• Title/Summary/Keyword: Starvation problem

Search Result 40, Processing Time 0.022 seconds

Strategy For Improvement of Food Crisis in North Korea (북한의 식량문제 해결방안)

  • Choi Young Il
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 1998.10a
    • /
    • pp.112-133
    • /
    • 1998
  • The Food Problem of North Korea is well known to all of us. And we, South-Koreans, are oblidged to solve the food problem of North Korea because we should prepare and cope with the reunification of Korean Penninsula in the near future. Although many organizations of the UN (including Korea) are engaged in food-support to North Korea from the humanitarian viewpoint, a great many people are disclosed to the starvation for the food deficiency. Now how to solve the food problem of North Korea? It is the agro-cooperation between South and North Korea. The most realistic method among them is the agro-cultivation in contract.

  • PDF

New Transient Request with Loose Ordering for Token Coherence Protocol (토큰 코히런스 프로토콜을 위한 경서열 트렌지언트 요청 처리 방법)

  • Park, Yun Kyung;Kim, Dae Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.10
    • /
    • pp.615-619
    • /
    • 2005
  • Token coherence protocol has many good reasons against snooping/directory-based protocol in terms of latency, bandwidth, and complexity. Token counting easily maintains correctness of the protocol without global ordering of request which is basis of other dominant cache coherence protocols. But this lack of global ordering causes starvation which is not happening in snooping/directory-based protocols. Token coherence protocol solves this problem by providing an emergency mechanism called persistent request. It enforces other processors in the competition (or accessing same shared memory block, to give up their tokens to feed a starving processor. However, as the number of processors grows in a system, the frequency of starvation occurrence increases. In other words, the situation where persistent request occurs becomes too frequent to be emergent. As the frequency of persistent requests increases, not only the cost of each persistent matters since it is based on broadcasting to all processors, but also the increased traffic of persistent requests will saturate the bandwidth of multiprocessor interconnection network. This paper proposes a new request mechanism that defines order of requests to reduce occurrence of persistent requests. This ordering mechanism has been designed to be decentralized since centralized mechanism in both snooping-based protocol and directory-based protocol is one of primary reasons why token coherence protocol has advantage in terms of latency and bandwidth against these two dominant Protocols.

Shakespeare and Food: Examples of Sir Thomas More, Coriolanus, and Pericles (셰익스피어와 음식-『토마스 모어 경』, 『코리올레이너스』, 『페리클리즈』를 중심으로)

  • Han, Younglim
    • Journal of English Language & Literature
    • /
    • v.57 no.4
    • /
    • pp.651-674
    • /
    • 2011
  • This paper approaches Sir Thomas More, Coriolanus, Pericles in terms of the relationship of food to national identity. These three plays examine ways in which food is essential to what constitutes English national identity, and food shortages give rise to riots thereby throwing everyday life into disorder. In Sir Thomas More food shortages are caused by foreign foodstuff and foreign habits of consumption. Rioting Londoners fear that the European foreigners' strange dietary habits would do harm on English food, the English body and English economy. In Coriolanus starvation is the primary trigger for the enmity between the senators and citizens. Menenius employs the fable of the belly to quell the hungry citizens' anger and to emphasize the senators' role as a store of nutrition to feed the body, that is, the citizens. Coriolanus' contempt for the body's need comes to a devastating end. In Pericles the famine is brought about by the gluttonous consumption of specific foods. The problem of greedy consumption becomes that of living in the cannibalistic situation where mothers are willing to eat their children and married couples one another. Pericles feeds the hungry people with bread, and is also saved from starvation by the fishermen after shipwreck. In this way the three plays provide the examples of Shakespeare's notion on healthy food and feeding.

Concurrency Control with Dynamic Adjustment of Serialization Order in Multilevel Secure DBMS (다단계 보안 데이타베이스에서 직렬화 순서의 동적 재조정을 사용한 병행수행 제어 기법)

  • Kim, Myung-Eun;Park, Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.15-28
    • /
    • 1999
  • In Multilevel Secure Database Management System(MLS/DBMS), we assume that system has a security clearance level for each user and a classification level for each data item in system and the objective of these systems is to protect secure information from unauthorized user. Many algorithms which have been researched have focus on removing covert channel by modifying conventional lock-based algorithm or timestamp-based algorithm. but there is high-level starvation problem that high level transaction is aborted by low level transaction repeatedly. In order to solve this problem, we propose an algorithm to reduce high-level starvation using dynamic adjustment of serialization order, which is basically using orange lock. Because our algorithm is based on a single version unlike conventional secure algorithms which are performed on multiversion, it can get high degree of concurrency control. we also show that it guarantees the serializability of concurrent execution, and satisfies secure properties of MLS/DBMS.

A Counter-based Adaptive Priority Scheduling Policy for the Readers-Writers Problem (독자-필자 문제를 위한 카운터 기반의 적응적 우선 스케줄링 정책)

  • Kang, Sung-Il;Lee, Heung-Kyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2997-3009
    • /
    • 1998
  • 독자-필자 문제(readers-writers problem)를 위한 기존의 스케쥴링 정책들은 대부분 독자나 필자 중 어느 한 쪽에 편향된 처리 성향을 가지고 있기 때문에 응답 시간이나 처리량, 둘 중 하나의 성능이 상당히 좋지 않은 특성이 있다. 본 논문에서는 이러한 문제를 개선하고자 새로룬 동적 스케쥴링 정책인 CAP(Counter-based Adaptive Priority)을 제안한다. CAP은 동시에 수행될 수 없는 필자에게 가중치를 주는 기법과 소수의 독자를 무작정 지연시키는 것을 막기 위한 에이징(aging) 기법을 동적으로 결합하여 사용하고 있다. CAP은 기는(starvation) 문제를 가지고 있지 않으며 주어진 상황에 동적으로 대응하는 능력을 가지고 있기 때문에 처리량과 응답 시간 모두 FCFS에 비하여 더 우수하다. 제안된 정책에 대한 효과성을 입증하기 위하여 세마포어 기반의 해법을 제시하고 사건-기반 시뮬레이션을 사용하여 기존의 정책들과 성능을 비교하였다.

  • PDF

Fair Scheduling for Throughput Improvement in Wireless Mesh Networks

  • Tran, Nguyen H.;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1310-1312
    • /
    • 2007
  • Throughput improvement problem in wireless mesh network can be alleviated by equipped mesh router with multiple radios tuned into orthogonal channels. However, some links on the same channel also can be activated concurrently if the Signal-to-Noise and Interference Ratio (SNIR) at their receiver endpoints is not lower than the threshold. We propose a greedy algorithm to investigate the problem of how to schedule a set of feasible transmission under physical interference model by using the spatial time-division multiple-access (STDMA) scheme. We also consider the fairness in scheduling to prevent some border nodes from starvation. We evaluate our algorithms through extensive simulation and the results show that our algorithms can achieve better aggregate throughput and fairness performance than 802.11 standard.

  • PDF

A Token-based Mutual Exclusion Algorithm in Mobile Computing Environments (모바일 컴퓨팅 환경에서의 토큰기반 상호배제 알고리즘)

  • Yang, Seung-Il;Lee, Tae-Gyu;Park, Sung-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.263-274
    • /
    • 2010
  • Mutual exclusion that applied on existing systems was designed for static distributed systems. but now computing environments are going to mobile computing environments. Therefore a mutual exclusion algorithm in static distributed environments should be designed for new computing environments. So this paper proposes a mobile mutual exclusion algorithm to support the mutual exclusion of shared resources in mobile computer environments. Mobile computing resources as wireless hosts cause new issues because of their mobility and weakness and made mutual exclusion problem more complex than stationary distributed environments. So we proposed a new mobile token mutual exclusion algorithm with deadlock-free and starvation-free in mobile computing environments based on spanning tree topology and extend for mobile computing environments. The proposed algorithm minimizes message complexity in case of free hopping in cellular networks.

Priority- and Budget-Based Protocol Processing Using The Bottom-Half Mechanism for End-to-End QoS Support (종단간 QoS 지원을 위해 Bottom-half 메커니즘을 이용한 우선순위 및 예산 기반의 네트워크 프로토콜 처리)

  • Kim, Ji-Min;Ryu, Min-Soo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.189-198
    • /
    • 2009
  • The traditional interrupt-based protocol processing at end hosts has two priority-inversion problems. First, low-priority packets may interrupt and delay high-priority process executionssince interrupts have the highest priority in most operating systems. Second, low-priority packet may delay high priority packets when they arrive almost simultaneously since interrupt processing is performed in a FCFS (first come, first served) order. These problems can be solved by a priority-based protocol processing policy and implementation. However, general priority-based schemes commonly have the problem of starvation and cannot support the each network flow requiring the mutually exclusive QoS since the packets are processed in the FCFS order. Therefore, the priority-based schemes are not appropriate for different QoS-demanding applications. In this paper, we present a bottom-half-based approach that relies on priority- and budget-based processing. The proposed approach allows us to solve both the starvation and priority-inversion problems, and further enables effective QoS isolation between different network connections. This feature also enables bounding the protocol processing time at an end host. We finally show through experiments that the proposed approach achieves QoS isolation and control.

Enhancements of the Modified PCF in IEEE 802.11 WLANs

  • Kanjanavapastit Apichan;Landfeldt Bjorn
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.313-324
    • /
    • 2005
  • The success of the IEEE 802.11 standard has prompted research into efficiency of the different medium access methods and their support for different traffic types. A modified version of the point coordination function (PCF) called modified PCF has been introduced as a way to improve the efficiency over the standard method. It has been shown through a simulation study and a mathematical analysis that channel utilization can be much improved compared to the standard, in case there is no so-called hidden station problem. However, under the hidden station problem, the efficiency of the modified PCF would obviously decrease. In this paper, some enhancements of the modified PCF are introduced. Firstly, we propose a retransmission process to allow frames involved in collisions to be retransmitted. Then, we propose a collision resolution mechanism to reduce the frame collision probability due to the hidden station problem. In addition, we propose a priority scheme to support prioritization for different traffic types such as interactive voice and video, and real-time data traffic in the modified PCF. To prevent the starvation of one low priority traffic, minimum transmission period is also guaranteed to each traffic type via an admission control algorithm. We study the performance of the modified PCF under the hidden station problem and the performance of the modified PCF with priority scheme through simulations. To illustrate the efficiency of the priority scheme, we therefore compare its simulation results with those of some standardized protocols: The distributed coordination function (DCF), the enhanced distributed channel access (EDCA), the PCF, and our previously proposed protocol: The modified PCF without priority scheme. The simulation results show that the increment of delay in the network due to the hidden station problem can be reduced using the proposed collision resolution mechanism. In addition, in a given scenario the modified PCF with priority scheme can provide better quality of service (QoS) support to different traffic types and also support a higher number of data stations than the previous proposals.

Reader Collision Avoidance Scheme for Mobile RFID-Sensor Integrated Networks

  • Ko, Doo-Hyun;Kim, Song-Min;Lee, Sang-Bin;An, Sun-Shin
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.108-117
    • /
    • 2009
  • In recent years, one of alternatives for constructing RFID networks that provide mobile services is using wireless sensor networks (WSN) to enhance network capacity, utility and scalability. Due to absence of compatible reader anti-collision control and channel capture phenomenon, the medium access control protocols as used in the RFID networks lead to reader collision and starvation problem. In this paper, we develop a MAC protocol which is called Enhanced Collision Avoidance MAC (ECO) to avoid reader to reader collisions in an integrated RFID network. ECO is a CSMA-based MAC protocol, and operates on integrated nodes which consist of a RFID reader and a mote. Performance evaluation shows superior results to pure-CSMA protocols under dense deployment environments, both in number of failures and in throughput.

  • PDF