• Title/Summary/Keyword: information priority

Search Result 2,401, Processing Time 0.032 seconds

A New Backoff algorithm considering Hop Count for the IEEE 802.11 Distributed Coordination Function

  • Nam, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.205-208
    • /
    • 2007
  • The IEEE 802.11 is a MAC protocol which has been standardized by IEEE for Wireless Local Area Networks (WLANs). In the IEEE 802.11 WLANs, network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. However, the BEB scheme suffers from a fairness problem; some nodes can achieve significantly larger throughput than others. This paper proposes a new backoff algorithm for the IEEE 802.11 DCF scheme. This algorithm uses the hop count for considering fairness. It causes flows with high hop count to generate short backoff interval than those with low hop count, thus getting high priority. Therefore, when a collision occurs, the modified IEEE 802.11 DCF assigns higher priority to flow to be close to a destination.

Software structure design for processing various tactical data

  • Kim, Jin Woo;Lee, Woo Sin;Lee, Seung Chan;Kim, Young Don;Jin, So Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.39-47
    • /
    • 2017
  • In this paper, we propose a message transmission processing structure for efficient use of radio resources. Existing tactical data links have more data and accumulate more data than the amount of tactical data planned according to the situation. This may result in delays in operations and additional problems. To prevent this, priority is assigned to the message and transmission is performed according to the priority on a single basis. And we design a processing structure that can update duplicate messages and delete old messages in order to prevent waste of radio resources. Experiments are conducted to verify that these structures can be implemented and applied to data links.

A Decision Model for Information Systems Outsourcing Using AHP (AHP를 이용한 정보시스템 아웃소싱 의사결정모형)

  • 우태희;임충묵
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2003.05a
    • /
    • pp.37-42
    • /
    • 2003
  • Recently, information systems(IS) outsourcing has become a very important management strategy of implementing IS and many studies on the IS outsourcing approach had been largely performed in the organizations, but it isn't still show how to outsource the IS functions and how to decide quantitative magnitude for judgement. To offer a quantitative decision model that can help practitioners set priority and reap the most benefits from outsourcing, we show outsourcing structure including 3 factors(strategic benefit, economic benefit and technological benefit) and sub-levels which. is different from the Yang and Huang's model. Also, we compute the weight of alternatives using analytic hierarchy process to find a priority of the IS outsourcing. As a result of analysis, we suggest systematic steps and quantitative model to increase the precision of decision making.

  • PDF

A Study on the Health Policy Issues of Telemedicine Problem in Korean

  • Jeun, Young-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.151-156
    • /
    • 2015
  • Recently, the government tends to address the health policy as an economic logic. However, health policy must be priority to national health right than economic logic. Thus, in this paper analyzes the problems of telemedicine for telemedicine that are at issue in South Korea, based on this, and presents reasonable health policy directions for telemedicine. To amend the law and legislation the health policy and law, analyze the rationality, feasibility of law and sufficient review should be implemented. Comparing to the foreign which introduced telemedicine earlier, discussion on telemedicine in South Korea remains a long way to go and it is now beginning step. Therefore, it should not forget that the health policy of the government with crass insensitivity can bring great disaster. Above all, to the health care, the sufficient review and social consensus which can reduce the side-effects are priority.

A Medium Access Control Protocol for rt- VBR Traffic in Wireless ATM Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • This paper proposes a MAC protocol for real-time VBR (rt-VBR) services in wireless ATM networks. The proposed protocol is characterized by a contention-based mechanism of the reservation request, a contention-free polling scheme for transferring the dynamic parameters, and a priority scheme of the slot allocation. The design objective of the proposed protocol is to guarantee the real-time constraint of rt-VBR traffic. The scheduling algorithm uses a priority scheme based on the maximum cell transfer delay parameter. The wireless terminal establishes an rt-VBR connection to the base station with a contention-based scheme. The base station scheduler allocates a dynamic parameter minislot to the wireless terminal for transferring the residual lifetime and the number of requesting slots as the dynamic parameters. Based on the received dynamic parameters, the scheduler allocates the uplink slots to the wireless terminal with the most stringent delay requirement. The simulation results show that the proposed protocol can guarantee the delay constraint of rt-VBR services along with its cell loss rate significantly reduced.

A Study on Algorithm for Selection Priority of Contents in Social Network Service (소셜 네트워크 서비스에서 콘텐츠 우선순위 선정을 위한 알고리즘 연구)

  • Kim, Yu-Doo;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.753-754
    • /
    • 2011
  • SNS(Social Network Service) is not provider-oriented service unlike the existing internet communication services. So contents produced by SNS are rapidly increase. In this paper, we analyze the algorithm for selection priority of contents.

  • PDF

Optimal Offset-Time Decision for QoS in Optical Burst Switching Networks

  • Kim, Sung-Chang;Choi, Jin-Seek;Yoon, Bin-Yeong;Kang, Min-Ho
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.312-318
    • /
    • 2007
  • In this paper, we propose the optimal offset-time decision (OOD) algorithm which can effectively reduce the pre-transmission delay compared to the perfect isolation model, and can also be extended to general n priority classes while the target loss probability of each class is guaranteed for the variable offered load. In order to drive the OOD algorithm, we first analyze the loss probability of each priority class through class aggregation and iteration method; the analytic results obtained through the proposed algorithm are then validated with results garnered from extensive simulation tests.

The Design and Implementation of Advanced MuTexS For Minimizing Priority Inversion Time In uCOS (우선순위 역전시간 최소화를 위한 uCOS 에서의 확장 MuTexS 설계 및 구현)

  • Lee, Jae-Ho;Kim, Heung-Nam;Kim, Sun-Ja
    • Annual Conference of KIPS
    • /
    • 2001.10a
    • /
    • pp.659-662
    • /
    • 2001
  • 본 논문은 실시간 운영체제에서 높은 우선순위를 가지는 태스크가 낮은 우선순위를 가지는 태스크가 사용중인 공유자원을 기다리는 과정에서 발생하는 우선순위 역전현상을 해결하기 위한 효과적인 방법에 대해 언급한다. 우선순위 역전현상은 실시간 운영체제의 주요 특징인 태스크 수행 완료의 바운드 타임을 예측하기 어렵게 만들어 실시간 운영체제를 사용하는 가장 큰 목적인 결정성(determinism)을 보장 받지 못하게 된다. 이를 해결하기 위해 논문에서 구현된 커널은 비교적 크기가 작으면서도 실시간 운영체제의 핵심적 특징을 잘 갖추고 있는 uCOS(Micro C/OS) 커널을 사용하였으나, 유일한 우선순위만을 갖는 uCOS의 제약사항을 보완하고 Priority Inheritance protocol을 이용한 MuTexS (Mutual Exclusion Semaphore)를 구현 하기위해 커널의 자료구조를 확장하여 수정된 스케줄링 방식을 사용하였다.

  • PDF

A Risk Metric for Failure Cause in FMEA under Time-Dependent Failure Occurrence and Detection (FMEA에서 고장발생 및 탐지시간을 고려한 고장원인의 위험평가 척도)

  • Kwon, Hyuck Moo;Hong, Sung Hoon;Lee, Min Koo
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.3
    • /
    • pp.571-582
    • /
    • 2019
  • Purpose: To develop a risk metric for failure cause that can help determine the action priority of each failure cause in FMEA considering time sequence of cause- failure- detection. Methods: Assuming a quadratic loss function the unfulfilled mission period, a risk metric is obtained by deriving the failure time distribution. Results: The proposed risk metric has some reasonable properties for evaluating risk accompanied with a failure cause. Conclusion: The study may be applied to determining action priorities among all the failure causes in the FMEA sheet, requiring further studies for general situation of failure process.

The Needs Analysis of Software Safety Education Program for Common Competency Area

  • Kang, Ji-Woon;Do, Sung-Ryong
    • Journal of Information Processing Systems
    • /
    • v.17 no.5
    • /
    • pp.960-971
    • /
    • 2021
  • As the era of the 4th Industrial Revolution enters, the importance of software safety is increasing, but related systematic educational curriculum and trained professional engineers are insufficient. The purpose of this research is to propose the high priority elements for the software safety education program through needs analysis. For this purpose, 74 candidate elements of software safety education program were derived through contents analysis of literature and nominal group technique (NGT) process with five software safety professionals from various industries in South Korea. Targeting potential education participants including industrial workers and students, an on-line survey was conducted to measure the current and required level of each element. Using descriptive statistics, t-test, Borich needs assessment and Locus for focus model, 16 high priority elements were derived for software safety education program. Based on the results, suggestions were made to develop a more effective education program for software safety education.