• Title/Summary/Keyword: information priority

Search Result 2,401, Processing Time 0.039 seconds

Applying Distributed-System Considering Processing Priority Algorithm to Real-Time Statistical Process Control System (통계적 품질관리 시스템 구축에 있어서의 우선순위를 고려한 분산처리 시스템 알고리즘의 적용)

  • 이상혁;이홍철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04b
    • /
    • pp.286-288
    • /
    • 2002
  • 본 연구에서는 자동화된 부품생산 공장에서의 실시간 통계적 공정관리 시스템의 구축사례를 소개하고, 생산현장에서 지속적으로 올라오는 많은 양의 품질정보를 실시간으로 처리하기 위해 적용된 우선순위를 고려한 분산처리방식을 응용한 알고리즘을 제시한다.

  • PDF

Analyzing the Importance and Priority of Safety Information in Walking Tourism: Focusing on Open Data Utilization (도보여행 안전정보의 유형별 중요도 및 우선순위 도출: 오픈데이터 활용을 중심으로)

  • Ham, Juyeon;Choi, Sujeong;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.59-77
    • /
    • 2018
  • The tourism industry is now changing to smart tourism, which maximizes tourists' overall tourism experience with the use of advanced mobile technologies and emphasizes the utilization of tourism information. Despite the quantitative expansion of the tourism industry, there is a lack of academic and practical discussion on tourism safety. Especially, in the context of walking tourism, tourists are more likely to be exposed to natural or social disasters and emergencies. Therefore, it is necessary to build a system that can provide walking tourists with safety information not only on dangerous factors which are anticipated to be confronted during a walking trip in advance but also on specific dangers in real time. Under the circumstances, this study seeks to identify the types of tourism safety information that can be offered by using publicly available open data, drawing on the safety information framework on the walking tourism that is presented in Choi et al. (2017)'s study. More specifically, this study focuses on the use of open data which is provided by the Korean government. Furthermore, this study verifies the types of safety information that are most urgently needed in walking travel situations. Specifically, this study aims to derive the importance and priority of each type of safety information for a walking trip by applying the analytic hierarchy process (AHP) analysis. For this, we collected 35 questionnaires from walking tour operators (practitioners) and walking tourists. The main results are as follows. First, natural disaster information is the most important factor in the top-level factor of safety information for walking tourists, followed by social disaster, life safety, and exhibition (security crisis) information. Second, information on natural disasters, environmental pollution, and weather is considered to be important at the sub-level factor. Lastly, the noteworthy result of this study is that the importance of each type of safety information varies depending on the walking tour operators (practitioners) and the walking tourists. That is, there is a recognition difference between the operator (practitioner) and the user in the importance and priority of the safety information of the walking trip. Therefore, it is necessary to develop policies and services reflecting the opinions of potential users when providing safety information so that the most importantly recognized information can be provided first.

A Study on the Change of Traffic Accidents Around the Pedestrian Priority Zone (보행자 우선도로 개선 사업으로 인한 교통사고 변화에 대한 연구)

  • JANG, Jae-Min;LEE, Young-Ihn;KIM, Sukhee;CHOI, Hoi-Kyun
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.2
    • /
    • pp.112-128
    • /
    • 2018
  • We are implementing pedestrian priority zone policy to certain districts to reduce greenhouse gas and to develop eco-friendly city which has more focus on pedestrians' walking environment. This policy has contributed to citizens' satisfaction level with improved public transportation service as well as more spacious streets for walk. Despite highly positive influence of pedestrian priority zone policy to the walking environment, we need to anticipate the impact of this to traffic environment as it may have bad effect to the overall traffic flow around the zone where the policy is implemented. This research has analyzed the change of characteristics of traffic accidents around the eco-traffic area of Hang-Gung dong, Suwon city, to understand impact of the pedestrian priority zone policy to the traffic surroundings, with pre-post analysis methodology. As a result, number of accidents related to pedestrians showed decrease as pedestrian priority zone is designed operated with focus to pedestrians. But accidents related illegal U-turn and violation of the traffic signal showed (significant) increase as there was a restriction of turns and decrease of overall traffic speed. To prevent the accidents above, we need to notice drivers to pay special attention before the pedestrian priority zone event, and information from this research should be given to the drivers through safety signs and mobile application at the place near to the event.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Comparison and Analysis of Cycling Packet Drop Algorithms and RIO as Packet Drop for the Congestion Control (혼잡제어용 패킷 폐기를 위한 사이클링 패킷 폐기 기법과 RIO 알고리즘의 비교 분석)

  • Kim, Su-Yeon;Gang, Hyeon-Guk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.2
    • /
    • pp.59-68
    • /
    • 2002
  • In this paper, we compared and analyzed two new models of cyclic packet dropping algorithm, Adaptive Cyclic Packet Dropping algorithm (ACPD), and Non-adaptive Cyclic Packet Dropping algorithm (NCPD) with RIO. The ACPD algorithm drops adaptively packets for the congestion control, as predicting traffic pattern between each cycle. Therefore the ACPD algorithm makes up for the drawback of RIO algorithm and minimizes the wastes of the bandwidth being capable of predicting in the NCPD algorithm. We modelled two cyclic packet drop algorithms and executed a simulation and analyzed the throughput and packet drop rate based on Sending Priority changing dynamically depending on network traffic. In this algorithm, applying the strict drop precedence policy, we get better performance on priority levels. The results show that two new algorithms may provide more efficient and stricter drop precedence policy as compared to RIO independent of traffic load. The ACPD algorithm can provide better performance on priority levels and keep stricter drop policy than other algorithms.

An Integrated Scheduling Approach for Real-Time Web Servers (실시간 웹서버 시스템을 위한 통합 스케줄링 방안)

  • Kang, Bong-Jik;Jung, Suk-Yong;Lee, Hyun-Suk;Choe, Gyeong-Hui;Jeong, Gi-Hyeon;Yu, Hae-Yeong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.39 no.6
    • /
    • pp.36-46
    • /
    • 2002
  • This paper proposes an integrated scheduling mechanism for embedded system with real-time web server to meet the characteristics of real time task. The proposed scheduling mechanism may solve the so-called priority inversion problem in scheduling between urgent web requests and tasks with low priorities. The priority inversion problem happens because of operating two independent schedulers, web scheduler and operating system scheduler in a system without considering the requirements of each other. In the proposed mechanism, two schedulers are integrated in an operating system and the integrated scheduler schedules tasks for urgent web requests with real time characteristics and other application tasks together. Since all tasks are scheduled by one unified scheduler that knows the characteristics of tasks, the tasks are scheduled with their absolute priorities and thus the priority inversion problem can be eliminated. The performance is measured on a prototype embedded system with the proposed algorithm.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

Estimating User Utility Functions for Network-Resource Pricing (네트워크 자원 가격정책을 위한 사용자 유틸리티 함수 추정법)

  • Park, Sun-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.103-112
    • /
    • 2006
  • Priority-based network service has been widely adopted for the Internet traffic management in the context of IETF differentiated services, and computing optimal prices for such priority-based service is the key topic in many pricing literature. While the equilibrium analysis has been commonly used to this end, many have criticized the validity of the underlying assumption of equilibrium analysis that user utility functions are precisely known. In this paper, we propose a solution for bridging the gap between the existing theoretical work on optimal pricing and the unavailability of precise user utility information in real networks. In the proposed method, the service provider obtains more and more accurate estimates of user utility functions from the initial imprecise knowledge by iteratively changing the price of service levels and observing the users' decisions under the changed price. Our contribution is two-fold. First, we have developed a general principle for estimating the user utility functions. Second, we have developed a novel method for setting the prices that can optimize the extraction of the knowledge about user utility functions. The extensive simulation results demonstrate the effectiveness of our method.

A mobile data caching synchronization strategy based on in-demand replacement priority (수요에 따른 교체 우선 순위 기반 모바일 데이터베이스 캐쉬 동기화 정책)

  • Zhao, Jinhua;Xia, Ying;Lee, Soon-Jo;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • Mobile data caching is usually used as an effective way to improve the speed of local transaction processing and reduce server load. In mobile database environment, due to its characters - low bandwidth, excessive latency and intermittent network, caching is especially crucial. A lot of mobile data caching strategies have been proposed to handle these problems over the last few years. However, with smart phone widely application these approaches cannot support vast data requirements efficiently. In this paper, to make full use of cache data, lower wireless transmission quantity and raise transaction success rate, we design a new mobile data caching synchronization strategy based on in-demand and replacement priority. We experimentally verify that our techniques significantly reduce quantity of wireless transmission and improve transaction success rate, especially when mobile client request a large amount of data.