• Title/Summary/Keyword: request rejection

Search Result 14, Processing Time 0.045 seconds

Cultural Self-Orientation and Rejection of Requests (문화성향에 따른 거절 반응과 예측의 차이)

  • Soeun Yim;Hyekyung Park
    • Korean Journal of Culture and Social Issue
    • /
    • v.21 no.2
    • /
    • pp.279-297
    • /
    • 2015
  • The present study examined whether individuals would respond differently, as a function of cultural self-orientations, when their requests were rejected. Also examined was whether individuals with different cultural self-orientations would predict differently how their interaction partner would respond when they rejected his or her request. Furthermore, it was investigated whether experimentally induced perspective-taking would influence responses to rejection and predictions of responses to rejection. It was found that responses to rejection as well as predictions of responses to rejection varied as a function of individual's independent self-orientation and perspective-taking. However, no significant effects were found with regard to interdependent self-orientation. Based on these results, the implications that cultural self-orientations have for request rejection and social behavior in general are discussed, and future directions are suggested.

  • PDF

On the Comparison of Call Overload Control Methodologies in ATM Networks (ATM 통신망에서의 호 과부하 제어방식 비교)

  • Song, Ki-Sang;Lee, Jean
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.168-179
    • /
    • 1996
  • Automatic repeated recalling from individual computing equipments such as PC and workstations, to access ATM networks may result in call overload to networks. Call overload causes to waste network resources and fail to meet user call processing QoS requirements. We evaluate two call connection request methods: the back-off recall method(BRM) which makes recall with random waiting time after rejection, and the direct recall method(DRM) which repeats call connection request whenever call request is rejected. We evaluate their performances by simulation and it shows that as the total number of attached terminals to each access node increases, BRM performs better than DRM in terms of the call acceptance level and effective network bandwidth utilization.

  • PDF

Korean Women's Response Type and Characteristics on Unwanted Sexual Request (원하지 않은 성관계 요구에 대한 한국 여대생의 반응 유형 및 특성)

  • Cho, Jung-Hwa;Song, Wonyoung
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.511-518
    • /
    • 2017
  • The purpose of this study was to investigate the typology of response to unwanted sexual request, and find the characteristics according to the types. For this purpose, 332 college female students were surveyed. As a results, two group were identified through cluster analysis: assertive type and compliant type. Compliant type had more sexual experiences, consensual unwanted sex, reasons for sexual compliance. Furthermore, compliant type had more unstable attachment, rejection sensitivity, and loneliness. Implications related with prevention and education program for the high risk compliant group were discussed and ideas for health, education, psychological experts were suggested.

Performance Improvement on MPLS On-line Routing Algorithm for Dynamic Unbalanced Traffic Load

  • Sa-Ngiamsak, Wisitsak;Sombatsakulkit, Ekanun;Varakulsiripunth, Ruttikorn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1846-1850
    • /
    • 2005
  • This paper presents a constrained-based routing (CBR) algorithm called, Dynamic Possible Path per Link (D-PPL) routing algorithm, for MultiProtocol Label Switching (MPLS) networks. In MPLS on-line routing, future traffics are unknown and network resource is limited. Therefore many routing algorithms such as Minimum Hop Algorithm (MHA), Widest Shortest Path (WSP), Dynamic Link Weight (DLW), Minimum Interference Routing Algorithm (MIRA), Profiled-Based Routing (PBR), Possible Path per Link (PPL) and Residual bandwidth integrated - Possible Path per Link (R-PPL) are proposed in order to improve network throughput and reduce rejection probability. MIRA is the first algorithm that introduces interference level avoidance between source-destination node pairs by integrating topology information or address of source-destination node pairs into the routing calculation. From its results, MIRA improves lower rejection probability performance. Nevertheless, MIRA suffer from its high routing complexity which could be considered as NP-Complete problem. In PBR, complexity of on-line routing is reduced comparing to those of MIRA, because link weights are off-line calculated by statistical profile of history traffics. However, because of dynamic of traffic nature, PBR maybe unsuitable for MPLS on-line routing. Also, both PPL and R-PPL routing algorithm we formerly proposed, are algorithms that achieve reduction of interference level among source-destination node pairs, rejection probability and routing complexity. Again, those previously proposed algorithms do not take into account the dynamic nature of traffic load. In fact, future traffics are unknown, but, amount of previous traffic over link can be measured. Therefore, this is the motivation of our proposed algorithm, the D-PPL. The D-PPL algorithm is improved based on the R-PPL routing algorithm by integrating traffic-per-link parameters. The parameters are periodically updated and are dynamically changed depended on current incoming traffic. The D-PPL tries to reserve residual bandwidth to service future request by avoid routing through those high traffic-per-link parameters. We have developed extensive MATLAB simulator to evaluate performance of the D-PPL. From simulation results, the D-PPL improves performance of MPLS on-line routing in terms of rejection probability and total throughput.

  • PDF

ARCA-An Adaptive Routing Protocol for Converged Ad-Hoc and Cellular Networks

  • Wu, Yumin;Yang, Kun;Chen, Hsiao-Hwa
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.422-431
    • /
    • 2006
  • This paper proposes an adaptive routing protocol called ARCA for converged ad-hoc and cellular network (CACN). Due to the limitation of both bandwidth and transmission range in a cell, a mobile host (MH) may not be able to make a call during busy time. CACN offers a flexible traffic diversion mechanism that allows a MH to use the bandwidth in another cell to ease the congestion problem and increase the throughput in a cellular network. Based on the presentation of CACN's physical characteristics, the paper details the design issues and operation of the adaptive routing protocol for CACN (ARCA). Detailed numerical analysis is presented in terms of both route request rejection rate and routing overhead, which, along with the simulation results, have indicated the effectiveness and efficiency of the ARCA protocol.

A Study on Lawsuit Cases and Measures of Emergency Medical Service (응급의료서비스 중 발생되는 소송사례와 대책 연구)

  • Kwon, Hay-Ran
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.77-90
    • /
    • 2009
  • Civil complaints and lawsuits filed in the process of providing emergency medical service include fall accident on the way of carrying the patient, transfer consent, refusal and rejection of rescue request, range and behavior restriction of emergency medical technicians, false registry of logbook, neglect of duty and emergency patient, and violation of traffic laws on the way of dispatch to the scene of accident. This study suggested the measures by cases as follows. 1. The accidents on the way of carrying a patient could be divided into fall of patient and fall by paramedic's mistake. In the former case, damages caused by the ambulance's shaking must be notified to the patient and guardian and recommended to fasten seat belt, in the latter case, the plan of patient's posture, route of transport, rescue and equipments should be comfirmed before fixing the patient. 2. Transfer consent must be made as implied when the patient is unconscious under delusion and was not able to consent physically, and paramedic must take an action by his judgment and record details of services on logbook. 3. When a patient refused to transfer, get 'confirmation of transfer refusal' and inform him of refusal. Paramedic should receive the signature. In addition, in case of refusal, transfer request should be made after hearing doctor's opinion and it should be notified to transfer request and superintendent of fire station after making 'confirmation of transfer refusal'. 4. Emergency medical technicians should perform their duties within the range of services prescribed by Article 41 of Law of Emergency Medical Service and Article 33 of Its Enforcement Regulations and shall not make announcement of death. In case of reporting the death to guardian, it is desirable to use record data like ECG results. 5. The best way to have protection from legal problems is making and keeping the exact records of accident and patient. Paramedic should not mention his subjective opinion about the accident-related matter. He must record correctly and keep the original medical records. 6. As emergency medical technicians are responsible for taking care of emergency patients, they must contact a briefing room when they meet a difficult situation suddenly due to vehicle stop or treatment of other patients and then must have support from neighboring hospital and other safety centers. 7. Since the ambulance operator is responsible for safety and careful driving of ambulance, he must be careful when he violates traffic regulations unavoidably. The operator should drive slowly below 10km/h at an intersection and pass it after getting way from general vehicles driving from all directions.

  • PDF

A Study on Agent Communication Languages for Computational Logic - based Agents (계산논리 기반 에이전트를 위한 에이전트 통신언어에 관한 연구)

  • 이명진;한현관
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.3
    • /
    • pp.363-370
    • /
    • 2004
  • The FIPA community is developing a range of agent-related standards, of which the centerpiece is an Agent Communication Language (ACL). This language includes a number of communicative acts explicitly intended to support negotiation. In this paper, we consider a multi-agent environment that exchanges the resources for achieving agents' goals, represent agents as computational logic-based formalizations, and describe a simple ACL for negotiation using logic-based agents. In particular, we introduce and compare some communication acts that enable counter-agents to know the reason of request(proposal) or the reason of rejection(refusal).

  • PDF

The Role of Geological and Geomorphological Factors in the Delimitation of Maritime Boundaries (해양경계획정에서 지질 및 지형적 요소의 효과에 관한 고찰)

  • Yang, Hee-Cheol;Park, Seong-Wook;Jeong, Hyeon-Su;Yi, Hi-Il
    • Ocean and Polar Research
    • /
    • v.29 no.1
    • /
    • pp.55-67
    • /
    • 2007
  • A reference to natural prolongation appeared for the first time in the North Sea Judgement. Although it was not suggested that the concept of natural prolongation would automatically allow for the fixing of a continental shelf boundary, that concept encouraged States to request international tribunals to determine continental shelf boundaries on the basis of the geological and geomorphological features of the seabed. In the Libya v. Malta Case, however, the rejection of geological and geomorphological factors was total. Especially, Natural prolongation was the then checkmated as a relevant fact in delimitation between coasts situated less than 400 nm. apart. There can be no doubt that, in several disputed cases, prominent geomorphological variations are simply ignored ; nevertheless, there are also a few agreements where geological and geomorphological characteristics come into play and, to a certain extent, affect maritime boundaries. Physical characteristics of sea-bed are generally given serious consideration in the boundary delimitation such as the final negotiated boundary of the Australia-Indonesia Continental Shelf boundary Agreement(Timor and Arafura seas) which follows the continental slope bordering the Timor Trench.

A Study for International Standardization of China Arbitration System (중국중재제도의 국제표준화에 대한 연구)

  • Kim, Suk-Chul
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.117-138
    • /
    • 2008
  • This study lies on building the International Standardization of China Arbitration System for improving a relationship of mutual trust and the safety trade between China and other worldwide countries, especially, South Korea as their one of the biggest trading partners through the comparative analysis of China and UNCITRAL Arbitration Law. In this analysis, the differences from China and UNCITRAL in arbitration law are like belows ; lack of arbitrator's international mind, the limitation of private property right, prohibition of Ad. hoc arbitration, arbitrator's biased nationalism, localism, and their short specialties. a deficiency of the objectiveness for arbitrator's election, a judgement rejection of claimants by using nonattendance and walkout, impossibility of prior and temporary property custody for execution of arbitration award. etc. For the improvement of the International Standardization of China Arbitration, this paper propose as follows: 1) Extension of private property right, reorganization of tax system, realization of open competition, exclusion of 'Sinocentrism', globalization of arbitration system 2) The abolition of old fashioned bureaucracy with approval for ad.hoc arbitration 3) An education for arbitrator's internationalization, specialty, and to promote legal knowledge 4) A settlement of the third country arbitrators' selection for reflecting interested party's decision by the court in a selection system of arbitration committee. 5) Institutionalization of arbitration judgment that prevent for claimant's avoidance by using a withdrawal and an intentional absent 6) A permission of the right of claimant's court custody directly before the begging of arbitration request for the prevention for destruction of evidence and property concealment 7) Grant of the arbitration tribunal's interim measures of protection for private property preservation to the third party, proof security, prevention from the loss that selling the corruptible goods 8) Improvement of arbitration's efficiency from the exclusion of the obstacles that are forgery, concealed evidence, and arbitrator's bribe taking Lastly, I hope that this study will serve to promote friendly economic relationship between China and South Korea and strive for international equilibrium through the achievement of China Arbitration's International Standardization. I will finish this paper with a firm belief that this will lead to more advanced studies.

  • PDF

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF