• Title/Summary/Keyword: Order Management

Search Result 18,113, Processing Time 0.041 seconds

A Queue Management Mechanism for Service groups based on Deep Reinforcement Learning (심층강화학습 기반 서비스 그룹별 큐 관리 메커니즘)

  • Jung, Seol-Ryung;Lee, Sung-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1099-1104
    • /
    • 2020
  • In order to provide various types of application services based on the Internet, it is ideal to guarantee the quality of service(QoS) for each flow. However, realizing these ideas is not an easy task.. It is effective to classify multiple flows having the same or similar service quality requirements into same group, and to provide service quality for each group. The queue management mechanism in the router plays a very important role in order to efficiently transmit data and to support differentiated quality of service for each service. In order to efficiently support various multimedia services, an intelligent and adaptive queue management mechanism is required. This paper proposes an intelligent queue management mechanism based on deep reinforcement learning that decides whether to deliver packets for each group based on the traffic information of each flow group flowing in for a certain period of time and the current network state information.

Comparison between static tradeoff theory and pecking order theory (정태적 절충이론과 자본조달순위이론의 비교)

  • Park, Jung-Ju
    • Management & Information Systems Review
    • /
    • v.31 no.1
    • /
    • pp.89-116
    • /
    • 2012
  • This paper is an empirical study for the listed manufacturing companies in the Korea Stock Exchange during the sample period(2001-2010). The research is based on the target adjustment model(Shyam-Sunder and Myers(1999)) and the pecking order model(Frank and Goyal(2003)), and is aimed at reflecting the critical viewpoint of Chirinko and Singha(2000). An analysis in the model of Shyam-Sunder and Myers(1999) shows the value is too low to support the pecking order model in view of the following results. A target adjustment coefficient value is between 0 and 1, and is significant variable and explanatory power is very high, while deficit-in-funds coefficients close to 0. In addition, the result of an empirical test following the methodology used by Frank and Goyal(2003) does not support the pecking order theory.

  • PDF

Effect of higher order terms of Maclaurin expansion in nonlinear analysis of the Bernoulli beam by single finite element

  • Zahrai, Seyed Mehdi;Mortezagholi, Mohamad Hosein;Mirsalehi, Maryam
    • Structural Engineering and Mechanics
    • /
    • v.58 no.6
    • /
    • pp.949-966
    • /
    • 2016
  • The second order analysis taking place due to non-linear behavior of the structures under the mechanical and geometric factors through implementing exact and approximate methods is an indispensible issue in the analysis of such structures. Among the exact methods is the slope-deflection method that due to its simplicity and efficiency of its relationships has always been in consideration. By solving the differential equations of the modified slope-deflection method in which the effect of axial compressive force is considered, the stiffness matrix including trigonometric entries would be obtained. The complexity of computations with trigonometric functions causes replacement with their Maclaurin expansion. In most cases only the first two terms of this expansion are used but to obtain more accurate results, more elements are needed. In this paper, the effect of utilizing higher order terms of Maclaurin expansion on reducing the number of required elements and attaining more rapid convergence with less error is investigated for the Bernoulli beam with various boundary conditions. The results indicate that when using only one element along the beam length, utilizing higher order terms in Maclaurin expansion would reduce the relative error in determining the critical buckling load and kinematic parameters in the second order analysis.

A Study on the Recognition of Fire Construction Surveillance System : Focused on the Stakeholders (소방공사감리제도의 인식에 관한 연구 : 이해당사자를 중심으로)

  • Lee, Ranny;Jeong, Kyeon-Sik;Kong, Ha-Sung
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.133-143
    • /
    • 2014
  • The purpose of this article is to search stakeholders' recognition related to Fire Construction Surveillance system; a client(order), fire fighting officer, supervision company, construction company, design company, other. The paper provides 4 important things. Firstly, a client(order) suggested the lowest recognition in the needs about the need of separation order, that of contract for any construction work limited registered companies, and that of standard price for engineering.. Secondly, the design company is lowest recognition in guidance and control participating in construction-design phase. Thirdly, the design company is lowest in adjustment about manpower-allocation according to allocation criteria of technical manpower. Fourthly, a client(order) and supervision company are relatively lower than other stakeholder in necessity on special education and training system for auditor in fire protection construction. Almost all related matters are related to more or less stakeholders' interest.

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

XML Repository System Using DBMS and IRS

  • Kang, Hyung-Il;Yoo, Jae-Soo;Lee, Byoung-Yup
    • International Journal of Contents
    • /
    • v.3 no.3
    • /
    • pp.6-14
    • /
    • 2007
  • In this paper, we design and implement a XML Repository System(XRS) that exploits the advantages of DBMSs and IRSs. Our scheme uses BRS to support full text indexing and content-based queries efficiently, and ORACLE to store XML documents, multimedia data, DTD and structure information. We design databases to manage XML documents including audio, video, images as well as text. We employ the non-composition model when storing XML documents into ORACLE. We represent structured information as ETID(Element Type Id), SORD(Sibling ORDer) and SSORD(Same Sibling ORDer). ETID is a unique value assigned to each element of DTD. SORD and SSORD represent an order information between sibling nodes and an order information among the sibling nodes with the same element respectively. In order to show superiority of our XRS, we perform various experiments in terms of the document loading time, document extracting time and contents retrieval time. It is shown through experiments that our XRS outperforms the existing XML document management systems. We also show that it supports various types of queries through performance experiments.

Determination of Forest Road Construction Priority Order Using Multiple Criteria Decision Making Methods (다기준의사결정법(多基準意思決定法)에 의한 임도개설순위(林道開設順位)의 결정(決定))

  • Cha, Du Song;Cho, Koo Hyun;Kim, Jong Yoon
    • Journal of Korean Society of Forest Science
    • /
    • v.85 no.2
    • /
    • pp.149-157
    • /
    • 1996
  • The applications of multiple criteria decision making(MCDM) methods were investigated to determine the priority order in forest road construction for timber harvesting and silvicultrual activities in 22 regions. In this paper, MCDM methods have five methods from two kinds of models. The one is non-compensatory preference model including maximin and maximax method; the other is compensatory preference model including simple additive weighting method(SAW), hierarchical additive weighting method(HAW) and technique for order preference by similarity to ideal solution(TOPSIS), SAW and TOPSIS methods turned out to be the most adequate for forest road construction priority order among the five methods tested in this study.

  • PDF

A Study on the Brand-based Warehouse Management in Online Clothing Shops (온라인 쇼핑몰의 브랜드 중심 창고관리 기법에 대한 연구)

  • Song, Yong-Uk;Ahn, Byung-Hyuk
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2011
  • As the sales volume of online shops increases, the job burden in the back-offices of the online shops also increases. Order picking is the most labor-intensive operation among the jobs in a back-office and mid-size pure click online shops are experiencing the time delay and complexity in order picking nowadays while fulfilling their customers' orders. Those warehouses of the mid-size shops are based on manual systems, and as order pickings are repeated, the warehouses get a mess and lots of products in those warehouses are getting missing, which results in severe delay in order picking. To overcome this kind of problem in online clothing shops, we research a methodology to locate warehousing products. When products arrive at a warehouse, they are packed into a box and located on a rack in the warehouse. At this point, the operator should determine the box to be put in and the location on the rack for the box to be put on. This problem could be formulated as an Integer Programming model, but the branch-and bound algorithm to solve the IP model requires enormous computation, and sometimes it is even impossible to get a solution in a proper time. So, we relaxed the problem, developed a set of heuristics as a methodology to get a semi-optimum in an acceptable time, and proved by an experiment that the solutions by our methodology are satisfactory and acceptable by field managers.

A Study of Influencing Factors through the Follow-up on Commercialization of Transferred Technology from Government Funded Research Lab : A Case Study of A-institute (출연(연)의 기술이전·사업화 추적조사를 통한 영향요인 연구 : A연구원 사례 연구)

  • Yun, Yohan;Kim, Yun Bae;Kang, Ji Seok;Jeong, Ga Seop
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.1
    • /
    • pp.105-114
    • /
    • 2015
  • An empirical analysis study applied to evaluate the effect of critical factors for technology transfer. The research aims to suggest ways of political support in order to facilitate technological transfer and commercialization of public research institute'technology. Based on previous researches, it is determined that five critical factors which effect on technology commercialization. These critical factors are used to derive the order of priority, attribute of the success, and failure factors. The result of this research emphasized on both roles of technology introduction motivation and type of technology transfer. In order to collect data for this research, it is carried out that survey and field study toward to technology user such as manufacturing companies which have contracted with institute A. This research has a meaning in aspects of verification of previous hypothesis through scientific approach and new findings of a significant factor that motivation determines the success or failure of technology commercialization.

A Study on the Supply Chain Security Program (수출입 공급망 안전 프로그램에 관한 연구)

  • Han, Byoung Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF