• Title/Summary/Keyword: Delay Exclusion

Search Result 15, Processing Time 0.022 seconds

An Efficient Mutual Exclusion Algorithm for Hypercube Multicomputers (하이퍼큐브 멀티컴퓨터를 위한 효율적인 상호 배제 알고리즘)

  • Bae, Ihn-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1207-1214
    • /
    • 1996
  • We present an efficient decentralized, symmetric mutual exclusion algorithm for the hypercube architecture. The algorithm is based on the technique which embeds a mesh into a hypercube. We compare the performance of our algorithm with that of Gupta et al.'s algorithm. As a result of performance comparison, the minimum round-trip delay is equal to that of Gupta et al.'s algorithm, the average blocking delay is a little longer than that of Gupta et al.'s algorithm, and the number of messages per access to critical resource is fewer than that of Gupla et al.'s algorithm.

  • PDF

A Study on the Major Revised Contents in Exclusion Clauses of the Institute Cargo Clauses 2009 (2009년 협회적하약관의 면책조항 상 주요 개정내용에 관한 연구)

  • Shin, Gun Hoon;Lee, Byung Mun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.57
    • /
    • pp.137-169
    • /
    • 2013
  • This article intends to analyse some features in Exclusion Clauses of the Institute Cargo Clauses 2009 and the results of analysis are following. First, the insufficiency of packing or preparation exclusion under the revised Clause 4.3 is now more limited than before and the Clause suggest the test of sufficiency or suitability "to withstand the ordinary incidents of the insured transit". Secondly, the word "proximately" was deleted under the revised Clause 4.5 for the insurer to be identified more easily as a cause, but it remains to be seen whether that re-drafting will be successful. Thirdly, The exclusion under the revised Clause 4.6 does not apply unless the insurer can prove that, at the time the subject-matter insured is loaded on board the vessel, the assured was aware, or in the ordinary course of business should have been aware, that the relevant insolvency or financial default could prvent the normal prosecution of the voyage, and to a person who purchase the goods from the assured in good faith under a binding contract. Fourthly, the exclusion in respect of unseaworthiness of vessel under Clause 5.1.1 applies only where the assured is privy to the unseaworthiness, whereas the exclusion in respect of unfitness of container or conveyance under Clause 5.1.2 includes the privity of the employee. Finally, Clause 7 establishes the definition of terrorism, and adds ideological and religious motive to political motive.

  • PDF

Design and Evaluation of a Distributed Mutual Exclusion Algorithmfor Hypercube Multicomputers (하이퍼큐브 멀티컴퓨터를 위한 분산 상호배제 알고리즘의 설계 및 평가)

  • Ha, Sook-Jeong;Bae, Ihn-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2221-2234
    • /
    • 1997
  • Distributed mutual exclusion algorithms have employed two approaches to achieve mutual exclusion and can be divided into two broad classes:token-based and permission-based. Token-based algorithms share a unique token among the nodes and a node is allowed to access its common resources if it possesses the token. Permission-based algorithms require one or more successive rounds of message exchanges among the nodes to obtain the permission to access the common resources. A hypercube architecture has earned wide acceptance in multiprocessor systems in the past few years because of its simple, yet rich topology. Accordingly, we study distributed permission-based mutual exclusion algorithms for hypercubes, and design a distributed permission-based mutual exclusion algorithm based on a new information structure adapted to the hypercubes. The new information structure is a request set of T-pattern from a logical mesh that is embedded into a hypercube. If a node wants to access the common resources, it sends request message to all nodes in the request set by Lan's multicast algorithm. Once the node receives a grant message from all nodes in the request set, it accesses the common resource. We evaluate our algorithm with respect to minimum round-trip delay, blocking delay, and the number of messages per access to the common resource.

  • PDF

A Reactive Cross Collision Exclusionary Backoff Algorithm in IEEE 802.11 Network

  • Pudasaini, Subodh;Chang, Yu-Sun;Shin, Seok-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1098-1115
    • /
    • 2010
  • An inseparable challenge associated with every random access network is the design of an efficient Collision Resolution Algorithm (CRA), since collisions cannot be completely avoided in such network. To maximize the collision resolution efficiency of a popular CRA, namely Binary Exponential Backoff (BEB), we propose a reactive backoff algorithm. The proposed backoff algorithm is reactive in the sense that it updates the contention window based on the previously selected backoff value in the failed contention stage to avoid a typical type of collision, referred as cross-collision. Cross-collision would occur if the contention slot pointed by the currently selected backoff value appeared to be present in the overlapped portion of the adjacent (the previous and the current) windows. The proposed reactive algorithm contributes to significant performance improvements in the network since it offers a supplementary feature of Cross Collision Exclusion (XCE) and also retains the legacy collision mitigation features. We formulate a Markovian model to emulate the characteristics of the proposed algorithm. Based on the solution of the model, we then estimate the throughput and delay performances of WLAN following the signaling mechanisms of the Distributed Coordination Function (DCF) considering IEEE 802.11b system parameters. We validate the accuracy of the analytical performance estimation framework by comparing the analytically obtained results with the results that we obtain from the simulation experiments performed in ns-2. Through the rigorous analysis, based on the validated model, we show that the proposed reactive cross collision exclusionary backoff algorithm significantly enhances the throughput and reduces the average packet delay in the network.

Development portable hair removal applies PET ($Pause^{10-90}$ and $Energy^{20-40}$ $Trigger^{1-7}$) function

  • Kim, Whi-Young
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.223-230
    • /
    • 2009
  • For pulse trigger way and the energy injection rate according to PET ($Pause^{10-90}$ $Energy^{20-40}$ $Trigger^{1-7}$) function, indeed, human body condition, period of dormancy in this research about this back correctly adjustment possible and designed harmless micro carrying along style hair exclusion so that can design and manufacture and run special quality examination and Xenon flash lamp to crawl in human body. Because creating individual's skin model to do stable treatment by light transmission way by skin impedance and measure, must embody treatment special quality of most suitable that draw skin color, energy, wave length, approximately, transmission time, pulse delay etc. and want. Specially, saved standard of war treatment pulse modeling by skin impedance, and manufacture pulse modeling system of most suitable by skin subordinate, and embody suitable treatment pulse. Specially, embody as could do root of a hair exclusion being emitted in pulse form using multi wave length of 560nm, 590nm, 640nm, 755nm and embodied clinical data. If become research repletion furthermore little more, is seen that can approximate in commercialization.

Analysis on Awareness of Construction Labors about Resolution Step of the Delayed Wage Payment (임금체불 해소절차에 대한 건설근로자 인식 분석)

  • Yang, Gi Nam;Kim, Gwang-Hee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.16 no.6
    • /
    • pp.553-560
    • /
    • 2016
  • Wage is a very important issue not only for the workers' current living but also for the future laboring landscape. As of 2014, it is reported that about 290,000 workers suffer from delay in payment of wage. The construction industry is particularly labor-intensive, which implies that delay in payment of wage is a serious problem. Despite this fact, in terms of the delayed payment of wage most studies have been conducted on the improvement of a system to resolve delayed payment in exclusion of labor workers' awareness and thinking. Thus, the purpose of this study is to understand construction labor' awareness and analyze the effectiveness of the resolution step of the delayed payment of wage based on construction labors' awareness. In the research result, more than 30 percent of all construction labors and managers are never aware of the settlement procedure of the delayed payment, and it appears that the resolution step system needs to be greatly improved. In conclusion, it is expected that this study will be utilized as fundamental data for the settlement procedure of the delayed payment, and the influence of delayed payment on construction labors' safety behavior and productivity should be further studied in the future.

Enhanced Security Measurement of Web Application Testing by Outsourcing (외주 개발 웹 어플리케이션 테스팅의 보안성 강화 방안)

  • Choi, Kyong-Ho;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.3-9
    • /
    • 2015
  • A web application that allows a web service created by a internal developer who has security awareness show certain level of security. However, in the case of development by outsourcing, it is inevitable to implement the development centered on requested function rather than the issue of security. Thus in this paper, we improve the software testing process focusing on security for exclusion the leakage of important information and using an unauthorized service that results from the use of the vulnerable web application. The proposed model is able to consider security in the initial stage of development even when outsourced web application, especially, It can prevent the development schedule delay caused by the occurrence of modification for program created by programer who has low security awareness. This result shows that this model can be applied to the national defense area for increasing demand web application centered resource management system to be able to prevent service of web application with security vulnerability based on high test.

Magnetic resonance imaging analysis of rotator cuff tear after shoulder dislocation in a patient older than 40 years

  • Kim, Jung-Han;Park, Jin-Woo;Heo, Si-Young;Noh, Young-Min
    • Clinics in Shoulder and Elbow
    • /
    • v.23 no.3
    • /
    • pp.144-151
    • /
    • 2020
  • Background: This study was designed to evaluate characters of the rotator cuff tear (RCT) recognized after primary shoulder dislocation in patients older than 40. Methods: From 2008 to 2019, patients who visited two hospitals after dislocation were retrospectively reviewed. Inclusion criteria were patients over 40 who had dislocation, with magnetic resonance imaging (MRI) undergone. Exclusion criteria were patients who lost to follow-up, combined with any proximal humerus fracture, brachial plexus injury, and previous operation or dislocation history in the ipsilateral shoulder. Also patients who had only bankart or bony bakart lesion in MRI were excluded. We evaluated RCTs that were recognized by MRI after the primary shoulder dislocation with regard to tear size, degree, involved tendons, fatty degeneration, the age when the first dislocation occurred, and the duration until the MRI was evaluated after the dislocation. Results: Fifty-five RCTs were included. According to age groups, the tear size was increased in coronal and sagittal direction, the number of involved tendons was increased, and the degree of fatty degeneration was advanced in infraspinatus muscle. Thirty-two cases (58.2%) conducted MRI after 3 weeks from the first shoulder dislocation event. This group showed that the retraction size of the coronal plane was increased significantly and the fatty accumulation of the supraspinatus muscle had progressed significantly. Conclusions: Age is also a strong factor to affect the feature of RCT after the shoulder dislocation in patients over 40. And the delay of the MRI may deteriorate the degree of tear size and fatty degeneration.

A Systematic Review of Effects on Sensory Integration Intervention Based on Vestibular-Proprioceptive System for Children in Korea (아동의 전정-고유감각 중심의 감각통합중재 효과에 대한 체계적 고찰: 국내연구를 중심으로)

  • Park, Youngju;Kong, In-Joo
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.13 no.2
    • /
    • pp.53-61
    • /
    • 2015
  • Objective : The purpose of this study was to investigate the effects on sensory integration interventions for korean children which focused on vestibular - proprioceptive system. Methods : Authors systematically searched published studies in DBpia, KISS and RISS databases from August to September 2015. Key words in the search were 'sensory integration intervention', 'sensory integration therapy' and 'vestibular-proprioceptive'. By using the inclusion and exclusion criteria, we selected seven studies for further analyses examining level of evidence and methodological qualities. Information for the analyses were on study designs, participants, interventions, outcome measures and results. Results : Grade IV rated evidence was found from five studies, and Grade III and Grade V rated evidence was found from one for each study. The methodological levels of the quantitative studies were 'fair' (2) and 'poor' (5). Subjects for the studies were developmental delay (5), Asperger Syndrome (1), and not specific diagnosis (2). Single-subject design was most frequently used and motor area were most frequently evaluated. The interventions used the studies showed positive effects on outcome measures. Conclusion : This study presented the summary of sensory integration intervention based on vestibular-proprioceptive system for Korean children. More studies with high level of evidence and various study designs need to be followed.

Study Protocol for the Most Effective Recall Method in a Cervical Cancer Screening Program in Klang, Malaysia

  • Rashid, Rima Marhayu Abdul;Dahlui, Maznah
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.10
    • /
    • pp.5867-5870
    • /
    • 2013
  • Background: Cervical cancer is the second most common cancer among Malaysian women with an ASR of 17.9 and a mortality rate of 5.6 per 100,000 population in 2008 (GLOBOCAN, 2008). The 5 year prevalence was estimated to be 14.5 per 100,000 population. As the second most common cancer affecting productive females, cervical cancer imposes an impact to the socioeconomic aspect of the country. However, the poor uptake of cervical cancer screening is a major problem in detecting early pre-cancerous lesions and thus, delay in initiating treatment for cervical cancer. Realizing the urgency to increase the uptake of PAP smear, besides enhancing the promotion of PAP smear screening for women above 35 years old, the call-recall system for pap smear screening had been piloted in one of the suburban districts which aimed to improve regular participation of women for cervical and breast cancer screening. This is of public health importance as identifying the best feasible option to increase patient's respond to participate in the screening program effectively in our setting will be helpful in implementing an organized regular population based screening program tailored to our setting. The pilot program of cervical cancer screening in Klang was an opportunity to assess different options in recalling patients for a repeat pap smear to increase their participation and adherence to the program. Methods and Results: This was a population based randomized control trial. Women aged 20-65 years in the population that matched the inclusion and exclusion criteria were re-called for a repeat smear. There are four different intervention groups; letter, registered letters, short messages services (SMS) and phone calls where 250 subjects were recruited into each group. Samples were generated randomly from the same population in Klang into four different groups. The first group received a recall letter for a repeat smear similar to the one that has been given during the first invitation. The intervention groups were either be given a registered letter, an SMS or a phone call to re-call them. The socio-demographic data of the patients who came for uptake were collected for further analysis. All the groups were followed up after 8 weeks to assess their compliance to the recall. Conclusions: The study will provide recommendations about the most effective methods for recall in a population based pap smear screening program on two outcomes: i) patients response; ii) uptake for repeat pap smear.