliability were experimentally verified by applying the ultrasonic test among non-destructive inspection techniques. When the technology development is completed, it is expected that it will be possible to realize preemptive/active maintenance of anchor bolts by securing source technology for improving inspection reliability.

Estimation of Channel Capacity for Data Traffic Transmission (데이터 트래픽 특성을 고려한 적정 채널 용량 산정)

  • Park, Hyun Min
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.589-595
    • /
    • 2017
  • We present an estimation model for optimal channel capacity required to data traffic transmission. The optimal channel capacity should be calculated in order to satisfy the permitted transmission delay of each wireless data services. Considering the discrete-time operation of digital communication systems and batch arrival of packet-switched traffic for various wireless services, $Geo^x$/G/1 non-preemptive priority queueing model is analyzed. Based on the heuristic interpretation of the mean waiting time, the mean waiting times of various data packets which have the service priority. Using the mean waiting times of service classes, we propose the procedure of determining the optimal channel capacity to satisfy the quality of service requirement of the mean delay of wireless services. We look forward to applying our results to improvement in wireless data services and economic operation of the network facilities.