• Title/Summary/Keyword: Number of conflicts

Search Result 224, Processing Time 0.019 seconds

USING TABU SEARCH IN CSPS

  • Gupta, D.K.
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.1
    • /
    • pp.181-197
    • /
    • 2001
  • A heuristic method TABU-CSP using Tabu Search (TS) is described for solving Constraint Satisfaction Problems (CSPs). The method is started with a complete but inconsistent solution of a binary CSP and obtained in prespecified number of iterations either a consistent solution or a near optimal solution with an acceptable number of conflicts. The repair in the solution at each iterative step is done by using two heuristics alternatively. The first heuristic is a min-conflicts heuristic that chooses a variable with the maximum number of conflicts and reassigns it the value which leads to the minimum number of conflicts. If the acceptable solution is not reached after the search continued for a certain number of iterations, the min-conflict heuristic is changed and the variable selected least number of times is chosen for repair. If an acceptable solution is not reached, the method switches back to the min-conflict heuristic and proceeds further. This allowed the method to explore a different region of search space space for the solution as well as to prevent cycling. The demonstration of the method is shown on a toy problem [9]which has no solution. The method is then tested on various randomly generated CSPs with different starting solutions. The performance of the proposed method in terms of the average number of consistency is checked and the average number of conflicts is conflicts is compared with that of the Branch and Bound(BB) method used to obtain the same solution. In almost all cases, the proposed method moves faster to the acceptable solution than BB.

The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control (RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델)

  • Im Hyun-Soo;Cho Eun-Ae;Moon Chang-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.51-55
    • /
    • 2005
  • Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

  • PDF

Minimization of Spill Code Insertion by Register Constraint Analysis for Code Generation for Application Specific DSPs

  • Watanabe, Tatsuo;Ishiura, Nagisa
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.953-956
    • /
    • 2000
  • Application specific DSPs often employ irregular datapath structures with distributed registers. In the scheduling phase of retargetable compilation, resolution of register usage conflicts comes to be a new constraint for such datapaths. This paper presents a method of register constraint analysis which attempts to minimize the number of the spill codes required for resolving the register usage conflicts. It searches for a set of ordering restrictions among operations which sequentialize the lifetimes of the values residing in the same register as much as possible and thus minimize the number of the register conflict. Experimental results show that a combination of the proposed register constraint, analysis and list-based scheduling reduces the number of the register spills into 25%.

  • PDF

An Analysis on the Factors related to the Family Business Performance (가족기업의 성공 관련 요인 분석)

  • 정순희
    • Journal of Family Resource Management and Policy Review
    • /
    • v.6 no.1
    • /
    • pp.103-115
    • /
    • 2002
  • The purpose of this study was to analyze which factor, influenced the business and family performance success. Data were obtained from 248 family households. Proxy variable of the business performance was gross business income and of the family performance was the Family AFGAR scores. The multiple regression analysis was conducted for both the business performance equation and family performance equation. The main results of this study were as followings: The results indicated the effects of various business and family characteristics on performance and their contributions to the business and family performance model. Nine explanatory variables such as sex, being home-based, number of hours worked per week, number of family employee, number of nonfamily employee, total asset, the presence of young child under 6, nonbusiness income, and role conflicts were statistically significant in the business performance equation and three explanatory variables such as the hours worked per week, family stress scores, and role conflicts were statistically significant in the family performance equation. The results indicated the need for a more comprehensive view of family business performance.

  • PDF

Stakeholder Conflict Resolution Model (S-CRM) Based On Supervised Learning

  • Jeon, Chang-Kyun;Kim, Neung-Hoe;Lee, Dong-Hyun;Lee, Taek;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2813-2826
    • /
    • 2012
  • Various stakeholders are involved in the creation of software projects. In general, the higher the number of stakeholders involved during the requirements elicitation phase, the better are the chances of success for the project. However, it is rather difficult to consider the opinion of all the stakeholders owing to constraints on time and resources. Furthermore, conflicts between stakeholders can become inevitable when the number of stakeholders increases. Thus, the identification of key stakeholders is an important factor in ensuring the success of a project. In this paper, a methodical stakeholder conflict resolution model (s-CRM) is proposed by considering an actual industrial case study. The proposed model uses information gain based on entropy when measuring the impurity of information. We believe that the proposed s-CRM is effective in identifying the key stakeholders and in intuitively indicating those stakeholders whose elicited requirements need to be weighted. In addition, the model provides a solution for conflicts among stakeholders during requirements engineering.

A Study of the Relationship between Communication Patterns and Conflict between Old Parents and Adult Children (노부모와 성인자녀간의 의사소통 유형과 갈등에 관한 연구)

  • Shin, Il-Jin;Kim, Tae-Hyun
    • Journal of Families and Better Life
    • /
    • v.9 no.1 s.17
    • /
    • pp.27-44
    • /
    • 1991
  • The purpose of this study is to investigate the relationship between communication pattern and conflict between old parents and their adult children. For this purose, 380 adult children are surveyed therefore the answers of survey are described by adult children only. The number of old parents turn to be 230 old fathers and 301 old mothers respectively, there numbers have included the case both parents are alive. The data were analysed several method with SPSS and the methods used for the analysis are Factor analysis, one way ANOVA, Scheffe-Test, Pearson's Correlation, Multple Regression. The results of this study are summarizd as follows ; 1) Old parents's communication patterns differ each other and under many variables. 2) In the conflicts between old parents and adult children differ each other and under many variables, too. 3) The relationship between communication patterens and conflict between old parent and adult children turn to be as follows : Two communication styles ie, the autoritarian style and insincere style increse conflicts. Frendly style have negatve affect to conflicts and decreses the conflicts. Sacrifice style is turn to have slightly affect the conflict.

  • PDF

An Analysis of the Tendency of Native Studies on Children's Social Conflicts (유아의 사회적 갈등에 대한 국내연구 동향 분석)

  • Kim, Yong-Sook;Park, Ji-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.3934-3942
    • /
    • 2012
  • This study heads for analysing precedent studies on children's social conflicts and groping for the tendency of change investigation, according to streams. So, this study selected and analysed 101 books as a study standard, basing on native studies. The collected materials were handled with frequency and percentage. The summary of the study is as followings. First, the progress of the studies on children's social conflict, classified with years, showed an increase from 1995 to 2005, but it showed a decrease after 2005. Second, as for an object of a study on children's social conflicts, the study frequency on conflicts among peers was high greatly, but the study frequency on parent-child, teacher-child conflicts was low comparatively. As for a number of the study object, the study frequency on the object less than 50 was the highest, and the study frequency on 50-100 was high, the next. As for a study period, short-period study was the most, but longitudinal study was not performed at all. As a study type, quantitative study was comparatively higher than qualitative study. Experimental handling method was the highest. The number of study tools was high in order of 1, 2, and 3. Third, as a subject of the study on children's social conflicts, the subject of study on relationship between children's social conflict factors and their development was the most, and children's social conflict factors, and children's social conflict aspect analysis, and children's conflict solution strategy in order.

Safety Analysis on Pedestrian Crossings in Urban Corridors with Bus Rapid Transit System (중앙버스전용차로 횡단보도의 보행 안전도 평가)

  • Han, Sang-Jin;Kim, Kewn-Jung
    • International Journal of Highway Engineering
    • /
    • v.10 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • Seoul metropolitan government has introduced Bus Rapid Transit (BRT) systems in some major urban corridors on July 1st, 2004, and has reported that it was successful on the ground that bus speed has been increased in the corridors with BRT system and that it has also resulted in the increase of bus patrons. However, there comes a negative claim that BRT has increased the number of fatalities in the same corridors. This study first aims at developing safety evaluation indicators of pedestrian crossings, then compares values of those indicators from pedestrian crossings with and without BRT systems. The safety evaluation indicators of pedestrian crossing are developed as: the number (or ratio) of conflicts between pedestrians and vehicles, the number (or ratio) of vehicles violating pedestrian signals, the number (or ratio) of pedestrians remaining crossings at red signals, and the number (ratio) of pedestrians walking beyond crossing areas. When we compare values of these indicators for both pedestrian crossings with and without BRT system, it has turned out that crossings with BRT systems has more number of conflicts than the crossings without BRT systems, but it cannot be said that the ratio of conflicts will be different between two crossing types. It means that the number of conflict will increase as the number of pedestrians and vehicles in the crossings. When we note that BRT system intrinsically attract more number of pedestrians who get-in or get-off bus stops, we cannot said that BRT system will be safer for pedestrians.

  • PDF

Development of Methodology for the Analysis of Level-of-Service of Non-Controlled Intersections (무통제 교차로의 서비스수준 결정 방법론에 관한 연구)

  • 김정현;김영찬
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.5
    • /
    • pp.31-40
    • /
    • 2003
  • Unsignalized intersections are classified into two-way-stop-controlled(TWSC) and all-way-stop-controlled(AWSC) intersections for the analysis of capacity and level of service. There is no AWSC intersection in Korea, but non-controlled intersections are common. Non-controlled intersections are operated only by the driver's decision without any control. However, the study for the analysis of capacity and level of service of the non-controlled intersection has been rare. As the first stage research, this study aims to determine the measure-of-effectiveness (MOE) for the performance evaluation of non-controlled intersections. The relationships between traffic volume and the intersection passing time (delay) and number of conflicts on each intersection are analyzed. It was found that the number of conflicts were more sensitive to the traffic volume compared with the delay. It means that number of conflicts can be the MOE for the performance of non-controlled intersection. The analysis of the number of conflicts and traffic volume showed a linear relationship, so that traffic volume can also be an MOE. The level of service of non-controlled intersection can be determined with either of the MOE's. Since the performance is also influenced by the ratio of traffic volumes of crossing streets, the traffic volume should be adjusted by the ratio. The capacity of non-controlled intersection was suggested to be 2,000veh/hr referring that of AWSC intersection in the USHCM. The criteria was suggested by evenly dividing the traffic volumes based on the capacity.

Driving Behaivor Optimization Using Genetic Algorithm and Analysis of Traffic Safety for Non-Autonomous Vehicles by Autonomous Vehicle Penetration Rate (유전알고리즘을 이용한 주행행태 최적화 및 자율주행차 도입률별 일반자동차 교통류 안전성 분석)

  • Somyoung Shin;Shinhyoung Park;Jiho Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.30-42
    • /
    • 2023
  • Various studies have been conducted using microtraffic simulation (VISSIM) to analyze the safety of traffic flow when introducing autonomous vehicles. However, no studies have analyzed traffic safety in mixed traffic while considering the driving behavior of general vehicles as a parameter in VISSIM. Therefore, the aim of this study was to optimize the input variables of VISSIM for non-autonomous vehicles through genetic algorithms to obtain realistic behavior. A traffic safety analysis was then performed according to the penetration rate of autonomous vehicles. In a 640 meter section of US highway I-101, the number of conflicts was analyzed when the trailing vehicle was a non-autonomous vehicle. The total number of conflicts increased until the proportion of autonomous vehicles exceeded 20%, and the number of conflicts decreased continuously after exceeding 20%. The number of conflicts between non-autonomous vehicles and autonomous vehicles increased with proportions of autonomous vehicles of up to 60%. However, there was a limitation in that the driving behavior of autonomous vehicles was based on the results of the literature and did not represent actual driving behavior. Therefore, for a more accurate analysis, future studies should reflect the actual driving behavior of autonomous vehicles.