• Title/Summary/Keyword: priority mechanism

Search Result 235, Processing Time 0.024 seconds

The Impacts of Uses of Childcare Facilities on Mothers' Labor Supply under a Rationing Mechanism (보육시설이용이 기혼여성 취업에 미치는 영향 - 어린이집 입소 순위를 중심으로 -)

  • Lim, Eunjae;Yoon, Jayoung
    • Journal of Labour Economics
    • /
    • v.43 no.1
    • /
    • pp.59-91
    • /
    • 2020
  • The recent reform of child care policy is to give priority to double-income households in the use of childcare facilities. This study analyzed the effect of the use of childcare facilities on the employment of married women under the on-going reform. Using the data from the 19th and 21st wave of the Korean Labor and Income Study, the marginal treatment effect (MTE) analysis method was used to eliminate the selection bias in which the sub-population targeted for policy is determined according to the priority when childcare demand exceeds supply. The study finds that the employment effect of married women who use childcare facilities does not differ statistically from the employment effect of married women who do not use childcare facilities.

  • PDF

Efficient Migration of Service Agent in P-Grid Environments based-on Mobile Agent (이동에이전트 기반의 P-그리드 환경에서 서비스 에이전트의 효율적인 이주기법)

  • Kook, Youn-Gyou;Uem, Young-Hyun;Jung, Gye-Dong;Chio, Yung-Geun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.131-134
    • /
    • 2005
  • This paper describes the efficient peer-to-peer migration method of Grid service agent on the mobile agent based P-Grid. The migration mechanism for transmitting service agent upon the service request is based on the peer's logic network topology. The network topologies that this system uses are organized as star topology, ring topology and tree topology, and agents are migrated by the master/slave method and serial/parallel method. The migration method of services is chosen based on the execution range and characteristic of the requested service. Also, the entire execution time of service is affected by the performance of peer that is a part of network topology, and the migration order, Therefore, the system monitors the performance of peers, and determines the migration priority based on analyzing and learning history. The system can reduce service execution time efficiently with decisions of migration method for service agent and priority of peers.

  • PDF

A Study on Preparing Measures for Reducing Aggressive Driving and Road Rage by Analysing Mechanism of How the Driving Behavior Determinants and Dangerous Driving Behavior Factors Affect Aggressive Driving and Road Rage: Targeting Traffic Law Violator and Assaulter of a Traffic Accident (운전행동 결정요인과 위험운전 행동요인이 난폭운전과 보복운전에 미치는 메커니즘 분석을 통한 대책마련 연구: 교통법규위반자 및 교통사고야기자를 대상으로)

  • KIM, Soo Jin;JUNG, Cheol Su;JANG, Seok Yong
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.15-28
    • /
    • 2016
  • The purpose of this study is to prepare countermeasures for aggressive driving and road rage which have recently become a hot issue by analysing mechanism of how the driving behavior determinants(personal anger and aggression) and dangerous driving behavior factors(aggressive driving behavior and over-speeding driving behavior, drunk driving behavior, inattentive driving behavior, and inexperience driving behavior) affect aggressive driving and road rage. From the survey conducted by seven branches of the Road Traffic Authority with 351 people who were traffic offenders and drivers who caused car accidents, this study obtained three results as follows. First, seriousness of aggressive driving and road rage and requirements as types of customized educations, proper length of time for education, and contents of education can be understood. Second, specific relation and mechanism between the driving behavior determinants and dangerous driving behavior factors with respect to aggressive driving and road rage can be clearly identified, which helps to set order of priority and weighting of measures for reducing aggressive driving and road rage. Third, countermeasures can be categorized as corporate measures or customized measures through mechanism analysis model of aggressive driving and road rage.

Class Gated Dynamic Bandwidth Allocation Algorithm for supporting QoS in the EPON (EPON 시스템에서 효율적인 QoS 제공을 위한 Class Gated 동적 대역 할당 알고리즘)

  • Hwang Jun-Ho;Kim Hyo-Won;Yoo Myung-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.94-103
    • /
    • 2006
  • Ethernet passive optical network (EPON) has drawn many attention as a promising access network technology for FTTH because it can provide a high bandwidth with a low cost. Since the uplink bandwidth in the EPON system is shared by many users, it is necessary for an EPON system to have an efficient bandwidth allocation mechanism. To support QoS in EPON, the previous bandwidth allocation schemes employ strict priority queueing (SPQ). Since SPQ gives unlimited priority to higher service class, the QoS of lower service classes gets worse. In this paper, we propose Class Gated DBA (Dynamic Bandwidth Allocation) algorithm in which the bandwidth is requested / granted in a service class basis. To avoid the monopoly in bandwidth usage by higher classes the maximum bandwidth that is allocate to each service class is limited (fairness between services classes). In addition, to avoid the monopoly in bandwidth usage by some particular users, each ONU runs fairness bandwidth allocation algorithm within each service classes. Through computer simulations, it is verified that the proposed algorithm achieves a good level of QoS, and at the same time maintains a good level of fairness between both service classes and users.

A Study on the Call Admission Control with Overflow and Preemption at Adaptive Moving Boundary in Cellular Mobile Communications (셀룰러 이동통신망의 적응성 가변경계에서 Overflow와 Preemption을 갖는 호 접속제어 방안 연구)

  • 노희정
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.4
    • /
    • pp.171-180
    • /
    • 2004
  • CDP(handoff Call Dropping Probability) and CBP(new Call Blocking Probability) have been used as two important call level QoS parameters in cellular mobile communications. But, many methods to reduce CDP without considering CBP have been studied, and hand-off call priority scheme has been introduced. But the use of hand-off call priority scheme increases CBP and decreases channel utilization rate depending on the number of reserved channel for priority. In this paper, we propose a CAC(Call Admission Control) algorithm with overflow and preemption to solve the problem caused by considering CDP and CBP in calculation of the number of channel reserved. The problem is the increase of CDP as the traffic load increases. In our CAC algorithm, hand-off call is permitted to use(overflow) unreserved and unused channel if there is no reserved and unused channel, and new call is permitted to use(preemption) the channel overflowed by hand-off call if there is no unreserved and unused channel. This mechanism of calculation of the number of reserved channel and CAC algorithm is expected to increase channel utilization rate, and can be applied to media-based QoS provision in cellular mobile communications.

Congestion Control Mechanism using Real Time Signaling Information in ATM based MPLS Network (ATM 기반 MPLS 망에서 실시간 신호정보를 이용한 체증 제어 기법)

  • Ahn, Gwi-Im
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.462-469
    • /
    • 2007
  • ATM protocol has the techniques such as cell discarding priority, traffic shaping and traffic policing. ATM based MPLS(Multiprotocol Label Switching) is discussed for its provisioning QoS commitment capabilities, traffic engineering and smooth migration for BcN using conventional ATM infra in Korea. This paper proposes preventive congestion control mechanism for detecting HTR(Hard To Reach) LSP(Label Switched Path) in ATM based MPLS systems. In particular, we decide HTR LSP using real time signaling information(etc., PTI,AIS/RDI) for applying HTR concept in circuit switching to ATM based MPLS systems and use those session gap and percentage based control algorithm that were used in conventional PSTN call controls. We concluded that it maximized the efficiency of network resources by restricting ineffective machine attempts. Proposed control can handle 208% call processing and more than 147% success call, than those without control. It can handle 187% BHCA(Busy Hour Call Attempts) with 100 times less than use of exchange memory.

  • PDF

Concurrency Control Based on Triggering Relationship for Real-Time Active Database (실시간 능동 데이터베이스에서 triggering 관계를 고려한 동시성 제어 기법)

  • 홍석희
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.10-23
    • /
    • 2001
  • Transactions in real-time active databases have the notion of activeness where transactions are generated by external effects and another transaction. In this paper, we propose the multi version concurrency control algorithm for real-time active transactions. A real-time active transaction has a timing constraint in the form of a deadline until which the user wants to complete the transaction, and is characterized by triggering relationships which mean that association between a transaction that triggers the execution of another transaction and the triggered transaction. The triggering relationship is an important factor to resolve data conflicts among real-time active transactions. The proposed concurrency control mechanism resolves data conflicts by considering triggering relationships between conflicting transactions as well as priorities and precedence relationships. The conflict resolution mechanism considers association types of the triggering relationship such as abort and commit dependency, and then resolves data conflicts in favor of higher priority transactions. We also present the experimental results of our algorithm comparing other real-time active concurrency control algorithms.

  • PDF

Survey of Curriculum for 4 Subjects (Structure and Function of Human Body, Clinical Microbiology, Pathophysiology, & Mechanism and Effect of Drugs) of Biological Nursing in Undergraduate Nursing Education (4년제 간호교육기관의 기초간호학 4개 교과목(인체 구조와 기능, 병원미생물학, 병태생리학, 약물의 기전과 효과) 운영 현황)

  • Lee, Kyung-Sook;Choi, Eun-Ok;Jeong, Jae Sim
    • Journal of Korean Biological Nursing Science
    • /
    • v.16 no.1
    • /
    • pp.17-25
    • /
    • 2014
  • Purpose: The purpose of this study was to review the curriculum on biological nursing: structure and function of the human body, clinical microbiology, pathophysiology, and function and effect of drugs. Methods: Data was collected by searching and reviewing internet websites of 102 nursing schools or universities which provide 4 years nursing education in the Republic of Korea. The 74 curriculum on biological nursing science were available and analyzed by title, credits, hours, types of major (core or selective), offering semester, and laboratory practice. Results: The titles of 4 courses were diverse and were offered as core major (core requisites) or selective major. Structure and function of human body was offered in priority with more credits. Laboratory practice was poorly established in most courses. Biological nursing science courses were mostly taught in the second semester of the first year and the first or second semester of second year nursing education courses. Conclusion: There is a need to standardize the curriculum on biological nursing science and to expand the use of titles proposed by academic society. Also further research is necessary to identify curriculum details and to reflect the needs of professors.

Reusing Technique of Primitive Motions for Effective Implementation of Complex Action (복합적 행동들을 효율적으로 구현하기 위한 기본 동작의 재활용 기법)

  • Choi, Jun-Seong;Park, Jong-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.1-13
    • /
    • 2014
  • Apart from the physical realism, the implementation of various physical actions of an agent to respond to dynamically changing situations is essential for the design of an agent in a cyber world. To achieve a maximum diversity in actions, we develop a mechanism that allows composite actions to be constructed by reusing a set of primitive motions and enables an agent to instantly react to changes in the ambient states. Specifically we model an agent's body in terms of joints, and a primitive or composite motion is performed in a real time. To implement this mechanism, we produce an animation for basic joint movements and develop a method to construct overall motions out of the primitive motions. These motions can be assembled into a plan by which an agent can achieve a goal. In this manner, diverse actions can be implemented without excessive efforts. This approach has conspicuous advantages when constructing a parallel action, e.g., eating while walking, that is, two or more parallel actions can be naturally merged into a parallel action according to their priority. We implement several composite and parallel actions to demonstrate the viability of our approach.

A Study on Mechanism of Intelligent Cyber Attack Path Analysis (지능형 사이버 공격 경로 분석 방법에 관한 연구)

  • Kim, Nam-Uk;Lee, Dong-Gyu;Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.93-100
    • /
    • 2021
  • Damage caused by intelligent cyber attacks not only disrupts system operations and leaks information, but also entails massive economic damage. Recently, cyber attacks have a distinct goal and use advanced attack tools and techniques to accurately infiltrate the target. In order to minimize the damage caused by such an intelligent cyber attack, it is necessary to block the cyber attack at the beginning or during the attack to prevent it from invading the target's core system. Recently, technologies for predicting cyber attack paths and analyzing risk level of cyber attack using big data or artificial intelligence technologies are being studied. In this paper, a cyber attack path analysis method using attack tree and RFI is proposed as a basic algorithm for the development of an automated cyber attack path prediction system. The attack path is visualized using the attack tree, and the priority of the path that can move to the next step is determined using the RFI technique in each attack step. Based on the proposed mechanism, it can contribute to the development of an automated cyber attack path prediction system using big data and deep learning technology.