• Title/Summary/Keyword: Blocking-After-Service

Search Result 18, Processing Time 0.028 seconds

Spreadsheet Model Approach for Buffer-Sharing Fork-Join Production Systems with General Processing Times and Structure (일반 공정시간과 구조를 갖는 버퍼 공유 분기-접합 생산시스템의 스프레드시트 모형 분석)

  • Seo, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.3
    • /
    • pp.65-74
    • /
    • 2019
  • For many years, it has been widely studied on fork-join production systems but there is not much literature focusing on the finite buffer(s) of either individuals or shared, and generally distributed processing times. Usually, it is difficult to handle finite buffer(s) through a standard queueing theoretical approach. In this study, by using the max-plus algebraic approach we studied buffer-shared fork-join production systems with general processing times. However, because it cannot provide proper computational ways for performance measures, we developed simulation models using @RISK software and the expressions derived from max-plus algebra. From the simulation experiments, we compared some properties on waiting time with respect to a buffer capacity under two blocking policies: BBS (Blocking Before Service) and BAS (Blocking After Service).

Spreadsheet Model Approach for Buffer-Sharing Line Production Systems with General Processing Times (일반 공정시간을 갖는 버퍼 공유 라인 생산시스템의 스프레드시트 모형 분석)

  • Seo, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.119-129
    • /
    • 2019
  • Although line production systems with finite buffers have been studied over several decades, except for some special cases there are no explicit expressions for system performances such as waiting times(or response time) and blocking probability. Recently, a max-plus algebraic approach for buffer-sharing systems with constant processing times was introduced and it can lead to analytic expressions for (higher) moment and tail probability of stationary waiting. Theoretically this approach can be applied to general processing times, but it cannot give a proper way for computing performance measures. To this end, in this study we developed simulation models using @RISK software and the expressions derived from max-plus algebra, and computed and compared blocking probability, waiting time (or response time) with respect to two blocking policies: communication(BBS: Blocking Before Service) and production(BAS: Blocking After Service). Moreover, an optimization problem which determines the minimum shared-buffer capacity satisfying a predetermined QoS(quality of service) is also considered.

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

THROUGHPUT ANALYSIS OF TWO-STAGE MANUFACTURING SYSTEMS WITH MERGE AND BLOCKING

  • Shin, Yang Woo;Moon, Dug Hee
    • Journal of applied mathematics & informatics
    • /
    • v.33 no.1_2
    • /
    • pp.77-87
    • /
    • 2015
  • Parallel lines are often used to increase production rate in many manufacturing systems where the main line splits into several lines in parallel, and after some operations, they merge into a main line again. Queueing networks with finite buffers have been widely used for modeling and analyzing manufacturing systems. This paper provides an approximation technique for multi-server two-stage networks with merge configuration and blocking which will be a building block for analysis of general manufacturing systems with parallel lines and merge configuration. The main idea of the method is to decompose the original system into subsystems that have two service stations with multiple servers, two buffers and external arrivals to the second stage are allowed. The subsystems are modeled by level dependent quasi-birth-and-death (LDQBD) process.

Relay Station based Optimal Handoff Prioritization Control Algorithm (Relay Station 기반 최적 핸드오프 우선화 제어 알고리즘)

  • Yu, Hye-In;Kang, Hae-Lynn;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.7
    • /
    • pp.24-31
    • /
    • 2009
  • Resource reservation scheme is an effective method to guarantee QoS for handoff calls in the next generation multimedia mobile communication systems, but it causes negative impacts on blocking probability of new calls. In this paper, to optimize the tradeoff between dropping probability of handoff calls and blocking probability of new calls, relay station based handoff prioritization control algorithm is proposed. In this algorithm, the relay station participates in handoff procedure and enables mobile stations to have guaranteed prompt service after handoff by providing highly efficient data transmission. In this paper, Markov chain models of the proposed handoff prioritization schemes are developed, and dropping probability of handoff packets and blocking probability of new packets are derived. By numerical analysis, the proposed algorithm has been proved to outperform conventional handoff prioritization schemes in terms of dropping probability of handoff packets and blocking Probability of new packets.

Long-Term Monitoring of the Barrier Effect of the Wild Boar Fence

  • Lim, Sang Jin;Kwon, Ji Hyun;Namgung, Hun;Park, Joong Yeol;Kim, Eui Kyeong;Park, Yung Chul
    • Journal of Forest and Environmental Science
    • /
    • v.38 no.2
    • /
    • pp.128-132
    • /
    • 2022
  • Wild boars (Sus scrofa) not only cause crop damage and human casualties, but also facilitate the spread of many infectious diseases in domestic animals and humans. To determine the efficiency of a fencing system in blocking the movement of wild boars, long-term monitoring was performed in a fenced area in Bukhansan National Park using camera traps. Upon monitoring for a period of 46 months, there was a 72.6% reduction in the number of wild boar appearances in the fence-enclosed area, compared to that in the unenclosed area. For 20 months after the fence installation, the blocking effect of the fence was effective enough to reduce the appearance of wild boars by 92.6% in the fence-enclosed area, compared to that in the unenclosed area. The blocking effect of the fence remained effective for 20 months after its installation, after which its effectiveness decreased. Maintaining a fence for a long time is likely to lead to habitat fragmentation. It can also block the movement of other wild animals, including the endangered species - the long-tailed goral. This study suggests a 20-month retention period for the fences installed to inhibit the movement of wild boars in wide forests such as Gangwon-do in South Korea. To identify how long the blocking effect of the fences lasts, further studies are needed focusing on the length and height of the fence, and the conditions of the ground surface.

Detection of Antibody to Infectious Laryngotracheitis Virus by Enzyme Linked Immunosorbent Assay (효소면역법에 의한 닭 전염성 후두기관염 바이러스 항체 측정에 관한 연구)

  • 임숙경;위성하;최정옥;고홍남
    • Korean Journal of Veterinary Service
    • /
    • v.15 no.1
    • /
    • pp.32-45
    • /
    • 1992
  • In order to establish and enzyme-linked immunosorbent assay to ILTV, field virus strain of ILTV was propagated in chorioallantoic membrane of the embryonated eggs. purified and used as antigen. The antisera selected from the field samples and immunized chickens based on serum neutralization test were used as the standard positive and negative sera in all tests. It was found that optimal antigen concentration was $2{\mu}g$ of protein per well and a 1 : 100 dilution of standard serum showed low background optical density with negative serum and high P/N values of positive sera. A 1 : 500 dilution of the rabbit anti-chicken IgG peroxidase conjugate produced a high P/N values and thirty minutes was chosen as suitable time to read the optical density of the enzyme substrate reaction and optical density was consistent during the 16 hours after stopper was treated. When coated antigen was kept on microplate for varying time up to 16 hours at $4^{\circ}C$ or $37^{\circ}C,$ no significant difference was observed between the treatment. The coated antigen could be kept without change of antigenicity for at least one month at $-70^{\circ}C,\; -20^{\circ}C,\; 4^{\circ}C$ and room temperature. When blocking buffer contanining bovine serum albumin was mixed directly with conjugate and serum at 10% level induced higher P/N values compared to blocking antigen coated microplate with the same blocking buffer. The coefficience of correlation between ELISA and SN test was 0.577. When antibody response of chickens, vaccinated with ILTV, was examined by ELISA and SN test, antibody rising and decay pattern between the two test was similar until 11 weeks of age. However 12 weeks onward antibody titer checked on by SN test was slightly lower than that tested by ELISA.

  • PDF

Performance Analysis on Link Quality of Handover Mechanism based on the Terminal Mobility in Wired and Wireless Integrated Networks (유무선 복합망에서 이동 단말 기반 핸드오버의 링크 품질에 관한 성능 분석)

  • Park, Nam-Hun;Gwon, O-Jun;Kim, Yeong-Seon;Gam, Sang-Ha
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2608-2619
    • /
    • 2000
  • This paper proposes the Handover Scheme for the mobile and describes the result of the performance analysis. In the conventional scheme of handover request, the withdrawal of terminal may occur because handover request is performed based on fixed signal level without considering network load and terminal mobility. The proposed scheme offers the minimization of withdrawal and handover blocking probability by means of the handover request of terminal based on the network load and terminal mobility. Conventional handover scheme has the sequential procedure that network performs resource check and path rerouting on the handover by MT(Mobile Terminal). Proposed handover scheme pre-processes the resource check before the handover request by predicting the handover request timo so that handover latency can be reduced. Moreover, path optimization is executed after the completion of handover in order to reduce handover latency. The rdduction of handover latency prevents the dropping of service by minimizing backward handover blocking. In summary, we propose the prediction of handover request time and decision method based on terminal, validating the performance of proposed scheme considering various cases of simulation.

  • PDF

Bandwidth Dimensioning for High-Speed Internet Access Networks (초고속인터넷 가입자망의 대역설계)

  • Lee, Tae-Joon;Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1017-1027
    • /
    • 2006
  • Recently, Internet service providers are offering triple play service which combines voice and video services with the existing high speed Internet service under the common network infrastructure of IP protocol, so that they can create more benefit from operating a single network architecture. In line with this movement in the convergence of network and services, in this work we propose a bandwidth dimensioning method for the subscriber network of the IP network at flow level. To that purpose, let us propose a series of bandwidth dimensioning methods: bandwidth for best effort service only, bandwidth dimensioning for premium services, and bandwidth dimensioning schemes for the premium Internet services as well as the best effort service which comprise the TPS. Our link dimensioning method is based on the flow level that incorporates the flow blocking probability as a measure of grade of services(GoS), and investigates the characteristics of the proposed methods via extensive numerical experiments. After that, let us carry out a simulation experiment concerning the delay and loss performance of the packet scheduling for the premium services (QoS) using the bandwidth designed by our proposed method, via which the packet level quality of service (QoS) for the proposed link dimensioning method can be observed.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.