• Title/Summary/Keyword: 프로세스 우선순위

Search Result 130, Processing Time 0.028 seconds

Real-Time Communication System Performance Optimization Using Task Priority Reassignment Scheme (타스크 우선 순위 재배치를 이용한 실시간 통신 시스템의 성능 향상)

  • 이주영;김대웅
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.11a
    • /
    • pp.329-332
    • /
    • 1998
  • 실시간 통신 시스템은 서로 떨어져 있는 시스템간에 통신 매체를 통하여 호스트와 사용자 단말간에 통신을 수행하므로 종단간의 데이터 패킷 전달 시 보장된 응답시간 특성이 요구된다. 원격 액세스 서비스의 경우 여러 개의 채널에 대한 공평한 대역 서비스의 제공을 위해서 시스템 내부에서 각 채널에 대하여 균등하고 신속한 처리가 필요하다. 본 논문에서는 실시간 통신시스템의 대역 보장과 처리속도 향상을 위하여 전형적인 시스템을 모델링하고, 다양한 타스크 우선 순위 할당 방법을 적용하여 성능을 비교한다 비 주기적인 특성을 가지는 프로세스의 우선 순위 할당은 Rate Monotonic 방법보다는 메시지 흐름에 따른 우선순위 할당 방법이 더 나은 성능을 보인다.

  • PDF

A study on prioritizing the application areas for business development of IoT(Internet of Things) (사물 인터넷의 사업화 영역에 대한 우선순위 선정에 관한 연구)

  • Moon, Tae Hee;Kim, Taehoon;Ahn, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.183-195
    • /
    • 2014
  • This study aims at identifying and prioritizing the application areas for business development of IoT(Internet of Things). In specific, we collected the opinions of the experts on IoT in Korea through the survey based on pairwise comparison, and then we analyzed them using AHP(analytic hierarchy process). As a result, we found that 'Public Safety & Security', 'Automotive & Transportation', and 'Utility & Energy' are the most promising area in realizing IoT-related businesses. Also, we found that the experts had different views according to the positions of their industry in IoT value chain. The analysis showed that the device industry prioritizes 'Public Safety & Security', whereas the network industry does 'Automotive & Transportation'. The experts from the service industry were found to regard 'Utility and Energy' as the most promising commercialization area of IoT.

A Study on Priority Decision Method of Required Capability for North West Islands (서북도서에 대한 요구능력 우선순위 결정방법에 관한 연구)

  • Jang, Dong Mo;Lim, Gye Hwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.45-56
    • /
    • 2013
  • In order to prepare against the unpredictable provocation of nK on NWI, instead of the threat based force enhancement, sufficient capability based force planning is required in consideration to enemy capability, operations environment, and technological development. This thesis proposes a method on how to prioritize the required capabilities of NWI during the process of identifying capabilities and investing on the decided acquisition assets. Ambiguity in deciding the priority is eliminated and detailed planning is possible through instituting relationship of organization, operation and capability, and by designating weight based on the above relationship. This method identify the various operations and required capabilities, classify the order of priority clearly for NWI, when compare to other method of priority decision. Although capability based force planning requires more assets and faces limitations due to budget, this method will provide and efficient decision making procedure through precise prioritization.

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.

Use Case Oriented Requirements Engineering for improving the previous ViRE's Process (기존 ViRE 프로세스 개선을 위한 Use Case 지향 요구공학)

  • Park, Bokyung;Moon, Soyoung;Kim, Kidu;Kim, Boyeon;Kim, R. Youngchul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1497-1499
    • /
    • 2012
  • 전통적인 소프트웨어 개발에서는 초기 요구사항을 정확히 판단하고 분석하는 것이 중요하다. 이를 위해 B.Boehm은 가치혁신 요구공학을 제안하지만, 이는 기존의 개발 방법 기반이다. 본 논문에서는 가치 혁신 요구공학 개선을 위해, 유스케이스 기반의 요구공학 방법을 제시와, 요구사항과 유스케이스의 우선순위 도출 방법을 제안한다. 이를 위해 어려운 시스템 요소(하드웨어와 소프트웨어)를 기본 단위인 유스케이스 요소와, 유스케이스 점수(Use Case Point) 개념을 적용하여 유스케이스 중요도를 도출한다. 그 기본 단위 내의 분석을 통해 쉽게 요구사항 추출 및 우선순위화를 한다. 이는 테스트 단계에서 우선순위화된 테스트 케이스를 적용이 가능한다고 본다.

Priority- and Budget-Based Protocol Processing Using The Bottom-Half Mechanism for End-to-End QoS Support (종단간 QoS 지원을 위해 Bottom-half 메커니즘을 이용한 우선순위 및 예산 기반의 네트워크 프로토콜 처리)

  • Kim, Ji-Min;Ryu, Min-Soo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.189-198
    • /
    • 2009
  • The traditional interrupt-based protocol processing at end hosts has two priority-inversion problems. First, low-priority packets may interrupt and delay high-priority process executionssince interrupts have the highest priority in most operating systems. Second, low-priority packet may delay high priority packets when they arrive almost simultaneously since interrupt processing is performed in a FCFS (first come, first served) order. These problems can be solved by a priority-based protocol processing policy and implementation. However, general priority-based schemes commonly have the problem of starvation and cannot support the each network flow requiring the mutually exclusive QoS since the packets are processed in the FCFS order. Therefore, the priority-based schemes are not appropriate for different QoS-demanding applications. In this paper, we present a bottom-half-based approach that relies on priority- and budget-based processing. The proposed approach allows us to solve both the starvation and priority-inversion problems, and further enables effective QoS isolation between different network connections. This feature also enables bounding the protocol processing time at an end host. We finally show through experiments that the proposed approach achieves QoS isolation and control.

A Study on the Priorities of Key Performance Indicators for Efficient Business Process Management of Small and Medium Enterprises (중소협력업체의 효율적 비즈니스 프로세스 관리를 위한 핵심성과지표 우선순위에 대한 연구)

  • Hong, Jung-Wan;Moon, Sung-Hyun;Lee, Young-Han;Kim, Hoon-Tae
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.321-334
    • /
    • 2011
  • As Small and Medium Enterprises(SMEs)' dependency on major companies is increasing every day, the importance of the IT collaboration between those is being highlighted more than ever. However, the information level of the SMEs is much inferior and lack of capital, low level of management and the problem of the informatization are being raised. Therefore, the methods to improve the level of the infrastructure for the informatization need to be performed based on the current status of the SMEs. In this paper, we proposed the ways to manage key performance indicators(KPI) of each business process by inducing and prioritizing the KPIs which has higher accomplishment compared to its management rate. As the result of the present study reflects the priorities of KPIs, it may contribute to the accomplishment of the efficient informatization that considers the enterprise's size.

Implementation of a general purpose embedded computer system (범용 내장형 컴퓨터 시스템의 구현)

  • Jang, Wee-Sik;Cho, Byeong-Heon;Sung, Yeong-Rak;Oh, Ha-Ryoung
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.503-510
    • /
    • 2002
  • In this paper, a general purpose embedded computer system is designed and implemented. The most crucial points of the system are extensibility and flexibility. The hardware of the developed system is composed of three modules and the software provides hardware independent application program interfaces. Moreover, uC/OS-II, a well-known open realtime kernel. is extended and ported onto the system. The extended uC/OS-II supports that multiple processes can have the same priority and such processes are scheduled in a round-robin manner.

Decision Criterion in Military Apartment Remodeling Project (군인아파트 리모델링에 있어서 항목별 우선순위 결정에 관한 연구)

  • Ryu Kuk-Mu;Kim Gil-Su;Shin Chang-Hyun;Jung Yong- Sik;Chun Jae-You
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.277-280
    • /
    • 2004
  • Since the beginning of our military history, we are continuously interested in supplying apartment for military officers. So we possessed 72,361 households and used in 2002 however, $18\%$ of those are over 20years and need to be remodeled Department of Military has taken this fact seriously To solve the problems, they built more new buildings, rent public buildings and remodeled the old one But, The procedure of present military apartment remodeling has many problems at the stage of evaluating the priorities in various remodeling projects which have been caused from lots of corps. I've reviewed the study of military apartment business and applied the AHP(Analytic Hierarchy Process) method which is effective to evaluate the priority in various groups' decision.

  • PDF

Risk analysis using PCD result and cost driver of COCOMOII (COCOMOII의 cost driver를 이용한 PCD결과의 위험분석)

  • 박지협;이은서;장윤정;이경환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.10-12
    • /
    • 2002
  • 본 논문에서는 신뢰성 있는 소프트웨어 개발을 위한 위험분석 방법을 모색한다. 기존의 프로세스 능력 결정(PCD: Process Capability Determination)결과의 차이를 이용한 전체 위험결정 방법의 취약점을 보안하기 위해 MBASE(COCOMOII)I에서 제시하는 위험분석 방법을 이용한다. 이 과정에서 필수적으로 수행되어야 할 과제는 레벨의 MP(Management Practice)단위 속성과 cost driver를 매핑함으로써 개별 위험항목(risk item)을 얻는 것이다. SPICE 레벨4 단계를 예로 cost driver를 추출하고 rating 결과를 입력하여 위험요소의 우선순위를 결정하며, 결정된 위험 우선순위에 따라 위험을 제거할 경우 전체 위험이 급격히 감소되어 RE(Risk Exposure) 그래프의 하강 곡선을 따름을 증명하였다. 이러한 산정결과를 통해 레벨에 영향을 미치는 위험 속성 및 위험 제거시 전체위험의 감소율을 예상할 수 있다.

  • PDF