• Title/Summary/Keyword: Time scheduling

Search Result 2,288, Processing Time 0.039 seconds

MAC Scheduling Algorithm in IEEE 802.15.3 HR-WPAN (고속 무선 개인화 네트워크를 위한 MAC 스케줄링 알고리즘)

  • Joo Sung-Don;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.6 s.336
    • /
    • pp.41-52
    • /
    • 2005
  • In wireless networks there are various errors, caused by multi-path fading and interference between devices which lower the network Performance. Especially, performance of IEEE 802.IS.3 High-Rate WPAN (Wireless Personal Area Network) which is operated in ISM unlicensed frequency band is easily affected by channel errors. In this paper, we propose a scheduling algorithm which takes channel errors into consideration in scheduling asynchronous data traffic. The proposed scheduling algorithm can allocate CTA(Channel Time Allocation) proportionally in accordance with the requested channel time of each device. It also prevents waste of channel time by allocating CTA of the channel-error devices to other channel-error free devices. After recovering from the channel error, the devices are compensated as much as they conceded during channel error status. Simulation results show that the proposed scheduling algorithm is superior to the existing SRPT(Shortest Remain Processing Time) and RR(Round Robin) in throughput and fairness aspects.

Vertex Coloring based Slot Reuse Scheduling for Power Line Communications

  • Yoon, Sung-Guk
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2135-2141
    • /
    • 2015
  • Power line communication (PLC) is one of the major communication technologies in smart grid since it combines good communication capability with easy and simple deployment. As a power network can be modeled as a graph, we propose a vertex coloring based slot reuse scheduling in the time division multiple access (TDMA) period for PLCs. Our objective is to minimize the number of assigned time slots, while satisfying the quality of service (QoS) requirement of each station. Since the scheduling problem is NP-hard, we propose an efficient heuristic scheduling, which consists of repeated vertex coloring and slot reuse improvement algorithms. The simulation results confirm that the proposed algorithm significantly reduces the total number of time slots.

Evaluation of Appointment Policy and Scheduling Rule for a Dental Clinic Based on Computer Simulation (시뮬레이션을 이용한 치과의원의 예약정책과 스케줄링 규칙 평가)

  • Lee, Jong-Ki;Kim, Myeng-Ki;Ha, Byung-Hyun
    • Korea Journal of Hospital Management
    • /
    • v.16 no.4
    • /
    • pp.161-182
    • /
    • 2011
  • In today's competitive dental markets, it is of paramount importance to improve service quality and at the same time to use scarce resource efficiently. In this study, we present appointment policies and scheduling rules for private dental clinics to reduce the waiting time of patients and to increase the revenue by utilizing resource more effectively. This study validates the proposed appointment policies and scheduling rules based on simulation models. We show that the bottleneck-based appointment policy is the most effective among appointment policies, followed by the multiple-block appointment one. The shortest processing time among scheduling rules contributes most to the performance of the appointment system.

  • PDF

Effective Real-Time Scheduling in Composite Task Model (복합 태스크 모델에 대한 효율적인 실시간 스케쥴링)

  • Kim, In-Guk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1568-1579
    • /
    • 1996
  • Most of the real-time scheduling algorithms assume that all tasks are either preemptive or nonpreemptive. In this paper, we present a real-time scheduling algorithm for the more generalized task model in which each task contains both preemptive and nonpreemptive subtasks in a single processor environment. If the task set is found to be scheduling by the method of Harbour et al, it is also found to be scheduling by the proposed method. A simulation is used ti compare two methods and the result shows the maximum of 45% difference between them in their effectiveness.

  • PDF

CPLD Low Power Technology Mapping for Reuse Module Design under the Time Constraint (시간제약 조건하에서 재사용 모듈 설계를 통한 CPLD 저전력 기술 매핑)

  • Kang, Kyung Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.77-83
    • /
    • 2008
  • In this paper, CPLD low power technology mapping for reuse module design under the time constraint is proposed. Traditional high-level synthesis do not allow reuse of complex, realistic datapath component during the task of scheduling. On the other hand, the proposed algorithm is able to approach a productivity of the design the low power to reuse which given a library of user-defined datapath component and to share of resource sharing on the switching activity in a shared resource. Also, we are obtainable the optimal the scheduling result in experimental results of our using chaining and multi-cycling in the scheduling techniques. Low power circuit make using CPLD technology mapping algorithm for selection reuse module by scheduling.

Markov Chain based Packet Scheduling in Wireless Heterogeneous Networks

  • Mansouri, Wahida Ali;Othman, Salwa Hamda;Asklany, Somia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.1-8
    • /
    • 2022
  • Supporting real-time flows with delay and throughput constraints is an important challenge for future wireless networks. In this paper, we develop an optimal scheduling scheme to optimally choose the packets to transmit. The optimal transmission strategy is based on an observable Markov decision process. The novelty of the work focuses on a priority-based probabilistic packet scheduling strategy for efficient packet transmission. This helps in providing guaranteed services to real time traffic in Heterogeneous Wireless Networks. The proposed scheduling mechanism is able to optimize the desired performance. The proposed scheduler improves the overall end-to-end delay, decreases the packet loss ratio, and reduces blocking probability even in the case of congested network.

Heuristic Approach for Lot Sizing and Scheduling Problem with State Dependent Setup Time

  • Han, Jung-Hee
    • Industrial Engineering and Management Systems
    • /
    • v.10 no.1
    • /
    • pp.74-83
    • /
    • 2011
  • In this paper, we consider a new lot-sizing and scheduling problem (LSSP) that minimizes the sum of production cost, setup cost and inventory cost. Setup carry-over, setup overlapping, state dependent setup time as well as demand splitting are considered. For this LSSP, we develop a mixed integer programming (MIP) model, of which the size does not increase even if we divide a time period into a number of micro time periods. Also, we develop an efficient heuristic algorithm by combining a decomposition scheme with a local search procedure. Test results show that the developed heuristic algorithm finds a good quality (in practice, even better) feasible solution using far less computation time compared with the CPLEX, a competitive MIP solver.

Stability and a scheduling method for network-based control systems (네트워크를 이용한 제어 시스템의 안정도 및 스케줄링에 관한 연구)

  • 김용호;권욱현;박홍성
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1432-1435
    • /
    • 1996
  • This paper obtains maximum allowable delay bounds for stability of network-based control systems and presents a network scheduling method which makes the network-induced delay be less than the maximum allowable delay bound. The maximum allowable delay bounds are obtained using the Lyapunov theorem. Using the network scheduling method, the bandwidth of a network can be allocated to each node and the sampling period of each sensor and controller can be determined. The presented method can handle three kinds of data (periodic, real-time asynchronous, and non real-time asynchronous data) and guarantee real-time transmissions of real-time synchronous data and periodic data, and possible transmissions of non real-time asynchronous data. The proposed method is shown to be useful by examples in two types of network protocols such as the token control and the central control.

  • PDF

Kernel Thread Scheduling in Real-Time Linux for Wearable Computers

  • Kang, Dong-Wook;Lee, Woo-Joong;Park, Chan-Ik
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.270-280
    • /
    • 2007
  • In Linux, real-time tasks are supported by separating real-time task priorities from non-real-time task priorities. However, this separation of priority ranges may not be effective when real-time tasks make the system calls that are taken care of by the kernel threads. Thus, Linux is considered a soft real-time system. Moreover, kernel threads are configured to have static priorities for throughputs. The static assignment of priorities to kernel threads causes trouble for real-time tasks when real-time tasks require kernel threads to be invoked to handle the system calls because kernel threads do not discriminate between real-time and non-real-time tasks. We present a dynamic kernel thread scheduling mechanism with weighted average priority inheritance protocol (PIP), a variation of the PIP. The scheduling algorithm assigns proper priorities to kernel threads at runtime by monitoring the activities of user-level real-time tasks. Experimental results show that the algorithms can greatly improve the unexpected execution latency of real-time tasks.

  • PDF

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.