• 제목/요약/키워드: Resource Control Model

Search Result 372, Processing Time 0.036 seconds

생산제어시스템의 시뮬레이션모델 자동생성

  • 이상훈;조현보;정무영
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.631-634
    • /
    • 1996
  • This paper describes an intelligent user interface to define simulation models from the process and resource models. It also explains an automatic program generator of discrete event simulation model for shop floor control in a flexible manufacturing system. Especially, the paper is focused on the design and development of methodology to automate simulation modeling from the system description. Describing a shop floor control system in simulation is not an easy task since it must resolve various decision problems such as deadlock resolution, part dispatching, resource conflict resolution, etc. The program generator should be capable of constructing a complete discrete simulation models for a multi-product and multi-stage flow shop containing the above mentioned problems.

  • PDF

Modeling for Performance Evaluation of Distributed Computer Systems (분산 컴퓨터 시스템의 성능 평가를 위한 모델연구)

  • Cho, Young-Cheol;Kwon, Wook-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 1995.11a
    • /
    • pp.219-221
    • /
    • 1995
  • This paper proposes a model for simulation and performance evaluation of distributed computer systems(DCS). The model is composed of operating system(OS), resource, task, environment submodel. Task Flow Graph(TFG) is suggested to describe the relation between tasks. This paper considers task response time, the scheduler's ready queue length, utilization of each resource as performance indices. The distributed system of Continuous Annealing Line(CAL) in iron process is simulated with the proposed model.

  • PDF

A Resource Access Control Mechanism Considering Grid Accounting (그리드 어카운팅을 고려한 자원 접근 제어 메커니즘)

  • Hwang Ho-Joen;An Dong-Un;Chung Seung-Jong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.363-370
    • /
    • 2006
  • Currently, many people have been researching diverse mechansmims related to a resource access control in Grid environment. Mostly Grid user's resource access control was designed to authorize according to their attributes and roles. But, to provide Grid with resources continuously, a resource access based on utility computing must be controlled. So, in this paper we propose and implement mechanism that intergrates Grid accounting concept with resource access control. This mechanism calcuates costs of Grid service on the basis of accounting, and determines based on user's fund availibility whether they continue to make use of site resources or not. Grid jobs will be controlled according to a site resource access control policy only if the amount of available fund is less than its costs. If Grid job completed, resource consumer pays for the costs generated by using provider's idle resources. Therefore, this paper provides mechansim to be able to control user's resource access by Grid accounting, so that it is evaluated as the research to realize utility computing environment corresponding to economic principle.

Resource Management System for Multimedia Service in Wireless Mobile Networks (무선 이동 통신망에서의 멀티미디어 서비스를 위한 자원 제어 시스템)

  • Lee, Won-Yeoul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1153-1164
    • /
    • 2007
  • One of the most challenging technical issues in mobile communication for multimedia is Quality of Service (QoS) management of handover calls. This paper proposes a 2-level handover control system to copy with this problem. A 2-level handover control system consists of resource reservation and call admission control modules. The resource reservation module divides the network resource into Hard and Soft reserved resource. The Hard reserved resource is only for the handover calls while the Soft reserved resource is for both the handovers and the new calls. And also, the resource reservation module classifies handovers into primary and secondary handovers based on often they occur. The call admission control module deals with the primary and secondary handover calls in different ways. The new calls can use Soft reserved resource only if there is sufficient amount available in the Hard reserved resource. Proposed system is evaluated using an M/M/c/c queueing model. It is shown that proposed system allows more efficient utilization of network resource without degrading QoS comparing with the legacy handover control systems.

  • PDF

A Study on Developement of Optimization Model for Single Action Tidal Power Station (단류식 창조발전의 조력발전소 최적화 운영 Model 개발에 관한 연구)

  • Kim, Hyun-Han;Kim, Man-Kie;Kim, June-Kyou;Ok, Yeon-Ho;Kim, Kwang-Ho;Jeong, Jong-Chan
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1144_1145
    • /
    • 2009
  • Tidal power station is using the difference of the ebb and flow and the single action tidal power is dependent on tide amplitude and basin volume. Therefore the inflow of basin in rainy season has also effect on the daily power. Also if operating units are changed then starting head too changed. Therefore the number of units are very important for the optimization model. According to our study the primary point when we make a determination of optimization is starting head and governorl control mode. On this study optimization model for tidal power station is considered all of this conditions.

  • PDF

3D-QSAR and Molecular Docking Studies on Benzotriazoles as Antiproliferative Agents and Histone Deacetylase Inhibitors

  • Li, Xiaolin;Fu, Jie;Shi, Wei;Luo, Yin;Zhang, Xiaowei;Zhu, Hailiang;Yu, Hongxia
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.8
    • /
    • pp.2387-2393
    • /
    • 2013
  • Benzotriazole is an important synthetic auxiliary for potential clinical applications. A series of benzotriazoles as potential antiproliferative agents by inhibiting histone deacetylase (HDAC) were recently reported. Three-dimensional quantitative structure-activity relationship (3D-QSAR), including comparative molecular field analysis (CoMFA) and comparative molecular similarity indices analysis (CoMSIA), were performed to elucidate the 3D structural features required for the antiproliferative activity. The results of both ligand-based CoMFA model ($q^2=0.647$, $r^2=0.968$, ${r^2}_{pred}=0.687$) and CoMSIA model ($q^2=0.685$, $r^2=0.928$, ${r^2}_{pred}=0.555$) demonstrated the highly statistical significance and good predictive ability. The results generated from CoMFA and CoMSIA provided important information about the structural characteristics influence inhibitory potency. In addition, docking analysis was applied to clarify the binding modes between the ligands and the receptor HDAC. The information obtained from this study could provide some instructions for the further development of potent antiproliferative agents and HDAC inhibitors.

Resource Allocation in Wireless Ad Hoc Networks Using Game Theory

  • Lee, Ki-Hwan;Halder, Nilimesh;Song, Ju-Bin
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.195-196
    • /
    • 2007
  • The purpose of this paper is to analyze the resource allocation problem in a self organizing network from the viewpoint of game theory. The main focus is to suggest the model and analyze a power control algorithm in wireless ad-hoc networks using non cooperative games. Our approach is based on a model for the level of satisfaction and utility a wireless user in a self organizing network derives from using the system. Using this model, we show a distributed power control scheme that maximizes utility of each user in the network. Formulating this as a non-cooperative game we will show the feasibility of such power control as well as existence of the Nash Equilibrium achieved by the non-cooperative game.

  • PDF

A Resource Reservation Scheme using Dynamic Mobility Class on the Mobile Computing Environment (이동 컴퓨팅 환경에서 동적인 이동성 등급을 이용한 자원 예약 기법)

  • 박시용;정기동
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.112-122
    • /
    • 2004
  • In this paper, we propose a mobility estimation model based on inner regions in a cell and a dynamic resource reservation scheme which can control dynamically classes of mobile hosts on the mobile network. The mobility estimation model is modeled based on the reducible Markov chain. And the mobility estimation model provides a new hand off probability and a new remaining time for the dynamic resource reservation scheme. The remaining time is n estimated time that mobile hosts can stay in a cell. The dynamic resource reservation scheme can reserve dynamically a requested resource according to the classes of mobile hosts. This scheme can efficiently improve the connection blocking probability and connection dropping probability.

Developing Information Security Management Model for SMEs: An Empirical Study (중소기업 정보보호관리 모델의 개발: 실증 연구)

  • Lee, Jung-Woo;Park, Jun-Gi;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.15 no.1
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.

A Design and Implementation of Access Control Mechanism based on the Integrated Information Model (통합 전보 모델을 이용한 접근제어 메커니즘 설계 및 구현)

  • Kang, Chang-Goo;Park, Jin-Ho;Choi, Yong-Rak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2354-2365
    • /
    • 1997
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in modern information communication applications. In this paper, we proposed an integrated information model which can satisfy the combined goals of confidentiality, integrity and availability of any resource. We defined an integrated information model from the view points of identity-based, rule-based and role-based policy and implemented six access control operations. The proposed integrated information model can protect to unauthorized access to any resource based on the multilevel security policies of security label, integrity level, role and ownership.

  • PDF