• Title/Summary/Keyword: Secondary Operations

Search Result 181, Processing Time 0.031 seconds

a linear system approach

  • 이태억
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1993.10a
    • /
    • pp.118-118
    • /
    • 1993
  • We consider a discrete event dynamic system called periodic job shop, where an identical mixture of items called minimal part set(MPS) is repetitively produced in the same processing order and the primary performance measure is the cycle time. The precedence relationships among events(starts of operations) are represented by a directed graph with rocurront otructure. When each operation starts as soon as all its preceding operations complete(called earliest starting), the occurrences of events are modeled in a linear system using a special algebra called minimax algebra. By investigating the eigenvalues and the eigenvectors, we develop conditions on the directed graph for which a stable steady state or a finite eigenvector exists. We demonstrate that each finite eigenvector, characterized as a finite linear combination of a class of eigenvalue, is the minimum among all the feasible schedules and an identical schedule pattern repeats every MPS. We develop an efficient algorithm to find a schedule among such schedules that minimizes a secondary performance measure related to work-in-process inventory. As a by-product of the linear system approach, we also propose a way of characterizing stable steady states of a class of discrete event dynamic systems.

  • PDF

A POLLED DISPATCHING STRATEGY FOR AUTOMATED GUIDED VEHICLES IN PORT CONTAINER TERMINALS

  • Bae, Jong Wook;Kim, Kap Hwan
    • Management Science and Financial Engineering
    • /
    • v.6 no.2
    • /
    • pp.47-67
    • /
    • 2000
  • It is discussed how to assign delivery tasks to automated guided vehicles (AGVs) for multiple container cranes in automated container terminals. The primary goal of dispatching AGVs is to complete all the lading and discharging operations as early as possible, and the secondary goal is to minimize the total travel distance of AGVs. It is assumed that AGVs are not dedicated to a specific container crane but shared among multiple cranes. A mathematical formulation is developed and a heuristic algorithm is suggested to obtain a near optimal solution with a reasonable amount of computational time. The single-cycle and the dual-cycle operations in both the seaside and the landside operations are analyzed. The effects of pooling AGVs for multiple container cranes on the performance of an entire AGV system are also analyze through a numerical experiment.

  • PDF

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

Effects of Secondary Left-sided Portal Hypertension on the Radical Operation Rate and Prognosis in Patients with Pancreatic Cancer

  • Zhang, Shuo;Wen, Dong-Qing;Kong, Ya-Lin;Li, Ya-Li;Zhang, Hong-Yi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.5
    • /
    • pp.2239-2244
    • /
    • 2014
  • Objective: To investigate the effects of secondary left-sided portal hypertension (LSPH) on the radical operation rate of patients with pancreatic cancer and systemically evaluate the prognosis of patients with LSPH secondary to pancreatic cancer after radical surgery. Materials and Methods: The data of patients with pancreatic cancer who underwent laparotomy over a 15-year period in Department of Hepatobiliary Surgery of Chinese PLA Air Force General Hospital from Jan. 1, 1997, to Jun. 30, 2012 was retrospectively reviewed. Results: A total of 362 patients with pancreatic cancer after laparotomy were selected, including 73 with LSPH and 289 without LSPH. Thirty-five patients with LSPH (47.9%) and 147 without non-LSPH (50.9%) respectively underwent radical operations. No significant difference was found between these two groups regarding the total resection rate and stratified radical resection rate according to different pathological types and cancer locations. The mean and median survival time of patients after radical operation in LSPH group were $13.9{\pm}1.3$ months and 14.8 months, respectively, while those in non-LSPH group were $22.6{\pm}1.4$ months and 18.4 months, respectively(P<0.05). Conclusions: Radical operations for pancreatic cancer and secondary LSPH are safe and effective. Because high-grade malignancy and poor prognosis are closely associated, the decision for radical surgery should be made more meticulously for the patients with pancreatic cancer.

Secondary reduction mammaplasty using different pedicle from the initial pedicle : Report of two cases (일차 수술과 다른 혈관경을 이용한 이차 유방 축소술: 증례 보고)

  • Kim, Kyu Nam;Lee, Taik Jong;Kim, Eun Key;Kim, Tae Gon
    • Archives of Plastic Surgery
    • /
    • v.36 no.6
    • /
    • pp.784-787
    • /
    • 2009
  • Purpose: Reduction mammaplasty is one of the most commonly performed operations in plastic surgery. Although secondary surgery is occasionally required for minor aesthetic problems or for treatment of the complications of the primary surgery, there are no clear operative guidelines of management. We report here two cases of secondary reduction mammaplasty using differrent pedicle from the initial ones. Methods: One case of secondary reduction mammaplasty were performed using medial pedicle after central (19 years) pedicle reduction mammaplasty because of subsequent breast ptosis and asymmetry. The other case were performed using medial pedicle after superior (4 years) pedicle reduction mammaplasty with contralateral immediate breast reconstruction with TRAM flap because of subsequent breast ptosis and asymmetry. Care was taken to include sufficient width of pedicle and adequate soft tissue attachment beneath the nipple - areolar complex. Results: There was no significant complication such as nipple - areolar necrosis or fat necrosis. The results were well maintained throughout the follow - up period. Conclusion: Medial pedicle reduction mammaplasty can be safely performed after central or superior pedicle reduction mammaplasty when sufficient width of pedicle and adequate soft tissue attachment beneath the nipple - areolar complex are maintained.

A continuity method for bridges constructed with precast prestressed concrete girders

  • Lee, Hwan Woo;Barnes, Robert W.;Kim, Kwang Yang
    • Structural Engineering and Mechanics
    • /
    • v.17 no.6
    • /
    • pp.879-898
    • /
    • 2004
  • A method of making simply supported girders continuous is described for bridges with spans of 30-45 m. The splicing method takes advantage of an induced secondary moment to transform the self-weight stresses in the precast simply supported girders into values representative of a continuous girder. The secondary moment results from prestressing of continuity tendons and detensioning of temporary tendons in the girders. Preliminary sections are selected for spliced U-girder bridges with a range of span lengths. Use of the proposed technique results in girder depth reductions of 500-800 mm when compared to standard simply supported I-girder bridges. The flexural behavior of an example bridge with 40-m spans is examined to illustrate the necessary considerations for determining the optimum sequence of splicing operations.

DSS of Discharging from Military Service using the Analysis of Mental Patient's Prescription (정신과 환자 처방분석을 통한 의병전역 결정지원 시스템)

  • Jeon, Young-Hee;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.3
    • /
    • pp.93-105
    • /
    • 2008
  • Recently, mental patients are increasing by secondary gain, that is, purpose for avoiding a military service as the social prejudice about mental disease decreases. In particular, it is unique diagnostic tool to a patient's subjective symptoms complaint and a doctor's special judgment, in occasion of psychiatry problem that an objective diagnostic tool does not exist. In this paper, we provide an objective basis to help in a quick decision-making of discharging from military service using the datamining, that analyzes mental patient's prescription to find a special rule. Therefore, we propose the decision support system of discharging from service using the analysis of mental patient's prescription.

A Study of Effective Methods for the Formation of Calluses on Trees after Surgical Operation (외구수술 후 수목의 효율적인 Callus 형성 방법에 관한 연구)

  • Ha, Tae-Joo;Lee, Jae-Keun;Kwon, Oh-Bok
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.7 no.6
    • /
    • pp.29-38
    • /
    • 2004
  • This study validated the effect of Vaseline and the vegetable hormone-added medicine that can influence the formation of new calluses on the injured part, with the subjects of natural monument trees and large old trees. The medicines can help in the treatment of the pored or injured parts and promote the formation of new callus on natural monument trees and large old trees, which can help vigorous growth activities and prevent any secondary infection by pathogens at the same time. It turned out that the Vaseline that is used for the protection of cambiums after surgical operations on the trees did not have any significant effect on the formation of calluses. However, since it was found that new calluses formed rapidly when applying the medicine using a vegetable hormone, the medicine is highly recommended for use. If further studies should determine proper medicines for the trees according to the kinds of trees and if the medicine is applied in proper concentrations to the injured part for rapid formation of calluses on the trees when the trees undergo surgical operations, it then should be helpful in preventing the sound part(s) of the trees from decay caused by secondary infection and treatment of the injured part.

A Branch and Bound Algorithm for the Hierarchical Transportation Network Design Problem in Directed Networks (유방향 네트워크에서 계층수송망 설계 문제에 대한 분지한계법)

  • Shim, Hyun-Taik;Park, Son-Dal
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.86-102
    • /
    • 1991
  • The purpose of this paper is to present a branch and bound algorithm for the hierarchical transportation network design problem in 2-level directed networks. This problem is to find the least cost of hierarchical transportation networks which consist of a primary path and a secondary path. The primary path is a simple path from a prespecified orgin node to a prespecified terminal node. All nodes must be either a transsipment node on the primary path or connected to that path via secondary arcs. This problem is formulated to a 0-1 inter programming problem with assignment and illegal subtour elimination equations as constaints. We show that the subproblem relaxing subtour elimination constraints is transformed to a linear programming problem by means of the totally unimodularity. Optimal solutions of this subproblem are polynoially obtained by the assignment algorithm and complementary slackness conditions. Therefore, the optimal value of this subproblme is used as a lower bound. When an optimal solution of the subproblem has an illegal subtour, a better disjoint rule is adopted as the branching strategy for reducing the number of branched problems. The computational comparison between the least bound rule and the depth first rule for the search strategy is given.

  • PDF

New Method of Cooperative Spectrum Sharing for Interference Mitigation (간섭 완화를 위한 새로운 협력 스펙트럼 공유 기법)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.111-116
    • /
    • 2015
  • This article considers a model of cooperative spectrum sharing between primary and secondary systems in which transmission occurs in two phases. In this scheme, we introduce that a single secondary transmitter, ST, employs a quadrature-phase-based signal to present the secondary message, while the primary message is presented by an in-phase-based signal. This allows simultaneous spectrum sharing without mutual interference. Therefore, an interference constraint is not necessary to protect primary operating performance from being degraded by the secondary user operations. Theoretical analysis and Simulations are then provided to confirm the superiority of the proposed scheme over the the current conventional methods.